-
A Data Propagation Model for Wireless Gossi**
Authors:
Thomas M. M. Meyfroyt,
Sem C. Borst,
Onno J. Boxma,
Dee Denteneer
Abstract:
Wireless sensor networks require communication protocols for efficiently propagating data in a distributed fashion. The Trickle algorithm is a popular protocol serving as the basis for many of the current standard communication protocols. In this paper we develop a mathematical model describing how Trickle propagates new data across a network consisting of nodes placed on a line. The model is anal…
▽ More
Wireless sensor networks require communication protocols for efficiently propagating data in a distributed fashion. The Trickle algorithm is a popular protocol serving as the basis for many of the current standard communication protocols. In this paper we develop a mathematical model describing how Trickle propagates new data across a network consisting of nodes placed on a line. The model is analyzed and asymptotic results on the hop count and end-to-end delay distributions in terms of the Trickle parameters and network density are given. Additionally, we show that by only a small modification of the Trickle algorithm the expected end-to-end delay can be greatly decreased. Lastly, we demonstrate how one can derive the exact hop count and end-to-end delay distributions for small network sizes.
△ Less
Submitted 4 November, 2014; v1 submitted 23 July, 2014;
originally announced July 2014.
-
Data Dissemination Performance in Large-Scale Sensor Networks
Authors:
Thomas M. M. Meyfroyt,
Sem C. Borst,
Onno J. Boxma,
Dee Denteneer
Abstract:
As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular…
▽ More
As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period. This generalization proves to be useful for optimizing the design and usage of the algorithm. For single-cell networks we show how the message count increases with the size of the network and how this depends on the Trickle parameters. Furthermore, we derive distributions of inter-broadcasting times and investigate their asymptotic behavior. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Additionally, we develop an approximation for the expected number of transmissions in multi-cell networks. All results are validated by simulations.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Slow transitions, slow mixing and starvation in dense random-access networks
Authors:
Alessandro Zocca,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We consider dense wireless random-access networks, modeled as systems of particles with hard-core interaction. The particles represent the network users that try to become active after an exponential back-off time, and stay active for an exponential transmission time. Due to wireless interference, active users prevent other nearby users from simultaneous activity, which we describe as hard-core in…
▽ More
We consider dense wireless random-access networks, modeled as systems of particles with hard-core interaction. The particles represent the network users that try to become active after an exponential back-off time, and stay active for an exponential transmission time. Due to wireless interference, active users prevent other nearby users from simultaneous activity, which we describe as hard-core interaction on a conflict graph. We show that dense networks with aggressive back-off schemes lead to extremely slow transitions between dominant states, and inevitably cause long mixing times and starvation effects.
△ Less
Submitted 13 March, 2014;
originally announced March 2014.
-
Delay performance in random-access grid networks
Authors:
Alessandro Zocca,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Francesca R. Nardi
Abstract:
We examine the impact of torpid mixing and meta-stability issues on the delay performance in wireless random-access networks. Focusing on regular meshes as prototypical scenarios, we show that the mean delays in an $L\times L$ toric grid with normalized load $ρ$ are of the order $(\frac{1}{1-ρ})^L$. This superlinear delay scaling is to be contrasted with the usual linear growth of the order…
▽ More
We examine the impact of torpid mixing and meta-stability issues on the delay performance in wireless random-access networks. Focusing on regular meshes as prototypical scenarios, we show that the mean delays in an $L\times L$ toric grid with normalized load $ρ$ are of the order $(\frac{1}{1-ρ})^L$. This superlinear delay scaling is to be contrasted with the usual linear growth of the order $\frac{1}{1-ρ}$ in conventional queueing networks. The intuitive explanation for the poor delay characteristics is that (i) high load requires a high activity factor, (ii) a high activity factor implies extremely slow transitions between dominant activity states, and (iii) slow transitions cause starvation and hence excessively long queues and delays. Our proof method combines both renewal and conductance arguments. A critical ingredient in quantifying the long transition times is the derivation of the communication height of the uniformized Markov chain associated with the activity process. We also discuss connections with Glauber dynamics, conductance and mixing times. Our proof framework can be applied to other topologies as well, and is also relevant for the hard-core model in statistical physics and the sampling from independent sets using single-site update Markov chains.
△ Less
Submitted 5 July, 2013;
originally announced July 2013.
-
Delay Performance and Mixing Times in Random-Access Networks
Authors:
Niek Bouman,
Sem Borst,
Johan van Leeuwaarden
Abstract:
We explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules for which throughput opti…
▽ More
We explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules for which throughput optimality has been established, may however yield excessive queues and delays.
Motivated by that issue, we examine whether the poor delay performance is inherent to the basic operation of these schemes, or caused by the specific kind of activation rules. We derive delay lower bounds for queue-based activation rules, which offer fundamental insight in the cause of the excessive delays. For fixed activation rates we obtain lower bounds indicating that delays and mixing times can grow dramatically with the load in certain topologies as well.
△ Less
Submitted 16 May, 2013;
originally announced May 2013.
-
Queue-Based Random-Access Algorithms: Fluid Limits and Stability Issues
Authors:
Javad Ghaderi,
Sem Borst,
Phil Whiting
Abstract:
We use fluid limits to explore the (in)stability properties of wireless networks with queue-based random-access algorithms. Queue-based random-access schemes are simple and inherently distributed in nature, yet provide the capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. Unfortunately, the type of activation rules for which t…
▽ More
We use fluid limits to explore the (in)stability properties of wireless networks with queue-based random-access algorithms. Queue-based random-access schemes are simple and inherently distributed in nature, yet provide the capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. Unfortunately, the type of activation rules for which throughput optimality has been established, may result in excessive queue lengths and delays. The use of more aggressive/persistent access schemes can improve the delay performance, but does not offer any universal maximum-stability guarantees. In order to gain qualitative insight and investigate the (in)stability properties of more aggressive/persistent activation rules, we examine fluid limits where the dynamics are scaled in space and time. In some situations, the fluid limits have smooth deterministic features and maximum stability is maintained, while in other scenarios they exhibit random oscillatory characteristics, giving rise to major technical challenges. In the latter regime, more aggressive access schemes continue to provide maximum stability in some networks, but may cause instability in others. Simulation experiments are conducted to illustrate and validate the analytical results.
△ Less
Submitted 24 February, 2013;
originally announced February 2013.
-
Queues with random back-offs
Authors:
Niek Bouman,
Sem C. Borst,
Onno J. Boxma,
Johan S. H. van Leeuwaarden
Abstract:
We consider a broad class of queueing models with random state-dependent vacation periods, which arise in the analysis of queue-based back-off algorithms in wireless random-access networks. In contrast to conventional models, the vacation periods may be initiated after each service completion, and can be randomly terminated with certain probabilities that depend on the queue length. We examine the…
▽ More
We consider a broad class of queueing models with random state-dependent vacation periods, which arise in the analysis of queue-based back-off algorithms in wireless random-access networks. In contrast to conventional models, the vacation periods may be initiated after each service completion, and can be randomly terminated with certain probabilities that depend on the queue length. We examine the scaled queue length and delay in a heavy-traffic regime, and demonstrate a sharp trichotomy, depending on how the activation rate and vacation probability behave as function of the queue length. In particular, the effect of the vacation periods may either (i) completely vanish in heavy-traffic conditions, (ii) contribute an additional term to the queue lengths and delays of similar magnitude, or even (iii) give rise to an order-of-magnitude increase. The heavy-traffic asymptotics are obtained by combining stochastic lower and upper bounds with exact results for some specific cases. The heavy-traffic trichotomy provides valuable insight in the impact of the back-off algorithms on the delay performance in wireless random-access networks.
△ Less
Submitted 13 February, 2013;
originally announced February 2013.
-
Lingering Issues in Distributed Scheduling
Authors:
Florian Simatos,
Niek Bouman,
Sem Borst
Abstract:
Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fashion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the "cautious" activation rules involved in establishing throughput optimality tend to produce extremely large delays, typically growing…
▽ More
Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fashion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the "cautious" activation rules involved in establishing throughput optimality tend to produce extremely large delays, typically growing exponentially in 1/(1-r), with r the load of the system, in contrast to the usual linear growth.
Motivated by that issue, we explore to what extent more "aggressive" schemes can improve the delay performance. Our main finding is that aggressive activation rules induce a lingering effect, where individual nodes retain possession of a shared resource for excessive lengths of time even while a majority of other nodes idle. Using central limit theorem type arguments, we prove that the idleness induced by the lingering effect may cause the delays to grow with 1/(1-r) at a quadratic rate. To the best of our knowledge, these are the first mathematical results illuminating the lingering effect and quantifying the performance impact.
In addition extensive simulation experiments are conducted to illustrate and validate the various analytical results.
△ Less
Submitted 23 May, 2013; v1 submitted 12 February, 2013;
originally announced February 2013.
-
Achievable Performance in Product-Form Networks
Authors:
Jaron Sanders,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We characterize the achievable range of performance measures in product-form networks where one or more system parameters can be freely set by a network operator. Given a product-form network and a set of configurable parameters, we identify which performance measures can be controlled and which target values can be attained. We also discuss an online optimization algorithm, which allows a network…
▽ More
We characterize the achievable range of performance measures in product-form networks where one or more system parameters can be freely set by a network operator. Given a product-form network and a set of configurable parameters, we identify which performance measures can be controlled and which target values can be attained. We also discuss an online optimization algorithm, which allows a network operator to set the system parameters so as to achieve target performance metrics. In some cases, the algorithm can be implemented in a distributed fashion, of which we give several examples. Finally, we give conditions that guarantee convergence of the algorithm, under the assumption that the target performance metrics are within the achievable range.
△ Less
Submitted 6 November, 2012;
originally announced November 2012.
-
Mixing Properties of CSMA Networks on Partite Graphs
Authors:
Alessandro Zocca,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We consider a stylized stochastic model for a wireless CSMA network. Experimental results in prior studies indicate that the model provides remarkably accurate throughput estimates for IEEE 802.11 systems. In particular, the model offers an explanation for the severe spatial unfairness in throughputs observed in such networks with asymmetric interference conditions. Even in symmetric scenarios, ho…
▽ More
We consider a stylized stochastic model for a wireless CSMA network. Experimental results in prior studies indicate that the model provides remarkably accurate throughput estimates for IEEE 802.11 systems. In particular, the model offers an explanation for the severe spatial unfairness in throughputs observed in such networks with asymmetric interference conditions. Even in symmetric scenarios, however, it may take a long time for the activity process to move between dominant states, giving rise to potential starvation issues. In order to gain insight in the transient throughput characteristics and associated starvation effects, we examine in the present paper the behavior of the transition time between dominant activity states. We focus on partite interference graphs, and establish how the magnitude of the transition time scales with the activation rate and the sizes of the various network components. We also prove that in several cases the scaled transition time has an asymptotically exponential distribution as the activation rate grows large, and point out interesting connections with related exponentiality results for rare events and meta-stability phenomena in statistical physics. In addition, we investigate the convergence rate to equilibrium of the activity process in terms of mixing times.
△ Less
Submitted 13 September, 2012;
originally announced September 2012.
-
Online Optimization of Product-Form Networks
Authors:
Jaron Sanders,
Sem C. Borst,
Johan S. H. van Leeuwaarden
Abstract:
We develop an online gradient algorithm for optimizing the performance of product-form networks through online adjustment of control parameters. The use of standard algorithms for finding optimal parameter settings is hampered by the prohibitive computational burden of calculating the gradient in terms of the stationary probabilities. The proposed approach instead relies on measuring empirical fre…
▽ More
We develop an online gradient algorithm for optimizing the performance of product-form networks through online adjustment of control parameters. The use of standard algorithms for finding optimal parameter settings is hampered by the prohibitive computational burden of calculating the gradient in terms of the stationary probabilities. The proposed approach instead relies on measuring empirical frequencies of the various states through simulation or online operation so as to obtain estimates for the gradient. Besides the reduction in computational effort, a further benefit of the online operation lies in the natural adaptation to slow variations in ambient parameters as commonly occurring in dynamic environments. On the downside, the measurements result in inherently noisy and biased estimates. We exploit mixing time results in order to overcome the impact of the bias and establish sufficient conditions for convergence to a globally optimal solution.
△ Less
Submitted 30 August, 2012;
originally announced August 2012.
-
A stochastic network with mobile users in heavy traffic
Authors:
Sem Borst,
Florian Simatos
Abstract:
We consider a stochastic network with mobile users in a heavy-traffic regime. We derive the scaling limit of the multi-dimensional queue length process and prove a form of spatial state space collapse. The proof exploits a recent result by Lambert and Simatos which provides a general principle to establish scaling limits of regenerative processes based on the convergence of their excursions. We al…
▽ More
We consider a stochastic network with mobile users in a heavy-traffic regime. We derive the scaling limit of the multi-dimensional queue length process and prove a form of spatial state space collapse. The proof exploits a recent result by Lambert and Simatos which provides a general principle to establish scaling limits of regenerative processes based on the convergence of their excursions. We also prove weak convergence of the sequences of stationary joint queue length distributions and stationary sojourn times.
△ Less
Submitted 23 May, 2013; v1 submitted 13 February, 2012;
originally announced February 2012.
-
Network iso-elasticity and weighted $α$-fairness
Authors:
S. C. Borst,
N. S. Walton,
A. P. Zwart
Abstract:
When a communication network's capacity increases, it is natural to want the bandwidth allocated to increase to exploit this capacity. But, if the same relative capacity increase occurs at each network resource, it is also natural to want each user to see the same relative benefit, so the bandwidth allocated to each route should remain proportional. We will be interested in bandwidth allocations w…
▽ More
When a communication network's capacity increases, it is natural to want the bandwidth allocated to increase to exploit this capacity. But, if the same relative capacity increase occurs at each network resource, it is also natural to want each user to see the same relative benefit, so the bandwidth allocated to each route should remain proportional. We will be interested in bandwidth allocations which scale in this \textit{iso-elastic} manner and, also, maximize a utility function.
Utility optimizing bandwidth allocations have been frequently studied, and a popular choice of utility function are the weighted $α$-fair utility functions introduced by Mo and Walrand \cite{MoWa00}. Because weighted $α$-fair utility functions possess this iso-elastic property, they are frequently used to form fluid models of bandwidth sharing networks. In this paper, we present results that show, in many settings, the only utility functions which are iso-elastic are weighted $α$-fair utility functions.
Thus, if bandwidth is allocated according to a network utility function which scales with relative network changes then that utility function must be a weighted $α$-fair utility function, and hence, a control protocol that is robust to the future relative changes in network capacity and usage ought to allocate bandwidth inorder to maximize a weighted $α$-fair utility function.
△ Less
Submitted 11 January, 2012;
originally announced January 2012.
-
Stability of Random Admissible-Set Scheduling in Spatially Continuous Wireless Systems
Authors:
Niek Bouman,
Sem Borst,
Johan van Leeuwaarden
Abstract:
We examine the stability of wireless networks whose users are distributed over a compact space. A subset of users is called {\it admissible} when their simultaneous activity obeys the prevailing interference constraints and, in each time slot, an admissible subset of users is selected uniformly at random to transmit one packet. We show that, under a mild condition, this random admissible-set sched…
▽ More
We examine the stability of wireless networks whose users are distributed over a compact space. A subset of users is called {\it admissible} when their simultaneous activity obeys the prevailing interference constraints and, in each time slot, an admissible subset of users is selected uniformly at random to transmit one packet. We show that, under a mild condition, this random admissible-set scheduling mechanism achieves maximum stability in a broad set of scenarios, and in particular in symmetric cases. The proof relies on a description of the system as a measure-valued process and the identification of a Lyapunov function.
△ Less
Submitted 4 September, 2013; v1 submitted 15 December, 2010;
originally announced December 2010.
-
Stability of parallel queueing systems with coupled service rates
Authors:
Sem Borst,
Matthieu Jonckheere,
Lasse Leskelä
Abstract:
This paper considers a parallel system of queues fed by independent arrival streams, where the service rate of each queue depends on the number of customers in all of the queues. Necessary and sufficient conditions for the stability of the system are derived, based on stochastic monotonicity and marginal drift properties of multiclass birth and death processes. These conditions yield a sharp cha…
▽ More
This paper considers a parallel system of queues fed by independent arrival streams, where the service rate of each queue depends on the number of customers in all of the queues. Necessary and sufficient conditions for the stability of the system are derived, based on stochastic monotonicity and marginal drift properties of multiclass birth and death processes. These conditions yield a sharp characterization of stability for systems, where the service rate of each queue is decreasing in the number of customers in other queues, and has uniform limits as the queue lengths tend to infinity. The results are illustrated with applications where the stability region may be nonconvex.
△ Less
Submitted 10 January, 2010;
originally announced January 2010.
-
Subexponential asymptotics of hybrid fluid and ruin models
Authors:
Bert Zwart,
Sem Borst,
Krzystof Debicki
Abstract:
We investigate the tail asymptotics of the supremum of X(t)+Y(t)-ct, where X={X(t),t\geq 0} and Y={Y(t),t\geq 0} are two independent stochastic processes. We assume that the process Y has subexponential characteristics and that the process X is more regular in a certain sense than Y. A key issue examined in earlier studies is under what conditions the process X contributes to large values of the…
▽ More
We investigate the tail asymptotics of the supremum of X(t)+Y(t)-ct, where X={X(t),t\geq 0} and Y={Y(t),t\geq 0} are two independent stochastic processes. We assume that the process Y has subexponential characteristics and that the process X is more regular in a certain sense than Y. A key issue examined in earlier studies is under what conditions the process X contributes to large values of the supremum only through its average behavior. The present paper studies various scenarios where the latter is not the case, and the process X shows some form of ``atypical'' behavior as well. In particular, we consider a fluid model fed by a Gaussian process X and an (integrated) On-Off process Y. We show that, depending on the model parameters, the Gaussian process may contribute to the tail asymptotics by its moderate deviations, large deviations, or oscillatory behavior.
△ Less
Submitted 23 March, 2005;
originally announced March 2005.
-
Exact asymptotics for fluid queues fed by multiple heavy-tailed on-off flows
Authors:
Bert Zwart,
Sem Borst,
Michel Mandjes
Abstract:
We consider a fluid queue fed by multiple On-Off flows with heavy-tailed
(regularly varying) On periods. Under fairly mild assumptions, we prove that the workload distribution is asymptotically equivalent to that in a reduced system. The reduced system consists of a ``dominant'' subset of the flows, with the original service rate subtracted by the mean rate of the other flows. We describe how a…
▽ More
We consider a fluid queue fed by multiple On-Off flows with heavy-tailed
(regularly varying) On periods. Under fairly mild assumptions, we prove that the workload distribution is asymptotically equivalent to that in a reduced system. The reduced system consists of a ``dominant'' subset of the flows, with the original service rate subtracted by the mean rate of the other flows. We describe how a dominant set may be determined from a simple knapsack formulation. The dominant set consists of a ``minimally critical'' set of On-Off flows with regularly varying On periods. In case the dominant set contains just a single On-Off flow, the exact asymptotics for the reduced system follow from known results. For the case of several
On-Off flows, we exploit a powerful intuitive argument to obtain the exact asymptotics. Combined with the reduced-load equivalence, the results for the reduced system provide a characterization of the tail of the workload distribution for a wide range of traffic scenarios.
△ Less
Submitted 9 June, 2004;
originally announced June 2004.