Next Article in Journal
Regulation Principles of Power Flow Gradients to Multiple Characteristic Independent Variables in UPFC Embedded Power System
Previous Article in Journal
PET/CT Radiomics in Lung Cancer: An Overview
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks

1
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
State Key Laboratory of Wireless Mobile Communications, China Academy of Telecommunication Technology, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(5), 1719; https://doi.org/10.3390/app10051719
Submission received: 5 February 2020 / Revised: 25 February 2020 / Accepted: 26 February 2020 / Published: 3 March 2020
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Most mobile ad hoc wireless networks have social features. It is a fundamental problem how to understand the performances of social-aware mobile ad hoc wireless networks. In this paper, we consider a wireless network area, with restricted mobility model and rank-based social model. On this basis, we investigate the upper bound of throughput capacity in such networks using the protocol interference model. By tessellating the network area into cells spatially and dividing time into slots temporally, we propose a multi-hop relay and slots allocation scheduling strategy. Then, we derive the achieved throughput capacity under this strategy. Results show per-node throughput is related to parameter of social model and range of node motion. In addition, we also study the delay varies by queueing theory in such network. Finally, we discuss capacity-delay tradeoffs in such networks. These results are beneficial to the design of network protocols in large social-aware mobile ad hoc wireless networks.

1. Introduction

There will be trillions of devices in 5G and beyond 5G networks [1,2]. These devices are connected to the base station, then massive amounts of data will be generated. If these devices are maintained in a decentralized way, exchanging data over multi-hops (paths consisting of multiple devices), an ad hoc network is formed.
A decentralized structure that all participating devices are responsible for exchange information by themselves, makes wireless ad hoc networks useful [3]. Usually there is no previously established network infrastructure in scenarios, such as emergency services and disaster recovery. These characteristics make wireless ad hoc networks suitable for such applications where a centralized structure could be invalid.
Wireless ad hoc networks have a better scalability in contrast to centralized networks. They can be easily extended with more devices at any position in the network region. However, the mobile devices connected by radio, in which case the topology could be rapidly changed. Unpredictable mobility of nodes introduces more routing problems [4].
In this paper, we provide the scaling lows of social-aware mobile ad-hoc wireless networks. The sections are organized as follows. We introduce some related works in Section 2. In Section 3, preliminaries (such as the mobility model, social model, and throughput definitions) are introduced. In Section 4, the upper bound throughput of each node is studied. In Section 5, a multi-hop relay and slots allocation scheduling scheme is proposed, and the achieved throughput of each node is given. In Section 6, we investigate the network delay by queueing theory. In Section 7, we discuss and analyze the results.

2. Related Works

Gupta and Kumar [5,6] analyzed large wireless networks capacity from the perspective of the network layer for the first time. The wireless network is modeled as an interference network in their work. In other words, whether data is received depending on the interference between nodes. Based on this assumption, they derived the upper bound throughput of each node in random ad hoc networks with asymptotic method. However, the throughput of each node cannot reach the upper bound.
The seminal work has inspired researchers to study performances of large wireless networks. In particular, Grossglauser and Tse [7,8] showed that throughput capacity changes dramatically allowing the nodes to move. A 2-hop relay algorithm was proposed with random Independent Identically Distributed Mobility Model. Using 2-hop relay algorithm, they show that the per-node throughput in large wireless networks can keep constant. But, 2-hop relay algorithm comes at the expense of latency and requires higher node speed.
Subsequently, a great deal of research has emerged on exploring performance for large wireless networks under various physical technologies and various traffic model. These include directional antennas [9], cognitive radios [10], Multiple Input Multiple Output techniques [11], etc. Multicast is a more common pattern of unicast. Li et al. [12,13] studied multicast scenario with k ( k < n ) destinations in large static wireless ad hoc networks. The results demonstrate that the upper bound throughput of each node is Θ ( 1 n k log n ) .
Performance of large wireless networks with more mobility models are extensively studied, such as the Brownian Mobility Model [14], Correlated Mobility Model [15], Levy Mobility Model [16], Reference Point Group Mobility Model [17], and Human Mobility Model [18].
However, high throughput and low latency cannot be obtained simultaneously. Delay can be reduced at the cost of a lower per-node throughput capacity, and vice versa. Neely and Modiano [19] analyzed this issue under different scheduling policies. The corresponding delay is O ( n ) , O ( n ) and O ( log n ) respectively when per-node throughput is O ( 1 ) , O ( 1 n ) and O ( 1 n log n ) . They showed the necessary delay and capacity tradeoffs in large wireless ad hoc network. The redundancy (flooding scheme) can decrease delay because of more transmission opportunities.
Newly added backbone nodes are beneficial for capacity and delay in mobile ad hoc networks. Data can be delivered by high-bandwidth links between backbone nodes. In Reference [20], Alexander and Veciana studied the asymptotic scaling for hybrid ad hoc networks. They analyzed the throughput capacity by dividing the number of backbone nodes into three regions. Zhang et al. [21] studied multicast traffic model impacts on capacity of hybrid networks.
Social characteristics have also become an important indicator for mobile communication network. Geographic location has a significant impact on their social relations in online social networks [22,23]. However, existing social models have not captured small world phenomenon that arbitrary nodes are likely connected through shorter friends chain. The probability of contacts decreases with the increase of distance, which obeys the power law distribution. Literature initiated the research on capacity scaling of networks with social attributes [24,25].
As the number of devices increases in large mobile ad hoc wireless networks, new challenges have to be faced in order to maintain their performance. It is of great importance how to improve the performance of such networks with social attributes. To the best of our knowledge, there are a few researches about the interaction between social networks and mobile communication networks. We are among the first attempt to study the interaction between social networks and mobile communication networks.

3. Preliminaries

In this section, we want to demonstrate some models and define the problem to be solved. Some parameters used in following analysis are summarized in Table 1.
There are n mobile nodes scattering randomly over an unit square region O , so each node is independently and uniformly distributed in size of region. We do not focus on edge effect, which is ignored in this paper. As shown in Figure 1, the network area is divided into square cells to avoid interference. We evenly divide the unit region of n nodes into cells with an area b ( n ) . Let b ( n ) = Θ ( log n / n ) to ensure connectivity in the network.

3.1. Mobility Model

Distinct from the cell above, as shown in Figure 1, the range of node motion is restricted within the certain area, which is called super-cell. Data forward process is independent of node mobility process in the network. The area of each super-cell is m, so each super-cell consists of Θ ( m / b ( n ) ) cells.
There are some special cases: (1) m = 1 the range of node motion is the whole network area, each node refresh its position in each time slot, which is similar to the Independent Identically Distributed Mobility model. (2) m = b ( n ) the range of node motion is cell area, each node can oscillate at its initial position, which is similar to the static network.
In the super-cell, each node randomly chooses direction in [ 0 , 2 π ] and randomly chooses speed in [ 0 , m ] . Then, we know location of nodes is independently and identically distributed in super-cell. Time is divided into slots of equal duration. At the beginning of each time slot, each node randomly selects destination cell in the super-cell, moves from its current cell to destination cell, stays in it until next time slot.

3.2. Social Model

We adopt the model in Reference [26] mapping from the social connections to wireless network. For a given node i, it select destination node j based on two aspects - social experiences and geographic location. The node is likely select the destination close to it.
We define social relationship strength of node j with respect to node i as
R a n k i ( j ) = | { k N : L ( X k , X i ) < L ( X j , X i ) } | ,
where N is the node set of networks, L ( X k , X i ) is the distance between node k and node i, | · | represented the number of elements in the set.
The probability that node i select node j as a destination is defined as
P i j = 1 F n R a n k i δ ( j ) ,
where F n = i = 1 n 1 i δ uses for normalization.
F n shows the social experiences which follows the power-law degree distribution and guarantees small-world properties. δ is the parameter of social model. Notice that when δ = 0 and F n = 0 the network is pure mobile ad hoc network.

3.3. Definitions

The amount of data transmitted from the source node to the destination node is Λ ( t ) in time interval [ 0 , t ] . Then, throughput capacity is defined as
T = lim t ( Λ ( t ) t ) .
From network perspective, data can be bits, bytes, or packets. If there is a spatial and temporal scheme for scheduling transmissions, the throughput of each node μ is feasible, called achieved throughput of each node.
Network delay is the total time spent by data transmission from the source node to the destination node. Since we analyze delay from the perspective of network, packet processing time of the node is neglected.

4. The Upper Bound of Throughput Capacity

In this section, we use the network models and assumptions above to derive an upper bound of capacity for social-aware mobile ad hoc wireless networks. For simplicity, we use S-D pairs instead of source and destination node pairs.
Since pairs are selected by the social model, it is of great importance to find the relation between rank and geographical position. We show the relation between rank and geographical position in following lemma 1, which is different from the destination node randomly selected pattern.
Lemma 1 ([26], Lemma 3).
In large social-aware mobile ad hoc wireless networks, if the rank of node j to source node i is R a n k i ( j ) = r , the distance between node i and node j satisfies x = Θ ( r n ) with probability 1, when n .
The probability can be calculated as
P ( x c r π n ) = k = r n n ! k ! ( n k ) ! ( c r n ) k ( 1 c r n ) n k < 2 c 1 ( c e 1 c ) r .
Similarly,
P ( x c r π n ) < 2 c 2 ( c e 1 c ) r .
Then, the probability x = Θ ( r n ) can be calculated as
1 P ( x = Θ ( r n ) ) < 2 c 1 ( c e 1 c ) r + 2 c 2 ( c e 1 c ) r = o ( 1 ) .
The whole proof of this lemma is demonstrated in Reference [26].
Lemma 2.
In large social-aware mobile ad hoc wireless networks, the distance of data cumulative transmission can be represented as
D = { Θ ( log n n m ) 0 δ < 1 Θ ( 1 n log n m ) δ = 1 Θ ( log n n δ 1 / 2 m ) 1 < δ < 3 / 2 Θ ( log 3 / 2 n n m ) δ = 3 / 2 Θ ( log n n m ) δ > 3 / 2 .
Take back the normalizing factor in (2). According to the asymptotic sum of p-series, F n can be represented as
F n = i = 1 n 1 i δ = { Θ ( 1 ) δ > 1 Θ ( log n ) δ = 1 Θ ( n 1 δ ) 0 δ < 1 .
L ( S , D ) denotes Euclidean distance of S-D pair under rank-based social model. It is clear that
E { L ( S , D ) } = 1 F n n r = 1 n r r δ .
Then,
E { L ( S , D ) } = { 1 0 δ < 1 1 / log n δ = 1 n 1 δ 1 < δ < 3 / 2 log n / n δ = 3 / 2 1 / n δ > 3 / 2 .
The number of super-cells that data packets go through is E { L ( S , D ) } 2 m , and the average transmission distance in the cell is at least b ( n ) . The average cumulative transmitted distance D can be calculated as
D E { L ( S , D ) } 2 m b ( n ) .
Substituting E { L ( S , D ) } and b ( n ) , we get Lemma 2.
Let L ( X i , X j ) denote the distance between node X i and node X j . When the equation L ( X k , X i ) ( 1 + Δ ) L ( X j , X i ) is satisfied, data from node i to node j can be transmitted successfully. Δ is a given threshold to avoid interference. Euclidean distance L ( X j , X k ) and L ( X i , X l ) hold the protocol interference model, node pairs ( X i , X k ) and ( X j , X l ) can transmit data simultaneously.
L ( X j , X k ) ( 1 + Δ ) L ( X i , X k ) ; L ( X i , X l ) ( 1 + Δ ) L ( X j , X l ) .
From the triangle inequality, we have
L ( X j , X i ) L ( X j , X k ) L ( X i , X k ) Δ L ( X i , X k ) .
Likewise, we have
L ( X i , X j ) Δ L ( X j , X l ) .
Therefore,
L ( X i , X j ) Δ 2 ( L ( X i , X k ) + L ( X j , X l ) ) .
Hence, there is an essential disjoint disks zone centered transmitters in the same slot, in which the radius is Δ 2 times the length of this hop.
Square region O is 1, then we have
( T i t , R i t ) S ( t ) S E 1 ,
where S ( t ) is the set of transmitter-receiver pairs transmitted simultaneously. S E is the area of disjoint disks - consumed area that a single hop’s transmission occupies. We have
S E = π Δ 2 4 L ( T i t , R i t ) 2 ,
where L ( T i t , R i t ) is the distance between a transmitter-receiver pair.
Then, we can get
( T i t , R i t ) S ( t ) L ( T i t , R i t ) 2 4 π Δ 2 .
According to Cauchy-Schwartz inequality, we have
( ( T i t , R i t ) S ( t ) L ( T i t , R i t ) ) 2 ( T i t , R i t ) S ( t ) L ( T i t , R i t ) 2 ( T i t , R i t ) S ( t ) 1 2 .
Assuming that all nodes are semi-duplex. n 2 transmitter-receiver node pairs can transmit at the same time, then
( T i t , R i t ) S ( t ) L ( T i t , R i t ) 2 n π Δ 2 .
During a large enough duration of time t, the network transport capacity is T · t · n 2 · D . The amount of data transferred during a given time t is at most W · t . The network transport capacity is lesser than the product of W · t (the amount of data transferred) and ( T i t , R i t ) S ( t ) L ( T i t , R i t ) (the cumulative distance of all hops). Thus, the following inequality holds
T · t · n 2 · D W · t · ( T i t , R i t ) S ( t ) L ( T i t , R i t ) W t 2 n π Δ 2 .
We can obtain the following inequality
T 2 2 · W Δ D π n .
Thus, an upper bound throughput of each node can be represented as
T = O ( 1 n D ) .
Theorem 1.
Under restricted mobility model and rank-based social model, the upper bound throughput of each node in large social-aware mobile ad hoc wireless networks is
T = { O ( m log n ) 0 δ < 1 O ( log n m ) δ = 1 O ( n 1 δ m log n ) 1 < δ < 3 / 2 O ( n m log 3 / 2 n ) δ = 3 / 2 O ( n m log n ) δ > 3 / 2 .

5. Scheduling Scheme and Achieved Throughput Capacity

In this section, we propose a multi-hop relay and slots allocation scheme, as shown in Figure 2. Then, the achieved throughput capacity based on the proposed scheme is derived. Multi-hop relay and slots allocation scheduling scheme is as follow:
(1) Spatially, we tessellate the network area O into equal square cells. A straight line segment ( SD line) connecting the source node and the destination node denote as the reference line. Each source node forwards data approximate this SD line by multi-hop. Nodes in each super-cell which intersect the SD lines act as relay nodes.
(2) Temporally, we adopt time division multiple access (TDMA) for transmission scheduling. Time is divided into slots, all of the cells scheduled to be active in time slot sequence. Each cell becomes active in every c 2 (c is determined in the following) time slots. In an active cell, transmission is always between two nodes within the same cell or in the neighboring cells. Further, each time-slot is divided into three sub time-slots.
(3) In sub-slot A, the source node, which is located in the interior active cell, gets a transmission opportunity then randomly selects one node from in the same cell or in neighboring cells. The source node maybe transmit data to a relay node, or a destination node. If the interior active cell contains two or more source nodes, randomly select one source node. Otherwise, the interior cell remains idle.
(4) In sub-slot B, the destination node, which is located in the interior active cell, gets a transmission opportunity, then randomly selects one node from in the same cell or in neighboring cells. The transmission maybe happened between the relay node and the destination node, or maybe between the source node and destination node. If the cell contains two or more nodes, randomly select one destination node at random. Otherwise, the interior cell remains idle.
(5) In sub-slot C, the relay node, which is located in the border active cell, gets a transmission opportunity, then randomly selects one node from in the same cell or in neighboring cells. The transmission maybe happened between the relay node and the relay node, or maybe the relay node and the destination node. If the cell contains two or more nodes, randomly select one destination node at random. Otherwise, the border cell remains idle.
As illustrated by the shaded cells in Figure 1, active cell can transmit without interference at the same time. Let us assume that the transmission radius of each node is equal to r ( n ) . Any two active cells should have a vertical and horizontal distance of multiple of r ( n ) . Successful transmission occurs, when the following equations are satisfied.
L ( X k , X i ) ( 1 + Δ ) r ( n ) ; L ( X j , X i ) r ( n ) .
According to multi-hop scheduling and slots allocation scheme, transmission occur when two nodes are located in the same cell or adjacent cell. So, transmission radius to be 8 times the side length of the cell b ( n ) , i.e., r ( n ) = 8 b ( n ) .
Each cell alternately becomes active in c 2 time slots. The protocol interference model should be hold to guarantee the simultaneous transmissions, i.e., c b ( n ) = ( 1 + Δ ) r ( n ) . We obtain that c = 8 ( 1 + Δ ) . If there is at least one node in an active cell, randomly select one node to conduct transmission.
So, multi-hop scheduling that each cell becomes active in each c 2 time slots is possible. Now, we bound the number of SD lines passing through each super-cell.
Lemma 3.
For each super-cell, the number of SD lines that multi-hop scheduling and slots allocation scheme should pass through is O ( n E { L ( S , D ) } m ) .
Let h i denote the number of hops for each S-D pair, we get
h i = Θ ( E { L ( S , D ) } m ) .
where E { L ( S , D ) } is the distance of S-D pairs.
The total number of hops required for all S-D pairs to send data to corresponding destination node can be represented as N h = i = 1 n + 1 h i .
If the kth hop originated from S-D pair i intersects the super-cell, the random variable I k i = 1 , where 1 i n + 1 and 1 k h i ; otherwise I k i = 0 . Therefore, the total number of super-cells SD lines passing through is I = 1 n i = 1 h i I i k .
A given super-cell can be intersected by SD lines at most once. I k i and I l j are independent for any 1 i j n . Variable I reflects the relaying load of a super-cell, its mathematical expectation is
E [ I ] = E N h [ E [ I | N h ] ] = E N h [ i = 1 n + 1 k = 1 h i E [ I 1 1 ] ] = E N h [ N h E [ I 1 1 ] ] = E N h [ N h m ] = m E [ i = 1 n + 1 L ( S , D ) m ] = n E { L ( S , D ) } m ,
where E [ I 1 1 ] = m , since any hop is equally likely to originate from any of the super-cells.
Therefore, the number of super-cell that S-D lines passing through is O ( n E { L ( S , D ) } m ) . Next, we present that the interior zone of each super-cell achieves constant per-node throughput.
Lemma 4.
In large social-aware mobile ad hoc wireless networks, the per-node throughput for the interior zone of each super-cell is Θ ( 1 ) , with multi-hop relay and slots allocation scheme.
Let us assume that the total number of data transmitted for each S-D pairs in sub-slot A is D ( t ) . Let C ( t ) denote the number of cells which occur a source node transmit data to relay node transmission. Then, we have D ( t ) = 1 n m C ( i , t ) . Since the transmission of source nodes occupied 1 3 time slot, we can obtain
E [ D ( t ) ] = 1 c 1 E [ C ( t ) ] .
Next, we determine the value of E [ C ( t ) ] and E [ D ( t ) ] . The probability that k nodes are in a general cell is P k , then
P k = C n m k ( 1 n ) k ( 1 1 n ) n m k .
Obviously,
lim n C n m k ( 1 n ) k = 1 2 k k ! ; lim n ( 1 1 n ) n m k = 1 e m .
Thus,
lim n P k = 1 2 k k ! e m .
The event that an source node in interior cell transmit data to relay node transmission denote by indicator - I i . I i contains two parts: One is the probability that cell contains exactly one source node, not a destination node represented by P 1 ( 1 P 0 ) , The other is the probability that cell contains two or more nodes represented by 1 P 0 P 1 . Thus, we can calculate the mathematical expectation of I i ,
E [ I i ] = P 1 ( 1 P 0 ) + ( 1 P 0 P 1 ) 1 2 e m ( 1 1 e m ) + ( 1 1 e m 1 2 1 e m ) = c 2 .
Therefore,
E [ D ( t ) ] = 1 c 1 E [ C ( t ) ] = 1 c 1 E [ i = 1 n m I i ] = n m c 1 E [ I 1 ] c 3 n m ,
where c 3 = c 2 / c 1 .
Each node randomly chooses direction and randomly chooses speed in super-cell. Then, we know the state can model as an irreducible finite-state Markov Chain. Therefore, over a period of time slot N, by the ergodicity of such a Markov Chain, we get
E [ D ( t ) ] = lim N 1 t t = 1 N D ( t ) c n m .
Thus, the total number of data transmitted from sources node is Θ ( n m ) , which equals to the number of nodes in super-cell. We obtain that each source node can transmit at rate of Θ ( 1 ) . Similar analyses can employ in sub-slot B and sub-slot C. Data packets are queued at the relay nodes or reach the final destination node in sub-slot B and sub-slot C.
Combining Lemmas 3 and 4, we get the achieved throughput of each node straightforwardly
μ = 1 n E { L ( S , D ) } m .
Theorem 2.
Based on the multi-hop scheduling and slots allocation scheme, the achieved throughput of each node in large social-aware mobile ad hoc wireless networks can be expressed as
μ = { Ω ( 1 n m ) 0 δ < 1 Ω ( log n n m ) δ = 1 Ω ( 1 n 2 δ m ) 1 < δ < 3 / 2 Ω ( n m log n ) δ = 3 / 2 Ω ( 1 n m ) δ > 3 / 2 .

6. Network Delay of Our Scheduling Scheme

In this section, we provide an analysis on network delay of multi-hop relay and slots allocation scheduling scheme based on queueing theory. The delay consists of two components: hop delay (processing delay) and network delay (queuing delay). Noted that the processing time (such as coding/decoding) spent is negligible. Like many important work, hop delay is ignored in this paper.
It worth noting that the value of E { L ( S , D ) } is larger than value of super-cell m for social parameter 0 δ 3 / 2 . The S-D pairs are not located in the same super-cell. For social parameter δ > 3 / 2 , the S-D pairs are located in the same super-cell. Thus, we solve the problem in two cases.
Let λ i ( λ i = O ( μ ) ) denote the input stream for source node i. The total rate of each node μ can be divided into two parts: r 1 represents the rate that the node is scheduled to transmit to the relay node; r 2 represents the rate that the node is scheduled to transmit to the destination node.
For social parameter δ 3 / 2 , there are two possible routings from source node to its destination node: one is single hop from source node to destination node directly; the other is two hop path - source node to relay node transmission and relay node to destination node transmission.
Since data transmission processes is independent of mobility processes, the network delay can compute from the perspective of source node i. Decoupled transmission path is illustrated in Figure 3, which can be modeled as discrete queue.
Source node generates data at rate of λ i , and service opportunity arises with some fixed rate μ . Thus, source node have an expected number of data given by
L ¯ s = ρ ( 1 λ i ) 1 ρ ,
where ρ = λ i μ .
It is a reversible queue, the output stream is also a discrete stream at rate λ i . Data from this output process is transmitted to relay node. Because the total number of relay nodes in each super-cell is n m 2 , data delivered to a relay node with probability r 1 u equally.
Hence, each relay node independently receives data with probability λ r = λ i r 1 μ ( n m 2 ) . Because the total number of relay nodes in each super-cell is n m 2 , the relay node is scheduled for data transmission to the destination node with probability r 2 u . Hence, each relay node independently sends data with probability μ r = r 2 n m 2 .
However, receiving and sending data is mutually exclusive events in cache queue of each relay node. The queue of the relay node can be seen as a continuous time queue with input rate λ r and service rate μ r , where λ r μ r = ρ . This holds for each relay node, the expected number of data is
L ¯ r = ρ 1 ρ .
Finally, when social parameter δ > 3 / 2 , using Little’s Theorem, we can get the average waiting time for S-D pairs—the network delay D ( n ) is
D ( n ) = L s ¯ + ( n m 2 ) L r ¯ λ i = n m 1 λ i μ λ i .
For social parameter δ > 3 / 2 , the network delay D ( n ) is Θ ( n m ) .
For social parameter δ 3 / 2 , data is forward via a multi-hop path. Three kinds of transmissions are allowed: transmissions between source node and relay node, transmissions between relay node and relay node, transmissions between relay node and destination node. As illustrated in Figure 4, the process can be modeled as a open queuing network just as δ > 3 / 2 .
The super-cell where the source node is located is defined as the source super-cell; the super-cell where the relay node is located is defined as the relay super-cell; and the destination super-cell where the destination node is located is defined as the destination super-cell.
Using the same analytical method, we can get a same result in source super-cell. The source node have an expected number of data given by L ¯ s = ρ ( 1 λ i ) 1 ρ , where ρ = λ i μ .
In relay super-cell and the destination super-cell, both the input and the output are Bernoulli stream of rate λ i because of a reversible queue. Data from this output process is transmitted to relay node. Because the total number of relay nodes in each super-cell is n m 1 , data delivered to a relay node with probability r 1 u equally.
Hence, each relay node independently receives data with probability λ r = λ i r 1 μ ( n m 1 ) . Because the total number of relay nodes in each super-cell is n m 1 , the relay node is scheduled for data transmission to the destination node with probability r 2 u . Hence, each relay node independently sends data with probability μ r = r 2 n m 1 .
Similarly, receiving and sending data is mutually exclusive events in cache queue of each relay node. which can be seen as a continuous time queue with input rate λ r and service rate μ r .
This holds for all the relay super-cell, the expected number of data of the relay node is L ¯ r = ρ 1 ρ , where ρ = λ r μ r . Data is delivered along SD lines super-cells. To reach the destination node the average number of super-cells passing through by each source node is E { L ( S , D ) } m .
Finally, summing the delay in all super-cell, we can get the total network delay
D ( n ) = L ¯ λ i = L s ¯ + i = 1 h L r ¯ λ i = 1 λ i μ λ i + E { L ( S , D ) } m ( n m 1 ) L ¯ r λ i .
Substituting E { L ( S , D ) } , we get the network delay in Theorem 3.
Theorem 3.
Based on the multi-hop relay and slots allocation scheme, the network delay D ( n ) in large social-aware mobile ad hoc wireless networks can be expressed as
D ( n ) = { Θ ( n m ) 0 δ < 1 Θ ( n log n m ) δ = 1 Θ ( n 2 δ m ) 1 < δ < 3 / 2 Θ ( n 1 / 2 log n m ) δ = 3 / 2 Θ ( n m ) δ > 3 / 2 .

7. Discussion and Conclusions

As illustrated in Theorems 1–3, both network capacity and network delay are affected by the social characteristics and node mobility. In this section we discuss and analyze the results.
Upper bound throughput of each node and achieved throughput of each node are listed in Table 2. From this table, we can see that the achieved throughput of each node differs from the upper bound throughput of each node only by a factor. Such discrepancies are consistent with the fact.
A common phenomenon can be seen from Table 2. Both the upper bound throughput of each node and the achieved throughput of each node increase with social characteristics δ . Specifically, the value of achieved per-node throughput is between 1 n m and 1 n m . Minimum value of achieved per-node throughput is 1 n m , when 0 δ < 1 . And the maximum value of achieved per-node throughput is 1 n m when δ > 3 / 2 . The upper bound of per-node throughput shows the same change tendency.
From formula (8), we can seen that the greater value of social characteristics δ , the shorter distance between S-D pair. With the increase of δ , source node tends to select a closer destination node. This leads to traffic aggregation in large social-aware mobile ad hoc wireless networks. The parameter of social model depicts the degree of traffic aggregation. Traffic aggregation brings greater network capacity.
When the parameter of node mobility m is equal to b ( n ) , make the upper bound throughput of each node minimum. The the upper bound throughput of each node is 1 n , log n n , 1 n δ 1 / 2 , 1 log n and 1 log n respectively, when δ < 1 , δ = 1 , 1 < δ < 3 / 2 , δ = 3 / 2 and δ > 3 / 2 . The parameters of node mobility m is equal to O , make the upper bound throughput of each node maximum. In order to obtain higher throughput capacity, we need to increase m, which means a larger motion range.
Figure 5 exhibits that different scaling behaviors of network delay result from different values of social model parameter δ . One can observe that for δ > 3 / 2 the best network delay can be achieved Θ ( n m ) . Since m ( b ( n ) , 1 ) , it indicates that the network delay ranges from Θ ( n ) to Θ ( n ) . As the parameter of social model becomes smaller, the network delay increases.
The relationship between network delay and throughput capacity is mutual contradiction. Bigger throughput capacity requires as many nodes as possible to send or receive data at any time, which makes the waiting queue increase. On the other hand, reducing the network delay requires waiting queue as short as possible, which makes throughput capacity smaller.
The throughput of each node is Θ ( 1 n log n ) in static ad hoc wireless networks, meanwhile the network delay is negligible [5,6]; the throughput of each node is Θ ( 1 ) in mobile ad hoc wireless networks, with network delay Θ ( n ) [7]. Compared with existing works, we clearly show the gain on capacity, as well as on delay in large social-aware mobile ad hoc wireless networks. We propose a multi-hop scheduling and slots allocation scheme, and we try to improve the tradeoff between throughput capacity and network delay, as shown in Figure 6.
Our results provide a new insight on the performances of wireless ad hoc networks. It should be emphasized that our results are obtained under some idealistic assumptions. We will further extend our work to more realistic scenarios.

Author Contributions

Conceptualization, Y.Z., Y.S. and S.C.; Methodology, Y.Z.; Writing—original draft, Y.Z.; Writing—review and editing, Y.S. and S.C.; Project administration, Y.S.; Funding acquisition, Y.S. and S.C. All authors have read and agree to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ghosh, A.; Maeder, A.; Baker, M.; Chandramouli, D. 5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release 15. IEEE Access 2019, 7, 127639–127651. [Google Scholar] [CrossRef]
  2. Li, T.; Chen, Z.N. Shared-Surface Dual-Band Antenna for 5G Applications. IEEE Trans. Antennas Propag. 2019, 68, 1128–1133. [Google Scholar] [CrossRef]
  3. Azees, M. Reply to Comments on dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2019, 20, 3595. [Google Scholar] [CrossRef]
  4. Luo, Y.; Dang, J.; Song, Z.; Wang, B. Compressed sensing algorithm for neighbour discovery in mobile ad hoc networks. IET Commun. 2019, 13, 1781–1786. [Google Scholar] [CrossRef]
  5. Gupta, P.; Kumar, P.R. The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46, 388–404. [Google Scholar] [CrossRef] [Green Version]
  6. Freris, N.M.; Kowshik, H.; Kumar, P.R. Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks, and Computation. Proc. IEEE 2010, 98, 1828–1846. [Google Scholar] [CrossRef] [Green Version]
  7. Grossglauser, M.; Tse, D. Mobility increases the capacity of ad-hoc wireless networks. In Proceedings of the IEEE Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2001, Anchorage, AK, USA, 22–26 April 2001; Volume 3, pp. 1360–1369. [Google Scholar] [CrossRef]
  8. Franceschetti, M.; Dousse, O.; Tse, D.N.C.; Thiran, P. Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory. IEEE Trans. Inf. Theory 2007, 53, 1009–1018. [Google Scholar] [CrossRef]
  9. Peraki, C.; Servetto, S.D. On the Maximum Stable Throughput Problem in Random Networks with Directional Antennas. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc ’03, Annapolis, MD, USA, 1–3 June 2003; ACM: New York, NY, USA, 2003; pp. 76–87. [Google Scholar] [CrossRef]
  10. Huang, W.; Wang, X. Throughput and delay scaling of general cognitive networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 2210–2218. [Google Scholar] [CrossRef]
  11. Jiang, C.; Shi, Y.; Hou, Y.T.; Kompella, S. On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2011, 10, 1032–1037. [Google Scholar] [CrossRef] [Green Version]
  12. Li, X.Y. Multicast Capacity of Wireless Ad Hoc Networks. IEEE/ACM Trans. Netw. 2009, 17, 950–961. [Google Scholar] [CrossRef] [Green Version]
  13. Li, X.Y.; Liu, Y.; Li, S.; Tang, S. Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model. IEEE/ACM Trans. Netw. 2010, 18, 1145–1157. [Google Scholar] [CrossRef] [Green Version]
  14. Lin, X.; Sharma, G.; Mazumdar, R.R.; Shroff, N.B. Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility. IEEE Trans. Inf. Theory 2006, 52, 2777–2784. [Google Scholar] [CrossRef] [Green Version]
  15. Ciullo, D.; Martina, V.; Garetto, M.; Leonardi, E. Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks. IEEE/ACM Trans. Netw. (TON) 2011, 19, 1745–1758. [Google Scholar] [CrossRef]
  16. Lee, K.; Kim, Y.; Chong, S.; Rhee, I.; Yi, Y.; Shroff, N.B. On the Critical Delays of Mobile Networks Under Levy Walks and Flights. IEEE/ACM Trans. Netw. 2013, 21, 1621–1635. [Google Scholar] [CrossRef]
  17. Liu, J.; Kato, N.; Ma, J.; Sakano, T. Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility. IEEE Trans. Wirel. Commun. 2015, 14, 1266–1279. [Google Scholar] [CrossRef]
  18. Luo, Z.; Cui, Y.; Wang, X.; Luo, H. On the Throughput and Delay in Ad Hoc Networks With Human Mobility. IEEE Trans. Commun. 2015, 63, 2273–2287. [Google Scholar] [CrossRef]
  19. Neely, M.J.; Modiano, E. Capacity and delay tradeoffs for ad hoc mobile networks. IEEE Trans. Inf. Theory 2005, 51, 1917–1937. [Google Scholar] [CrossRef]
  20. Zemlianov, A.; de Veciana, G. Capacity of ad hoc wireless networks with infrastructure support. IEEE J. Sel. Areas Commun. 2005, 23, 657–667. [Google Scholar] [CrossRef]
  21. Zhang, G.; Xu, Y.; Wang, X.; Tian, X.; Liu, J.; Gan, X.; Yu, H.; Qian, L. Multicast Capacity for VANETs with Directional Antenna and Delay Constraint. IEEE J. Sel. Areas Commun. 2012, 30, 818–833. [Google Scholar] [CrossRef]
  22. Mori, H. Fault Tolerance of Small World Network Architecture. In Proceedings of the 2018 Sixth International Symposium on Computing and Networking Workshops, Takayama, Japan, 27–30 November 2018; pp. 344–349. [Google Scholar] [CrossRef]
  23. Luo, D.; Qiu, T.; Deonauth, N.; Zhao, A. A small world model for improving robustness of heterogeneous networks. In Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL, USA, 14–16 December 2015; pp. 849–852. [Google Scholar] [CrossRef]
  24. Hou, R.; Cheng, Y.; Li, J.; Sheng, M.; Lui, K. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior. IEEE/ACM Trans. Netw. 2017, 25, 834–848. [Google Scholar] [CrossRef]
  25. Wei, Z.; Wu, H.; Yuan, X.; Huang, S.; Feng, Z. Achievable Capacity Scaling Laws of Three-Dimensional Wireless Social Networks. IEEE Trans. Veh. Technol. 2018, 67, 2671–2685. [Google Scholar] [CrossRef]
  26. Qin, Y.; Jia, R.; Zhang, J.; Wu, W.; Wang, X. Impact of Social Relation and Group Size in Multicast Ad Hoc Networks. IEEE/ACM Trans. Netw. 2016, 24, 1989–2004. [Google Scholar] [CrossRef]
Figure 1. Network model.
Figure 1. Network model.
Applsci 10 01719 g001
Figure 2. Multi-hop relay and slots allocation scheme.
Figure 2. Multi-hop relay and slots allocation scheme.
Applsci 10 01719 g002
Figure 3. Queue in network for δ > 3 / 2 .
Figure 3. Queue in network for δ > 3 / 2 .
Applsci 10 01719 g003
Figure 4. Queue in network for δ 3 / 2 .
Figure 4. Queue in network for δ 3 / 2 .
Applsci 10 01719 g004
Figure 5. The network delay D ( n ) .
Figure 5. The network delay D ( n ) .
Applsci 10 01719 g005
Figure 6. Throughput capacity and network delay tradeoff.
Figure 6. Throughput capacity and network delay tradeoff.
Applsci 10 01719 g006
Table 1. Symbols.
Table 1. Symbols.
SymbolDefinition
OAsymptotic upper bound
Ω Asymptotic lower bound
Θ Asymptotically tight bound
c , c 1 , c 2 , c 3 Constants
nNumber of nodes
WTotal bandwidth available
r ( n ) The transmission range
mArea of super-cell
b ( n ) Area of cell
δ Parameter of social model
λ i The input stream of source node
T Upper bound throughput of each node
μ Achieved throughput of each node
D ( n ) Network delay
Table 2. Throughput capacity.
Table 2. Throughput capacity.
δ δ < 1 δ = 1 1 < δ < 3 / 2 δ = 3 / 2 δ > 3 / 2
T O ( m log n ) O ( log n m ) O ( n 1 δ m log n ) O ( n m log 3 / 2 n ) O ( n m log n )
μ Ω ( 1 n m ) Ω ( log n n m ) Ω ( 1 n 2 δ m ) Ω ( n m log n ) Ω ( 1 n m )

Share and Cite

MDPI and ACS Style

Zhou, Y.; Shi, Y.; Chen, S. Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks. Appl. Sci. 2020, 10, 1719. https://doi.org/10.3390/app10051719

AMA Style

Zhou Y, Shi Y, Chen S. Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks. Applied Sciences. 2020; 10(5):1719. https://doi.org/10.3390/app10051719

Chicago/Turabian Style

Zhou, Yang, Yan Shi, and Shanzhi Chen. 2020. "Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks" Applied Sciences 10, no. 5: 1719. https://doi.org/10.3390/app10051719

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop