Abstract
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes.
1. Introduction
A neighbor election is a distributed algorithm for the nodes to coordinate with their competing neighbors for slot access in wireless ad hoc networks. It was first proposed as neighborhood-aware contention resolution (NCR) [1] and then adopted as a multiple access scheme in WiMAX mesh mode for transmitting control messages [2,3]. In recent years, there has been an increasing demand for developing next-generation multiple access schemes for the evolving fifth-generation (5G) and sixth-generation (6G) wireless networks, Internet of Things (IoT) [4,5,6] and wireless sensor networks (WSN) [7,8], where the nodes are expected to schedule themselves in a distributed manner with the knowledge of their neighbors. With the characteristics of neighborhood awareness, the neighbor election has then attracted recent research interest again [9,10,11]. Different from the well-known contention-based slotted aloha (SA) and Carrier-Sense Multiple Access (CSMA), where the nodes randomly initiate transmissions without any prior knowledge about their neighboring network, neighbor election performs contention resolution by getting acquainted with their neighbors. To avoid collisions, a node using neighbor election needs to maintain the information updates from its one-hop and two-hop neighbors to ensure whether they will compete for a specific slot. This lightweight information maintenance will not require the successful two-way handshake processes between transmitters and receivers in reservation-based distributed coordination function (DCF) and other scheduling mechanisms, which may reduce the required control message overhead. If the information of a neighbor node cannot be timely updated, it will also be considered as a potential competitor, leading to an increasing number of competing neighbors. As a result, the insufficient timeliness of neighbor maintenance will decrease the probability of a node winning an election and starting its transmission [9]. Meanwhile, the maintenance of frequent neighbor updates is fundamentally supported by the communication among nodes, which implies an interaction relationship between the transmission probability of nodes and the timeliness of information maintenance.
The timeliness of information maintained in a neighbor election is first modeled in [9] as a function of the number of relaying nodes and the packet loss rate of wireless links. In contrast, the impact of a message transmission on the maintenance process is ignored. In the recent decade, the concept of age of information (AoI) [12] has been introduced as a novel metric to evaluate the information freshness in communication networks. As we are discussing the neighbor election-based slot access, throughout this paper, the AoI is determined as the age of maintained information updates from the neighbors of a receiver node [13]. For time-restricted applications, the timeliness of information maintenance can also be evaluated by the probability that AoI exceeds a given age threshold, which is termed as the age violation probability [14,15] or outage probability of AoI [16]. In [12], the real-time status updating by multiple information sources is comprehensively discussed. In [14], the age violation probability is derived based on the probability-generating function (pgf) of peak age at a steady state. The upper bound of age violation probability is given and tightened in [16]. While in [15], Hu et al. derive the mean age violation probability by analyzing the different cases that the AoI that may exceed an arbitrary age constraint and provide statistical results. This work makes it easy to analyze age violation probability by intuitively mapping the violation period within the evolution path of AoI.
Besides evaluating the AoI metric and its variations, some literature also try to build the connection between AoI and the concerned indicators in CSMA networks to bring more insights. The relation between beacon interval and AoI is given in [17], and the relation of AoI and the stability in control loops over non-beacon CSMA network is presented in [18]. However, the transmission timing in CSMA networks does not depend on AoI, as nodes using CSMA-based schemes only rely on direct channel sensing to initiate transmissions. Hence the change of AoI cannot affect the transmission process of nodes, and these analyses cannot be directly applied to the analysis of neighbor election process where interaction relationship between AoI and transmissions of nodes exists.
The main contributions of this paper are given as follows:
- We propose an approximated analytical model of the transmission probability of nodes in a wireless ad hoc network concerning its interaction relationship with the age violation probability of neighbor election-based distributed slot access. To our best knowledge, it is the first work that analyzes such interaction relationships in distributed multiple access schemes, which provides theoretical guidance for enhancing the design of distributed multiple access schemes with network-aware algorithms from the information freshness perspective.
- We define the concept of timely maintained neighbors in which information can be updated by a typical node on time. We then consider the competing probability of these neighbor nodes by analyzing the intersection of election intervals
- We verify the proposed approximation model by performing numerical simulations under different parameters, including the number of neighbors, the ratio of relaying nodes, and the packet loss rate. According to the simulation results, the proposed approximation model can enhance the accuracy of evaluating the transmission probability of nodes, which shows that the consideration of age violation probability of neighbor information is necessary.
The rest of the paper is organized as follows. We first introduce the system model of a wireless ad hoc network where the nodes use neighbor election-based slotted access in Section 2. Also, we first derive the interaction relationship between the transmission probability of nodes, the age violation probability of neighbor information, and the competing probability of timely maintained neighbors. Next, we discuss the election process of two neighboring nodes in Section 3 and linearly approximate their competing probability to simplify the derivations. Section 4 focuses on the information maintenance from the two-hop neighborhood, and the age violation probability is derived as the mean violation duration divided by the average maintenance interval. Numerical simulation results are illustrated in Section 5. The conclusions of this paper and future research aspects are summarized in Section 6.
2. Neighbor Election Based Distributed Slot Access
2.1. System Model
We consider a slotted wireless ad hoc network where the nodes attempt to access slots for transmitting their messages using a distributed neighbor election algorithm. The principle of neighbor election-based slot access is to control nodes’ transmission reasonably. As the literature describes [9,11], the nodes have to maintain neighbors’ information and avoid collisions in some future slots. A node should therefore announce to its neighbors the range of future slots it may compete for. The neighbors that receive this announcement will check the intersection of slots which they may compete together and avoid collision with the distributed neighbor election algorithm. As for broadcasting crucial control messages in WiMAX mesh mode, a node should ensure that the one-hop neighbors are ready to receive its message. A two-way reservation handshake is unsuitable for such transmission as it is complicated for a node to make handshakes with all its one-hop neighbors. However, election-based slot access helps the nodes initiate collision-free transmissions in a much more efficient way with the prior knowledge of neighbors. This makes it a promising candidate for designing next-generation multiple access schemes.
We start the analysis of the neighbor election by considering a typical node i. From the perspective of node i, the slots are partitioned into two types of intervals: the valid election interval and the hold-off interval. Node i first participates in the elections within its valid election interval of V slots and competes with its neighbors. After winning the chance of transmitting in a slot of index , it suspends the participation in elections and steps into a hold-off interval of H slots. When the hold-off interval ends, node i will enter the next valid election interval and rejoin the election. The duration between the start of two consecutive valid election intervals is termed as an election cycle [9] of slots, which is illustrated in Figure 1.
Figure 1.
Illustration of the election cycle in distributed neighbor election.
Algorithm 1 shows a simplified version of the neighbor election algorithm adopted in the WiMAX standard [2], where and denote the one-hop and two-hop neighbor set of i respectively; denotes the competing neighbor list for slot t and is a two-input hash-based pseudo random number generating function which has a unique output when the input variables are given. where node i should maintain the election information from several N neighbors within its two-hop coverage. To realize the required two-hop neighborhood maintenance, the node message should contain a list of the latest election information updates of itself and its one-hop neighbors. The update of a neighbor node j has three fields: the identity of j, the range of its next valid election interval, and the earliest subsequent transmitting slot, i.e., the start of the second next valid election interval. This information helps node i to determine whether node j belongs to the competing neighbor list . The information of node j itself will be updated right before its message transmission, which means there will be no queuing time for the update before being embedded into the message.
| Algorithm 1: Distributed Neighbor Election Algorithm. |
|
2.2. Interaction Relationship among Parameters
For simplicity of analysis, we assume that each node is equal to the typical node i and operates with the same value of N in each slot. Let denote the transmission probability of node i in an arbitrary slot after it wins an election. Let denote the age violation probability that node i cannot timely maintain the updates from one of its neighbors. Let denote the competing probability that a timely maintained neighbor node will compete with node i in a specific election. Let denote the number of untimely maintained neighbors, which is binomial distributed with parameters N and . The number of timely maintained competing neighbors is denoted as . Therefore, can be expressed as the reciprocal of the mean number of nodes participating in an election:
Equation (1) shows that is a function of N, and . While the competing probability of maintained neighbors is related to as it is determined by the intersections of valid election intervals of competing neighbors, which is derived in Section 3. The age violation probability also relates to since it is determined by the information maintenance process, which will be analyzed in the Section 4.
3. Competing Probability of Timely Maintained Neighbors
We concentrate on the election process of typical node i and a timely maintained neighbor node j within two-hop distance. These two nodes will not win the same election and thus have different transmitting slots. To analyze the competing probability of j, we suppose that node i and j enter their new election cycles at slot and respectively. Let denote the residual slot number of the previous election cycle of j when i has entered its new one. Node i will consider j as a competing node during the intersections of their valid election intervals, which can be divided into three cases as illustrated in Figure 2. Let denote the duration ratio of an intersection to node i’s related valid election interval. From the perspective of i, the competing probability of j can be written as the expectation of :
where is the probability mass function (pmf) of Q, and is the expectation of under the condition of .
Figure 2.
The intersections of valid election intervals of two neighbor nodes: (a) . (b) . (c) .
Since Q is geometric distributed with parameter , the pmf of Q is written as:
where for simplifying notations.
In the first and second cases of Figure 2, which conditions are and respectively, there should be . Hence only the third case will happen when . The expectation of conditioned by is then defined as:
where is the pmf of residual slot number R of node j:
and is the pmf of election cycle’s duration :
The definition in Equation (5) is based on the fact that when is given, R is uniformly distributed in the range .
To derive as a function of , we start from the derivation of . When , Equation (5) can be simplified as:
As for , Equation (5) is truncated, and difficult to have a simple expression by reduction to a common denominator. According to [19], the limit distribution of the residual slot number R in a renewal process satisfies the following formula:
Thus when is given, Equation (5) can be approximated as:
With the expression in Equations (7) and (9), we obtain the mean of when and respectively as follow:
where denotes the mean of Q and is written as:
and the approximation in Equation (12) holds as goes to zero when V is sufficiently large. For the same reason, , and the increment of when is approximated as:
As q grows, goes to zero and so gradually tends to . Thus we consider to approximate by a linear function defined as follow:
where the value of and are approximated by substituting Equations (9) and (12) into Equation (11):
Substitute Equations (15) and (16) into Equation (14), we have the expression of as follow:
where and .
Finally, we obtain the approximated expression of by some transformations and simplifications as follow:
4. Age Violation Probability of Neighborhood Maintenance
We focus on analyzing the age violation probability of the neighborhood maintenance process in this section. Consider that node i successfully receives a message from its neighbor node j for the k-th time. Let and denote the slot indices that node j transmits and node i successfully receives . Let denote the transmitting slot index of the last maintained update at slot t. The age of this update is denoted as .
An illustration of the AoI process of node j observed at node i is presented in Figure 3, where denotes the consumed time of k-th successful maintenance, denotes the interval between two consecutive and successfully maintained updates, denotes the duration of k-th maintenance interval. Let denote the age threshold that a neighbor cannot be timely updated as referred to in Section 2, and let denote the violation duration that AoI exceeds the threshold in k-th maintenance interval.
Figure 3.
Illustration of the observed AoI process at node i of neighbor node j.
According to the derivation of Equation (25) in [15], the age violation probability of an update is defined as
where the mean of and will be derived in the following two subsections.
4.1. Mean Duration of Maintenance Interval
We first analyze the mean of . Since the updates happen along with the generation of messages, there is no queuing time, and so . Therefore, the mean of should be
since the expectations of and are statistically equal. Equation (20) shows that has the same mean of . Consider that during the k-th maintenance interval, node i fails to maintain the updates from j for M times. Let denote the successful maintenance probability of an update. As M is geometric distributed of parameter , the mean of M is , and the mean of is written as:
The analysis of is given as follow. Note that the nodes should forward the updates of their one-hop neighbors to realize two-hop neighbor maintenance in a distributed neighbor election. Thus, node i can capture the updates of a one-hop neighbor by receiving messages from either the direct link or the forwarding links from their common one-hop neighbors. For the simplicity of analysis, we assume that a node’s two-hop coverage area is four times as large as its one-hop coverage, and each node has the same number of one-hop and two-hop neighbors. Hence we can have the number of one-hop and two-hop neighbors as and respectively. Suppose there are several common one-hop neighbors between node i and j. They will transmit at least one time in the hold-off interval of j after its transmission. The probability that i can capture the update of j in an arbitrary slot via forwarding links can be considered as the service rate:
where is the identical outage rate of all the wireless links.
If i receives from j via direct link, there is no need to wait for the forwarded messages, and the time is only consumed in the forwarding process, and the pmf of can be written as:
Finally, according to the definition of , it can be given as the cumulative probability of , i.e., .
4.2. Mean Violation Duration within a Maintenance Interval
Next, we analyze the mean of . Since the AoI at the start of k-th maintaining interval is and always smaller than , can be obtained as given in [15]:
The mean of can be written as follow:
where . In the second term of the rhs where and are independently distributed, there is . So M can only be 1 and . The pmf of can then be written as:
where .
5. Numerical and Simulation Analysis
According to the IEEE 802.16/WiMAX standard [2], the value of V and H are determined by the related duration exponents, i.e., and . The duration exponents are usually set to and , where x is an non-negative integer [9]. Here we set and so , .
To verify the accuracy of our approximations, we first take the age violation probability as an independent variable to analyze its impact on the transmission probability . We substitute Equation (18) into Equation (1) and obtain the approximated value of as the positive root of a quadratic equation, which is given as follow:
where the coefficients are adjusted as , , and .
To intuitively present the impact of on , we compare the numerical results of the approximated and exact value of under different in Figure 4. The exact value of is obtained by directly calculating the result of Equation (4) without approximation. We can observe that as increases, the neighbors are more likely to be competing nodes, which leads to a decreasing value of . We also find that the linear approximation of Equation (14) is tight when N is between 16 to 32, while for or , the value of is slightly overestimated due to the imperfection of linear approximation.
Figure 4.
Approximated and numerical results of under different value of , .
Next we consider that is also related to by summarizing the derivations in Section 4:
To obtain the approximation results, we search the value of which can satisfy both Equations (27) and (28) simultaneously under different parameters including the number of neighbors N, the ratio of relaying nodes and the packet loss rate .
As the interaction between and is now concerned, a C++-based virtual simulation platform is implemented to provide high-fidelity simulation results of the neighbor election based distributed slot access. This platform consists of virtual network nodes and wireless channels, where the synchronization procedures among nodes are predetermined to let them have the same timing of slot numbers and the start of slots. In each simulation slot, the transmitting nodes disseminate their messages to the relevant receiving nodes via virtual channels configured with different packet loss rates. The platform monitors the action of nodes and calculates the transmission probability and age violation probability from statistics. The simulation and approximation results are compared in Figure 5, where the analytical results in [9] are also plotted by black lines. We can first observe that for a greater packet loss rate, it is harder for the nodes to maintain the information updates, leading to a greater value of and hence the transmission probability decreases. For , the result from [9] is underestimated when , while it is slightly tighter than our approximations when . For greater packet loss rate, saying , our approximation is tighter than the one in [9] when , which shows that our approximation method is valid for greater .
Figure 5.
Comparison of the approximation and simulation results of under different node numbers and packet loss rate , , , and for two-hop neighbors [9].
After verifying the accuracy of our approximation models, we also want to investigate the impact of the outage rate of wireless links onto the age violation probability , which is shown in Figure 6.
Figure 6.
Approximated results of under different value of , .
We can see that as rises, also monotonically increases. For , the value of is lower than 0.1 when , while it increases rapidly when compared to other cases with a smaller number of neighbors. This is because when reaches a given level, the nodes cannot timely maintain the information from the two-hop and even one-hop neighbors, leading to higher age violation probability.
In Figure 7, the approximation and simulation results of are illustrated against the ratio of relaying nodes, which reflects the connectivity of network topology. It shows that a growing ratio of relaying nodes is beneficial to the value of as the information updates from neighbors can be timely maintained with higher probability. Meanwhile our approximation is tight when and , and quite underestimated when and due to imperfection linear approximation and should be improved.
Figure 7.
The value of under different node numbers and ratio of n to for two-hop neighbors, , , .
6. Conclusions
In this paper, we develop an approximated analytical model of the interaction relationship between the transmission probability of nodes and the age violation probability of information update maintenance in neighbor election-based distributed slot access of wireless ad hoc networks. By introducing the novel AoI metric, we can understand the timeliness of neighbor information maintenance and its impact on communication performance in a new way. Numerical and simulation results also show that with the aid of analyzing the age violation probability metric, our approximation is much tighter than the one in the literature when a greater packet loss rate is configured. The interaction analysis also helps to extend the future research of next-generation network-aware distributed multiple access schemes, such as optimizing the timeliness threshold and improving the strategy of dealing with the untimely maintained neighbors and their information updates.
Author Contributions
Conceptualization, X.L. and W.H.; investigation, Y.L.; data curation, X.L. and W.H.; writing—review and editing, W.H.; visualization, Y.L. and W.H.; supervision, X.L.; funding acquisition, X.L. All authors have read and agreed to the published version of the manuscript.
Funding
The work is supported in part by the Fundamental Research Funds for the Central Universities under Grant 2021RC242 and 2021JBZ102, in part by the Science and Technology Innovation Program of Xiongan New Area under Grant 2022XAGG0300, and in part by Joint Funds of the National Natural Science Foundation of China under Grant U2241215.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| NCR | Neighborhood-aware Contention Resolution |
| 5G | Fifth-Generation |
| 6G | Sixth-Generation |
| IoT | Internet of Things |
| WSN | Wireless Sensor Networks |
| AoI | Age of Information |
| SA | Slotted Aloha |
| DCF | Distributed Coordination Function |
| CSMA | Carrier-Sense Multiple Access |
| pmf | probability mass function |
| pgf | probability-generating function |
References
- Bao, L.; Garcia-Luna-Aceves, J.J. A New Approach to Channel Access Scheduling for Ad Hoc Networks. In Proceedings of the ACM 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, 16 July 2001; pp. 210–221. [Google Scholar] [CrossRef]
- IEEE Std 802.16-2004; IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems. IEEE: Piscataway, NJ, USA, 2004; pp. 1–895. [CrossRef]
- Kas, M.; Yargicoglu, B.; Korpeoglu, I.; Karasan, E. A Survey on Scheduling in IEEE 802.16 Mesh Mode. IEEE Commun. Surv. Tutor. 2010, 12, 205–221. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, S.; Mu, X.; Ding, Z.; Schober, R.; Al-Dhahir, N.; Hossain, E.; Shen, X. Evolution of NOMA Toward Next Generation Multiple Access (NGMA) for 6G. IEEE J. Select. Areas Commun. 2022, 40, 1037–1071. [Google Scholar] [CrossRef]
- Xie, W.; Ding, X.; Cai, B.; Li, X.; Wei, M. Downlink MIMO-NOMA System for 6G Internet of Things. Electronics 2022, 11, 3233. [Google Scholar] [CrossRef]
- Lin, Y.-J.; Tzeng, S.-S. A Framed Slotted ALOHA-Based MAC for Eliminating Vain Wireless Power Transfer in Wireless Powered IoT Networks. Electronics 2020, 10, 9. [Google Scholar] [CrossRef]
- Leccese, F.; Leccisi, M.; Cagnetti, M. Cluster Layout for an Optical Wireless Sensor Network for Aerospace Applications. In Proceedings of the 2019 IEEE 5th International Workshop on Metrology for AeroSpace (MetroAeroSpace), Torino, Italy, 19–21 June 2019; pp. 556–561. [Google Scholar] [CrossRef]
- Leccese, F.; Cagnetti, M.; Giarnetti, S.; Petritoli, E.; Luisetto, I.; Tuti, S.; Leccisi, M.; Eurovic-Pejcev, R.; Eordevic, T.; Tomasevic, A.; et al. Comparison between Routing Protocols for Wide Archeological Site. In Proceedings of the 2018 Metrology for Archaeology and Cultural Heritage (MetroArchaeo), Cassino, Italy, 22–24 October 2018; pp. 406–410. [Google Scholar] [CrossRef]
- Li, X.; Li, X. Research on the Impact of Interaction Times in Distributed Wireless Ad Hoc Networks. IEEE Access 2020, 8, 111742–111750. [Google Scholar] [CrossRef]
- Sun, Z.; Yang, T.; Che, Y.; Yao, L.; Bai, B.; Zhang, G.; Yang, O.; Liu, X. Research on Scheduling Mechanism of Control Channel in 802.16 Mesh Mode. In Proceedings of the Prognostics and Health Management Conference (PHM-Besançon), Besancon, France, 4–7 May 2020; pp. 328–331. [Google Scholar] [CrossRef]
- Cirimelli-Low, D.; Garcia-Luna-Aceves, J.J. Key-Activation Multiple Access (KAMA). In Proceedings of the 2021 13th IFIP Wireless and Mobile Networking Conference (WMNC), Montreal, QC, Canada, 20 October 2021; pp. 92–99. [Google Scholar] [CrossRef]
- Yates, R.D.; Kaul, S.K. The Age of Information: Real-Time Status Updating by Multiple Sources. IEEE Trans. Inform. Theory 2019, 65, 1807–1827. [Google Scholar] [CrossRef]
- Kaul, S.; Yates, R.; Gruteser, M. Real-Time Status: How Often Should One Update? In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar] [CrossRef]
- Devassy, R.; Durisi, G.; Ferrante, G.C.; Simeone, O.; Uysal-Biyikoglu, E. Delay and Peak-Age Violation Probability in Short-Packet Transmissions. In Proceedings of the International Symposium onInformation Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2471–2475. [Google Scholar] [CrossRef]
- Hu, L.; Chen, Z.; Dong, Y.; Jia, Y.; Liang, L.; Wang, M. Status Update in IoT Networks: Age-of-Information Violation Probability and Optimal Update Rate. IEEE Internet Things J. 2021, 8, 11329–11344. [Google Scholar] [CrossRef]
- Seo, J.-B.; Choi, J. On the Outage Probability of Peak Age-of-Information for D/G/1 Queuing Systems. IEEE Commun. Lett. 2019, 23, 1021–1024. [Google Scholar] [CrossRef]
- Baiocchi, A.; Turcanu, I. Age of Information of One-Hop Broadcast Communications in a CSMA Network. IEEE Commun. Lett. 2021, 25, 294–298. [Google Scholar] [CrossRef]
- Mena, J.P.; Nunez, F. On the Relation Between Peak Age and Stability in Control Loops Over Non-Beacon Enabled CSMA/CA. IEEE Commun. Lett. 2021, 25, 3139–3143. [Google Scholar] [CrossRef]
- Ali, S.; Shah, I.; Wang, L.; Yue, Z. A Comparison of Shewhart-Type Time-Between-Events Control Charts Based on the Renewal Process. IEEE Access 2020, 8, 113683–113701. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).