Analytical Modeling and Performance Analysis of Flooding in CSMA-Based Wireless Networks

被引:10
作者
Shah-Mansouri, Hamed [1 ,2 ]
Pakravan, Mohammad Reza [1 ,2 ]
Khalaj, Babak Hossein [1 ,2 ]
机构
[1] Sharif Univ Technol, ACRI, Tehran 113659363, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran 113659363, Iran
基金
美国国家科学基金会;
关键词
Flooding; marked point process; network coverage; probabilistic flooding; wireless network; CAPACITY;
D O I
10.1109/TVT.2010.2093548
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although different broadcasting techniques are widely deployed in wireless networks, there are limited comprehensive analytical frameworks to evaluate the performance of such schemes. In this paper, based on a rigorous theoretical analysis, upper bounds on the network coverage and the total number of transmissions (corresponding to network energy consumption) of flooding and its popular variant probabilistic flooding are derived. The analysis is performed for a static multihop ad hoc wireless network when the network is in saturated condition. To consider a realistic medium-access control (MAC) layer algorithm, successful signal reception is based on the protocol model, and nodes employ carrier-sense multiple access. Based on the concept of marked point process, two different approaches, i.e., hop based and time based, are proposed. In the hop-based approach, an upper bound on network coverage and energy consumption is derived for any serving policy and queuing delay that broadcasted packets experience. This approach can be easily extended to multiple-source scenarios. The time-based approach is appropriate for the case of known service policy and queuing delay, and it predicts the time-domain behavior of the broadcasting schemes, as well as other mentioned parameters. We show that the two bounds are very close to each other. The first approach has less complexity, whereas the second approach provides a tighter bound. As an interesting result, we analytically demonstrate that the disjoint analysis of MAC and network layers provides a much simpler solution, whereas the obtained results are also upper bounds on the network coverage. Simulation results validate our analytical model and demonstrate its tightness for real scenarios.
引用
收藏
页码:664 / 679
页数:16
相关论文
共 18 条