• Aucun résultat trouvé

Theoretical results on flooding performance in mobile ad hoc networks

N/A
N/A
Protected

Academic year: 2021

Partager "Theoretical results on flooding performance in mobile ad hoc networks"

Copied!
11
0
0

Texte intégral

(1)

HAL Id: inria-00130586

https://hal.inria.fr/inria-00130586v2

Submitted on 23 Feb 2007

HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Theoretical results on flooding performance in mobile ad hoc networks

Philippe Jacquet

To cite this version:

Philippe Jacquet. Theoretical results on flooding performance in mobile ad hoc networks. [Research Report] RR-6122, INRIA. 2007, pp.10. �inria-00130586v2�

(2)

a p p o r t

d e r e c h e r c h e

ISSN0249-6399ISRNINRIA/RR--6122--FR+ENG

Thème COM

INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE

Theoretical results on flooding performance in mobile ad hoc networks

Philippe Jacquet

N° 6122

February 2007

(3)
(4)

Unité de recherche INRIA Rocquencourt

Domaine de Voluceau, Rocquencourt, BP 105, 78153 Le Chesnay Cedex (France)

Téléphone : +33 1 39 63 55 11 — Télécopie : +33 1 39 63 53 30

Theoretical results on flooding performance in mobile ad hoc networks

Philippe Jacquet

Th`eme COM — Syst`emes communicants Projets Hipercom

Rapport de recherche n°6122 — February 2007 — 7 pages

Abstract: We investigate the performance of flooding in mobile ad hoc networks when the relay set is a set of nodes uniformly dispatched with densityD. We give some bounds on the conditions under which a flooding will actually spread (or percolates) when the relay set density is above a certain threshold that depends on traffic density.

Key-words: wireless mesh networks, flooding, access points, performance and models

(5)

esultats th´eoriques sur les performances des inondations dans les r´eseaux mobiles ad hoc

esum´e : Nous nous int´eressons aux performances de l’inondation dans les r´eseaux mo- bilesad hoc quand l’ensemble des postes relais est uniform´ement distribu´e avec densit´eD.

Nous donnons des bornes th´eoriques sur les conditions pour que l’inondation se propage (ou percole) quand la densit´e des relais est au dessus d’un seuil qui d´epend dela densit´e de trafic.

Mots-cl´es : r´eseaux sans fil maill´es, inondation, points d’acc`es, performances et mod`eles

(6)

Theoretical flooding performance 3

1 Introduction

We investigate the performance of flooding in mobile ad hoc networks when the relay set is a set of nodes uniformly dispatched with densityD. In [2] it has been shown that a flooding broadcast actually spread on the whole network when certain conditions are met, called the percolation point. In this paper we give some bounds on the percolation point in some rrealistic wireless networks. In particular we show that the relay set density can be made small so that some nodes may not be connected via unicast links to the relay node, but they can actually receive the broadcast via other nodes than neighbors. This comes from the fact that non neighbor nodes can receive packets from each other but with a success rate that would be acceptable for unicast routing. Therefore the neighbor radius that make optimal routing is in fact much smaller than the radius between relay set that would make the flooding percolating.

2 Preliminary results

2.1 Network and traffic model

The model is a network made of N mobile nodes on a large map of area A uniformly distributed with constant densityν = NA. We take a slotted time model and a network on an infinite map. We assume that at each slot the density of transmitters is constant and uniform ofλper square unit with a Poisson distribution. Therefore the per node node traffic transmission isρ= λν.

We assume that the attenuation coefficient isα >2, for instance wave propagation theory shows thatα= 4. We know [1, 3] that the Laplace transform of the signal levelS(assuming all transmitter emitting at unit nominal power) isw(θ) =E(e) and

w(θ) = exp(λπΓ(1 2

αα2) (1)

If we assume that the signal can be altered by a random fading factor exp(F) then the factor Γ(11α) is to be simply replaced by Γ(1α1)E(eα2F).

Taking w(θ) = eλCθγ with γ = α2, we get, via thorough computations we get the following expansion:

P(S < x) =X

n0

(Cλ)nsin(πnγ)

π Γ(nγ)x.

2.2 Unicast transmission optimization

If we assume that a packet is correctly received when the Signal over Noise Ratio is above a certain thresholdK, for instance we will takeK= 4 then one can evaluate the probability p(r, λ) of correctly receiving a packet at distancerof the emitter. From easy scaling property

RR n°6122

(7)

4 P. Jacquet

we have p(r, λ) = p(r

λ,1). A failed packet will need to be retransmitted therefore a transmission at distancermust be transmitted in average p(r,λ)1 times. It turns out that the optimal hop lengthrit the one that minimizes the global number of retransmissions: rp(r,λ) , i.e. that maximizesrp(r, λ). The optimal value isr= r0

λ wherer0 maximizesrp(r,1). We denoteσ0=πr20 then the area of optimal neighborhood that needs to be managed by every node is σλ0.

In the paper we will assume that α = 4 and K = 4 which leads to σ0 0.181 and p00.653.

When a nodeA has packets to send to node B at distance L r0λ (we consider that node density and traffic density are both large), the optimal route will be made ofLr0λ relay nodes regularily spaced on a strait lines between A and B. Therefore the packet will be repeated in an average of r0Lp0 times.

3 Flooding optimization

Our main goal mis to have single source and all nodes in the network as potential receivers.

3.1 Flooding model protocol

We assume that the relay set M is a random set of nodes with density D. For example nodes select themselves to be in the relay set with probability Dν.

A node A which have a broadcast packet to transmit broadcasts it to its neighbors.

When a node belonging to the relay set M receives such broadcast packet, it retransmits it after a random jitter (in order to avoid collision with other relay nodes). Our aim is to analyze the performance of such a simple scheme.

3.2 Performance of flooding

Let assume that every relay node receives the broadcast with probability q. Since the transmissions are done under jitter we can consider that retransmissions occur at different time. Therefore a nodeB will retransmit the broadcast packet with probability Dqν which the combination of the probability to be in the relay set and the probability to have received the packet from other members of the relay set. An external nodeAwill receive it fromB with probabilityp(|AB|, λ) where|AB|is the distance betweenAandB. Our aim to compute the average number of reception of the broadcast packet by nodeA.

Every portion of areadAat distancerwill contribute a correct transmissiom to nodeA with probabilityp(r, λ)Dq. Therefore the average number of correct reception by nodeAis given by 2πDqR

0 p(r, λ)rdr. This quantity is equal toqDλσ1 with σ1 = 2πR

0 p(r,1)rdr.

Thorough computations gives σ1 = sin(πγ)πγ KγΓ(1

2 α)

C with γ = α2. In absence of fading term we simply haveσ1= sin(πγ)πγ K−γ. Withα= 4 andK= 4 we getσ1=π1 0.31831.

INRIA

(8)

Theoretical flooding performance 5

Figure 1: succesful reception probabilityqI with respect to relay set densityD (expressed in σλ1 unit).

Computing the average number of succesful reception of the broadcast gives the obvious upper bound: P(Areceives the packet)Dqσλ1.

When the flooding percolates, i.e. when it uniformly spread in the network, all nodes will get the same probability of correct reception. Therefore in percolation condition we will haveP(Areceives the packet) =qand the inequality

qDqσ1

λ

Therefore the percolation condition implies that Dλ σ1. In passing we see that the lower bound for percolating flooding is a density of one relay node per σλ1 which is larger than the neighbor area σλ0. Therefore there can be nodes which have no neighbor in the relay set (but nevertheless can be reached from further nodes).

3.3 Refined flooding performance

Since radio signal naturally spread the correct reception of a packet are positively correlated between nodes (on the same ground, the uncorrect reception of a packet are also positively correlated). In other words when the nodes of the relay set which have received correctly the packet are in statistic more grouped than they would be as if they were receiving it independently. This suggests (but this will not be justified in detail in the present paper) that the probability of uncorrect reception of the packet by nodeAis in fact greater than it would be in the hypothesis that relay nodes would have received the packet independently. In the independence hypothesis, the number of correct reception would be a Poisson distribution of mean Dλ1 and therefore 1P(Areceives the packet) exp(Dλ1). In percolating condtion this yields:

1qexp(D λ1)

Equating the above inequality will yield a fixed point value qI which is actually an upper bound of the actual valueq: qI q with 1qI = exp(DλqIσ1) (or more rigorously

D

λσ1 = log(1qIqI)). Figure 1 displays quantity qI with respect to relay node density D (expressed in σλ1 unit).

In the same hypothesis qIDλ is also an actual upper bound of the number of correct reception of the broadcast packet by an arbitrary node. The figure 2 displays this average number of actual reception with respect to relay set densityD, this time the density D is expressed with respect to σλ0 unit, the inverse of the average neighbor area. Notice that the average number of reception reach more than 1 even whenD <σλ

0.

RR n°6122

(9)

6 P. Jacquet

Figure 2: average number of correct reception in independence hypothesis with respect to relay node densityD (expressed in inverse of average area σλ0 unit).

References

[1] P. Jacquet, “El´ement de th´eorie analytique de l’information, mod´elisation et ´evaluation de performances,” INRIA Research Report RR-3505, http://www.inria.fr/rrrt/rr- 3505.html, 1998.

[2] O. Dousse, F. Baccelli, P. Thiran, Impact of interferences on connectivity in ad hoc networks,IEEE/ACM Transactions on Networking (TON) archive Volume 13 , Issue 2 (April 2005)

[3] P. Jacquet, Control of mobile ad hoc networks, ITW 2006, Uruguay, 2006.

Appendix

Computation ofσ1. We use the identity p(r, λ) =P(S < Kr1α) By integration by part:

λσ1=πα Z

0

P(W = 1 Krα) r

Krαdr We use the fact thatP(W =x) = 2iπ1 R

Cw(θ)eθxdθ, whereC is an integration path in the definition domain of w(θ), i.e. with Re(θ) >0parallel to the imaginary axis. We get by changing variablex= (Krα)1and inverting integrations (γ= α2).

σ1

λ = 1

2i Z

C

w(θ) Z

0

eθx(Kx)−γdx

= 1

2iK−γΓ(1γ) Z

C

w(θ)(θ)γ−1

We usew(θ) = exp(λAθγ) and now deforming the integration path to stick to the negative axis:

σ1

λ = eiπγeiπγ

2i KγΓ(1γ) Z

0

exp(λCθγγ1

= sin(πγ)K−γΓ(1γ) λCγ Thereforeσ1=sin(πγ)πγ Kγ.

INRIA

(10)

Theoretical flooding performance 7

Computation of function Ψ(y) = 2πR

P(W < Kr1α)reyπr2dr.

By integration by part we get Ψ(y) = α

y Z

P(W = 1 Krα) 1

Krα+1(1eyπr2)dr Using change of variablex= (Krα)1:

Ψ(y) = 1 y

Z

P(W =x)(1eyπ(Kx)−γ)dx

= 1

2iπy Z

C

w(θ)dθ Z

eθx(1exp(yπ(Kx)−γ))dx Using 1exp(yπ(Kx)γ) =P

n>0(yπKγ)n xn!n, we get Ψ(y) = 1

2iπy X

n>0

(yπKγ)nΓ(1nγ) n!

Z

C

w(θ)(θ)1

Usingw(θ) =eγ: Ψ(y) = 1

2iπy X

n>0

(yπKγ)nΓ(1nγ)

n! (eiπnγeiπnγ)C−n(n1)!

γ

= X

n>0

(πKγ

C )nΓ(1nγ)sin(nπγ) nπγ yn−1 Without fading it comes: Ψ(y) = P

n>0(Γ(1K−γ−γ))nΓ(1nγ)sin(nπγ)nπγ yn1. Notice that Ψ(y) =σ1(Γ(1K−γγ))2Γ(12γ)sin(2γπ)2πγ y+O(y2).

RR n°6122

(11)

Unité de recherche INRIA Rocquencourt

Domaine de Voluceau - Rocquencourt - BP 105 - 78153 Le Chesnay Cedex (France)

Unité de recherche INRIA Futurs : Parc Club Orsay Université - ZAC des Vignes 4, rue Jacques Monod - 91893 ORSAY Cedex (France)

Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois - Campus scientifique 615, rue du Jardin Botanique - BP 101 - 54602 Villers-lès-Nancy Cedex (France)

Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l’Europe - 38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Sophia Antipolis : 2004, route des Lucioles - BP 93 - 06902 Sophia Antipolis Cedex (France)

Éditeur

INRIA - Domaine de Voluceau - Rocquencourt, BP 105 - 78153 Le Chesnay Cedex (France)

http://www.inria.fr

ISSN 0249-6399

Références

Documents relatifs

The results obtained with the game theoretic approach presented in this section shows that if the security mechanism used to enforce cooperation between the nodes of a mobile ad

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Reverse Path Forwarding Flooding [4] (RPF) augments the mechanism of CF by the requirement that a node may only forward a packet if the “previous hop” of the packet is on the

We namely present multi- point relay (MPR) flooding and gateway flooding. We investigate the matter theoretically via mathematical modelling, as well as practically via simulations.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non,. Performance Analysis of

Moreover, even if it was possible to measure in real time the FER or another quantity reflecting the link quality, these metrics have to be announced by the routing protocols

In this paper we propose two methods to evaluate the effectiveness of the CORE mechanism based on a cooperative game approach and a non-cooperative game approach: the results

However it is possible to compute probability density function of the nodes moving according to random waypoint mobility model within an environment closed, bounded, limited and