Next Article in Journal
Geometric Positioning for Satellite Imagery without Ground Control Points by Exploiting Repeated Observation
Next Article in Special Issue
Smooth Sensor Motion Planning for Robotic Cyber Physical Social Sensing (CPSS)
Previous Article in Journal
A Denoising Scheme for Randomly Clustered Noise Removal in ICCD Sensing Image
Previous Article in Special Issue
Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing

1
Department of Communications Engineering, School of Information Science and Technology, Xiamen University, Xiamen 361005, Fujian, China
2
Key Laboratory of Underwater Acoustic Communication and Marine Information Technology, Ministry of Education, Xiamen University, Xiamen 361005, Fujian, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(2), 232; https://doi.org/10.3390/s17020232
Submission received: 19 November 2016 / Revised: 12 January 2017 / Accepted: 18 January 2017 / Published: 26 January 2017
(This article belongs to the Special Issue New Paradigms in Cyber-Physical Social Sensing)

Abstract

:
The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λ b / λ u bits/s/Hz, where λ b and λ u are the densities of base stations and mobile users, respectively.

1. Introduction

Exploitation of the spatial domain is a primary way to address the challenge of exponential capacity demand in cellular communication networks [1]. Small cells [2] and device-to-device (D2D) communications [3,4] are both effective solutions to enhance the cellular network capacity by increasing the spatial reuse factor of the limited spectrum. An alternative approach to address the exploding traffic challenge is to exploit the traffic delay domain. This is motivated by the fact that a large portion of mobile data traffic is consumed by content delivery, which is non-real-time in nature. Unlike real-time services that have strict delay constraints, content delivery services have a greater flexibility to be manipulated in the delay domain (e.g., by proactive content pushing) [5,6]. It has been shown that relaxed delay constraints can be traded for capacity. This drives an emerging research field of content-centric mobile communications, which aim to find capacity-efficient solutions for massive content delivery [7,8,9].
The integration of ad hoc D2D communications and open-access small cells can result in a fundamental networking paradigm called the hybrid ad hoc network, which is a promising paradigm for future mobile communication networks. The objective of this paper is to investigate the fundamental trade-off between capacity and delay in such hybrid ad hoc networks. The capacity study of cellular D2D networks can take the reference from the extensive literature on the capacity of wireless ad hoc networks. Most existing works in this field have adopted a popular information-theoretic framework called scaling law analysis. Gupta and Kumar first proposed this framework and showed that the per-node transport capacity of arbitrary static ad hoc networks scales as 1 / n [10], where n is the number of nodes in the network. This result suggests that the capacity of each node diminishes as n goes large. Subsequent works on static ad hoc networks, such as [11,12,13,14], all lead to similar pessimistic results.
Based on an important insight that mobility can be exploited to enhance capacity at the expense of increased delay, Gorssglauser and Tse [15] showed that in mobile ad hoc networks, a constant per node throughput can be achieved with a two-hop relaying scheme. Several subsequent works have studied the amount of delays required to achieve a level of capacity for various mobility models, such as i.i.d. mobility [16], random walk [17,18,19], Brownian motion [20] and Levy walk [21,22]. The delay required for constant per node throughput has been shown to scale as fast as the network size.
Apart from mobility, it has been shown that adding infrastructure (e.g., base stations (BSs)) to pure ad hoc networks, resulting in the so-called hybrid wireless networks, can bring significant benefits in terms of capacity and delay. The capacity of hybrid networks with static nodes has been studied in [23,24,25,26,27,28]. It was shown that capacity increases linearly with the number of BSs, given that the number of BSs grows faster than n [28]. In [29], it is shown that a constant delay can be achieved. The capacity scaling law of hybrid networks with mobile nodes is studied in [30], where some mobility-dependent extra gains on the capacity are shown. The study of capacity-delay trade-off using the “scaling law” analysis has attracted much research attention in recent years. Research has been extended to address various aspects, such as motion-cast [31,32], multi-cast [33,34,35,36], converge-cast [37], group and correlated mobility [38,39,40,41,42,43], cognitive radio [44,45], etc.
Despite the enormous success and popularity of the “scaling law” framework, this framework also has some limitations. First, for a tractable analysis, the “protocol model” [10] is usually assumed to describe the communication and interfering range of a transmitter. This model, however, does not take into account accumulated interference, which can become significant in dense networks. Second, the delays incurred by buffering and queueing are commonly neglected for simplicity, resulting in potentially under-estimated delays. For example, consider a mobile node with a large amount of buffered data and a short time opportunity to access a BS. It is likely that some buffered data cannot be delivered in the first access opportunity and should wait for the next chance. As a result, queueing delays are coupled with mobility-related delays, which can potentially lead to a significant increase of the overall delay. It should be noted that the delay we considered in this paper is the fundamental delay caused by ideal (i.e., infinite-buffer) queueing at the physical layer. This delay is different from other studies that considered specific medium access control (MAC) layer functions, such as retransmission schemes [46,47]. Third, previous studies have mostly focused on the average measures, e.g., the mean delays. Such an average measure can be misleading in the case of long-tail distributions, in which the mean is biased by infrequent incidents of very large values. Because long-tail delay distributions are common in communication networks, it is very desirable to gain finer-grained insights into the exact distribution of delays.
To address the above limitations, this paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. Although both models have been used extensively for the performance study of wireless networks, the effort to unify both models in a coherent framework is still rare. Our previous conference paper [48] was an early attempt to propose a unified framework for the performance analysis of hybrid ad hoc networks. The basic idea is to capture the stochastic phenomenon of user mobility and coverage outage using queueing dynamics. However, the work was still incomplete and does not consider the issue of multi-user access. This paper further extends and refines the unified framework and provides comprehensive analysis. Specifically, new issues, including multi-user access, capacity limit and power and rate optimization, are addressed in this paper. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of user and BS densities, transmit power, user mobility and packet size on the uplink capacity-delay trade-off. We reach a conclusion that the maximum throughput capacity per user is bounded by 0.7239 λ b / λ u bits/s/Hz, where λ b and λ u are the densities of base stations and mobile users, respectively.
The remainder of this paper is organized as follows. The system model is described in Section 2. Section 3 introduces the new analytical framework combining both queueing models and physical interference models. A detailed characterization of delay distributions and the fundamental limits of per node capacity throughput are presented in Section 4. In Section 5, we discuss the aspects of rate and power optimization to achieve the minimum average delay. Finally, numerical results are presented in Section 6, and conclusions are drawn in Section 7. For the convenience of the readers, the major parameters defined in this paper are summarized in the table (Table 1) below.

2. System Model

We consider a hybrid ad hoc network with small cells and mobile users. We are interested in the uplink scenario, where mobile users transmit message to the small cell BSs. The small cell BSs are randomly deployed following two-dimensional homogeneous Poisson point processes (PPPs) with density λ b . We assume that a single dedicated frequency band is used by all small cells to provide best-effort coverage in the presence of self-interference. Similarly, the mobile users are assumed to be randomly deployed following a PPP with density λ u . Each user has a homogeneous throughput capacity demand of C bits/s. More specifically, we assume that each user has an incoming traffic stream with fixed packet size L. It is assumed that all users have identical and random mobility patterns, so that they randomly move in and out of the small cell coverage areas from time to time. The average speed of a user is denoted by v. The duration when a user is not in coverage is called coverage outage.

2.1. User Collaboration Protocol

As illustrated in Figure 1, we consider a user collaboration scheme with two-hop decode and forward relay. This simple scheme was frequently assumed in the literature and has been shown to achieve the optimal scaling in mobile ad hoc networks [15]. Our study focuses on the uplink access scenario, which includes two phases: broadcast phase and deliver phase.
  • In the broadcast phase, original packets on a device are broadcast in the D2D band with a constant rate R I and constant power P I . Nearby users who can successfully decode the packet will store the packet. Each packet is broadcast only once from its original user.
  • In the deliver phase, the original traffic and traffic received from other users during the broadcast phase are buffered in a queue and wait to be transmitted to a BS. A transmission to the BS starts only when a packet carrier falls within the coverage of a small cell. The packets are transmitted following a first-come-first-out (FIFO) policy until the buffer empties or a coverage outage occurs. The transmit power and rate used to communicate with the BSs are denoted as P II and R II , respectively. Once the transmission of the first copy of a packet starts, a signaling is performed so that all other copies of the same packet will be dropped [15]. In cases that a packet transmission is interrupted by a coverage outage, the transmission will be resumed to transmit the rest of the packet once the user moves into coverage again. In other words, we assume a preemptive-resume queueing policy, noting that our results can be easily extended for a similar preemptive-repeat policy.
The frequency bands used for D2D communications and small cell access are different to avoid interference. Without loss of generality, we assume that both frequency bands have the same normalized bandwidth of one.

2.2. Interference Model

Whether a user is within the coverage of a small cell transmitter is determined by its received signal-to-noise-and-interference ratio (SINR). Unlike “protocol models” [10] that use two idealistic circles to represent the transmit range and interfering range of a transmitter, in this paper, we consider the physical interference model, which considers the accumulation of interference from multiple transmitters. Consider a random field of non-collaborative transmitters distributed as a two-dimensional PPP process and transmitting with identical power P; the receive SINR at a typical (randomly chosen) location is given by:
γ = P h P I + 1
where P is the transmit power normalized to the Gaussian noise power, I is the accumulated interference normalized to P, h is the channel gain given by h = g d η , d is a random variable (RV) denoting the distance between the active user and the inactive user, η is the path loss exponent and the RV g exp ( 1 ) follows an exponential distribution with unit mean to represent the power gain of Rayleigh fading channels. The accumulated interference I is given by:
I = i g i d i η , ( i = 1 , 2 , )
where i is the index of interfering active users, d i is the distance from the inactive user to the i-th interferer and g i exp ( 1 ) are RVs to account for Rayleigh fading in the interference channels. According to the spatial PPP model, the PDF of d is given by [49]:
f d ( x ) = e λ π x 2 2 π λ x , x ( 0 , )
where λ is the spatial density of transmitters. In the context of wireless networks, the above PDF could result in an unrealistic calculation of the path loss when the common path loss model is applied. When d ( 0 , 1 ) , we have d α > 1 , implying that the receive power becomes greater than the total transmit power, which is unrealistic. A practical approach to reduce this inaccuracy is to limit the range of d as d [ 1 , ) . This leads to a slightly modified PDF given by:
f d ( x ) = e λ π e λ π x 2 2 π λ x , x ( 1 , ) .
Numerical results show that the difference between (3) and (4) becomes significant when the transmitter density becomes higher than 0.1 users/m 2 . Consider a typical receiver on the plane; the received SINR is an RV. Following a similar procedure in [50], but applying the modified PDF of d given by (4), the complementary CDF (CCDF) of SINR, given the path loss exponent η = 4 , can be derived as:
F ˜ γ ( x ; λ , P ) = π λ e π λ 1 e a y b y 2 d y
= π 3 / 2 λ e λ π b e a 2 4 b Q 2 b + a 2 b
where:
a = λ π 1 + x arctan ( x )
and b = x / P . In Equation (6), Q ( · ) denotes the Q-function. Given that λ < 0.1 users/m 2 , which suits most practical scenarios, Equation (6) can be well approximated by:
F ˜ γ * ( x ; λ , P ) π 3 2 λ a b e a 2 2 b Q a 2 b
In the case of P , Equation (8) can be further simplified to [50]:
F ˜ γ lim ( x ) = lim P F γ ( x ; λ , P ) = 1 1 + x arctan ( x ) .

2.3. Remarks on System Parameters

Summarizing the above system description, two types of parameters can be distinguished. The first type is the system parameters, including the user packet arrival rate χ, packet size L, user density λ u , base station density λ b and user speed v. These are given parameters that cannot be optimized by protocol design. We note that the capacity per user is given by C = χ L . The second type is the protocol parameters, including power parameters P I and P II and rate parameters R I and R II . These parameters can be optimized by protocol designs.
Based on the above system description, our research objective is to gain theoretical insights into the following questions: (1) How is the distribution of packet delay related to the system and protocol parameters? (2) Given the system parameters, how can protocol parameters be optimized for delay performance? (3) Is there a fundamental limit of per node throughput capacity C? (4) Given optimized protocol parameters, what is the trade-off between capacity and delay? How does this trade-off change with different system parameters? Before addressing these questions, a new analytical framework is introduced to transform the above system model into a mathematically-tractable queueing model.
The following notations regarding an RV will be applied throughout the text. Given an RV denoted as α, we will use α ¯ to denote its mean, α ^ to denote its second moment, f α ( t ) to denote its probability density function (PDF), F α ( t ) to denote its cumulative distribution function (CDF), F ˜ α ( t ) to denote its complementary CDF and L α ( s ) to denote its Laplace transform. The Laplace transform of an RV is given by:
L α ( s ) = E ( e s α ) = 0 e s t d F α ( t )
where E ( · ) denotes expectation.

3. A Queueing Model-Based Analytical Framework

Our analytical framework is based on a queueing model that characterizes the behavior of data buffering, collaborative packet delivery and random processes of coverage outage. This section will explain how parameters of the queueing model can be derived from the various system parameters and protocol parameters introduced in the previous section.

3.1. A Queueing Model

Consider the packet transmission process in a typical device, the delays incurred in different phases can be described by the queueing model illustrated in Figure 2.

3.1.1. Queueing in the Broadcast Phase

In the broadcast phase, original traffic is buffered in a device before it can be broadcast. The queue is characterized by two RVs α d and β d , which represent the random packet arrival interval and transmission time of packets, respectively. Under the assumption of fixed packet size and constant broadcast rate, β d becomes a constant given by β d = L / R I . Define the load parameter ε d = β d ¯ / α d ¯ ; this parameter represents the fraction of time during which a device is active in broadcasting.
The delays incurred in this queueing process include waiting time w I and completion time z I . The former is defined as the duration from the arrival of a packet till the start of its transmission. The latter is defined as the duration from the start of a packet’s transmission to the end of the transmission. Define sojourn time as s I = w I + z I . This indicates the total time a packet spent in a queue.
The number of users that can successfully receive the packet from a broadcasting user is a discrete RV denoted by N. The probability mess function (PMF) of N is denoted by f N ( n ) . After the broadcast, we call a packet belonging to type-n traffic if there are n copies of the packet in the system, i.e., the packet has been successfully broadcast to n 1 more users.

3.1.2. Effective Traffic

Packets coming from the original traffic and packets received from other users via broadcast are buffered in a queue before they can be delivered to the BS. These packets, however, may be dropped if one of their copies gets transmitted first from other packet carriers. A rigid representation of the actual queueing process requires a complicated model involving queueing network, which is analytically intractable.
To simplify the analysis, we define “effective traffic” of a device as packets that eventually get transmitted from the device. Because users are homogeneous, the effective traffic load of a user should be the same as the original traffic load. After the broadcast phase, the average type-n traffic received by a user is given by n f N ( n ) / α d . Because there are n copies undergoing the independent queueing process on different users, the probability that a type-n packet gets transmitted from a particular user is 1 / n . Therefore, the effective type-n traffic delivered from a user becomes f N ( n ) / α d . Summing up all of the traffic types for n ranging from one to ∞, it can be easily shown that the overall effective traffic load of a device equals 1 / α d , i.e., n = 1 f N ( n ) / α d = 1 / α d . Because non-effective traffic packets are dropped before transmission as if they have never arrived on a device, only effective traffic will contribute to the actual queueing delays.

3.1.3. Queueing in the Deliver Phase

A preemptive-resume priority queueing model is used to describe the queueing behavior in the deliver phase. This model assumes two classes of independent traffic. The first class represents the coverage outage process, while the second class represents the effective traffic. The first class has absolute priority over the second class. This means that once a coverage outage occurs, the current transmission is stopped and should wait till the next coverage opportunity.
The effective traffic is characterized by two random RVs α e and β e . The former characterizes the arrival intervals of effective traffic packets, while the latter characterizes the uninterrupted transmission time of a packet. The outage process is characterized by α o and β o . The former represents the random duration between the arrivals of two outages, while the latter describes the random duration of an outage. Define load parameters ε e = β ¯ e / α ¯ e and ε o = β o ¯ / α o ¯ . The combined load of the two classes of traffic is ε II = ε e + ε o , and a stable queue requires ε II < 1 .
Delays incurred in this phase include waiting time w II and completion time z II . We note that the completion time z II is not the same as the transmission time β e . The former should take into account cases in which the transmission of a packet is interrupted by a coverage outage, so that the time taken to complete the transmission of a packet is prolonged by random coverage outages. The sojourn time in Phase II is s II = w II + z II .

3.2. Analysis of Queueing Parameters

So far, we have introduced the seven RVs that characterize our queueing model: α d , β d , α e , β e , α o , β o and N. We will subsequently show how these RVs are related to the various system and protocol parameters introduced in Section 2. A summary of the relationships among various parameters is illustrated in Figure 3.

3.2.1. Assumptions

To facilitate a tractable analysis, we assume that α e and α o follow exponential distributions. In other words, Poisson arrivals are assumed for the effective traffic and the coverage outage processes. The Poisson assumption of α e is a common practice in traffic engineering. The Poisson assumption of α o is natural with PPP distributed BSs, as will be explained later in Section 3.2.2. We note that no particular distribution is assumed for α d to justify the Poisson assumption of α e .
Because our system model assumes a fixed packet size and a constant broadcast rate, we have a deterministic β d L / R I . Our framework makes no particular assumptions on β e and β o , i.e., both can follow general distributions. This gives our model the flexibility to represent and differentiate a wide range of practical systems. By varying the distributions of β e , we can account for different policies and behaviors of open access small cells. Similarly, by varying the distributions of β o , we can account for different user mobility patterns.
It is easy to see that the mean inter-arrival times of the original and effective traffic are both given by:
α ¯ d = α ¯ e = L / C .
Moreover, the mean transmission times of the original and effective traffic are given by:
β ¯ d = L / R I
and:
β ¯ e = L / R II
respectively.

3.2.2. The Coverage Outage Process

The coverage outage process is fully characterized by RVs α o and β o . Here, we will show how their mean values α ¯ o and β ¯ o are inherently related to the system parameters.
Let us first consider α ¯ o . As shown in Figure 4, we assume that each user has a coverage sensing area represented by a circle, the diameter of which is given by Ω. When a user moves with speed v for a short period of time t, the movement trace can be regarded as a straight line. The sensing area covered by the mobile user during t is v t Ω , and new BSs may appear within this area. We assume that the user will attempt to handover to a newly appearing BS in the coverage sensing area, and an outage event occurs during a handover. Therefore, the rate of outage arrival is the same as the rate of BS arrival in the coverage sensing area. Because BSs follow a PPP distribution on the plane, it follows that:
α ¯ o = 1 λ b v Ω .
Now, we consider β ¯ o . As mentioned previously, we have ε o = β ¯ o / α ¯ o ; this parameter can be understood as the fraction of time that a user falls out of coverage. Parameter ε o depends on both the spatial coverage of the uplink and multi-user competition for access. We can write ε o = 1 p c p a , where p c is the probability that a user falls within coverage, and p a is the probability that the user is granted access among multiple users within the same cell. Coverage areas are defined as areas in which a receiver can receive a data rate higher than R II in the presence of inter-cell interference. Because only one user is active in transmission in a cell, based on the interference models described in Section 2.2, we have p c = F ˜ χ ( 2 R II 1 ; λ b , P I I ) , where function F ˜ χ ( x ) is the interference complementary cumulative distribution function (CCDF) defined in Equation (6). Moreover, because all users have equal access to the BS, the multi-user access results in p a = λ b / λ u in an average sense (we assume that λ u > λ b always holds). It follows that:
ε o = 1 λ b λ u F ˜ χ ( 2 R II 1 ; λ b , P I I ) .

3.2.3. Number of Packet Copies N

All original traffic is broadcast in Phase I from its user with identical power P I and broadcast rate R I . The broadcast is slotted with slot length L / R I , where L is the fixed packet length. In each slot, the broadcasting users are called active users, while the rest are called inactive users. The time fraction that a user is active in broadcasting equals ε d = β ¯ d / α ¯ d . The density of active users is therefore given by:
λ a = λ u ε d
and the density of inactive users is λ w = λ u λ a .
We assume that each inactive user is associated with the nearest active user and listens to its broadcast signal. Let M denote the number of associated inactive user per active user; the PMF of M is given by [51]:
f M ( n ) = 3.5 3.5 Γ ( 3.5 ) n ! Γ ( n + 3.5 ) ( λ w λ a ) n ( λ w λ a + 3.5 ) n + 3.5
where Γ ( · ) denotes the Gammafunction and ( · ) ! denotes factorial.
For each active user, the number of inactive users that can successfully receive its broadcast in each time slot is an RV denoted by N . The number of copies of a packet after a broadcast is denoted by N, and we have N = N + 1 . An inactive user can successfully receive a packet only if it can receive Phase I broadcasting with an SINR higher than χ = 2 R I 1 . The probability of successful packet reception can be calculated as F γ ( χ ; λ a , P I ) . Because the transmitter is assumed to follow an ergodic PPP process, the SINR can be treated as spatially ergodic. It follows that N B ( M , F γ ( χ ; λ a , P I ) ) , i.e., N follows a binomial distribution with parameters M and p = F γ ( χ ; λ a , P I ) . Since M is an RV, the PMF of N can be obtained by taking the expectation over M, i.e.,
f N ( n ) = m = 0 f M ( n ) C m n p n ( 1 p ) m 1 ( n 0 )
where C m n = m ! / n ! . Finally, the PMF of the random number of copies of a packet in the system is given by:
f N ( n ) = f N ( n 1 ) ( n 1 ) .

4. Capacity Limits and Delay Analysis

4.1. Capacity Limits

Consider the priority queue in the deliver phase; the combined load of two classes of traffic is given by:
ε II = ε e + ε o
where ε e = C / R II and ε o is defined in Equation (15). A stable queue requires ε II < 1 ; it follows that:
C < λ b λ u R II F γ 2 R II 1 ; λ b , P II .
Given BS density λ b and power input P II , the capacity C can be optimized over R II , i.e.,
C * ( λ b , P II ) = max R II λ b λ u R II F γ 2 R II 1 ; λ b , P II .
Numerical results show that C appears convex over R II under various parameter settings. Therefore, C * ( λ b , P II ) can be calculated by effective numerical methods. Furthermore, it is easy to see that C * is a monotonically-increasing function of P II . From a theoretical point of view, we are interested in the fundamental capacity limit C lim defined as:
C lim = lim P II C * ( λ b , P II ) .
Substitute Equations (9) and (22) into Equation (23), we get:
C lim = max x λ b λ u x 1 + 2 x 1 arctan ( 1 / 2 x 1 ) .
It can be shown that C lim is a convex function of x. Numerical evaluation can be performed to give C lim = 0.7239 λ b / λ u bits/s/Hz, which shows a constant scaling with λ b / λ u . We note that our conclusion conforms with the conclusions obtained via scaling law analysis [28], which predicts that the capacity can grow linearly with λ b / λ u . Our model refines the result by obtaining the exact scaling constant as 0.7239. In Figure 5, the optimal capacity C * is illustrated as a function of P II with varying λ b based on Equation (22). It is observed that C * increases initially with increasing P II or λ b , but eventually reaches the upper bound C lim .

4.2. Delay Distributions

This subsection aims to obtain the exact distribution of the four delay parameters w I , z I , w II and z II , from which the total delay can be obtained as:
D = w I + z I + w II + z II
The PDF of D can be numerically calculated as the convolution of the PDFs of each component.

4.2.1. Phase I Delays w I and z I

Because we have assumed a fixed packet size and a fixed broadcast rate R I , it is obvious that:
z I β ¯ d L R I .
The queueing process in Phase I forms a G/D/1, queue and the exact distribution of w I is generally unavailable. In the special case that α d follows exponential distributions, the queueing process in Phase I becomes an M/D/1queue, and we have [52]:
F w I t = 1 α ¯ d n = 0 K α d ( n t ) n n ! e α d ( n t )
where K = t is the largest integer smaller than t. The average waiting time is given by [52]:
w ¯ I = 1 2 ε d 1 ε d β ¯ d .
These results of an M/D/1 queue can serve as a reasonable estimate for the actual delay of the G/D/1 queue under practical settings. We note that under practical settings, the Phase II delays are much greater than Phase I delays, i.e., w II + z II > > w I + z I . Therefore, our subsequent focus is on obtaining the exact distributions of w II and z II .

4.2.2. Phase II Completion Time z II

In Phase II, we have an M/G/1 priority queue with two classes of traffic. The first-class of traffic is coverage outage, while the second-class of traffic is effective traffic. We are interested in the completion time of the second class of traffic. The Laplace transform of z II is given by [52]:
L z II s = L β e K s
where L β e ( · ) is the Laplace transform of β e and:
K s = s + 1 G s α ¯ o .
Here, G ( s ) is the solution with the smallest absolute value that satisfies the following equation:
x L β o s + 1 x α ¯ o = 0
where L β o ( · ) is the Laplace transform of β o . From (29)–(31), the Laplace transform L z II ( s ) can be obtained. The exact PDF of z II can then be numerically calculated using standard methods of Laplace inversion. Finally, the first and second moment of z II can be evaluated analytically as [52]:
z ¯ II = β e 1 ε o
and:
z ^ II = β ^ o ( 1 ε o ) 2 + β ^ o β ¯ e β ¯ o ε ^ o ( 1 ε o ) 3
respectively.

4.2.3. Discussions on β o

We have so far assumed a general distribution for the outage duration β o . This distribution affects the solution of Equation (31). We will subsequently discuss two special distributions for β o .
The first distribution to consider is the exponential distribution. This memoryless distribution is a natural choice for β o when small cell BSs are randomly located as a PPP and users have coverage-independent mobility patterns. Given β o exp 1 / β ¯ o , its Laplace transform can be evaluated as:
L β o E s = 1 1 + s β ¯ o .
It follows that Equation (31) can be solved explicitly to give:
G s = 1 + ε o + s β ¯ o 1 + ε o + s β ¯ o 2 4 ε o 2 ε o
Another useful distribution we consider is the Gamma distribution. The Gamma distribution can provide more flexibility when characterizing β o for a variety of practical scenarios. Given β o Γ k , θ , the PDF of β o is given by:
f β o ( t ) = 1 θ k 1 Γ k t k 1 e t θ
where k and θ are the shape and scale parameters, respectively. Under the Gamma distribution, the Laplace transform of β o is given by:
L β o G s = 1 + θ s k
It follows that when k is an integer or a rational fraction, Equation (31) yields a polynomial form. Therefore, function G ( s ) can be easily solved using existing root-finding algorithms for polynomials.

4.2.4. Phase II Waiting Time w II

The waiting time w II of a packet depends on its traffic type, i.e., the number of packet copies in the system. We denote the waiting time of a type-n traffic as w II n . Let us first consider w II 1 , whose Laplace transform is given by [52]:
L w II 1 s = 1 ε II α ¯ e K s L β e K s + α ¯ e s 1
where K ( s ) is defined in Equation (30). It is possible that the packet arrives to see an empty buffer. Therefore, the CDF function has a non-zero value at 0+, which is given by [52]:
F w II 1 t = 0 + = 1 ε II .
Clearly, the CDF of the virtual waiting time depends on the characteristics of the effective traffic and coverage outage process.
In Figure 6, the CDF of w II 1 is illustrated with varying values of ε o , which denotes the fraction of areas without coverage. Similar to the definition of the well-known “outage capacity” in fading channels, we can define “outage delay” as the delay that grantees certain outage. For example, a 10% outage delay is the delay t 10 that satisfies F w II ( t 10 ) = 0.9 . From Figure 6, a nonlinear relationship is observed between ε o and outage delays. Taking the 10% outage delay for example, when ε o takes values of 0.1, 0.2, 0.3 and 0.4, the corresponding 10% outage delay is roughly 1 s, 7 s, 17 s and 43 s, respectively. Therefore, the delay performance degrades quickly with increasing coverage outage.
Another aspect we investigate in Figure 6 is how the CDF of w II 1 is influenced by different distributions of β o . Two types of distributions are compared: one is the exponential distribution, the other the Gamma distribution with k = 2, which is also an Erlang distribution. The former distribution corresponds to a purely random network, while the latter can represent networks that are planned with certain regularities. For the purpose of fair comparison, the two types of distributions are set to have the same mean β ¯ o . It is observed that the Erlang distribution gives slightly better performance than the exponential distribution. From this, we postulate that the delay performance will improve if the small cell network is not entirely random, but exhibits certain regularities.
Now, consider the waiting time of a type-n traffic packet. Because there are now n copies undergoing independent queueing processes, the actual waiting time w II n is the minimum of the n queues. The delay CDF of a type-n traffic packet can then be evaluated as:
F w II n ( t ; n ) = 1 1 F w II 1 ( t ) n .
Further consider n as an RV denoted by N and apply the law of total probability; the CDF of the waiting time of an arbitrary packet is given by:
F w II ( t ) = 1 f N ( n ) 1 1 F w II 1 ( t ) N
where f N ( n ) is the PDF of N given by (19).
In Figure 7, the CDF of w II N is illustrated with varying values of N according to Equation (40). User collaboration is shown to be effective in reducing delays. Compare Figure 7 with Figure 6; we observe that the performance given by N = 5 and ε o = 0.6 is comparable to the performance given by N = 1 and ε o = 0.2 . In other words, if a packet is successfully broadcast to four other users, the coverage requirement can be relaxed about two times in this case ( ( 1 0.2 ) ÷ ( 1 0.6 ) = 2 ). On the other hand, Figure 7 also shows that the benefits of increasing N gradually diminishes as N goes large.

5. Rate and Power Optimization

In the previous section, we have established the delay distribution subject to protocol parameters and system parameters. From the practical perspective of system design and optimization, it is desirable to understand how the protocol parameters ( R I , R II , P I and P II ) can be properly chosen to give an optimized capacity-delay performance. Without loss of generality, our subsequent analysis is restricted to the case where both β e and β o follow exponential distributions.

5.1. Heuristic Optimization of R I

Under natural conditions, the waiting time w II dominates the delay. Therefore, the primary target of delay minimization is to minimize w II . According to Figure 7, increasing the number of packet copies is shown to be very effective in reducing delays. Therefore, a simple heuristics for the optimization of R I is to maximize the mean number of packet copies N ¯ . It turns out a simple closed-form estimate exists to give N ¯ = J ¯ q , where:
J ¯ = ( λ u λ a ) / λ a = R I / C 1
denotes the ratio of inactive users and active users in Phase I, λ a = λ u C / R I , and:
q = F γ 2 R I 1 ; λ a , P I
denotes the probability that an inactive user can successfully receive a packet. Because increasing R I will increase J ¯ , but reduce q, such a tension requires an optimization over R I . The optimization problem of R I can be formulated as follows: given C, λ u and P I ,
R I * = arg max x x C 1 F γ 2 x 1 ; λ u C x , P I x > 0 .
Figure 8 shows N ¯ as a function of R I . The above optimization problem is shown to have a simple structure with a single peak value, which can be easily obtained via numerical methods.

5.2. Heuristic Optimization of R II

The total delay is dominated by the waiting time w II , which depends largely on the waiting time of Type-1 traffic w II 1 . A simple heuristic to optimize R II is therefore to minimize the mean of w II 1 given by:
w ¯ II 1 = 1 2 ( 1 ε o ) ( 1 ε II ) 2 β ¯ e 2 α ¯ e + 2 β ¯ o 2 α ¯ o
in the case that β e and β o both follow exponential distributions. Increasing R II will reduce the Phase II transmission time (once in coverage), but at the cost of reduced probability to fall within coverage. This tension leads to an optimization problem as follows: given C, P II , L, v and λ b ,
R II * = arg max R II w ¯ II
In Figure 9, the mean waiting time w ¯ II 1 is shown as a function of average delivery rate R II with varying transmit power P II and capacity demand C. The objective function appears to be convex, and the optimal value can be easily obtained via numerical methods.

5.3. Heuristic Optimization of Power P I

Unlike the optimizations over R I and R II that aim to balance between conflicting effects, increasing P I is always beneficial, but with diminishing returns in terms of capacity and delay. Our heuristic approach to the optimization of P I is based on the following idea: when P I reaches a threshold, further increasing P I is not helpful as Phase I broadcasting becomes interference limited. Therefore, we want to have the minimum P I that can achieve ϕ percent of the best performance given by P I . As mentioned previously, the probability for an inactive user to successfully receive a packet is F γ ( χ ) . This can be used as a convenient performance indicator of the broadcasting performance.
The optimization of P I can now be formulated as follows:
P I * = arg min P F γ * ( χ ; λ a , P ) F γ lim ( χ ; λ a , ) ϕ , ϕ ( 0 , 1 )
where χ = 2 R I 1 , λ a = λ u ε d and functions F γ * ( · ) and F γ lim ( · ) are defined in Equations (8) and (9), respectively.
At relatively high values of P I , the Q-function appearing in Equation (8) can be well approximated by a lower bound given by:
Q ( x ) x 2 2 π ( 1 + x 2 ) e x 2 / 2 .
Substituting Equations (8), (9) and (48) into Equation (47), we get:
P I * ϕ 1 ϕ 2 χ ( π λ a ) 2 [ 1 + χ arctan ( χ ) ] 2 .
Equation (49) gives a closed-form formula to directly calculate P I * from system parameters.

5.4. Heuristic Optimization of Power P II

The idea for the optimization of P II is similar to that of P I , only that the objective function is now C lim . As shown in Figure 5, increasing P I is always beneficial to the capacity until the capacity approaches a constant limit. The optimization problem can be formulated as:
P II * = arg min P C * ( λ b , P ) C lim ϕ ( 0 < ϕ < 1 )
where C * ( λ b , P ) and C lim are defined in Equations (22) and (24), respectively. Obviously, given λ b , P II * can be easily obtained from Figure 5 by drawing a horizontal line at C = ϕ * C lim = 0.7329 ϕ to intersect with the various curves.

6. Numerical Results and Discussions

In this section, numerical results are shown to illustrate the capacity-delay trade-off with varying system parameters. We aim to shed light on the following questions: What is the trade-off between capacity and delay? How does this trade-off change with different system parameters? We note that two different metrics for the delay performance can be considered: the mean delay and the outage delay. Due to page limits, our discussions are limited to the mean delay.
The procedure of our numerical evaluation is as follows: (1) given system parameters (C, L, λ u , λ b , and v) and power parameters ( P I and P II ), calculate the optimal rate parameter R I and R II according to Equations (44) and (46), respectively; (2) given all of the above parameters, calculate the PDFs of w II and z II based on Section 4; (3) calculate the PDF of the accumulated delay D and evaluate its mean value D ¯ . Without loss of generality, we set λ b = 10 5 and Ω = 100 in all cases.
Figure 10 shows the impact of user density λ u and power P I on the capacity-delay trade-off. The trade-off is shown to be insensitive to the user density. This is because the capacity limit scales with 0.7239 λ b / λ u . When capacity approaches this limit, the delay shows an exponential growth to infinity. The value of P I is also shown to have a significant impact on the delay performance. The case of P I = 200 dB represents the extreme case of infinite power. The capacity-delay trade-off at P I = 200 dB indicates the performance upper bound we can get from user collaboration.
Figure 11 shows the impact of user speed v on the capacity-delay trade-off, for cases with and without user collaboration. We set P I and P II to very large values to shed light on to the fundamental performance limits. The trade-off is shown to be sensitive to the speed. For a ten-fold increase of the speed, the delay is shown to reduce by about 90%. In other words, an inversely proportional relationship is observed between speed and mean delay. The benefit of user collaboration (i.e., relay) is shown to be significant, especially when the movement speed is low. This suggests that in practice, allowing D2D communications between low speed and high speed users will effectively reduce the delays of low speed users.
Figure 12 shows the impact of packet size L on the capacity-delay trade-off. In practice, it is desirable to have a larger packet size to reduce overhead. However, it is observed that increasing L leads to slightly increased delays. This suggests that the packet size should also be optimized carefully in practice. It is interesting to see that the delay becomes larger when the value of C approaches zero. This is because the heuristic algorithms for optimizing protocol parameters are sub-optimal for very small values of C. This shows some limitations of the heuristic algorithm in Section 5.
While all of the above numerical results are based on the mean delay, it is also important to investigate the trade-off performance in terms of the outage delay. In practice, a small fraction of packets with large delays is allowed to be dropped by the queue; hence, the outage delay is particularly useful when the delay has long-tail distributions. Given a random delay D and its CDF F D ( x ) , the outage delay D o ( ϕ ) is defined as the delay value that gives F D ( D o ) = 1 ϕ , where ϕ is the outage threshold. In Figure 13, we show the capacity-delay trade-off based on outage delay. As expected, we see that the outage delay increases in an exponential fashion when the capacity per user approaches the limit. Moreover, it is observed that the delay reduces with increasing outage probability ϕ . Finally, we note that being able to pinpoint the delay distribution and study the outage delay performance is a key merit of the analytical framework proposed in this paper. Our analytical framework can potentially be extended beyond the scenario of cellular communications and applied to other networking paradigms, such as multi-hop sensor networks [53,54,55].

7. Conclusions

This paper has studied the uplink capacity-delay trade-off of large-scale hybrid wireless networks with a two-hop broadcast-and-forward relaying scheme. A queueing theoretic framework has been established to evaluate the exact distribution of the delays. The impacts of transmission rates, transmission power, user density, BSs density and packet size on the capacity-delay trade-off have been thoroughly investigated. Heuristic power and rate control algorithms have been proposed for performance optimization. Using a different and independent model, we reach the same conclusion with existing literature that per-user capacity scales with BS-user density ratio. However, our model is able to give an exact scaling coefficient as 0.7239 in the interference limiting scenario. Numerical results suggest that mobility and user collaboration are effective means to reduce the mean and outage packet delay.

Acknowledgments

The authors acknowledge the support from the National Science Foundation of China (NSFC), Grant No. 61571378.

Author Contributions

L.C. and X.H. conceived of the modeling idea and derived the main equations. W.L. and C.L. performed the simulations and analyzed the data. L.C., X.H. and J.S. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cisco, T. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2015–2020 White Paper. Available online: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html (accessed on 1 February 2016).
  2. Hoydis, J.; Kobayashi, M.; Debbah, M. Green small-cell networks. IEEE Veh. Technol. Mag. 2011, 6, 37–43. [Google Scholar] [CrossRef]
  3. Doppler, K.; Rinne, M.; Wijting, C.; Ribeiro, C.B.; Hugl, K. Device-to-device communication as an underlay to LTE-advanced networks. IEEE Commun. Mag. 2009, 47, 42–49. [Google Scholar] [CrossRef]
  4. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklos, G.; Turanyi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  5. Zhou, S.; Gong, J.; Zhou, Z.; Chen, W.; Niu, Z. Green delivery: Proactive content caching and push with energy-harvesting-based small cells. IEEE Commun. Mag. 2015, 53, 142–149. [Google Scholar] [CrossRef]
  6. Wang, X.; Chen, M.; Taleb, T.; Ksentini, A.; Leung, V.C.M. Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Commun. Mag. 2014, 52, 131–139. [Google Scholar] [CrossRef]
  7. Zhao, N.; Liu, X.; Yu, F.R.; Li, M.; Leung, V.C.M. Communications, caching, and computing oriented small cell networks with interference alignment. IEEE Commun. Mag. 2016, 54, 29–35. [Google Scholar] [CrossRef]
  8. Tourani, R.; Misra, S.; Mick, T. IC-MCN: An architecture for an information-centric mobile converged network. IEEE Commun. Mag. 2016, 54, 43–49. [Google Scholar] [CrossRef]
  9. Liu, D.; Chen, B.; Yang, C.; Molisch, A.F. Caching at the wireless edge: Design aspects, challenges, and future directions. IEEE Commun. Mag. 2016, 54, 22–28. [Google Scholar] [CrossRef]
  10. Gupta, P.; Kumar, P.R. The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46, 388–404. [Google Scholar] [CrossRef]
  11. Buragohain, C.; Suri, S.; Tóth, C.D.; Zhou, Y. Improved Throughput Bounds for Interference-aware Routing Inwireless Networks. In Proceedings of the 13th Annual International Conference on Computing and Combinatorics, Banff, AB, Canada, 16–19 July 2007; pp. 210–221.
  12. Dousse, O.; Franceschetti, M.; Thiran, P. On the throughput scaling of wireless relay networks. IEEE Trans. Inf. Theory 2006, 52, 2756–2761. [Google Scholar] [CrossRef]
  13. Duarte-Melo, E.; Josan, A.; Liu, M.; Neuhoff, D.L.; Pradhan, S.S. The effect of node density and propagation model on throughput scaling of wireless networks. In Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 1693–1697.
  14. Franceschetti, M.; Dousse, O.; Tse, D.N.C.; Thiran, P. Closing the gap in the capacity of wireless networks via percolation theory. IEEE Trans. Inf. Theory 2007, 53, 1009–1018. [Google Scholar] [CrossRef]
  15. Grossglauser, M.; Tse, D.N.C. Mobility increases the capacity of ad hoc wireless networks. IEEE ACM Trans. Netw. 2002, 10, 477–486. [Google Scholar] [CrossRef]
  16. Neely, M.J.; Modiano, E. Capacity and delay tradeoffs for ad hoc mobile networks. IEEE Trans. Inf. Theory 2005, 51, 1917–1937. [Google Scholar] [CrossRef]
  17. Gamal, A.E.; Mammen, J.; Prabhakar, B.; Shah, D. Throughput-delay trade-off in wireless networks. In Proceedings of the Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, 7–14 March 2004.
  18. Gamal, A.E.; Mammen, J.; Prabhakar, B.; Shah, D. Optimal throughput-delay scaling in wireless networks—Part I: The fluid model. IEEE Trans. Inf. Theory 2006, 52, 2568–2592. [Google Scholar] [CrossRef]
  19. Gamal, A.E.; Mammen, J.; Prabhakar, B.; Shah, D. Throughput-delay scaling in wireless networks with constant-size packets. In Proceedings of the 2005 International Symposium on Information Theory, Adelaide, SA, AUS, 4–9 September 2005; pp. 1329–1333.
  20. Lin, X.; Sharma, G.; Mazumdar, R.R.; Shroff, N.B. Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility. IEEE Trans. Inf. Theory 2006, 52, 2777–2784. [Google Scholar]
  21. Kim, Y.; Lee, K.; Shroff, N.B.; Rhee, I. Revisiting delay-capacity tradeoffs for mobile networks: The delay is overestimated. In Proceedings of the 2012 IEEE Conference on Computer Communications, Orlando, FL, USA, 25–30 March 2012; pp. 3041–3045.
  22. Lee, K.; Kim, Y.; Chong, S.; Rhee, I.; Yi, Y.; Shroff, N.B. On the critical delays of mobile networks under levy walks and levy flights. IEEE ACM Trans. Netw. 2013, 21, 1621–1635. [Google Scholar] [CrossRef]
  23. Liu, B.; Liu, Z.; Towsley, D. On the capacity of hybrid wireless networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, San Francisco, CA, USA, 30 March–3 April 2003; Volume 2, pp. 1543–1552.
  24. Liu, B.; Thiran, P.; Towsley, D. Capacity of a wireless ad hoc network with infrastructure. In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Montreal, QC, Canada, 9–14 September 2007; pp. 239–246.
  25. Zemlianov, A.; de Veciana, G. Capacity of ad hoc wireless networks with infrastructure support. IEEE J. Sel. Areas Commun. 2005, 23, 657–667. [Google Scholar] [CrossRef]
  26. Toumpis, S. Capacity bounds for three classes of wireless networks: Asymmetric, cluster, and hybrid. In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Roppongi Hills, Tokyo, Japan, 24–46 May 2004; pp. 133–144.
  27. Kozat, U.C.; Tassiulas, L. Throughput capacity of random ad hoc networks with infrastructure Support. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, CA, USA, 14–19 September 2003; pp. 55–65.
  28. Agarwal, A.; Kumar, P.R. Capacity bounds for ad hoc and hybrid wireless networks. SIGCOMM Comput. Commun. Rev. 2004, 34, 71–81. [Google Scholar] [CrossRef]
  29. Li, P.; Zhang, C.; Fang, Y. Capacity and delay of hybrid wireless broadband access networks. IEEE J. Sel. Areas Commun. 2009, 27, 117–125. [Google Scholar] [CrossRef]
  30. Huang, W.; Wang, X.; Zhang, Q. Capacity scaling in mobile wireless ad hoc network with infrastructure support. In Proceedings of the IEEE 30th International Conference on Distributed Computing Systems, Washington, DC, USA, 21–25 June 2010; pp. 848–857.
  31. Fu, L.; Yang, S.; Wang, X.; Gan, X. Capacity and delay tradeoffs of motionCast with base stations. In Proceedings of the 2011 IEEE Global Telecommunications Conference, Houston, TX, USA, 5–9 December 2011; pp. 1–5.
  32. Wang, X.; Huang, W.; Wang, S.; Zhang, J.; Hu, C. Delay and capacity tradeoff analysis for motion cast. IEEE ACM Trans. Netw. 2011, 19, 1354–1367. [Google Scholar] [CrossRef]
  33. Wang, Y.; Chu, X.; Wang, X.; Cheng, Y. Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective. In Proceedings of the 2011 IEEE International Conference on Computer Communications, Shanghai, China, 10–15 April 2011; pp. 640–648.
  34. Zhang, J.; Wang, X.; Tian, X.; Wang, Y.; Chu, X.; Cheng, Y. Optimal multicast capacity and delay tradeoffs in MANETs. IEEE Trans. Mob. Comput. 2014, 13, 1104–1117. [Google Scholar] [CrossRef]
  35. Zhang, J.; Li, Y.; Liu, Z.; Wu, F.; Yang, F.; Wang, X. On multicast capacity and delay in cognitive radio mobile ad hoc networks. IEEE Trans. Wirel. Commun. 2015, 14, 5274–5286. [Google Scholar] [CrossRef]
  36. Luo, J.; Zhang, J.; Yu, L.; Wang, X. The role of location popularity in multicast mobile ad hoc networks. IEEE Trans. Wirel. Commun. 2015, 14, 2131–2143. [Google Scholar] [CrossRef]
  37. Wang, X.; Fu, L.; Tian, X.; Bei, Y.; Peng, Q.; Gan, X.; Yu, H.; Liu, J. Converge cast: On the capacity and delay tradeoffs. IEEE Trans. Mob. Comput. 2012, 11, 970–982. [Google Scholar] [CrossRef]
  38. Liu, S.; Yang, F.; Gan, X.; Tian, X.; Wang, X.; Liu, J. Capacity and delay tradeoff in correlated hybrid Ad-Hoc networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 480–485.
  39. Wang, C.; Ye, B.; Wang, X.; Guo, S.; Lu, S. Delay and capacity analysis in MANETs with correlated mobility and f-cast relay. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2829–2839. [Google Scholar] [CrossRef]
  40. Wang, C.; Li, X.Y.; Jiang, C.; Yan, H. The impact of rate adaptation on capacity-delay tradeoffs in mobile ad doc networks. IEEE Trans. Mob. Comput. 2014, 13, 2661–2674. [Google Scholar] [CrossRef]
  41. Liu, J.; Nishiyama, H.; Kato, N.; Ma, J.F.; Jiang, X. Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. In Proceedings of the 2014 IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 2768–2776.
  42. Luo, J.; Zhang, J.; Yu, L.; Wang, X. Impact of location popularity on throughput and delay in mobile ad hoc networks. IEEE Trans. Mob. Comput. 2015, 14, 1004–1017. [Google Scholar] [CrossRef]
  43. Liu, J.; Kato, N.; Ma, J.; Sakano, T. Throughput and delay tradeoffs for mobile ad hoc networks with reference point group mobility. IEEE Trans. Wirel. Commun. 2015, 14, 1266–1279. [Google Scholar] [CrossRef]
  44. Qin, Y.; Li, Y.; Wu, W.; Yang, F.; Wang, X.; Xu, J. Near-optimal scheme for cognitive radio networks with heterogeneous mobile secondary users. IEEE Trans. Commun. 2015, 63, 1106–1120. [Google Scholar] [CrossRef]
  45. Ma, X.; Li, F.; Liu, J.; Liu, X. Throughput-delay tradeoff for wireless multichannel multi-interface random networks. Can. J. Electr. Comput. Eng. 2015, 38, 162–169. [Google Scholar] [CrossRef]
  46. Zhang, X.M.; Zhang, Y.; Yan, F.; Vasilakos, A.V. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2015, 14, 742–754. [Google Scholar] [CrossRef]
  47. Hu, Y.; Liu, D.; Wu, Y. A new distributed topology control algorithm based on optimization of delay in ad hoc networks. In Proceedings of the 2016 First IEEE International Conference on Computer Communication and the Internet, Wuhan, China, 13–15 October 2016; pp. 148–152.
  48. Ye, H.; Liu, C.; Hong, X.; Shi, H. Uplink capacity-delay trade-off in hybrid cellular D2D networks with user collaboration. In Proceeding of the International Symposium on Wireless Personal Multimedia Communications, Shenzhen, China, 14–16 November 2016.
  49. Mattfeldt, T. Stochastic Geometry and Its Applications; Wiley: West Sussex, UK, 1996. [Google Scholar]
  50. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef]
  51. Yu, S.M.; Kim, S.L. Downlink capacity and base station density in cellular networks. In Proceedings of the 11th International Symposium on Modeling Optimization in Mobile, Ad Hoc Wireless Networks, Tsukuba, Japan, 13–17 May 2013; pp. 119–124.
  52. Ganesh, A.; O’Connell, N.; Wischik, D. The Single Server Queue; Sole Distributors for the U.S.A. and Canada, Elsevier North-Holland: Amsterdam, The Netherlands, 1982; pp. 47–55. [Google Scholar]
  53. Dong, M.; Ota, K.; Liu, A. RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks. IEEE Internet Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
  54. Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  55. Hu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency. IEEE Syst. J. 2016, 10, 1160–1171. [Google Scholar] [CrossRef]
Figure 1. System model of the hybrid ad hoc network with user collaboration and coverage sensing.
Figure 1. System model of the hybrid ad hoc network with user collaboration and coverage sensing.
Sensors 17 00232 g001
Figure 2. Queueing model representation of the hybrid ad hoc network.
Figure 2. Queueing model representation of the hybrid ad hoc network.
Sensors 17 00232 g002
Figure 3. Relationships among system parameters, protocol parameters and queueing parameters.
Figure 3. Relationships among system parameters, protocol parameters and queueing parameters.
Sensors 17 00232 g003
Figure 4. Coverage sensing area of a mobile user.
Figure 4. Coverage sensing area of a mobile user.
Sensors 17 00232 g004
Figure 5. Maximum capacity per device as a function of transmit power P II with varying infrastructure density λ b ( λ b / λ u =1).
Figure 5. Maximum capacity per device as a function of transmit power P II with varying infrastructure density λ b ( λ b / λ u =1).
Sensors 17 00232 g005
Figure 6. CDF of waiting time w II with varying coverage outage fraction ε o when the coverage outage duration β o follows the exponential and Gamma distribution ( ε o increases from 0.1–0.7 with steps of 0.1, k = 2, N = 1, α ¯ o = 20, ε e = 0.2, α ¯ e = 1).
Figure 6. CDF of waiting time w II with varying coverage outage fraction ε o when the coverage outage duration β o follows the exponential and Gamma distribution ( ε o increases from 0.1–0.7 with steps of 0.1, k = 2, N = 1, α ¯ o = 20, ε e = 0.2, α ¯ e = 1).
Sensors 17 00232 g006
Figure 7. CDF of waiting time w II with varying number of collaborating devices N when the service outage duration β o follows the exponential and Gamma distribution (N increases from 1–5 with steps of one, k = 2, ε o = 0.6, α ¯ o = 20, ε e = 0.2, α ¯ e = 1).
Figure 7. CDF of waiting time w II with varying number of collaborating devices N when the service outage duration β o follows the exponential and Gamma distribution (N increases from 1–5 with steps of one, k = 2, ε o = 0.6, α ¯ o = 20, ε e = 0.2, α ¯ e = 1).
Sensors 17 00232 g007
Figure 8. The average number of collaborating devices N ¯ as a function of broadcast rate R I with varying transmit power P I and capacity demand C ( λ u = 10 4 ).
Figure 8. The average number of collaborating devices N ¯ as a function of broadcast rate R I with varying transmit power P I and capacity demand C ( λ u = 10 4 ).
Sensors 17 00232 g008
Figure 9. The mean waiting time w ¯ II 1 as a function of average delivery rate R II with varying transmit power P II and capacity demand C ( λ b = 10 6 , L = 1, v = 1).
Figure 9. The mean waiting time w ¯ II 1 as a function of average delivery rate R II with varying transmit power P II and capacity demand C ( λ b = 10 6 , L = 1, v = 1).
Sensors 17 00232 g009
Figure 10. Mean delay D ¯ as a function of capacity per device C with varying transmit power P I and user density λ u (L = 1, P II = , λ b = 10 5 , v = 1).
Figure 10. Mean delay D ¯ as a function of capacity per device C with varying transmit power P I and user density λ u (L = 1, P II = , λ b = 10 5 , v = 1).
Sensors 17 00232 g010
Figure 11. Mean delay D ¯ as a function of capacity per device C with varying user mobile speed v (L = 1, P I = , P II = , λ b = 10 5 , arbitrary λ u ).
Figure 11. Mean delay D ¯ as a function of capacity per device C with varying user mobile speed v (L = 1, P I = , P II = , λ b = 10 5 , arbitrary λ u ).
Sensors 17 00232 g011
Figure 12. Mean delay D ¯ as a function of capacity per device C with varying packet size L ( P I = , P II = , λ b = 10 5 , arbitrary λ u , v = 1).
Figure 12. Mean delay D ¯ as a function of capacity per device C with varying packet size L ( P I = , P II = , λ b = 10 5 , arbitrary λ u , v = 1).
Sensors 17 00232 g012
Figure 13. Outage delay D ( ϕ ) as a function of capacity per device C with varying outage threshold ϕ ( P I = , P II = , λ b = 10 5 , arbitrary λ u , L = 1 , v = 1).
Figure 13. Outage delay D ( ϕ ) as a function of capacity per device C with varying outage threshold ϕ ( P I = , P II = , λ b = 10 5 , arbitrary λ u , L = 1 , v = 1).
Sensors 17 00232 g013
Table 1. List of the main parameters.
Table 1. List of the main parameters.
System ParametersProtocol ParametersQueueing Parameters
χPacket arrival rate R I Transmit rate in broadcast phase α d Arrival interval of original traffic
LPacket size P I Transmit power in broadcast phase β d Transmission time of original traffic
λ u User density R I I Transmit rate in deliver phase α e Arrival interval of effective traffic
λ b BS density P I I Transmit power in deliver phase β e Transmit time of effective traffic
vUser speed p c Coverage probability ε e Load of effective traffic
CUser capacity demand p a Access probability α o Arrival interval of coverage outage
ηPath loss exponentNNumber of collaborative users β o Duration of coverage outage
ϕ Probability of delay outage F N ( n ) CDF of N ε o Load of coverage outage

Share and Cite

MDPI and ACS Style

Chen, L.; Luo, W.; Liu, C.; Hong, X.; Shi, J. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing. Sensors 2017, 17, 232. https://doi.org/10.3390/s17020232

AMA Style

Chen L, Luo W, Liu C, Hong X, Shi J. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing. Sensors. 2017; 17(2):232. https://doi.org/10.3390/s17020232

Chicago/Turabian Style

Chen, Lingyu, Wenbin Luo, Chen Liu, Xuemin Hong, and Jianghong Shi. 2017. "Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing" Sensors 17, no. 2: 232. https://doi.org/10.3390/s17020232

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop