The Latency Performance Analysis and Effective Relay Selection for Visible Light Networks

In visible light communication (VLC), the precise latency evaluation of wireless access networks and the efficient forwarding strategy of core networks are the crux for end-to-end reliability provisioning. Leveraging martingale theory, an elegant latency-bounded reliability analysis framework is studied for the VLC network. Considering the characteristic that VLC links are easy to block, the martingale of the service process is constructed. Based on the time shift features, the martingale process related to latency is proposed for the VLC system, which models the influence of entanglement between aggregate arrivals and random service on latency. A stopping time event about latency is defined. Renting the stopping time theory, a tight upper bound of the unreliability with regard to latency is derived. In the core network, a dynamic forward backhaul framework is proposed, which uses the relay selection algorithm based on back-pressure theory to improve data transmission quality. The theoretical latency-bounded reliability matches the simulation results well, which verifies the effectiveness of the proposed analysis framework, and the proposed relay selection algorithm can also improve network performance under data-intensive transmission.


Introduction
In 5G and beyond, massive businesses with strict reliability requirements surge, which expects extensive bandwidth provisioning.This will lead to more severe spectrum shortages.Visible light communication (VLC) is a potential paradigm to ease the dilemma of radio frequency (RF) resources in the next-generation communication systems [1,2].Benefiting from the characteristics of light, VLC can provide high transmission rates, ultrawide frequency bands, high-energy efficiency, low cost, and indoor full coverage.It can be deployed as indoor high-speed data links for personal area networks and RFs in nonfriendly environments.In critical scenarios, such as remote control in medical operating rooms and factory automation under strong magnetic interference, VLC is expected to embrace massive services with traffic possessing strong randomness, heterogeneity, and burstiness [3].The data require the reliability of latency within the millisecond level to reach 99.99-99.999%[4,5].For traffic featuring complex characteristics transmitted on visible light channels, we should explore an effective and precise evaluation method of reliability with regard to latency, which can reveal the influence of entanglement between visible light data traffic and visible light transmission schemes.Meanwhile, an efficient routing strategy needs to be explored for the VLC network.
In the VLC wireless network, the light-emitting diode (LED) access point (AP) carries packet flows from different services, which possess heterogeneous characteristics [6,7].The convergence of heterogeneous visible light data flows intensifies the uncertainty of the aggregate traffic.In [8], the aggregate traffic was composed of multiple 2-state Markovmodulated Bernoulli processes (MMBP-2) and was tackled as one MMBP-2 by the Kronecker product operation.The proposed method is not of universal applicability and is unable to provide a theoretical result of the latency-bounded reliability.The stochastic network calculus (SNC) theory, effective bandwidth (EB), and effective capacity (EC) theories provide classical analysis methods of latency-bounded reliability.The union-bound inequality, as the key enabler in SNC, only supports capturing a loose upper bound of unreliability [9].In the EB/EC framework, the stochastic traffic is tackled as a constant flow [10,11], which always triggers rougher theoretical results of latency performance, especially for bursty traffic.
Martingale, a random process throughout modern probability theory, has demonstrated great superiority in the precise analysis of the statistical reliability regarding latency.The theoretical upper bounds of unreliability derived in [9,12] are more precise than the existing conclusions.This martingale-based analysis framework is a milestone.In [13,14], the latency-bounded unreliability of the Markov-modulated on-off (MMOO) arrival process was analyzed in the ALOHA access scheme.Based on the results, the bandwidth resources were allocated reasonably.More importantly, martingales have been explored to support the evaluation of the end-to-end reliability of latency.In [15], a precise analysis framework of the end-to-end latency-bounded unreliability was introduced, where a multi-hop routing path was considered and the traffic was modeled as a Markov-modulated process.Then, the proposed method was extended in the 6G network scenarios [16].For the system adopting the THz wireless access scheme, the end-to-end latency performance was analyzed for the traffic generated from virtual reality.In [17], we constructed an analysis framework of latency performance for the aggregate traffic, which was constituted by the heterogeneous Markov-modulated flows.The martingale of the queuing length was defined, and the latency-bounded unreliability was derived.
These remarkable conclusions have inspired our work on the statistical latency QoS analysis based on martingale theory.The framework in [17] is theoretical without specific application scenarios.In this paper, the latency analysis in the VLC network is focused on.The differences with [17] can be summarized as follows.(1) The cross-layer service process is modeled, which is the improvement of the proposed method in [17].Specifically, in the physical layer, the Lambertian sources are considered and the channel gain is depicted.The Shannon Theorem is leveraged to model the achievable transmission rates, which achieves the mapping between the physical layer and the data link layer.We focus on the characteristic that the VLC links are easy to block.Blocking the line of sight (LoS) between the VLC AP and the targeted terminal at each time slot is considered a random variable, which triggers the stochastic features of the service process and further impacts the latency of the aggregate traffic.(2) Meanwhile, the martingale process related to latency is a proposed novelty, which is another way to analyze latency different from [17].It introduces the statistical characteristics of the service scheme and data traffic into martingale parameters, which reveals the influence of random blocks of the VLC link and the burstiness of aggregate traffic on the latency.(3) The stopping time event about latency is defined, which is the time point when the system latency exceeds the threshold.Applying the stopping time theory to the latency-related martingale, the upper bound of the unreliability with regard to latency is captured.(4) More importantly, the end-to-end reliability provisioning is investigated in this paper, not just the air interface latency analysis.
Further, for the aggregate traffic forwarded by the VLC AP, an efficient routing algorithm is proposed based on the back-pressure theory in the core network.Some studies have investigated the utilization of back-pressure theory to improve network performance, specifically within the Transmission Control Protocol domain [18].Additionally, alternative research has concentrated on employing back-pressure algorithms to facilitate relay selection in wireless sensor networks and wireless multi-hop networks [19].Although the source node (LED access point) can adopt the classic back-pressure algorithm to promote the network capacity, the classic algorithm results in significant packet delays and poor node energy.Therefore, combining the latency performance analysis, we design a new link weight calculation method to make routing and scheduling decisions, which considers the data packet's recent node record, the neighbor node's remaining energy status, and the queue latency.Meanwhile, we note that no prior research has explored the integration of back-pressure theory in visible light network systems.
To summarize, in this paper, considering the VLC APs serve the aggregate traffic with burstiness, a precise analysis framework of the latency-bounded reliability is proposed.In the core network, an efficient routing algorithm is introduced for the complex aggregate traffic.The contributions can be concluded as follows.

•
The service process of the VLC network and the aggregate arrival process are modeled in the martingale domain.For the VLC link with a random block, the i.i.d.service process provided by the LED AP is considered.Through mapping the statistical features of random block behavior in the martingale parameters, the martingale of the service is constructed.Leveraging the relation between the spectral radius and the eigenvector in Markov chains, martingales of Markov-modulated arrival processes are defined.

•
We propose a martingale process related to latency, which models the impact of entanglement between complex arrivals and random service on the latency.A stopping time point at which the latency violates the threshold is considered.Based on the stopping time theory, the complementary cumulative distribution function of latency is obtained for the VLC network.We evaluate the latency in terms of burstiness, which is measured by the squared coefficient of variation.

•
When the LED AP node data reach the core network, a dynamic back-pressure algorithm based on energy and latency from aggregate traffic is proposed, which designs a new link weight calculation method to make routing and scheduling decisions.The modified back-pressure algorithm trades off three factors, including the data packet's recent node record, the neighbor node's remaining energy status, and the queue latency, to boost the network performance and data transmission quality.Meanwhile, our scheme is the first research to apply back-pressure theory in the visible light network.

The Network Model and the Queuing System
We consider a multi-service uplink communication scenario, as shown in Figure 1.The data flow from different services (business) is statistically heterogeneous.That is, diverse models are adopted to describe the randomness of flows.The data packets belonging to different flows could access the same VLC AP, where these flows compose the aggregate traffic.The targeted AP supplies the transmission rates for the aggregate traffic according to a specific scheme.Because of the randomness of the VLC channel and the block, the transmission process provided for the aggregate traffic is stochastic.Thus, the backlog and latency are triggered in the buffer of the targeted VLC AP.

A. The queuing system of aggregate traffic
In the VLC access network, the target terminal is associated with the nearest VLC AP.This terminal carries two services where the generated packet flows are heterogeneous.Thus, the aggregate traffic is transmitted from this terminal, as shown in Figure 1a.We consider the block of LoS between the VLC AP, and this terminal obeys a Bernoulli distribution of parameter 1 − p.Then, the channel gain can be modeled as where b is the Lambertian index, and b = −1/log 2 (cos(ϑ 1/2 )).ϑ 1/2 is the half-intensity radiation angle.Ap is the area of reviewer photodetector (PD).d is the distance between the AP and the terminal.g o f is the gain of the optical filter.φ in and φ ir are the angle of incidence and irradiance between VLC AP and the terminal, respectively.f (φ in ) is the optical concentrator gain, which is a function of where r is the refractive index, and Θ is the semi-angle of the field of view (FoV) of the PD.
Based on the Shannon theorem, the achievable transmission rate between AP and the terminal, which is defined as R VLC (n), can be given as where W VLC is the system bandwidth, and p(n) is the transmission power.σ VLC 2 is the noise power.
The access process of the packets from aggregate traffic can be modeled as a queuing system, as is presented in Figure 1b.These two flows constituting the aggregate traffic are independent and described as the four-state Markov-modulated multinomial process (MMMP-4) and the interrupted multimomial process (IMP), respectively, which are introduced in part B in detail.These are the arrival processes of the queuing system.The access process is modeled as the service process provided by the AP.Because latency is often described in units of packets, the arrival process and the service process are modeled from the perspective of packets/slots.Without loss of generality, the length of packets is assumed to be fixed.The flows from different services have the same priority.Thus, the first-in-first-out (FIFO) scheduling scheme is adopted in the buffer.
In Figure 1b, , where a i (k) is the number of arrival packets of flow i at time slot k.The arrival process {a 1 (n), n ≥ 0} is modeled as an MMMP-4, and {a 2 (n), n ≥ 0} is modeled as an IMP, which are bursty and heterogeneous.Let A(m, n) denote the aggregate accumulated arrival process from slot m to slot n.Similarly, the accumulated service process S(m, n) provided by the VLC AP is also a bivariate process, S(m, n) = ∑ n k=m s(k), where {s(n), n ≥ 0} is the service process.s(n) is the number of the served packets at slot n.In this paper, s(n) is a random variable following a Bernoulli distribution with successful probability p and service rate C. s(n) can be given by where T s/slot is the duration of a slot and L bits/packet is the length of a packet.To simplify the subsequent analysis, C is assumed as a constant.
Based on SNC, the departure process D(0, n) can be defined by A(0, n) and S(0, n) using (min, +) convolution.The backlog process {Q(n), n ≥ 0} in the buffer is defined as and the latency W(n) at slot n is

B. The heterogeneous arrival models
The MMMP-4 is proposed to describe the interweaving arrival characteristics of packet flows from different services in a terminal.A 2D Markov chain is considered, which is denoted as represents the service that generates the packets.Z 1 (n) = {N, Y} models whether there are packets generated at time slot n.Z 1 (n) = N means that no packet is arriving, while Z 1 (n) = Y means that packets are generated.Corresponding to U 1 and V 1 , packet arrival probabilities at each slot are λ 1 and γ 1 , respectively.If service U 1 generates packets at slot n, the number of packets is R M1 , and in the other case, it is R M2 .Thus, the state space of the MMMP-4 model is The state transition probabilities between two services, U 1 and V 1 , are p 1 and q 1 , respectively.Based on [17], the state transition matrix of the 2D Markov chain is defined as T 1 .
The IMP model is proposed to embody the bursty and sporadic arrival characteristics of the small data service.It is also a 2D Markov chain, which is denoted as the service that generates the packets.In state U 2 , there are no packets generated.Z 2 (n) = {N, Y, I} describes whether there are packets at slot n.Z 2 (n) = N represents that no packet arrives in state V 2 , and Z 2 (n) = Y represents that R I2 packets arrive in state V 2 .It is worth noting that Z 2 (n) = I means that no packets arrive in idle state U 2 with probability one.The state space of the IMP model is {(U 2 , I), (V 2 , N), (V 2 , Y)}.The state transition probabilities between U 2 and V 2 are p 2 and q 2 , respectively.In V 2 , the packet generation process is stochastic and follows a multinomial distribution with the arrival probability γ 2 and the number of arrival packets R I2 .The state transition matrix of the IMP is T 2 .The MMMP-4 model and IMP model are shown in [17].

Martingale-Based Latency-Bounded Reliability Analysis
The arrival and service processes are described by martingales in this part.The upper bound of the latency-bounded unreliability is analyzed based on the stopping theory.

A. Martingale constructions of arrival and service processes
Firstly, we introduce the definition of martingales.Definition 1 (martingales).Let (Ω, F ∞ , P) be a probability space and {F t } t≥0 be a filtration, i.e., a non- As a powerful mathematical method, martingales can provide us with a framework to depict heterogeneous arrivals with burstiness.Martingale processes are inclusive, which shows that other random processes are transformed as martingale processes by martingale construction.Meanwhile, martingale can provide a modularized description method for arrival and service processes, which contributes to the model, analyzes the features of the backlog process (the difference between two random processes), and further enables the analysis of latency for aggregate traffic.It is noted that the inequality formulary of martingales supports the upper bound analysis of unreliability with regard to latency naturally.We construct the martingale processes of arrival and service, respectively, as follows.
Definition 2 (Martingale of arrival).Consider a Markov process {x(n), n ≥ 0}, which is F tmeasurable.The state space is N = {1, 2, • • • , N}.The state transition matrix is T = [T i,j ] N×N .T i,j = P{x(t + 1) = j|x(t) = i}.The arrival process is Markov modulated, i.e., a(t) = f (x(t)) and A(m, n) = ∑ t j=m f (x(j)), n ≥ m ≥ 0. Define a θ-transform for T as . The spectral radius of T θ is sp(T θ ), sp(T θ ) > 0, and the corresponding eigenvector is is constructed as a martingale relative to {F t } t≥0 .Then, M a (m, n) is admitted as a martingale of arrival {a(n), n ≥ 0}.The function Ka is We use the definition of martingales to prove Definition 2.
(a) is from the basic operation of conditional expectation and the definition of T θ i,j .(T θ V a ) i is the ith element of vector (T θ V a ).Then, (b) holds due to the relation between the eigenvector and eigenvalue, i.e., T θ V a = sp(T θ )V a , and the definition of Ka.
For the MMMP-4 and IMP models, the martingale parameters are V a x 1 (t) , Ka 1 , and V a x 2 (t) , Ka 2 respectively, which are related to T 1 and T 2 .The corresponding specific formulas can refer to [17].
Similar to the martingale of arrival, the martingale of the i.i.d.service process is constructed as described in Definition 3.

Definition 3 (Martingale of service).
The service process is {s(n), n ≥ 0}, which is G nmeasurable.The moment generating function is is constructed as a martingale relative to {G n } n≥0 .M s (m, n) is admitted as a martingale of service {s(n), n ≥ 0}.The function Ks is (a) is because of the i.i.d.property.To support formula (b), V s s(n) is set as a constant.The proof is completed based on Ψ(−θ) = E e −θs(n+1) .
Based on the characteristics of martingale processes, the backlog process can be modeled in the martingale domain, which facilitates the analysis of the latency performance.

B. The latency-bounded unreliability
Theorem 1.Consider a link for the aggregate traffic.The service process is modeled as {s(n), n ≥ 0}.
The aggregate traffic is {a The martingale of arrival is defined by Definition 2, and the martingale of service is in Definition 3.Then, the latency-bounded unreliability of the link holds for ∀k > 0, where k is the latency threshold.
The proof of Theorem 1 is based on the stopping time theory of martingale, as shown in Theorem 2 of [17].
Proof.Define a stopping time T for the martingale of backlog M L (n), which is the first time that the backlog exceeds threshold σ, i.e., T = min{n : A(0, n) − S(0, n) ≥ σ}.Let T ∧ n = min{T, n}.For M L (n), Theorem 2 is used.The probability of system backlog exceeding threshold σ can be obtained The detailed derivation process can refer to [17].Based on the definition of the departure process, the latency-bounded probability, P{W(n) ≥ k} can be transformed as follows.
According to the time shift feature of martingales, it is obvious that is also a martingale process.M L−s l (n − k) can be regarded as a martingale related to latency.To complete the latency analysis, the stopping time event about latency is defined as SW = {W(n) ≥ k} and can be transformed as Then, the first time slot that SW occurs is the stopping time T W .
Combined with the derivation of (15) and renting the stopping time theory for the martingale process When T W → ∞, we can obtain P{W(n) ≥ k} = P{T W ≥ ∞}.The proof is completed.

Relay Selection for Visible Light Network
We assume that the visible light network is represented by G = (V, L).V is the set of all nodes in the network, and L is the set of all links in the network.The nodes are static and the communication links are bidirectional.The topology changes as nodes die or links fail.All visible light nodes have the same configuration.
We set the network operation by time sharing, i.e., t ∈ {0, 1, 2, . ..}.At each time slot t, the back-pressure algorithm activates a set of interference-free links in the network.When the new data arrive in the network, each node makes routing and transmission scheduling decisions, and the visible light packets are delivered to the appropriate destinations.The back-pressure algorithm divides the visible light packet types according to the difference in the destination.Each packet in the network records information about the source and destination nodes.Q d i (t) is denoted as the total number of packet types on node i at time slot t.If d = i, then Q d i (t) = 0, indicating that node i is the destination node for the d number packets.Each node maintains up to N (total number of nodes) queues for storing packets arriving at different destination nodes.
π is denoted as the set of link scheduling, and Γ denotes the set of all schedulable links under the interference condition.The back-pressure algorithm used in the visible light network is as follows.
STEP-1: Calculating the weights of the links.The link (m, n) is any link in the network, the node n is a neighboring node of the node m within the network communication range, and d is the destination node in the network.We calculate the backlog difference of different kinds of packets between node m and node n, while the value of the backlog difference must be the positive integer, as follows, where di f f d mn (t) denotes the backlog difference of the packet queue of node d between node m and node n at time slot t.Q d m (t) and Q d n (t) are the queue length values for node m and node n, respectively.
We select the maximum value of all the queue backlog differences as the weight of the link, as follows, where D is the set of all destination nodes.w mn (t) is a maximum value in the set of all different kinds of packet queue backlog differences di f f mn (t).At time slot t, we make c * mn (t) as the optimal packet with w mn (t) value for link (m, n).STEP-2: Selecting schedulable links.We set the optimization function as follows, where Γ denotes the set of all schedulable links under the interference model.µ mn is the link transmission rate.π(t) is the set of optimal transmission links.STEP-3: Selecting routing paths.At time slot t, link (m, n) under the routing and scheduling policy, we transmit the optimal kind of packet c * mn (t) from node m to node n.The back-pressure algorithm for the relay selection in the visible light network is shown in Algorithm 1.We illustrate the workflow of the algorithm with a simple example.Figure 2 shows a visible light communication uploading network.There are three relay nodes C, D, and E, and three different destinations X, Y, and Z. From the figure, we can see the backlog number, i.e., the queue length value, corresponding to each packet type at each node, as shown in Table 1.We assume that the link (C, D) rate is µ cd = 4 packets/slot, and the link (C, E) rate is µ ce = 2 packets/slot.The neighboring node C at time slot t are only D and E.

Algorithm 1 The back-pressure algorithm for the relay selection in visible light network
transfer packets c * mn (t) from m to n 16: end for 17: end proceduce  First, we use Equation ( 21) to compute the queue backlog difference for different kinds of packets X, Y, and Z for link (C, D) and link (C, E), respectively.The values of queue backlog difference for different kinds of packets are shown in Table 2.
Then, we calculate the weights of the two links (C, D) and (C, E), respectively, by Equation ( 22); the results are shown in Table 3.
Next, we derive the schedulable links.At time slot t, for node C, the link scheduling sets (C, D) and (C, E) interfere with each other, they cannot be scheduled simultaneously.The rate of link (C, D) is µ cd = 4 packets/slot, the rate of link (C, E) is µ ce = 2 packets/slot, and ∑ µ CD w CD (t) = 4 × 6 = 24, ∑ µ CE w CE (t) = 2 × 6 = 12.We can find that ∑ µ CD w CD (t) > ∑ µ CE w CE (t), so we select link (C, D).The optimal data packet type is Y and the optimal transmission rate is µ CD (t).
Finally, at time slot t, the routing decision of node C is that packets of type Y will be transmitted to node D at a rate of 4 packets/slot through link (C, D) for several packets.

Simulations and Results Analysis
Firstly, the derived theoretical result is evaluated in part A, and the relay selection algorithm is analyzed in part B.

A. The theoretical upper bound of the unreliability of latency
The dynamic change of packets in the queuing system is simulated, where the arrival process models the aggregate traffic.The simulation results of the latency-bounded unreliability are measured by the ratio of the number of slots where the latency exceeds the threshold to the total observation slots.
In Figure 3, the aggregate arrival process is composed of an MMMP-4 process and an IMP process.The service process is modeled as a geometric distribution.The model parameters are summarized in Nomenclature section.The upper bounds of unreliability regarding latency with different system load ρ is presented, where ρ is defined as the ratio of the average arrival rate to the average service rate.According to the system load, the corresponding service rate C can be determined.The simulation results of unreliability are presented by box plots.It can be shown that the upper bounds of unreliability with regard to latency match the simulated results well with different ρ.The analysis framework can provide effective results of latency performance for the aggregate traffic with heterogeneity and burstiness.Obviously, the system load plays a significant role in the reliability.In the heavy-load system (ρ = 0.9), the latency-bounded reliability is terrible such that it cannot support almost any services with statistical reliability requirement even if the latency threshold is large.latency-bounded unreliability theoretical result =0.9 theoretical result =0.8 theoretical result =0.6 k (slots) Figure 3.The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1, q 1 = 0.5, λ 1 = 0.4, γ 1 = 0.6, R M1 = 3 packets/slot, R M2 = 4 packets/slot, p 2 = 0.1, q 2 = 0.5, R I2 = 20 packets/slot, p = 0.5.
In order to verify the advantages of the proposed analysis framework, we compare the theoretical results with the state-of-the-art ones based on EB/EC theory in Figure 4.In this part, the aggregate traffic consists of two identical MMOO processes.The parameters of the MMOO model are listed in Nomenclature section.The result based on the EB/EC theory refer to [20].It can be shown that the upper bound of unreliability obtained in this paper is much tighter than the compared one.The martingale-based theoretical results match the simulations well.The gap between the EB/EC-based results and the simulated values is obvious.Our analysis method can provide a more precise analysis for the latency performance of the Markovian aggregate traffic.The EB/EC theory assumes bursty traffic as the constant fluid, which makes it impossible to reflect the influence of complex random characteristics of aggregate traffic on latency performance.Next, we analyze the impact of the burstiness of the aggregate traffic on the latencybounded unreliability.Two measurement parameters of burstiness are adopted, which are the Hurst and squared coefficient of variation (CV).We change the state transition probabilities of the arrival models to influence the burstiness of aggregate traffic.The Hurst parameter is computed by the method of rescaled adjusted range analysis in this paper.Corresponding to the adjusted state transition probabilities ({0.1, 0.01, 0.001}), the Hurst parameter is {0.5904, 0.8495, 0.9140}, respectively.The CV of MMMP-4 can be derived as in (24), where Rav b is the average rate of the MMMP-4 model.A larger Hurst parameter or CV indicates a stronger burstiness of the traffic.The latency-bounded unreliability versus latency threshold with different Hurst parameters is shown in Figure 5, and the unreliability versus CV is in Figure 6.In Figures 5 and 6, the system loads are 75% and 60%, respectively, which are relatively high.The latency performance decreases sharply with the burstiness.The system will become unsustainable when the system load is high along with a bursty arrival.With the CV rising from 5 to 20, the system could only provide a best-effort QoS in the current service configuration.For the aggregate traffic with complex stochastic features, the impacts of burstiness on the latency-bounded reliability must be considered.
Finally, the impacts of system load on the latency performance are analyzed.Figure 7 presents the results of latency-bounded unreliability versus Rav of the aggregate traffic, Rav = Rav b + Rav i .When Rav < 4 packets/slot, the system load is lower than 66.7%.If the threshold k is relatively loose, the latency-bounded reliability is acceptable.However, for the business with strict latency threshold requirements (k = 25 to 70), the unreliability increases linearly with the system load.System load is an essential factor impacting the latency performance.If the system load goes too high, latency performance is unsatisfactory even if the latency threshold is moderate and the average arrival is not too large.From another perspective, even if the load is not high, the strong burstiness of arrivals may cause latency thresholds (those relatively small) to be violated frequently.The dotted lines in Figure 7 support our analysis.where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = q 1 = p 2 = q 2 ∈ {0.1, 0.01, 0.001}, CV, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1, q 1 = 0.5, λ 1 = 0.4, γ 1 = 0.6, Rav b = 5 packets/slot, p 2 = 0.1, q 2 = 0.5, γ 2 = 0.6, R I2 = 10 packets/slot, p = 0.5, C = 20 packets/slot.

B. Relay selection algorithm performance
We compare two relay selection algorithms: (1) our proposed relay selection algorithm based on the back-pressure theory, and (2) the traditional relay selection algorithm based on the max-min criterion method.In Figure 8, we show the evaluation of two relay selection algorithms through the average link throughput.From the figure, we can find that the average link throughput continues to increase with the increasing packet arrival rate, under two relay selection algorithms.Our proposed relay selection algorithm always achieves higher throughput than the traditional relay selection algorithm.It shows that the back-pressure theory can alleviate bandwidth limitations.
In Figure 9, we plot the relationship between the signal-to-noise ratio (SNR) threshold and outage traffic flows, under traditional and our proposed relay selection algorithm.If the SNR is still lower than the SNR threshold after the relay selection algorithm optimization, the transmission channel will be interrupted, i.e., outage traffic flows are interrupted.From the figure, we find that when the SNR threshold increases, both relay selection algorithms increase the number of outage traffic flows.However, the number of outage traffic flows from our proposed algorithm is significantly lower than that of the traditional algorithm.The result confirms that our proposed relay selection algorithm can provide better reliability network performance.

Conclusions
In this paper, we propose a novel latency-bounded reliability analysis framework based on martingales for the queuing system, where the aggregate traffic with burstiness is considered.The martingale of Markov-modulated arrival processes and the martingale of i.i.d.service processes are constructed, respectively.Leveraging the multiplicative property of martingales, the martingale of the backlog is proposed to model the buffer behavior of aggregate arrivals.Renting the stopping time theory, a tight upper bound of the unreliability with regard to latency for the aggregate traffic is derived.Meanwhile, in the core network, based on the back-pressure theory, a reasonable relay selection algorithm is proposed to boost the network performance and data transmission quality.Simulations verify the effectiveness of the proposed analysis framework.The latency performance is analyzed in terms of burstiness and the system load.When Hurst > 0.8, the latencybounded unreliability is up to 10 −1 level, and the system is unable to provision any reliability guarantee.For the aggregate traffic with sharp burstiness, more resources should be configured.

Figure 1 .
Figure 1.Scenario diagram.(a) is the network scenario.(b) is the corresponding queuing model.

Figure 2 .
Figure 2. The visible light communication network for relay selection.Both A and B are source nodes, and there are three relay nodes, C, D, and E, and three different destinations, X, Y, and Z.

Figure 4 .
Figure 4.The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed of two identical Markov modulated on-off (MMOO) processes, p a = 0.1, q a = 0.5, R = 5 packets/slot, p = 0.5.

Figure 8 .Figure 9 .
Figure 8.The relationship between packet arrival rates and link throughput under two different relay selection algorithms.
mn (t)w mn (t) \\ The sum of the products of link weight and rate 12: end for 13: π(t) ← arg max π∈Γ sum π ▷ Data Transferring 14: for all Node m, Link rate µ Output: Routing strategy 1: procedure Original back-pressure ▷Calculate Weight 2: for all links (m, n) ∈ L do 3: for all d ∈ D do \\Packet type d µ

Table 1 .
The queue length in the node.