In dynamic wireless ad hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust as well as have high bandwidth utilization, high predictability degree of bandwidth allocation, and low communication delay in the presence of frequent topological changes to the communication network. Recent studies have shown that existing implementations cannot guarantee the necessary satisfaction of these timing requirements. We propose a self-stabilizing MAC algorithm for DynWANs that guarantees a short convergence period, and by that, it can facilitate the satisfaction of severe timing requirements, such as the above. Besides the contribution in the algorithmic front of research, we expect that our proposal can enable quicker adoption by practitioners and faster deployment of DynWANs that are subject changes in the network topology.
1. Introduction
Dynamic wireless ad hoc networks (DynWANs) are autonomous and self-organizing systems where computing devices require networking applications when a fixed network infrastructure is not available or not preferred to be used. In these cases, computing devices may set up a short-lived network for the communication needs of the moment, also known as an ad hoc network. Ad hoc networks are based on wireless communications that require implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust and have high bandwidth utilization, a high predictability degree of bandwidth allocation, and low communication delay [1] in the presence of frequent changes to the communication network topology. Existing implementations cannot guarantee the necessary satisfaction of timing requirements [2, 3]. This work proposes an algorithmic design for self-stabilizing MAC protocols that guarantees a short convergence period and, by that, can facilitate the satisfaction of severe timing requirements. The proposed algorithm possesses a greater degree of predictability, while maintaining low communication delays and high throughput.
The dynamic and difficult-to-predict nature of wireless ad hoc networks give rise to many fault tolerance issues that requires efficient solutions. DynWANs, for example, are subject to transient faults due to hardware/software temporal malfunctions or short-lived violations of the assumed settings for modeling the location of the mobile nodes. Fault tolerant systems that are self-stabilizing [4] can recover after the occurrence of transient faults, which can cause an arbitrary corruption of the system state (so long as the program's code is still intact), or the model of dynamic networks in which communication links and nodes may fail and recover during normal operation [5]. The proof of self-stabilization requires convergence from an arbitrary starting system state. Moreover, once the system has converged and followed its specifications, it is required to do so forever. The self-stabilization design criteria liberate the application designer from dealing with low-level complications, such as bandwidth allocation in the presence of topology changes, and provide an important level of abstraction. Consequently, the application design can easily focus on its task and knowledge-driven aspects.
The IEEE 802.11 standard is widely used in wireless communications. Nonetheless, the research field of MAC protocols is very active and requires further investigation. In fact, the IEEE 802.11 amendment, IEEE 802.11p, for wireless access in vehicular environments (WAVE), has just being published. It was shown that the standard's existing implementations cannot guarantee channel access before a finite deadline [2, 3]. Therefore, applications with severe timing requirements cannot predictably meet their deadlines, for example, safety-critical applications for vehicular systems.
ALOHAnet and its synchronized version slotted ALOHA [6] are pioneering wireless systems that employ a strategy of “random access.” Time division multiple access (TDMA) [7] is another early approach, where nodes transmit one after the other, each using its own timeslot, say, according to a defined schedule. Radio transmission analysis in ad hoc networks [8] and relocation analysis of mobile nodes [9] show that there are scenarios in which MAC algorithms that employ a scheduled access strategy have lower throughput than algorithms that follow the random access strategy. However, the scheduled approach offers greater predictability of bandwidth allocation and communication delay, which can facilitate fairness [10] and energy conservation [11].
Our design choices have basic radio technology in mind, whilst aiming at satisfying applications that have severe timing requirements. We consider TDMA frames with fixed number of fixed-length timeslots. The design choice of TDMA frames with fixed-length radio time fits well applications that have severe delay requirements. By avoiding the division of fixed-length frames into timeslots of non-equal length, as in [10, 12], we take into consideration the specifications of basic radio technology.
In the context of the previous design choices, there are two well-known approaches for dealing with contention (timeslot exhaustion): employing policies for administering message priority (for meeting timing requirements while maintaining high bandwidth utilization, such as [13]) or adjusting the nodes’ individual transmission signal strength or carrier sense threshold [14]. The former approach is widely accepted and adopted by the IEEE 802.11p standard, whereas the latter has only been evaluated via computer simulations. The proposed algorithm facilitates the implementation of both of the previous approaches. We consider implementation details of the standard approach in Section 7.
For the sake of presentation simplicity, we start by considering a single priority MAC protocol and base the timeslot allocation on vertex coloring, before considering multipriority implementation in Section 7. The proposed algorithm allocates timeslots to a number of nearby transmitters, that is, a number that is bounded by the TDMA frame size, whereas nonallocated transmitters receive busy channel indications. The analysis considers saturated situations in which the node degree in the message collision graph is smaller than the TDMA frame size. As explained previously, this analysis assumption does not restrict the number of concurrent transmitters when implementing the proposed MAC algorithm.
1.1. Related Work
We are not the first to propose a MAC algorithm for DynWANs that follows the TDMA's scheduled approach. STDMA [15] and Viqar and Welch [16] consider global navigation satellite system -based scheduling (GNSS) [17] according to the nodes’ geographical position and their trajectories. Autonomous systems cannot depend on GNSS services, because they are not always available, or preferred not to be used, due to their cost. Arbitrarily long failure of signal loss can occur in underground parking lots and road tunnels. We propose a self-stabilizing TDMA algorithm that does not require GNSS accessibility or knowledge about the node trajectories. Rather, it considers an underlying self-stabilizing local pulse synchronization, such as [18, 19], which can be used for TDMA alignment; details appear in [18].
When using collision detection at the receiving side [14, 15, 20–22], it is up to the receiving side to notify the sender about collisions via another round of collision-prone transmissions, say, by using frame information (FI) payload fields that include T entries, where T is the TDMA frame size. Thus far, the study of FI-based protocols has considered stochastic resolution of message collision via computer network simulation [15, 20, 22–25]. Simulations are also used for evaluating the heuristics of MS-ALOHA [14] for dealing with contention (timeslot exhaustion) by adjusting the nodes’ individual transmission signal strength and/or carrier sense threshold. We do not consider lengthy frame information (FI) fields, which significantly increase the control information overhead, and yet we provide provable guarantee regarding the convergence time. Further analysis validation of the proposed algorithm via simulations and testbed implementation can be found in Section 8, and respectively, in [18].
The proposed algorithm does not consider collision detection mechanisms that are based on signal processing or hardware support, as in [26]. Rather, it employs a variation of a well-known strategy for eventually avoiding concurrent transmissions among neighbors. This strategy allows the sending side to eventually observe the existence of interfering transmissions. Before sending, the sender waits for a random duration while performing a clear channel assessment using basic radio technology (details appear in Section 3).
There are several MAC algorithms that are based on clear channel assessment. A recent example, [12], focuses on fair bandwidth allocation for single-hop-distance broadcasting while basing the interference model on discrete graphs. The authors do not consider self-stabilization. This work also considers clear channel assessment. However, we employ a strategy of random transmission delay in a way that allows the recipients to notice, in a probabilistic manner, prospective transmissions. We show that after a small number of rounds, the system is able to use the previous strategy for allocating the network bandwidth for single-hop-distance broadcasting when basing the interference model on discrete graphs. Further mitigation efforts of transmission pathologies, such as hidden terminal phenomena when unicast are considered, can be taken, for example, self-stabilizing two-hop-distance vertex coloring [27], equalizing transmission power, and coding-based methods [28], to name a few.
An abstract MAC layer was specified for DynWANs in [29]. The authors mention algorithms that can satisfy their specifications. However, they do not consider predictability.
Local algorithms [30, 31] consider both theoretical and practical aspects of MAC algorithms ([32] and references therein) and the related problem of clock synchronization; see [33] and references therein. For example, the first partly-asynchronous self-organizing local algorithm for vertex coloring in wireless ad hoc networks is presented in [34]. However, this line currently does not consider dynamic networks and predictable bandwidth allocation.
Two examples of self-stabilizing TDMA algorithms are presented in [10, 35]. The algorithms are based on vertex-coloring and the authors consider (nondynamic) ad hoc networks. Recomputation and floating output techniques ([4], Section 2.8) are used for converting deterministic local algorithms to self-stabilization in [36]. The authors focus on problems that are related to MAC algorithms. However, deterministic MAC algorithms are known to be inefficient in their bandwidth allocation when the topology of the communication network can change frequently [9]. There are several other proposals related to self-stabilizing MAC algorithms for sensor networks, for example, [37–40]; however, none of them consider dynamic networks, and their frame control information is quite extensive.
The MAC algorithms in [9, 18, 41, 42] have no proof that they are self-stabilizing. The authors of [9] present a MAC algorithm that uses convergence from a random starting state (inspired by self-stabilization). In [18, 41, 42], the authors use computer network simulators for evaluating self-⋆ MAC algorithms.
1.2. Our Contribution
This work proposes a self-stabilizing MAC algorithm that demonstrates rapid convergence without the extensive use of frame control information. Our analysis shows that the algorithm facilitates the satisfaction of severe timing requirements for DynWANs.
We start by considering transient faults and topological changes to the communication network, that is, demonstrating self-stabilization in Theorem 2. We then turn to focus on bounding the algorithm's convergence time after an arbitrary and unbounded finite sequence of transient faults and changes to the network topology. Theorem 3 shows that the expected local convergence time is brief and bounds it in (7). Theorem 7 formulates the expected global convergence time in (21). Moreover, for a given probability, the global convergence time is calculated in (22).
For discussion (Section 8), we point out the algorithm's ability to facilitate the satisfaction of severe timing requirements for DynWANs. Moreover, the analysis conclusions explain that when allowing merely a small fraction of the bandwidth to be spent on frame control information and when considering any given probability to converge within a bounded time, the proposed algorithm demonstrates a low dependency degree on the number of nodes in the network (as depicted by Figures 2 and 3).
We note that some of the proof details appear in the Appendix for the sake of presentation simplicity.
2. Preliminaries
The system consists of a set, P, of N anonymous communicating entities, which we call nodes. Denote every node with a unique index, i.
2.1. Synchronization
Each node has fine-grained, real-time clock hardware. We assume that the MAC protocol is invoked periodically by synchronous (common) pulse that aligns the starting time of the TDMA frame. This can be based, for example, on TDMA alignment algorithms [18], GPS [44], or a distributed pulse synchronization algorithm [19]. The term (broadcasting) timeslot refers to the period between two consecutive common pulses, and , such that , where T is a predefined constant named the frame size. Throughout the paper, we assume that . In our pseudocode, we use the event timeslot that is triggered by the common pulse. We assume that the timeslots are aligned as well.
2.2. Communications and Interferences
At any instance of time, the ability of any pair of nodes to communicate is defined by the set, , of (direct) neighbors that node can communicate with directly. Wireless transmissions are subject to interferences (collisions). We consider the potential of the nodes to interfere with each other's communications. The interference model in this paper is based on discrete graphs.
The set is the set of nodes that may interfere with 's communications when any nonempty subset of them, , transmits concurrently with . We call the (extended) neighborhood of node , and is named the (extended) degree of node . We assume that at any time, for any pair of nodes, ; it holds that implies that . Given a particular instance of time, we define the (interference) graph as , where represents the interference relationships among nodes.
2.3. Communication Schemes
We consider (basic technology of) radio units that raise the event when they detect that the received energy levels have reached a threshold in which the radio unit is expected to succeed in carrier locking; see [45]. Timeslots allow the transmission of packets using the primitives of and after fetching () a new packet from the upper layer, and respectively, before delivering () the packet to the upper layer. A beacon is a short packet that includes no data load, rather the timing of the event is the delivered information [12]. We assume that every node that invokes the operation causes the event to be raised by its neighbors, , within the exposure time, ε. Before the transmission of the packet in timeslot t, our communication scheme uses beacons for signaling the node's intention to transmit a packet within t; see Figure 1.
An example of TDMA frame, with three timeslots and three listening/signaling periods of size ε (signal exposure time). Each timeslot has a constant number, , of listening/signaling periods in which beacons can be transmitted. The duration of each listening/signaling period is ε (signal exposure time); the period during which a beacon that is sent by node is transmitted and raises the ca received by all neighbors . Namely, the period between 's transmission and 's rise of the event.
Numerical validation of Theorem 7's bound on the network-wise convergence time. We compare the bound, , with the numerical results, which consider random geometric graphs in which the nodes are randomly placed on the unit square. The charts considers nodes (from left to right). All experiments considered listening/signaling periods, interference range of , which result in an average extended degree of , on average, and .
Contour plot of (22) for . Contour charts [50] present two parameter functions, for example, the convergence time function, presented in (22). Contour lines in Figure 3 connect values of that are the same (see the text tags along the line). When N nodes attempt to access the medium, the convergence time, 𝒮 (cf. the contour lines), is stable in the presence of a growing number, n, of listening/signaling periods.
2.4. System Settings
We consider the interleaving model [4]. Every node, , executes a program that is a sequence of atomic steps. The state of a node consists of the value of all the variables of the node (including messages in transit for ). Variables are associated with individual node states by using the subscript notation, that is, is the value of variable in 's state. The term configuration is used for a tuple of the form , where G is the (interference) graph, and are the nodes’ states (including the set of all incoming communications). An execution (run) is an unbounded sequence of system configurations , such that each configuration (except the initial configuration ) is obtained from the preceding configuration by the execution of steps, , taken by all nodes.
Let τ (task) be a specification (predicate) set and a set of all executions that satisfy task τ. Let us consider TDMA-based MAC protocols for which the task requires that every node has its own broadcasting timeslot that is unique within its neighborhood. We note that 's requirements are obviously satisfiable when the ratio between the extended degree and the frame size is less than one; that is, there is no timeslot exhaustion when for all . Therefore, the studied task also deals with timeslot exhaustion by delivering busy channel indications, ⊥, to the nodes for which there were no timeslot left. We define to be the set of legal executions, R, for which holds in all of R's configurations.
We say that configuration is safe if there is an execution , such that is R's starting configuration. Let R be an execution and its arbitrary starting configuration. We say that Rconverges with respect to τ if within a bounded number of steps from c, the system reaches a safe configuration . The closure property requires that , for any execution, R, that starts form . An algorithm is said to be self-stabilizing if it satisfies both the convergence and the closure properties.
We describe execution R as an unbounded number of concatenated finite sequences of configurations. The finite sequence, , , is a broadcasting round if configuration has a clock value, t, of and immediately follows a configuration in which the clock value is , and configuration has a clock value of and immediately precedes a configuration in which the clock value is .
3. Algorithm Description
The proposed MAC algorithm periodically performs clear channel assessments. It uses these assessments when informing each node about the nearby unused timeslots. The nodes use this information for selecting their broadcasting timeslots, assessing the success of their broadcasts and reselecting timeslots when needed.
The MAC algorithm in Algorithm 1 satisfies the task. During the convergence period, several nodes can be assigned to the same timeslot. Namely, we may have . The algorithm solves such timeslot allocation conflicts by letting the nodes and go through a (listening/signaling) competition before transmitting in its broadcasting timeslot. The competition rules require each node to choose one out of listening/signaling periods for its broadcasting timeslot; see Figure 1. This implies that among all the nodes that attempt to broadcast in the same timeslot, the ones that select the earliest listening/signaling period win this broadcasting timeslot and access the communication media. Before the winners access their timeslots, they signal to their neighbors that they won via beacon transmission. The signal is sent during their choice of listening/signaling periods; see Figure 1. When a node receives a beacon, it does not transmit during that timeslot, because it lost this (listening/signaling) competition. Instead, it randomly selects another broadcasting timeslot and competes for it on the next broadcasting round.
Algorithm 1: Self-stabilizing TDMA-based MAC algorithm, code of node .
Constants, variables, macros and external functions
(n in the proofs) : integer = bound on round number
s : = next timeslot to broadcast or null, ⊥
signal : boolean = trying to acquire the channel
: boolean = marking unused timeslots
: unused timeslots, macro
: MAC layer interface
: communication primitives
Upon(t)
if = ⊥ thens(unused_set)
(, signal) (true, false) (* remove stale info. *)
ifs ≠⊥ ∧ thensend
Upon() do()
Function(m) (* send messagemto's neighbors *)
for ((signal, k) (true, 0); ; ) do
ifsignalthen with probability/() do
(* quit the competition *)
transmit() (* try acquiring the channel *)
wait untilthe end of competition round (* exposure period alignment *)
ifs ≠⊥ then() (* send the data packet *)
Upon (* defer transmission during t *)
ifthens ⊥ (* mark that the timeslot is not unique *)
(signal, ) (false, false) (* quit the competition *)
Function (* select an empty timeslot *)
ifthen return ⊥ else return
In detail, the MAC algorithm in Algorithm 1 is invoked at the start of every timeslot, t. When t is the first timeslot, the algorithm tries to allocate the broadcasting timeslot, , to (line 11) by randomly selecting a timeslot for which there is no indication to be used by its neighbors. Later, when the timeslot t becomes 's broadcasting timeslot, , the node attempts to broadcast (by calling the function in line 13). We note that the start of timeslot t also requires the marking of t as an unused timeslot and the removal of stale information (line 12). This indication is changed when the event is raised (line 27) due to a neighbor transmission; namely, when the detected energy levels reach a threshold in which the radio unit is expected to succeed in carrier locking; see [45].
When a node attempts to broadcast, it uses the (listening/signaling) competition mechanism for deciding when to signal to its neighbors that it is about to transmit a packet. The competition has rounds, and it stops as soon as the node transmits a beacon or a neighbor succeeds in signaling earlier (lines 18 to 23). We note that this signaling is handled by the event (line 27). Moreover, beacons are not required to carry payloads or any other information that is normally stored in packet headers. They are rather used to invoke the carrier sense event in .
The carrier sense in timeslot t indicates to each node that it needs to defer from transmission during t (line 25). In particular, it should stop using timeslot t for broadcasting, stop competing, and mark t as a used timeslot. Lastly, arriving DATA packets are delivered to the upper layer (line 15).
4. Correctness Proof: Outline and Notation
The proof starts by considering networks that do not change their topology and for which the ratio between the extended node degree and the frame size is less than one, that is, for all . (We deal with cases in which for all does not hold in Section 8). For these settings, we show that the MAC algorithm in Algorithm 1 is self-stabilizing with respect to task (Appendicies A to B), before considering the convergence time within a single neighborhood (Section 5) and the entire neighborhood (Section 6). These convergence estimations facilitate the exploration of important properties, such as predictability, and dealing with changes in the network topology of DynWANs (Section 8).
4.1. ProofOutline
The exposition of the proof outline refers to Definition 1, which delineates the different states at which a node can be in relation to its neighbors. Definition 1 groups these states into three categories of relative states: (1) to be allocated, when the node state depicts correctly its neighbor states, (2) a timeslot, when the node is competing for one, but there is no agreement with its neighbor states, and (3) to a timeslot, when the node is the only one to be allocated to a particular timeslot in its neighborhood. The correctness proof shows that the MAC algorithm in Algorithm 1 implements in a self-stabilizing manner by showing that eventually all nodes are allocated with timeslots; that is, all nodes are in the relative state ; see Definition 1.
Let R be an execution of the MAC algorithm in Algorithm 1 and the xth complete broadcasting round of R, where is an integer. We simplify the presentation by using uppercase notation for the configurations, , where is a timeslot. This notation includes the of the first event to be triggered immediately after configuration c, that is, .
Definition 1.
We say that node is (to be allocated) to a timeslot in configuration , if properties (1), (2), and (3) hold for node , but Property (4) does not. We say that is timeslot in configuration , if properties (1) to (4) hold for node , but Property (5) does not. We say that node is in state, with respect to timeslot in configuration , if properties (1) to (5) hold for node as follows:
Property (1) implies that node finishes any broadcast attempts within a timeslot. Properties (2) to (3) consider the case in which 's internal state represents correctly the timeslot allocation in its neighborhood. In particular, property (2) means that processor views timeslot t as an unused one if, and only if, it is indeed unused. Property (3) implies that when node is not using any timeslot, there is an unused timeslot at its disposal. Property (4) says that node is using timeslot . Property (5) refers to situations in which 's neighbors are not using 's timeslot during the next broadcasting round.
Starting from an arbitrary configuration, we show that node becomes within two broadcasting rounds (or one complete broadcasting round); see Appendix A. Then, we consider the probability, , that a node enters the relative state from either or ; see (6) (and Appendices B and D). Namely, (6) considers the probability that node is the only one to use its broadcasting timeslot in its neighborhood, where is 's probability to select the kth listening/signaling period for transmitting its beacon.
Theorem 2 (self-stabilization, the proof appears in Appendix C).
The MAC algorithm in Algorithm 1 is self-stabilizing with respect to the task .
Bounding the convergence time. We bound the time it takes the MAC algorithm in Algorithm 1 to converge by considering the relative states, , , and and describe a state machine of a Markovian process. This process is used for bounding the convergence time of a single node (Section 5) and the entire network (Section 6).
In detail, given node , its neighborhood , we define a random environment of a Markov chain; see Box 1. By looking at this random environment, we can focus our analysis on 's relative states while avoiding probability dependencies and considering average probabilities [46]. Suppose that 's environment, e, is known. Theorem 3 estimates two bounds on the expectation of probability , which is literally the probability , given that the environment is e.
Box 1: Markov chain describing 's relative state transitions.
We look at 's state transition with relation to its neighbors; see
Definition . The figure on the top defines 's relative states
as a 3-state Markov chain. The probabilities, , , , and
(solid lines arrows), that node change its relative state depend
on its neighbor's state. For instance, is the probability that
goes from the relative state It is environment-
dependent; that is, the states of 's neighbors are random as well.
We added the dotted edge between the state and the state
in order to make the Markov chain irreducible and to allow
working with the invariant probability. Namely, once node
arrives to , it returns to with probability 1. With
this convention, we can estimate the expected time to reach the
final relative state from relative state by the
expectation of the first hitting time of the irreducible chain [43]
In order to do that, we consider a set, ℛ, of executions of the MAC algorithm, such that each execution starts in a configuration, , in which (I) for any node , properties (1), (2), and (3) hold, and (II) node is in the relative state , which implies that (III) eventually, node arrives to the relative state .
With this convention, we can add a probability 1 to transit from the relative state to ; see the dashed line in the state machine diagram of Box 1. This allows us to estimate the expected time to reach the final relative state from relative state by the expectation of the first hitting time of the irreducible Markov chain [43].
When computing the expected time for node to reach state within its neighborhood, we see that it is sufficient to consider the lower bound of the probability to obtain an upper bound on the expected time to convergence; see Section 5. Moreover, when considering the network convergence time, that is, the expected convergence time of all nodes in the network, we see that the most dominant parameter is the mean neighborhood size. We do that by applying the arithmetic mean versus geometric mean (AM-GM) inequality and bounding the expected network convergence time; see Section 6.
4.2. Notation
Throughout the paper, we denote the states of the Markov chain by , and is the expectation, given that we start in relative state i, . In this paper, the states , , and of the Markovian process correspond, respectively, to states , , and and the time corresponds to configuration , where is the first complete broadcasting round in R that starts in a configuration, , in which all nodes are in the relative state . For example, is the expected time to reach the state.
Let be a node for which in configuration . We define to be the set of 's (broadcasting timeslot) matching neighbors, which includes all of 's neighbors that, during broadcasting round , are attempting to broadcast in 's timeslot. In our proofs, we use n as the number of listening/signaling periods, .
5. Convergence within a Neighborhood
Theorem 3 bounds the expected time, , for a node to reach the relative state , and follows from Proposition 5 and (12). Note that when the number of listening/signaling periods is and considering saturated situations in which the extended node degree is smaller than the TDMA frame size. Namely, the proposed algorithm convergence with a neighborhood is brief.
Theorem 3 (local convergence).
The expected time, , for node to reach the relative state satisfies (7), where n is the number of listening/signaling periods, T is the TDMA frame size, and is 's extended degree.
Consider
We look into the transition probability among relative states by depicting the diagram of Box 1 as a homogeneous Markov chain. We estimate the diagram transition probabilities in a way that maximizes the expected time for reaching the diagram's final state, . It is known that the first hitting time is given by , where is the invariant probability vector [43]. Let be the expected time it takes node that starts at the relative state to reach . It is clear that , because is the return time of the relative state . In our case, the transition matrix P is given by the following:
The invariant probability vector π satisfying is given by
The estimation of the maximal expected time necessary to assign the node to a timeslot requires us to compute bounds on the probabilities , , and that maximize as follows
The expected time for to reach the relative state is bounded in
Equation (7) has a compact and meaningful bound for (11). We achieve that by studying the impact of the parameters T and n on the MAC algorithm in Algorithm 1. Lemma 4 and (11) imply
Lemma 4.
Suppose that is the number of listening/signaling periods; see line 2 of the code in Algorithm 1. Then .
Proof.
Let us consider node that is in relative state . Given that has neighbors that compete for the same timeslot, the probability that gets allocated, , is given by (13).
Consider next that is in relative state , and thus, we know that transmitted during the preceding broadcasting round and transited from relative state to . Moreover, is using the same timeslot for the current broadcasting round. The only neighbors of that are using the same timeslot are the neighbors that are also in relative state and have chosen the same listening/signaling period as during the preceding broadcasting round. Let us denote by , the number of such neighbors. Given the probability that is allocated to the timeslot is given by
We have that is stochastically dominated by [47], that is, . Indeed, is a random variable that counts the number of neighbors that choose the same timeslot as , while counts the number of neighbors that choose the same timeslot and listening/signaling period as . For , 's expected value is smaller than 's expected value. To conclude, we remark that expressions (13) and (14) are the same decreasing function, , that is evaluated at two different points, and , respectively. Moreover, since is stochastically dominated by , (15) holds as follows:
Proposition 5 demonstrates (16) and leads us toward the proof of Theorem 3.
Proposition 5.
Let . Equation (16) bounds from below the probability ; see Appendix D of the.
Consider
The first bound, ((7)), has a simple intuitive interpretation. Let us consider first that two nodes compete for a same timeslot. The two nodes choose independently any of the n listening/signaling periods and there are different possible outcomes. Among these outcomes n correspond to the situation where the two nodes choose the same listening/signaling period and there is no winner. We then have outcomes that lead to a winner. There is then a probability of that one of the nodes wins the (listening/signaling) competition. Since the game is symmetric, the probability that wins is . The fact that we have T timeslots divides the number of competing nodes, , and implies that there are competing nodes for the same timeslot. If we interpret the game as a collection of independent games, where for each game wins with probability , thus, the probability that wins is . The inverse of this expression gives the average time for the event to occur and is the bound by (7).
6. Network Convergence
We estimate the expected time for the entire network to reach a safe configuration in which all nodes are allocated with timeslots. The estimation is based on the number of nodes that are the earliest to signal in their broadcasting timeslot. These nodes are winners of the (listening/signaling) competition and are allocated to their chosen timeslots. However, counting only these nodes leads to underestimating the number of allocated nodes, which then results in an overestimation of the convergence time. Indeed, node might have a neighbor that selects the earliest listening/signaling period in , but does not transmit because one of its neighbors, , had transmitted in an earlier listening/signaling period. Our bound considers only while both and transmit, became is inhibited by 's beacon.
Lemma 6 shows that the assumption that the nodes are allocated independently of each other is suitable for bounding the network convergence time, 𝒮. Theorem 7 uses Lemma 6 for bounding the network convergence time, 𝒮.
In Section 5, we prove a bound on the expected time, , for a single node to be allocated to a timeslot. We observe that the bound depends uniquely on the number of listening/signaling periods, n, as well as the ratio between the extended degree and the frame size, . In order to obtain a bound valid for all nodes, we bound this ratio with where x is as defined in Lemma 6. We note that the time needed for the allocation of timeslots to all the nodes depends on N, the total number of nodes.
In detail, the convergence time estimation considers the (fixed and independent) bound, , for the probability that a node reaches the relative state within a broadcasting round. Then, the convergence time, t, is a random variable with geometric probability, that is, . Let us denotes the time it takes for the nodes to respectively reach the relative state . The convergence time, 𝒮, for all the nodes is given with , which depends on N.
Lemma 6.
The expected number of nodes, , that win the (listening/signaling) competition after one broadcasting round satisfies (17), where , T is the number of timeslots, A the number of edges in the interference graph, G, and the number of nodes that attempt to access the communication media.
Consider
Proof.
The nodes that are allocated to a timeslot can previously be on relative state or . The probability of a transition from relative state to is , and a transition from relative state to is . As proved in Lemma 4, we always have . To bound the number of nodes that get allocated during a broadcasting round, we use the lower bound on the probability that a node gets allocated to a timeslot. Moreover, in the computations, we use the AM-GM bound [48], which says that if then and denote by the number of neighbors of node . As proved in Proposition D.1, since there are T timeslots the number of neighbors of i that choose the same timeslot as i and compete for it is bounded by . This lemma is proved by (18), where the last line of the expression holds because .
One has
We note that we use the AM-GM bound to reach the 4th row of (18).
By arguments similar to the ones used in the proof of Proposition 5, we deduce that if N nodes compete, the expected number of nodes that get allocated to a timeslot is lower bounded as follows:
Theorem 7 bounds the system convergence time. We numerically validate Theorem 7; see Figure 2. Moreover, our experiments showed that the average convergence time of the network is below the upper bound of (21).
Theorem 7 (global convergence).
The expected number of retransmissions is smaller than , where . Hence, one has that the expected number of broadcasting rounds, 𝒮, that guarantee that all nodes reach the relative state satisfies
Moreover, given that there are N nodes in the network and , the network convergence time is bounded by (22) with probability .
Consider
This means that with probability α, all nodes are allocated with timeslots in maximum k broadcasting rounds; see Figure 3.
Proof.
Theorem 3 bounds the convergence time of a particular processor; see (7). Lemma 6; see (20) , proves that this bound is still valid if we replace the term with ; that is, we consider the average degree instead of the particular degree of a node. If we replace by in expression (20) we obtain a larger bound because ; that is, .
The bound and the discussion in the paragraph of Section 6 show that the number of processors that are allocated during a broadcasting round is bounded by the random variable , where are identically and independently distributed random variables that are with probability and with probability (the second random variable dominates the first one; see [49]). This means that we lower bound the number of processors that are allocated if we consider that they are allocated independently with probability .
While the processors get allocated to a timeslot, the parameters and T change because some timeslots are no longer available (T decreases, some nodes are allocated, decreases). Actually the ratio becomes , where because if a timeslot is allocated or sensed used by processor , then T, the number of available timeslots decreases by and , the number of competing nodes, must decrease at least by one since there must be at least one processor that uses the busy timeslot (there may be multiple that are in state ). Under these circumstances, we always have . Thus, we can obtain a lower bound for the expected time to reach the relative state by assuming that all nodes are allocated independently with probability . We simplify the following arguments by using this definition of x.
To bound the number of broadcasting rounds, we consider the following game. The bank pays 1 unit to the nodes that get in state (get allocated to a timeslot) and receives units per nodes that fail to get in state . The game is fair because in each round the expected gain is . If we denote by the number of processors that get in state during the ith broadcasting round and by the number of processors that fail, we have that the gain is given by (23), where t denotes the total number of rounds.
One has
The expected gain is because the game is fair () and because eventually all the nodes get in state and the bank pays unit for each such processors. If we compute the expectation on both sides of (23), we then obtain
We observe that is the expected total number of retransmissions and is the average expected number of retransmissions whose value is . Replacing x with its expression, we obtain that the average number of retransmission is bounded by , and, this leads to the bound (21).
To prove the second assertion, let be the convergence time of nodes , respectively. The random variables, , are bound by random variables with geometric random distribution with expectation of , with . We require that in order to ensure that all nodes are allocated with timeslots. The fact that the random variables, , are independent and identically distributed, implies (25), where t is a random geometrical random variable, that is, and .
By solving (26), we observe that (26) is satisfied for any , where k satisfies (22). This proves that, with probability , the network convergence time is bounded by (22).
7. Implementation
Existing MAC protocols offer mechanisms for dealing with contention (timeslot exhaustion) via policies for administering message priority, such as [13]. In particular, the IEEE 802.11p standard considers four priorities and techniques for facilitating their policy implementation. We explain similar techniques that can facilitate the needed mechanisms.
7.1. Prioritized Listening/Signaling Periods
We partition the sequence of listening periods, , into subsequences, , where is used only for the kth priority. For example, suppose that there are six listening/signaling periods and that nodes with the highest priority may use the first three listening/signaling periods, , and nodes with the lowest priority may use the last three, . In the case of two neighbors with different listening period parameters, say, and , that attempt to acquire the same broadcasting timeslot, the highest priority node always attempts to broadcast before the lowest priority one.
7.2. TDMA-Based Backoff
Let us consider two backoff parameters, and , that refer to the maximal and minimal values of the contention window. Before selecting an unused timeslot, the procedure counts a random number of unused ones. Algorithm 2 presents an implementation of the function that facilitates backoff strategies as an alternative to the implementation presented in line 29 of Algorithm 1.
Algorithm 2: with TDMA-based backoff.
Additional constants and variables
and : backoff parameters
count : statically allocated variable that counts the backoff steps
Functionset)
let = // indicate busy channel (default return value)
ifthen
−
ifthen
return
The statically allocated variable records the number of backoff steps that node takes until it reaches the zero value. Whenever the function is invoked with , node assigns to a random integer from (cf. line 7). Whenever the value of is not greater than the number of unused timeslots, the returned timeslot is selected uniformly at random (cf. lines 8 to 9). Otherwise, a ⊥-value is returned after deducting the number of unused timeslots during the previous broadcasting round (cf. lines 6 and 10).
8. Discussion
Thus far, both schedule-based and nonschedule-based MAC algorithms could not consider timing requirements within a provably short recovery period that follows (arbitrary) transient faults and network topology changes. This work proposes the first self-stabilizing TDMA algorithm for DynWANs that has a provably short convergence period. Thus, the proposed algorithm possesses a greater predictability degree, whilst maintaining low communication delays and high throughput.
In this discussion, we would like to point out the algorithm's ability to facilitate the satisfaction of severe timing requirements for DynWANs by numerically validating Theorem 7. As a case study, we show that, for the considered settings of Figure 2, the global convergence time is brief and definitive. Figure 3 shows that when allowing merely a small fraction of the bandwidth to be spent on frame control information, say, three listening/signaling periods, and when considering 99% probability to convergence within a couple of dozen TDMA frames, the proposed algorithm demonstrates a low dependency degree on the number of nodes in the network even when considering 10,000 nodes.
We have implemented the proposed algorithm, extensively validated our analysis via computer simulation, and tested it on a platform with more than two dozen nodes [18]. These results indeed validate that the proposed algorithm can indeed facilitate the implementation of MAC protocols that guarantee satisfying these severe timing requirements.
The costs associated with predictable communications, say, using cellular base stations, motivate the adoption of new networking technologies, such as MANETs and VANETs. In the context of these technologies, we expect that the proposed algorithm will contribute to the development of MAC protocols with a higher predictability degree.
Footnotes
Appendices
The proof of Theorem 2 uses the propositions in Appendices A and B.
Acknowledgments
The authors thank Thomas Petig and Oscar Morales for helping with improving the presentation. The work of Elad M. Schiller was partially supported by the EC, through project FP7-STREP-288195, KARYON (kernel-based architecture for safety-critical control). The proceeding and technical versions of this work appears in [53] and, respectively, [].
References
1.
HartensteinH.LaberteauxK.VANET: Vehicular Applications and Inter-Networking Technologies2010Wiley
2.
BilstrupK.UhlemannE.StrömE. G.BilstrupU.Evaluation of the IEEE 802.11p MAC method for vehicle-to-cehicle communicationProceedings of the 68th Semi-Annual IEEE Vehicular Technology (VTC '08)September 2008152-s2.0-5814911924110.1109/VETECF.2008.446
3.
BilstrupK.UhlemannE.StrömE. G.BilstrupU.On the ability of the 802.11p MAC method and STDMA to support real-time vehicle-to-vehicle communicationEurasip Journal on Wireless Communications and Networking200920092-s2.0-6374908393010.1155/2009/902414902414
4.
DolevS.Self-Stabilization2000MIT Press
5.
DolevS.HermanT.Superstabilizing protocols for dynamic distributedsystemsChicago Journal of Theoretical Computer Science1997
6.
AbramsonN.Development of the ALOHANETIEEE Transactions on Information Theory19853121191232-s2.0-0022034585
7.
SchmidtW. G.Satellite time-division multiple access systems: past, present and futureTelecommunications19737821242-s2.0-0015653660
8.
HaenggiM.Outage, local throughput, and capacity of random wireless networksIEEE Transactions on Wireless Communications200988435043592-s2.0-7314909299510.1109/TWC.2009.090105
9.
LeoneP.PapatriantafilouM.Michael SchillerE.Relocationanalysis of stabilizing MAC algorithms for large-scale mobile ad hoc networksProceedings of the 5th International Workshop on Algorithm Aspects of Wireless Sensor Networks (ALGOSENSORS '09)2009203217
10.
HermanT.TixeuilS.A distributed TDMA slot assignment algorithm for wireless sensor networks3121Proceedings of the 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '04)2004Springer4558Lecture Notes in Computer Science
11.
YeW.HeidemannJ.EstrinD.An energy-efficient MAC protocol for wireless sensor networksProceedings of the IEEE INFOCOMJune 2002156715762-s2.0-003634365810.1109/INFCOM.2002.1019408
12.
CornejoA.KuhnF.LynchN. A.ShvartsmanA. A.Deploying wireless networks with beeps6343Proceedings of the 24th International Symposium on Distributed Computing (DISC ’10)2010Springer148162Lecture Notes in Computer Science
13.
RomR.TobagiF. A.Message-based priority functions in local multiaccess communication systemsComputer Networks1981542732862-s2.0-0019587698
14.
ScopignoR.CozzettiH. A.Mobile slotted Aloha for VanetsProceedings of the IEEE 70th Vehicular Technology Conference Fall (VTC '09)September 2009152-s2.0-7795146978010.1109/VETECF.2009.5378792
15.
YuF.BiswasS.Self-configuring TDMA protocols for enhancing vehicle safety with DSRC based vehicle-to-vehicle communicationsIEEE Journal on Selected Areas in Communications2007258152615372-s2.0-3534902436510.1109/JSAC.2007.071004
16.
ViqarS.WelchJ. L.Deterministic collision free communicationdespite continuous motionProceedings of the 5th International Workshop on Algorithm Aspects of Wireless Sensor Networks (ALGOSENSORS '09)2009218229
17.
ScopignoR.CozzettiH. A.GNSS synchronization in VanetsProceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS '09)December 2009152-s2.0-7794987160510.1109/NTMS.2009.5384821
18.
MustafaM.PapatriantafilouM.Michael SchillerE.TohidiA.TsigasP.Autonomous TDMA alignment for VANETsProceedings of the IEEE 76th Vehicular Technology Conference (VTC ’12)2012
19.
DaliotA.DolevD.ParnasH.HuangS.-T.HermanT.Self-stabilizing pulse synchronizationinspired by biological pacemaker networks2704Proceedings of the 6th International Symposium on Self-Stabilizing Systems (SSS '03)2003Springer3248Lecture Notes in Computer Science
20.
TadokoroY.ItoK.ImaiJ.SuzukiN.ItohN.Advanced transmission cycle control scheme for autonomous decentralized TDMA protocol in safe driving support systemsProceedings of the IEEE Intelligent Vehicles SymposiumJune 2008106210672-s2.0-5774917945710.1109/IVS.2008.4621135
21.
CozzettiH. A.ScopignoR.RR-Aloha+: a slotted and distributed MAC protocol for vehicular communicationsProceedings of the IEEE Vehicular Networking Conference (VNC '09)October 2009182-s2.0-7795126353110.1109/VNC.2009.5416375
22.
LenobleM.ItoK.TadokoroY.TakanashiM.SandaK.Header reduction to increase the throughput in decentralized TDMA-based vehicular networksProceedings of the IEEE Vehicular Networking Conference (VNC '09)October 2009142-s2.0-7795127525010.1109/VNC.2009.5416383
23.
ScopignoR.CozzettiH. A.Evaluation of time-space efficiency in CSMA/CA and slotted vanetsProceedings of the IEEE 72nd Vehicular Technology Conference Fall (VTC '10)September 2010152-s2.0-7864940481010.1109/VETECF.2010.5594410
24.
AbrateF.VescoA.ScopignoR.An analytical packet error rate model for WAVE receiversProceedings of the IEEE 74th Vehicular Technology Conference (VTC '11)September 2011152-s2.0-8375518165210.1109/VETECF.2011.6093093
25.
CozzettiH. A.ScopignoR. M.CasoneL.BarbaG.Comparative analysis of IEEE 802.11p and MS-aloha in vanet scenariosProceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC '09)December 200964692-s2.0-7794957619010.1109/APSCC.2009.5394140
26.
DemirbasM.HussainM.A MAC layer protocol for priority-based reliable multicast in wireless ad hoc networksProceedings of the 3rd International Conference on Broadband Communications, Networks and Systems (BROADNETS '06)October 20062-s2.0-5174908836310.1109/BROADNETS.2006.4374404
27.
BlairJ. R. S.ManneF.KuttenS.ZerovnikJ.An efficient self-stabilizing distance-2 coloringalgorithm5869Proceedings of the SIROCCO2009Springer237251Lecture Notes in Computer Science
28.
GollakotaS.KatabiD.BahlV.WetherallD.SavageS.StoicaI.Zigzag decoding: combating hidden terminals in wireless networksProceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM '08)August 20081591702-s2.0-6654910073510.1145/1402946.1402977
29.
KuhnF.LynchN. A.NewportC. C.KeidarI.The abstract MAC layer5805Proceedings of the 23rd International Symposium on Distributed Computing (DISC '09)2009Springer4862Lecture Notes in Computer Science
30.
HalldórssonM. M.WattenhoferR.AlbersS.Marchetti-SpaccamelaA.MatiasY.NikoletseasS. E.ThomasW.Wireless communication is in APX5555Proceedings of the ICALP2009Springer525536Lecture Notes in Computer Science
31.
GoussevskaiaO.WattenhoferR.HalldórssonM. M.WelzlE.Capacity of arbitrary wireless networksProceedings of the INFOCOM2009IEEE18721880
32.
WattenhoferR.Theory meets practice, it's about time!Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM '10)January 2010Špindlerův Mlýn, Czech Republic
33.
LenzenC.LocherT.SommerP.WattenhoferR.Clock synchronization: open problems in theory and practiceProceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM '10)January 2010Špindlerův Mlýn, Czech Republic
34.
SchneiderJ.WattenhoferR.TirthapuraS.AlvisiL.Coloring unstructured wireless multi-hop networksProceedings of the ACM Symposium on Principles of Distributed Computing (PODC '09)August 20092102192-s2.0-7035068645710.1145/1582716.1582751
35.
JhumkaA.KulkarniS. S.JanowskiT.MohantyH.On the design of mobility-tolerantTDMA-based media access control (MAC) protocol for mobile sensor networks4882Proceedings of the ICDCIT2007Springer4253Lecture Notes in Computer Science
36.
LenzenC.SuomelaJ.WattenhoferR.GuerraouiR.PetitF.Local algorithms: self-stabilization on speed5873Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS '09)2009Springer1734Lecture Notes in Computer Science
37.
LagemannA.NolteJ.WeyerC.TurauV.Mission statement: applying self-stabilization to wireless sensor networksProceedings of the 8th GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze” (FGSN '09)August 20094749
38.
ArumugamM.KulkarniS. S.ChakrabortyG.Self-stabilizing deterministicTDMA for sensor networks3816Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT '05)2005Springer6981Lecture Notes in Computer Science
39.
ArumugamM.KulkarniS. S.Self-stabilizing deterministic time division multiple access for sensor networksJournal of Aerospace Computing, Information and Communication2006384034192-s2.0-3374783050710.2514/1.19952
40.
KulkarniS. S.ArumugamM.Infuse: a TDMA based data dissemination protocol for sensor networksInternational Journal of Distributed Sensor Networks20062155782-s2.0-3374781881910.1080/15501320500330760
41.
LeoneP.PapatriantafilouM.Michael SE.ZhuG.Analyzing protocols for media access control in large-scale mobile ad hocnetworksProceedings of the Workshop on Self-Organising Wireless Sensor and Communication Networks (Somsed '09)October 2009Hamburg, Germany
42.
LeoneP.PapatriantafilouM.Michael SchillerE.ZhuG.DolevS.Arturo CobbJ.FischerM. J.YungM.Chameleon-mac: adaptive and self-? algorithms for media access control in mobilead hoc networks6366Proceedings of the12th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS ’10)2010Springer468488Lecture Notes in Computer Science
Hofmann-WellenhofB.LichteneggerH.CollinsJ.Global Positioning System. Theory and Practice1993Springer
45.
JamiesonK.HullB.MiuA.BalakrishnanH.Understanding the real-world performance of carrier senseProceedings of the ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND '05)August 200552572-s2.0-29244458360
46.
CogburnR.The ergodic theory of Markov chains in random environmentsZeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete19846611091282-s2.0-000286033810.1007/BF00532799
47.
RossS. M.Stochastic Processes1996John Wiley & Sons
48.
SteeleJ. M.The Cauchy-Schwartz Master Class2004Cambridge University Press,
49.
LindvallT.Lectures on the Coupling Method1992Dover Publications
50.
CrockerA. M.GodsonW. L.PennerC. M.Frontal contour chartsJournal of the Atmospheric Sciences194743
51.
DolevS.IsraeliA.MoranS.Analyzing expected time byscheduler-luck gamesIEEE Transactions on Software Engineering1995215429439
52.
JensenJ. L. W. V.Sur les fonctions convexes et les inégalités entre les valeurs moyennesActa Mathematica19063011751932-s2.0-3425060933310.1007/BF02418571
53.
LeoneP.Michael SchillerE.Bar-NoyA.HalldórssonM. M.Self-stabilizing tdma algorithms for dynamicwireless ad-hoc networksProceedings of the ALGOSENSORS2012SpringerLecture Notes in Computer Science
54.
LeoneP.SchillerE. M.Self-stabilizing TDMA algorithms for dynamic wireless ad-hoc networksabs 1210.3061, submitted in CoRR, 2012, http://arxiv.org/abs/1210.3061