Next Article in Journal
Dark and Singular Highly Dispersive Optical Solitons with Kudryashov’s Sextic Power-Law of Nonlinear Refractive Index in the Absence of Inter-Modal Dispersion
Next Article in Special Issue
Robust Deep Learning Models for OFDM-Based Image Communication Systems in Intelligent Transportation Systems (ITS) for Smart Cities
Previous Article in Journal
HeightNet: Monocular Object Height Estimation
Previous Article in Special Issue
The Rescuer’s Navigation in Metro Stations Based on Inertial Sensors and WiFi
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks

School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(2), 351; https://doi.org/10.3390/electronics12020351
Submission received: 13 November 2022 / Revised: 4 January 2023 / Accepted: 5 January 2023 / Published: 10 January 2023
(This article belongs to the Special Issue Recent Advances in Wireless Ad Hoc and Sensor Networks)

Abstract

:
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes.

1. Introduction

A neighbor election is a distributed algorithm for the nodes to coordinate with their competing neighbors for slot access in wireless ad hoc networks. It was first proposed as neighborhood-aware contention resolution (NCR) [1] and then adopted as a multiple access scheme in WiMAX mesh mode for transmitting control messages [2,3]. In recent years, there has been an increasing demand for developing next-generation multiple access schemes for the evolving fifth-generation (5G) and sixth-generation (6G) wireless networks, Internet of Things (IoT) [4,5,6] and wireless sensor networks (WSN) [7,8], where the nodes are expected to schedule themselves in a distributed manner with the knowledge of their neighbors. With the characteristics of neighborhood awareness, the neighbor election has then attracted recent research interest again [9,10,11]. Different from the well-known contention-based slotted aloha (SA) and Carrier-Sense Multiple Access (CSMA), where the nodes randomly initiate transmissions without any prior knowledge about their neighboring network, neighbor election performs contention resolution by getting acquainted with their neighbors. To avoid collisions, a node using neighbor election needs to maintain the information updates from its one-hop and two-hop neighbors to ensure whether they will compete for a specific slot. This lightweight information maintenance will not require the successful two-way handshake processes between transmitters and receivers in reservation-based distributed coordination function (DCF) and other scheduling mechanisms, which may reduce the required control message overhead. If the information of a neighbor node cannot be timely updated, it will also be considered as a potential competitor, leading to an increasing number of competing neighbors. As a result, the insufficient timeliness of neighbor maintenance will decrease the probability of a node winning an election and starting its transmission [9]. Meanwhile, the maintenance of frequent neighbor updates is fundamentally supported by the communication among nodes, which implies an interaction relationship between the transmission probability of nodes and the timeliness of information maintenance.
The timeliness of information maintained in a neighbor election is first modeled in [9] as a function of the number of relaying nodes and the packet loss rate of wireless links. In contrast, the impact of a message transmission on the maintenance process is ignored. In the recent decade, the concept of age of information (AoI) [12] has been introduced as a novel metric to evaluate the information freshness in communication networks. As we are discussing the neighbor election-based slot access, throughout this paper, the AoI is determined as the age of maintained information updates from the neighbors of a receiver node [13]. For time-restricted applications, the timeliness of information maintenance can also be evaluated by the probability that AoI exceeds a given age threshold, which is termed as the age violation probability [14,15] or outage probability of AoI [16]. In [12], the real-time status updating by multiple information sources is comprehensively discussed. In [14], the age violation probability is derived based on the probability-generating function (pgf) of peak age at a steady state. The upper bound of age violation probability is given and tightened in [16]. While in [15], Hu et al. derive the mean age violation probability by analyzing the different cases that the AoI that may exceed an arbitrary age constraint and provide statistical results. This work makes it easy to analyze age violation probability by intuitively mapping the violation period within the evolution path of AoI.
Besides evaluating the AoI metric and its variations, some literature also try to build the connection between AoI and the concerned indicators in CSMA networks to bring more insights. The relation between beacon interval and AoI is given in [17], and the relation of AoI and the stability in control loops over non-beacon CSMA network is presented in [18]. However, the transmission timing in CSMA networks does not depend on AoI, as nodes using CSMA-based schemes only rely on direct channel sensing to initiate transmissions. Hence the change of AoI cannot affect the transmission process of nodes, and these analyses cannot be directly applied to the analysis of neighbor election process where interaction relationship between AoI and transmissions of nodes exists.
The main contributions of this paper are given as follows:
  • We propose an approximated analytical model of the transmission probability of nodes in a wireless ad hoc network concerning its interaction relationship with the age violation probability of neighbor election-based distributed slot access. To our best knowledge, it is the first work that analyzes such interaction relationships in distributed multiple access schemes, which provides theoretical guidance for enhancing the design of distributed multiple access schemes with network-aware algorithms from the information freshness perspective.
  • We define the concept of timely maintained neighbors in which information can be updated by a typical node on time. We then consider the competing probability of these neighbor nodes by analyzing the intersection of election intervals
  • We verify the proposed approximation model by performing numerical simulations under different parameters, including the number of neighbors, the ratio of relaying nodes, and the packet loss rate. According to the simulation results, the proposed approximation model can enhance the accuracy of evaluating the transmission probability of nodes, which shows that the consideration of age violation probability of neighbor information is necessary.
The rest of the paper is organized as follows. We first introduce the system model of a wireless ad hoc network where the nodes use neighbor election-based slotted access in Section 2. Also, we first derive the interaction relationship between the transmission probability of nodes, the age violation probability of neighbor information, and the competing probability of timely maintained neighbors. Next, we discuss the election process of two neighboring nodes in Section 3 and linearly approximate their competing probability to simplify the derivations. Section 4 focuses on the information maintenance from the two-hop neighborhood, and the age violation probability is derived as the mean violation duration divided by the average maintenance interval. Numerical simulation results are illustrated in Section 5. The conclusions of this paper and future research aspects are summarized in Section 6.

2. Neighbor Election Based Distributed Slot Access

2.1. System Model

We consider a slotted wireless ad hoc network where the nodes attempt to access slots for transmitting their messages using a distributed neighbor election algorithm. The principle of neighbor election-based slot access is to control nodes’ transmission reasonably. As the literature describes [9,11], the nodes have to maintain neighbors’ information and avoid collisions in some future slots. A node should therefore announce to its neighbors the range of future slots it may compete for. The neighbors that receive this announcement will check the intersection of slots which they may compete together and avoid collision with the distributed neighbor election algorithm. As for broadcasting crucial control messages in WiMAX mesh mode, a node should ensure that the one-hop neighbors are ready to receive its message. A two-way reservation handshake is unsuitable for such transmission as it is complicated for a node to make handshakes with all its one-hop neighbors. However, election-based slot access helps the nodes initiate collision-free transmissions in a much more efficient way with the prior knowledge of neighbors. This makes it a promising candidate for designing next-generation multiple access schemes.
We start the analysis of the neighbor election by considering a typical node i. From the perspective of node i, the slots are partitioned into two types of intervals: the valid election interval and the hold-off interval. Node i first participates in the elections within its valid election interval of V slots and competes with its neighbors. After winning the chance of transmitting in a slot of index Q 1 , , V , it suspends the participation in elections and steps into a hold-off interval of H slots. When the hold-off interval ends, node i will enter the next valid election interval and rejoin the election. The duration between the start of two consecutive valid election intervals is termed as an election cycle [9] of τ = H + Q slots, which is illustrated in Figure 1.
Algorithm 1 shows a simplified version of the neighbor election algorithm adopted in the WiMAX standard [2], where N 1 and N 2 denote the one-hop and two-hop neighbor set of i respectively; C t denotes the competing neighbor list for slot t and H a s h ( i , t ) is a two-input hash-based pseudo random number generating function which has a unique output when the input variables are given. where node i should maintain the election information from several N neighbors within its two-hop coverage. To realize the required two-hop neighborhood maintenance, the node message should contain a list of the latest election information updates of itself and its one-hop neighbors. The update of a neighbor node j has three fields: the identity of j, the range of its next valid election interval, and the earliest subsequent transmitting slot, i.e., the start of the second next valid election interval. This information helps node i to determine whether node j belongs to the competing neighbor list C t . The information of node j itself will be updated right before its message transmission, which means there will be no queuing time for the update before being embedded into the message.
Algorithm 1: Distributed Neighbor Election Algorithm.
  • for slot t = 1 , , V in valid election interval do
  •     for one-hop and two-hop neighbors j N 1 N 2  do
  •         if the valid election intervals of i and j overlap at slot t then
  •            include j into C t ;
  •         end if
  •     end for
  •     for competing neighbor j C t  do
  •         if pseudo-random value H a s h ( i , t ) > H a s h ( j , t )  then
  •            node i wins the election with j. continue;
  •         else
  •            node i loses the election. break;
  •         end if
  •     end for
  •     if node i wins the election for slot t then
  •          Q t , node i transmits in slot Q. break;
  •     end if
  • end for

2.2. Interaction Relationship among Parameters

For simplicity of analysis, we assume that each node is equal to the typical node i and operates with the same value of N in each slot. Let p t denote the transmission probability of node i in an arbitrary slot after it wins an election. Let p v denote the age violation probability that node i cannot timely maintain the updates from one of its neighbors. Let p c denote the competing probability that a timely maintained neighbor node will compete with node i in a specific election. Let N v denote the number of untimely maintained neighbors, which is binomial distributed with parameters N and p v . The number of timely maintained competing neighbors is denoted as N c = N N v p c . Therefore, p t can be expressed as the reciprocal of the mean number of nodes participating in an election:
p t = 1 E N c + N v + 1 = 1 p c p c p v + p v N + 1
Equation (1) shows that p t is a function of N, p c and p v . While the competing probability of maintained neighbors p c is related to p t as it is determined by the intersections of valid election intervals of competing neighbors, which is derived in Section 3. The age violation probability p v also relates to p t since it is determined by the information maintenance process, which will be analyzed in the Section 4.

3. Competing Probability of Timely Maintained Neighbors

We concentrate on the election process of typical node i and a timely maintained neighbor node j within two-hop distance. These two nodes will not win the same election and thus have different transmitting slots. To analyze the competing probability p c of j, we suppose that node i and j enter their new election cycles at slot t 1 and t 2 > t 1 respectively. Let R = t 2 t 1 denote the residual slot number of the previous election cycle of j when i has entered its new one. Node i will consider j as a competing node during the intersections of their valid election intervals, which can be divided into three cases as illustrated in Figure 2. Let ξ denote the duration ratio of an intersection to node i’s related valid election interval. From the perspective of i, the competing probability of j can be written as the expectation of ξ :
p c : = E ξ = q = 1 V f Q q · ξ ¯ q
where f Q q is the probability mass function (pmf) of Q, and ξ ¯ q is the expectation of ξ under the condition of Q = q .
Since Q is geometric distributed with parameter p t , the pmf of Q is written as:
f Q q : = Pr Q = q = p ^ t q 1 p t , q = 1 , 2 , , V
where p ^ t = 1 p t for simplifying notations.
In the first and second cases of Figure 2, which conditions are 1 R < Q and H < R < H + Q respectively, there should be Q 2 . Hence only the third case will happen when Q = 1 . The expectation of ξ conditioned by Q = q is then defined as:
ξ ¯ q : = E ξ Q = q = r = H + 1 H + V f R r , q = 1 r = 1 q 1 f R r + f R r + H · r q + r = H + q H + V f R r , q > 1
where f R r is the pmf of residual slot number R of node j:
f R r : = Pr R = r = k = max r , H + 1 H + V f τ k k , r = 1 , , H + V
and f τ k is the pmf of election cycle’s duration τ = H + Q :
f τ k : = Pr τ = k = f Q k H , H < k H + V 0 , otherwise
The definition in Equation (5) is based on the fact that when τ is given, R is uniformly distributed in the range 1 , , τ .
To derive p c as a function of p t , we start from the derivation of f R r . When r H + 1 , Equation (5) can be simplified as:
f R r r H + 1 = k = H + 1 H + V f τ k k = q = 1 V f Q q q + H = 1 E τ
As for r > H + 1 , Equation (5) is truncated, and difficult to have a simple expression by reduction to a common denominator. According to [19], the limit distribution of the residual slot number R in a renewal process satisfies the following formula:
Pr R r 1 E τ i = 1 r Pr τ i
Thus when r > H + 1 is given, Equation (5) can be approximated as:
f R r r > H + 1 = Pr R r Pr R r 1 Pr τ r E τ = k = r H + V f τ k E τ = p ^ t r H 1 p ^ t V E τ
With the expression in Equations (7) and (9), we obtain the mean of ξ when q = 1 and q 2 respectively as follow:
ξ ¯ 1 = r = 1 V p ^ t r 1 E τ V p ^ t V E τ = p t 1 p ^ t V 1 V p ^ t V E τ = E Q 2 V p ^ t V E τ
ξ ¯ q 2 = 1 p ^ t V q E τ r = 1 q 1 r + 1 q E τ r = 1 q 1 r p ^ t r 1 + r = H + q H + V f R r
where E Q denotes the mean of Q and is written as:
E Q = q = 1 V q · f Q q = 1 p t 1 p t V · p ^ t V 1 p t
and the approximation in Equation (12) holds as p ^ t V goes to zero when V is sufficiently large. For the same reason, E τ H + p t 1 , and the increment of ξ ¯ q when q 2 is approximated as:
ξ ¯ q + 1 ξ ¯ q 1 + p ^ t q 1 q q + 1 E τ r = 1 q 1 r p ^ t r 1 + r = 1 q 1 r q q + 1 E τ p ^ t q 1 E τ = 1 2 E τ p ^ t q 1 q + 1 E τ 1 q p ^ t q 1 + q 1 p ^ t q p t 2 q q + 1 E τ
As q grows, p ^ t q goes to zero and so ξ ¯ q + 1 ξ ¯ q gradually tends to 2 E τ 1 . Thus we consider to approximate ξ ¯ q by a linear function defined as follow:
ξ ¯ Q : = ξ ¯ V V Q V 2 · ξ ¯ V ξ ¯ 2 , Q > 1
where the value of ξ ¯ 2 and ξ ¯ V are approximated by substituting Equations (9) and (12) into Equation (11):
ξ ¯ 2 = 2 p ^ t V 2 E τ + r = H + 2 H + V f R r = 2 p ^ t V 2 E τ + y = 2 V p ^ t y 1 E τ V 1 p ^ t V E τ y = 1 V p ^ t y 1 E τ 1 p ^ t V 1 p ^ t V p t p t E τ E Q E τ
ξ ¯ V = r = 1 V 1 f R r + f R r + H · r V = r = 1 V 1 r p ^ t r 1 V E τ + V 1 1 p ^ t V 2 E τ 1 V p t 2 E τ + V 1 2 E τ
Substitute Equations (15) and (16) into Equation (14), we have the expression of ξ ¯ Q as follow:
ξ ¯ Q 1 V 2 p t 2 E τ + 1 2 E τ Q 2 + E Q V Q V 2 E τ = c 1 Q 2 c 2 Q + c 2 V = c 1 c 2 Q + c 2 V 2 c 1
where c 1 = V 2 p t 2 E τ 1 + 2 E τ 1 and c 2 = E Q E Q V 2 E τ V 2 E τ .
Finally, we obtain the approximated expression of p c by some transformations and simplifications as follow:
p c 1 E τ + p t c 1 c 2 q = 1 V q p ^ t q 1 + p t V c 2 2 c 1 · q = 1 V p ^ t q 1 c 1 c 2 p t + c 1 p t + V c 2 2 V 2 p t 2 E τ 1 E τ c 1 c 2 p t 1 + V c 2 E τ 1 p t 2 + 1.5 V 1 p t 1 + 2 V V 2 H + p t 1

4. Age Violation Probability of Neighborhood Maintenance

We focus on analyzing the age violation probability p v of the neighborhood maintenance process in this section. Consider that node i successfully receives a message m k from its neighbor node j for the k-th time. Let t k and t k denote the slot indices that node j transmits m k and node i successfully receives m k . Let u t denote the transmitting slot index of the last maintained update at slot t. The age of this update is denoted as Δ t = t u t .
An illustration of the AoI process of node j observed at node i is presented in Figure 3, where T k = t k t k denotes the consumed time of k-th successful maintenance, X k = t k + 1 t k denotes the interval between two consecutive and successfully maintained updates, Y k = t k + 1 t k denotes the duration of k-th maintenance interval. Let ω = 2 H denote the age threshold that a neighbor cannot be timely updated as referred to in Section 2, and let Z k denote the violation duration that AoI exceeds the threshold ω in k-th maintenance interval.
According to the derivation of Equation (25) in [15], the age violation probability of an update is defined as
p v : = Pr Δ t > ω = E Z k E Y k
where the mean of Y k and Z k will be derived in the following two subsections.

4.1. Mean Duration of Maintenance Interval

We first analyze the mean of Y k . Since the updates happen along with the generation of messages, there is no queuing time, and so t k < t k + 1 . Therefore, the mean of Y k should be
E Y k = E X k + T k + 1 T k = E X k + E T k + 1 E T k = E X k
since the expectations of T k and T k + 1 are statistically equal. Equation (20) shows that Y k has the same mean of X k . Consider that during the k-th maintenance interval, node i fails to maintain the updates from j for M times. Let p m denote the successful maintenance probability of an update. As M is geometric distributed of parameter p m , the mean of M is E M = p m 1 , and the mean of X k is written as:
E X k = E M · τ = E M E τ H p m 1 + p t p m 1
The analysis of p m is given as follow. Note that the nodes should forward the updates of their one-hop neighbors to realize two-hop neighbor maintenance in a distributed neighbor election. Thus, node i can capture the updates of a one-hop neighbor by receiving messages from either the direct link or the forwarding links from their common one-hop neighbors. For the simplicity of analysis, we assume that a node’s two-hop coverage area is four times as large as its one-hop coverage, and each node has the same number of one-hop and two-hop neighbors. Hence we can have the number of one-hop and two-hop neighbors as N 1 = N 1 = N 4 and N 2 = N 2 = N N 1 respectively. Suppose there are several n N 1 common one-hop neighbors between node i and j. They will transmit at least one time in the hold-off interval of j after its transmission. The probability that i can capture the update of j in an arbitrary slot via forwarding links can be considered as the service rate:
μ = n H · 1 p out 2
where p out is the identical outage rate of all the wireless links.
If i receives from j via direct link, there is no need to wait for the forwarded messages, and the time is only consumed in the forwarding process, and the pmf of T k can be written as:
f T k s : = Pr T k = s = 1 p out , j N 1 , s = 0 p out 1 μ s 1 μ , j N 1 , s = 1 , , H 0 , j N 2 , s = 0 1 μ s 1 μ , j N 2 , s = 1 , , H
Finally, according to the definition of p m , it can be given as the cumulative probability of T k , i.e., p m = s = 0 H f T k s .

4.2. Mean Violation Duration within a Maintenance Interval

Next, we analyze the mean of Z k . Since the AoI at the start of k-th maintaining interval is T k H and always smaller than ω , Z k can be obtained as given in [15]:
Z k = max X k + T k + 1 ω , 0
The mean of Z k can be written as follow:
E Z k = Z = ω Z ω · Pr X k + T k + 1 = Z = E X k + T k + 1 ω Z = H + 1 ω 1 Z ω · Pr X k + T k + 1 = Z
where E X k + T k + 1 ω = E X k + E T k + 1 ω . In the second term of the rhs where X k and T k + 1 are independently distributed, there is H + 1 X k = M · τ Z ω 1 . So M can only be 1 and X k = τ . The pmf of X k + T k + 1 can then be written as:
Pr X k + T k + 1 = Z = s = max Z H V , 0 Z H 1 f τ Z s f T k s
where Z H + 1 , , 2 H 1 .

5. Numerical and Simulation Analysis

According to the IEEE 802.16/WiMAX standard [2], the value of V and H are determined by the related duration exponents, i.e., V = 2 E x p a and H = 2 E x p b . The duration exponents are usually set to E x p a = 4 and E x p b = E x p a + x , where x is an non-negative integer [9]. Here we set x = 2 and so V = 16 , H = 64 .
To verify the accuracy of our approximations, we first take the age violation probability p v as an independent variable to analyze its impact on the transmission probability p t . We substitute Equation (18) into Equation (1) and obtain the approximated value of p t as the positive root of a quadratic equation, which is given as follow:
p t b t b t 2 4 a t c t 2 a t
where the coefficients are adjusted as a t = p v H p v 1 V N , b t = 0.5 N p v + H 1.5 N V , and c t = 1 p v N + V .
To intuitively present the impact of p v on p t , we compare the numerical results of the approximated and exact value of p t under different p v in Figure 4. The exact value of p t is obtained by directly calculating the result of Equation (4) without approximation. We can observe that as p v increases, the neighbors are more likely to be competing nodes, which leads to a decreasing value of p t . We also find that the linear approximation of Equation (14) is tight when N is between 16 to 32, while for N = 8 or N = 64 , the value of p t is slightly overestimated due to the imperfection of linear approximation.
Next we consider that p v is also related to p t by summarizing the derivations in Section 4:
p v = N 1 E Z k j N 1 + N 2 E Z k j N 2 N 1 E Y k j N 1 + N 2 E Y k j N 2
To obtain the approximation results, we search the value of p t which can satisfy both Equations (27) and (28) simultaneously under different parameters including the number of neighbors N, the ratio of relaying nodes n N 1 and the packet loss rate p out .
As the interaction between p v and p t is now concerned, a C++-based virtual simulation platform is implemented to provide high-fidelity simulation results of the neighbor election based distributed slot access. This platform consists of virtual network nodes and wireless channels, where the synchronization procedures among nodes are predetermined to let them have the same timing of slot numbers and the start of slots. In each simulation slot, the transmitting nodes disseminate their messages to the relevant receiving nodes via virtual channels configured with different packet loss rates. The platform monitors the action of nodes and calculates the transmission probability and age violation probability from statistics. The simulation and approximation results are compared in Figure 5, where the analytical results in [9] are also plotted by black lines. We can first observe that for a greater packet loss rate, it is harder for the nodes to maintain the information updates, leading to a greater value of p v and hence the transmission probability decreases. For p out = 0.1 , the result from [9] is underestimated when N < 40 , while it is slightly tighter than our approximations when N > 40 . For greater packet loss rate, saying p out = 0.6 , our approximation is tighter than the one in [9] when N > 20 , which shows that our approximation method is valid for greater p out .
After verifying the accuracy of our approximation models, we also want to investigate the impact of the outage rate p out of wireless links onto the age violation probability p v , which is shown in Figure 6.
We can see that as p out rises, p v also monotonically increases. For N = 64 , the value of p v is lower than 0.1 when p out 0.3 , while it increases rapidly when p out 0.4 compared to other cases with a smaller number of neighbors. This is because when p out reaches a given level, the nodes cannot timely maintain the information from the two-hop and even one-hop neighbors, leading to higher age violation probability.
In Figure 7, the approximation and simulation results of p t are illustrated against the ratio of relaying nodes, which reflects the connectivity of network topology. It shows that a growing ratio of relaying nodes is beneficial to the value of p t as the information updates from neighbors can be timely maintained with higher probability. Meanwhile our approximation is tight when n = 0.025 N 1 and n = 0.05 N 1 , and quite underestimated when n = 0.05 N 1 and N > 24 due to imperfection linear approximation and should be improved.

6. Conclusions

In this paper, we develop an approximated analytical model of the interaction relationship between the transmission probability of nodes and the age violation probability of information update maintenance in neighbor election-based distributed slot access of wireless ad hoc networks. By introducing the novel AoI metric, we can understand the timeliness of neighbor information maintenance and its impact on communication performance in a new way. Numerical and simulation results also show that with the aid of analyzing the age violation probability metric, our approximation is much tighter than the one in the literature when a greater packet loss rate is configured. The interaction analysis also helps to extend the future research of next-generation network-aware distributed multiple access schemes, such as optimizing the timeliness threshold and improving the strategy of dealing with the untimely maintained neighbors and their information updates.

Author Contributions

Conceptualization, X.L. and W.H.; investigation, Y.L.; data curation, X.L. and W.H.; writing—review and editing, W.H.; visualization, Y.L. and W.H.; supervision, X.L.; funding acquisition, X.L. All authors have read and agreed to the published version of the manuscript.

Funding

The work is supported in part by the Fundamental Research Funds for the Central Universities under Grant 2021RC242 and 2021JBZ102, in part by the Science and Technology Innovation Program of Xiongan New Area under Grant 2022XAGG0300, and in part by Joint Funds of the National Natural Science Foundation of China under Grant U2241215.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
NCRNeighborhood-aware Contention Resolution
5GFifth-Generation
6GSixth-Generation
IoTInternet of Things
WSNWireless Sensor Networks
AoIAge of Information
SASlotted Aloha
DCFDistributed Coordination Function
CSMACarrier-Sense Multiple Access
pmfprobability mass function
pgfprobability-generating function

References

  1. Bao, L.; Garcia-Luna-Aceves, J.J. A New Approach to Channel Access Scheduling for Ad Hoc Networks. In Proceedings of the ACM 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, 16 July 2001; pp. 210–221. [Google Scholar] [CrossRef]
  2. IEEE Std 802.16-2004; IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems. IEEE: Piscataway, NJ, USA, 2004; pp. 1–895. [CrossRef]
  3. Kas, M.; Yargicoglu, B.; Korpeoglu, I.; Karasan, E. A Survey on Scheduling in IEEE 802.16 Mesh Mode. IEEE Commun. Surv. Tutor. 2010, 12, 205–221. [Google Scholar] [CrossRef] [Green Version]
  4. Liu, Y.; Zhang, S.; Mu, X.; Ding, Z.; Schober, R.; Al-Dhahir, N.; Hossain, E.; Shen, X. Evolution of NOMA Toward Next Generation Multiple Access (NGMA) for 6G. IEEE J. Select. Areas Commun. 2022, 40, 1037–1071. [Google Scholar] [CrossRef]
  5. Xie, W.; Ding, X.; Cai, B.; Li, X.; Wei, M. Downlink MIMO-NOMA System for 6G Internet of Things. Electronics 2022, 11, 3233. [Google Scholar] [CrossRef]
  6. Lin, Y.-J.; Tzeng, S.-S. A Framed Slotted ALOHA-Based MAC for Eliminating Vain Wireless Power Transfer in Wireless Powered IoT Networks. Electronics 2020, 10, 9. [Google Scholar] [CrossRef]
  7. Leccese, F.; Leccisi, M.; Cagnetti, M. Cluster Layout for an Optical Wireless Sensor Network for Aerospace Applications. In Proceedings of the 2019 IEEE 5th International Workshop on Metrology for AeroSpace (MetroAeroSpace), Torino, Italy, 19–21 June 2019; pp. 556–561. [Google Scholar] [CrossRef]
  8. Leccese, F.; Cagnetti, M.; Giarnetti, S.; Petritoli, E.; Luisetto, I.; Tuti, S.; Leccisi, M.; Eurovic-Pejcev, R.; Eordevic, T.; Tomasevic, A.; et al. Comparison between Routing Protocols for Wide Archeological Site. In Proceedings of the 2018 Metrology for Archaeology and Cultural Heritage (MetroArchaeo), Cassino, Italy, 22–24 October 2018; pp. 406–410. [Google Scholar] [CrossRef]
  9. Li, X.; Li, X. Research on the Impact of Interaction Times in Distributed Wireless Ad Hoc Networks. IEEE Access 2020, 8, 111742–111750. [Google Scholar] [CrossRef]
  10. Sun, Z.; Yang, T.; Che, Y.; Yao, L.; Bai, B.; Zhang, G.; Yang, O.; Liu, X. Research on Scheduling Mechanism of Control Channel in 802.16 Mesh Mode. In Proceedings of the Prognostics and Health Management Conference (PHM-Besançon), Besancon, France, 4–7 May 2020; pp. 328–331. [Google Scholar] [CrossRef]
  11. Cirimelli-Low, D.; Garcia-Luna-Aceves, J.J. Key-Activation Multiple Access (KAMA). In Proceedings of the 2021 13th IFIP Wireless and Mobile Networking Conference (WMNC), Montreal, QC, Canada, 20 October 2021; pp. 92–99. [Google Scholar] [CrossRef]
  12. Yates, R.D.; Kaul, S.K. The Age of Information: Real-Time Status Updating by Multiple Sources. IEEE Trans. Inform. Theory 2019, 65, 1807–1827. [Google Scholar] [CrossRef] [Green Version]
  13. Kaul, S.; Yates, R.; Gruteser, M. Real-Time Status: How Often Should One Update? In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar] [CrossRef] [Green Version]
  14. Devassy, R.; Durisi, G.; Ferrante, G.C.; Simeone, O.; Uysal-Biyikoglu, E. Delay and Peak-Age Violation Probability in Short-Packet Transmissions. In Proceedings of the International Symposium onInformation Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2471–2475. [Google Scholar] [CrossRef] [Green Version]
  15. Hu, L.; Chen, Z.; Dong, Y.; Jia, Y.; Liang, L.; Wang, M. Status Update in IoT Networks: Age-of-Information Violation Probability and Optimal Update Rate. IEEE Internet Things J. 2021, 8, 11329–11344. [Google Scholar] [CrossRef]
  16. Seo, J.-B.; Choi, J. On the Outage Probability of Peak Age-of-Information for D/G/1 Queuing Systems. IEEE Commun. Lett. 2019, 23, 1021–1024. [Google Scholar] [CrossRef]
  17. Baiocchi, A.; Turcanu, I. Age of Information of One-Hop Broadcast Communications in a CSMA Network. IEEE Commun. Lett. 2021, 25, 294–298. [Google Scholar] [CrossRef]
  18. Mena, J.P.; Nunez, F. On the Relation Between Peak Age and Stability in Control Loops Over Non-Beacon Enabled CSMA/CA. IEEE Commun. Lett. 2021, 25, 3139–3143. [Google Scholar] [CrossRef]
  19. Ali, S.; Shah, I.; Wang, L.; Yue, Z. A Comparison of Shewhart-Type Time-Between-Events Control Charts Based on the Renewal Process. IEEE Access 2020, 8, 113683–113701. [Google Scholar] [CrossRef]
Figure 1. Illustration of the election cycle in distributed neighbor election.
Figure 1. Illustration of the election cycle in distributed neighbor election.
Electronics 12 00351 g001
Figure 2. The intersections of valid election intervals of two neighbor nodes: (a) 1 R < Q . (b) H < R < H + Q . (c) H + Q R H + V .
Figure 2. The intersections of valid election intervals of two neighbor nodes: (a) 1 R < Q . (b) H < R < H + Q . (c) H + Q R H + V .
Electronics 12 00351 g002
Figure 3. Illustration of the observed AoI process at node i of neighbor node j.
Figure 3. Illustration of the observed AoI process at node i of neighbor node j.
Electronics 12 00351 g003
Figure 4. Approximated and numerical results of p t under different value of p v , H = 64 , V = 16 .
Figure 4. Approximated and numerical results of p t under different value of p v , H = 64 , V = 16 .
Electronics 12 00351 g004
Figure 5. Comparison of the approximation and simulation results of p t under different node numbers N 8 , , 64 and packet loss rate p out = 0.1 , 0.6 , H = 64 , V = 16 , and n = 0.05 N 1 for two-hop neighbors [9].
Figure 5. Comparison of the approximation and simulation results of p t under different node numbers N 8 , , 64 and packet loss rate p out = 0.1 , 0.6 , H = 64 , V = 16 , and n = 0.05 N 1 for two-hop neighbors [9].
Electronics 12 00351 g005
Figure 6. Approximated results of p v under different value of p out , H = 64 , V = 16 .
Figure 6. Approximated results of p v under different value of p out , H = 64 , V = 16 .
Electronics 12 00351 g006
Figure 7. The value of p t under different node numbers N 8 , , 64 and ratio of n to N 1 for two-hop neighbors, H = 64 , V = 16 , p out = 0.1 .
Figure 7. The value of p t under different node numbers N 8 , , 64 and ratio of n to N 1 for two-hop neighbors, H = 64 , V = 16 , p out = 0.1 .
Electronics 12 00351 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, W.; Li, X.; Liang, Y. Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks. Electronics 2023, 12, 351. https://doi.org/10.3390/electronics12020351

AMA Style

Huang W, Li X, Liang Y. Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks. Electronics. 2023; 12(2):351. https://doi.org/10.3390/electronics12020351

Chicago/Turabian Style

Huang, Wenjun, Xu Li, and Yanan Liang. 2023. "Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks" Electronics 12, no. 2: 351. https://doi.org/10.3390/electronics12020351

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop