The aims of this paper are to analyze the performance of a one-dimensional ALOHA ad hoc network and to investigate the impact of the access probability of the ALOHA protocol on the network performance. As a performance metric we consider the average number of nodes that successfully receive a packet from an arbitrary node. To mathematically model the random locations of nodes and the interference in the ad hoc network, we use stochastic geometry theory. With the help of stochastic geometry theory, we model the ad hoc network, derive an analytic form of the performance metric, and finally obtain the optimal access probability that maximizes the performance metric. Numerical examples are provided to validate our analysis and to investigate the performance behavior.
1. Introduction
Ad hoc networks have been paid much attention because of their wide applications such as Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs). One of important design issues in ad hoc networks is to optimize the performance of wireless channel access protocols such as Carrier Sense Multiple Access (CSMA) and ALOHA. Even though many real ad hoc networks consider the CSMA protocol, the analysis of the CSMA is complex when we consider the interference in the network. On the other hand, the ALOHA protocol is simple to implement. Moreover, since the ALOHA protocol is a good approximation of the CSMA protocol, for example, from the viewpoint of throughput [1], and the analysis of the ALOHA protocol is relatively simple, ad hoc networks with the ALOHA protocol are widely considered and analyzed, for example [2, 3]. In fact, a recent simulation study in [4] shows that the behavior of CSMA appears similar to that of ALOHA as the network density becomes high and the analysis of dense VANETs with Aloha is performed to approximate the CSMA-based MAC protocol in [5].
In this paper we consider a one-dimensional ad hoc network with the ALOHA protocol. The motivation of a one-dimensional network comes from its application to vehicular networks where vehicles are mostly located in a linear form. In the ALOHA protocol, each node having a packet in the network transmits independently with a given access probability, so that the performance of the ALOHA protocol is determined by the access probability. Hence, it is important to investigate the impact of the access probability on network performance of the ad hoc network, which is the objective of this paper.
Bearing broadcast messages in mind, we consider a neighbor of an arbitrarily tagged node and focus on the average number of nodes in the neighbor that successfully receive a transmitted packet from the tagged node. To consider the random locations of nodes and the interference, we use stochastic geometry [6, 7], which is recently widely used in the analysis of wireless networks. Interference depends upon the path loss and the fading characteristics of wireless channels. Both of them can be interpreted as functions of the distance between users in the network, where stochastic geometry is involved. In the last decades, stochastic geometry and related techniques have attained so much interest among researchers in wireless network community. For its various applications, readers refer to [7–10] for cellular systems, [11] for ultrawideband, [12–16] for cognitive radio, [17, 18] for femtocells, and [19] for relay networks. For a comprehensive understanding, we refer the readers to a survey paper [20] and the references therein.
Regarding the analysis of VANETs with the Aloha protocol based on stochastic geometry, [2, 3] analyze the performance of VANETs. While they derive the probability of packet capture at some distance in [2, 3], we focus on an arbitrary node, called the tagged node, in the ad hoc network and consider the number of nodes that successfully receive a packet transmitted from the tagged node as the performance metric. To compute the performance metric, we derive the conditional probability of packet capture at some distance, given the location of the nearest interfering node. Using the conditional probability we compute the average number of nodes that successfully receive a packet from the tagged node. Noting that the access probability of the Aloha protocol significantly affects our performance metric, we use our analytical result to find the optimal access probability of the Aloha protocol that maximizes the average number of nodes that successfully receive a transmitted packet.
The remainder of this paper is organized as follows. In Section 2 we describe our network model. In Section 3 we analyze the performance of the VANET with the Aloha protocol and formulate an optimization problem. In Section 4 we provide numerical and simulation results to validate our analysis and to investigate the performance behavior. In Section 5 we give our conclusions.
2. System Modeling
We consider a one-dimensional ad hoc network where nodes are located according to a homogeneous Poisson point process (PPP) with intensity λ. For wireless channel access, the time axis is divided into slots of equal size and each node uses the ALOHA protocol with access probability p (); that is, each node independently transmits its packet with probability p at each slot. We assume that simultaneous packet transmissions from multiple nodes might result in interference at receiving nodes and that interfered packets are deemed lost. To focus on the performance of the ALOHA protocol in the one-dimensional ad hoc network, we further assume that there are no other sources of packet loss. Under our assumption, we use stochastic geometry to capture the locations of nodes and the interference in packet transmission. For wireless channels, we use the Rayleigh fading model.
For our analysis, we tag an arbitrary node and call it the tagged node. Due to the reduced Palm distribution of a Poisson point process (PPP) [21], without loss of generality we assume that the tagged node is located at the origin and other nodes are located in the entire axis of one dimension according to a PPP Φ with intensity λ.
Consider an arbitrary slot time and suppose that the tagged node transmits its packet at the slot time. Let be the set of nodes that simultaneously transmit their packets at the slot time. The nodes in are called active nodes. The nodes in are called inactive nodes that try to receive packets at the slot time. Since packet transmissions are performed independently from node to node, we see that is a PPP with thinned intensity [21]. Moreover, is a PPP with thinned intensity [21].
Figure 1 provides a snapshot of the one-dimensional ad hoc network in the positive direction when the tagged node at the origin transmits a packet. In the figure triangles denote active nodes and upside down triangles denote inactive nodes. So the set of triangles forms and the set of upside down triangles forms in the figure.
A snapshot of the one-dimensional ad hoc network with active and inactive nodes in the range of 100 m.
We assume that one packet is transmitted during a slot time and that each node always has a packet to transmit. From the perspective of broadcast packets, as a performance metric we consider the average number of nodes in the neighbor of the tagged node, denoted by , that successfully receive the packet from the tagged node. If the tagged node transmits a packet in such a way that is optimized, then the broadcasting speed becomes fast, which is desirable. Furthermore, the maximization of prevents the case where the nearest active node from the tagged node is too much close, which is not desirable in the design of an ad hoc network.
To be more specific in the definition of , we define the neighbor of the tagged node by the interval between the tagged node and the nearest active node from the tagged node in the positive direction. Then is defined by the number of inactive nodes in the neighbor of the tagged node that successfully receive a packet transmitted from the tagged node. The reasons why we consider only inactive nodes in the positive direction in this paper are explained as follows. First, information forwarding is performed in the positive direction in practice. In fact, inactive nodes had better receive packets from their own nearest active nodes in front of them when the information is related with a safety or emergency situation in front of them such as the stopped-vehicle hazard warning. Second, the analysis of the average number of inactive nodes in the negative direction is the same as given in the next section, so we focus on the positive direction in this paper. Third, we assume that a node cannot transmit and receive a packet simultaneously. So only inactive nodes near the tagged node (i.e., the inactive nodes that are located between the tagged node and the nearest active node) are considered in the performance metric .
3. Performance Analysis and Optimization
In this section, we use as the performance metric of an ad hoc network with the ALOHA protocol and derive an analytic form of as a function of the access probability p. Then we find an optimal access probability that achieves the maximum value of .
We define the interference free distance R as the distance such that any inactive node located within the distance from the tagged node can successfully receive the packet transmitted by the tagged node. To derive our performance metric, we first analyze R as follows.
Let X be the location of the nearest active node. Since the set of active nodes is a PPP with intensity , the probability density function of X is given by
for . Conditioned on , suppose that there is an inactive node located at r ().
Let W denote the noise that is independent of the fading between nodes and α denote the path loss exponent. Then the signal to interference and noise ratio (SINR) at the inactive node at r is given by
Here, is the fading between the tagged node at the origin and the inactive node at r and is the fading between the nearest active node at x and the inactive node at r. Moreover, is the interference from all active nodes in the positive direction except the nearest active node, and is the interference from all active nodes in the negative direction.
Correspondingly, let be the set of active nodes in the positive direction except the nearest active node and let be the set of active nodes in the negative direction. Then the interferences and are expressed as
respectively. Here, is the location of the ith nearest active node (from ) in and is the location of the ith nearest active node in . Moreover, is the fading between the ith nearest active node in and the inactive node at r and is the fading between the ith nearest active node in and the inactive node at r. Then denotes the distance between and and denotes the distance between the origin and . Since we use the Rayleigh fading model, we assume that , , , and are independent exponential random variables with parameter μ. Note that is the average transmission power.
Assume that the inactive node can successfully receive the packet from the tagged node if its SINR value is greater than a threshold θ. For the analysis of the interference free distance R, we have to consider the following important observation on the relation between the distance R and the location X of the nearest active node.
Proposition 1.
Let X be the location of the nearest active node from the tagged node in the positive direction and let W be the exponential noise with mean . Given that , the conditional probability that R is greater than r is given by
for .
Proof.
For , observe first that
It then follows that
Equality (a) in the above holds because W, , , and are mutually independent. The derivation of Laplace transform of is presented below. Consider
In the first equality, the expectation is taken over both the point process and the fading. Due to the independence in fading, the second equality holds. The third equality follows from the fact that
From Laplace functional of the homogeneous PPP with intensity , we obtain the fifth equality.
Similarly, we derive Laplace transform of as follows:
where we use Laplace functional of the homogeneous PPP with intensity in the fifth equality.
We are now ready to derive . By the definition of R, note that the packet from the tagged node can be successfully received by an inactive node if the distance between the tagged node and the inactive node is not greater than R. Let be the set of inactive nodes in the interval that successfully receive the packet. Note that is a PPP with intensity and that an inactive node at r () successfully receives the packet from the tagged node with probability . Let denote the number of nodes in . Then Proposition 2 presents the analytic form of .
Proposition 2.
The average number of nodes that successfully receive the packet from the tagged node is given by
Proof.
From Proposition 1 the desired result is obtained as follows:
To obtain
we need to condition it on and compute
because all transmissions from active nodes in simultaneously affect the packet receptions at the inactive nodes in which causes correlations in the packet receptions at the inactive nodes. However, for a given , which implies that the locations of all active nodes are fixed, only the channel fading does matter in the packet receptions at the inactive nodes. Noting that the fading in a channel is assumed to be independent of all the other channels, the inactive nodes in that successfully receive the packet from the tagged node form a (location dependent) thinned Poisson point process with thinning probability . Hence, we have
It then follows that
Combining the above two results together we get
Observe that if the access probability p is too large, then the active nodes transmitting packets are likely to be close and hence most of their transmission ranges are overlapped, which results in decreasing due to severe interference. On the other hand, if the access probability p is too small, then is also degraded due to low packet transmission opportunity for each node. So it is important to find the optimal access probability that maximizes .
With the above observation, we formulate an optimization problem to obtain the optimal access probability . However, before we provide our optimization problem we should mention a remark on the feasible region on the access probability p. According to the technical report of NHTSA [22], the required broadcast packet latency is set to be msec. To satisfy the requirement on average in our model and to bear in mind that there are 100 msec/one slot time slots during msec, each node should send at least one packet with the access probability of
So the feasible region of the access probability p is . With the feasible region of p our optimization problem is formulated as follows:
4. Numerical Results
In this section we provide numerical and simulation results to validate our analysis. The simulation is conducted using MATLAB. The procedure is summarized as follows. First, we generate a Poisson random variable and set it to be the total number of nodes. The locations of nodes are independently generated by using a uniform random variable over the observation window. Next, we classify each node as active with probability p and inactive with probability , and each fading power between nodes is independently generated by using an exponential random variable. When the tagged node is active, pick up the nearest active node from the tagged node at the origin in the positive direction, and we only consider inactive nodes between the nearest active node and the tagged node, as explained before. Then we compute the SINR value for each inactive node considered and check whether the inactive node receives the packet successfully. Consequently, is computed. The whole procedure is repeated times so that the desired throughput is obtained.
We first validate our result on the average number of inactive nodes with successful packet reception and then find the optimal access probability . We use the following parameters throughout this section which are adopted from [3]:
The intensity of the network: nodes/m.
The average of transmission power: .
The path loss exponent: .
The success threshold: .
The observation window: .
We use Proposition 2 to compute and plot it in Figures 2 and 3 as we change the access probability p. We consider a zero-mean additive white Gaussian noise (AWGN) in this paper, which is widely used to model a noise in most of communication systems [23]. In this case, the power of the noise is exponentially distributed; that is, W follows an exponential distribution with parameter ν. Here, indicates the average noise power. The exponential noise is also considered in [24, 25]. In Figure 2 we use mW and in Figure 3 we use mW. We also plot the simulation results in the figures. As can be seen in the figures, there exists the optimal access probability that maximizes our performance metric . In addition, we see from the figures that our analytical and simulation results are well matched, which shows the validity of our analysis. Another important observation from the figures is that the impact of the noise power is significant. That is, when the average noise power is very small such as mW, the optimal access probability is very small. On the other hand, when the average noise power is not small such as mW, the optimal access probability becomes large, that is, greater than .
The average number of nodes that successfully receive the packet from the tagged node (W is exponential with mean mW).
The average number of nodes that successfully receive the packet from the tagged node (W is exponential with mean ).
We next investigate the behavior of when we change the intensity λ of the PPP. We first fix p to be , , and , and we plot versus λ for each fixed p in Figure 4. From the figure, we see that increases rapidly for small values of λ, but it becomes almost invariant soon in λ. We see a similar behavior of when we use the optimal access probability for each λ, which is plotted in Figure 5.
The average number of nodes that successfully receive the packet from the tagged node versus the intensity of network for fixed access probabilities.
The average number of nodes that successfully receive the packet from the tagged node versus the intensity of network for optimal access probabilities.
This is an interesting and useful result in practice. Consider the situation in an ad hoc network where the intensity of nodes is rapidly changing in time. In this case, since it is very difficult to adapt the access probability optimally according to the fast change in intensity, a fixed access probability is likely be used. Then, if the intensity λ is not too small, then the result in the figures concludes that it suffices to find an optimal access probability from which becomes almost invariant. For instance, for the ad hoc network we consider in this section we recommend for .
However, when the intensity λ is small, for example, less than , the access probability should be adapted according to the change in intensity to achieve the optimal performance. In fact, the optimal access probability becomes larger as λ decreases.
5. Conclusions
In this paper we considered a one-dimensional ad hoc network with the ALOHA protocol. We used stochastic geometry theory to analyze the performance of the network. As a performance metric we considered the average number of inactive nodes that successfully receive a packet from an arbitrary node and derived an analytic form of the performance metric. With our analysis we formulated an optimization problem to obtain the optimal access probability that achieves the optimal performance. Our numerical and simulation studies showed the validity of our analysis. We also investigated the performance behavior of the ad hoc network with the ALOHA protocol.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A2055410).
References
1.
CalìF.ContiM.GregoriE.Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limitIEEE/ACM Transactions on Networking20008678579910.1109/90.8938742-s2.0-0034467608
2.
BlaszczyszynB.MühlethalerP.ToorY.Maximizing throughput of linear vehicular ad-hoc NETworks (VANETs)—a stochastic approachProceedings of the European Wireless Conference (EW ‘09)May 2009Aalborg, DenmarkIEEE323610.1109/EW.2009.5358011
3.
BłaszczyszynB.MühlethalerP.ToorY.Stochastic analysis of ALOHA in vehicular ad-hoc networksAnnals of Telecommunications2013681-29510610.1007/s12243-012-0302-22-s2.0-84873096592
4.
SubramanianS.WernerM.LiuS.JoseJ.LupoaieR.WuX.Congestion control for vehicular safety: synchronous and asynchronous MAC algorithmsProceedings of the 9th ACM International Workshop on VehiculAr Inter-NETworking, Systems, and Applications (VANET ‘12)June 2012637210.1145/2307888.23079002-s2.0-84864317363
5.
NguyenT. V.BaccelliF.ZhuK.SubramanianS.WuX.A performance analysis of CSMA based broadcast protocol in VANETsProceedings of the IEEE INFOCOMApril 2013Turin, Italy2805281310.1109/infcom.2013.65670902-s2.0-84883092996
6.
StoyanD.KendallW.MeckeJ.Stochastic Geometry and Its Applications19962ndJohn Wiley & Sons
7.
BaccelliF.BłaszczyszynB.KarrayM. K.Up and downlink admission/congestion control and maximal load in large homogeneous CDMA networksMobile Networks and Applications20049660561710.1023/b:mone.0000042499.64488.ba2-s2.0-4944257700
8.
ChanC. C.HanlyS. V.Calculating the outage probability in a CDMA network with spatial Poisson trafficIEEE Transactions on Vehicular Technology200150118320410.1109/25.9179182-s2.0-0035039149
9.
BaccelliF.BaszczyszynB.TournoisF.Downlink admission/congestion control and maximal load in CDMA networks1Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (IEEE INFOCOM ‘03)March 200372373310.1109/INFCOM.2003.1208722
10.
YangX.PetropuluA. P.Co-channel interference modeling and analysis in a Poisson field of interferers in wireless communicationsIEEE Transactions on Signal Processing2003511647610.1109/tsp.2002.806591MR19560932-s2.0-0037235245
11.
PintoP. C.GiorgettiA.WinM. Z.ChianiM.A stochastic geometry approach to coexistence in heterogeneous wireless networksIEEE Journal on Selected Areas in Communications20092771268128210.1109/JSAC.2009.0909222-s2.0-77954716898
12.
NguyenT. V.BaccelliF.A stochastic geometry model for cognitive radio networksThe Computer Journal201255553455210.1093/comjnl/bxr0492-s2.0-84860663924
13.
YinC.GaoL.CuiS.Scaling laws for overlaid wireless networks: a cognitive radio network versus a primary networkIEEE/ACM Transactions on Networking20101841317132910.1109/tnet.2010.20414672-s2.0-77955770431
14.
BabaeiA.JabbariB.Throughput optimization in cognitive random wireless ad hoc networksProceedings of the 53rd IEEE Global Communications Conference (GLOBECOM ‘10)December 2010Miami, Fla, USA1510.1109/glocom.2010.56840662-s2.0-79551622955
15.
RenW.ZhaoQ.SwamiA.Power control in cognitive radio networks: how to cross a multi-lane highwayIEEE Journal on Selected Areas in Communications20092771283129610.1109/jsac.2009.0909232-s2.0-77953297492
16.
GhasemiA.SousaE. S.Interference aggregation in spectrum-sensing cognitive wireless networksIEEE Journal on Selected Topics in Signal Processing200821415610.1109/JSTSP.2007.9148972-s2.0-40849111506
17.
ChandrasekharV.AndrewsJ. G.Uplink capacity and interference avoidance for two-tier femtocell networksIEEE Transactions on Wireless Communications2009873498350910.1109/TWC.2009.0704752-s2.0-70350611340
18.
ZhangJ.AndrewsJ. G.Distributed antenna systems with randomnessIEEE Transactions on Wireless Communications2008793636364610.1109/TWC.2008.0704252-s2.0-52349119273
19.
DousseO.FranceschettiM.ThiranP.On the throughput scaling of wireless relay networksIEEE Transactions on Information Theory20065262756276110.1109/tit.2006.874537MR22385582-s2.0-33745179499
20.
HaenggiM.AndrewsJ. G.BaccelliF.DousseO.FranceschettiM.Stochastic geometry and random graphs for the analysis and design of wireless networksIEEE Journal on Selected Areas in Communications20092771029104610.1109/JSAC.2009.0909022-s2.0-79957978453
21.
BaccelliF.BlaszczyszynB.Stochastic Geometry and Wireless Networks, Volume I-Theory, Foundation and Trends in Networking2009NoW Publishers
22.
NHTSA ReportVehicle safety communications projectFinal Report2005DOT HS 809 859US Department of Transportation
23.
TseD.ViswanathP.Fundamentals of Wireless Communication2005Cambridge, Mass, USACambridge University Press10.1017/cbo9780511807213
24.
BaccelliF.BlaszczyszynB.Stochastic Geometry and Wireless Networks, Volume II—Applications, Foundation and Trends in Networking2009Norwell, Mass, USANow Publishers
25.
BłaszczyszynB.LaouitiA.MühlethalerP.ToorY.Comparison for VANETs: conventional routing vs an advanced opportunistic routing scheme using active signalingProceedings of the 8th International Conference on Intelligent Transport System Telecommunications (ITST ‘08)October 200828829310.1109/itst.2008.47402732-s2.0-62949132356