Abstract
As one of the most promising networking technologies, power-line communication (PLC) networks have been gradually used not only in home networking systems but also in industrial IoT (Internet of things). Current studies of PLC medium access control (MAC) protocol (i.e., IEEE 1901) only focus on the single-hop environment; however, in practical industrial IoT and home access communication systems, PLC networks generally utilize a multi-hop architecture. In addition, due to the difference in the MAC standard between 802 series and 1901, existing analytical models of multi-hop IEEE 802.11 wireless networks are not suitable for multi-hop IEEE 1901 PLC networks. In this paper, we propose a theoretical model for performance analysis of multi-hop IEEE 1901 PLC networks, where the impacts of traffic rate (containing relay traffic), buffer size, deferral counter process of 1901, hidden terminal problem and multi-hop environment are comprehensively considered. The modeling process is divided into two parts. In the local modeling part, we construct a brand-new Markov chain model to investigate the carrier sense multiple access with collision avoidance process of IEEE 1901 protocol under the multi-hop environment. In the coupling queueing modeling part, we employ queueing theory to analyze the packet transmission procedure between successive hops. On the basis, we derive the closed-form expressions of throughput, medium access delay, packet blocking probability, end-to-end successful transmission delay and goodput. Through extensive simulations, we verify that our theoretical model can accurately estimate the MAC performance of IEEE 1901 PLC networks in the multi-hop environment.
Similar content being viewed by others
Notes
The carrier sensing region is assumed to be of circle shape.
Although both 2-D DMC and ML DMC models can describe 1901’s CSMA/CA mechanism, the detailed mathematical description for CSMA/CA process of 1901 protocol in multi-hop environment is different from that in single-hop environment.
The complexity of a Markov chain model is determined by the size of its corresponding balance equations, i.e., the size of state space. It should be stressed that this definition is not equal to the computational complexity of algorithm.
1901 allows unlimited retransmission attempts.
This assumption relies on the fact that the 1901 standard does not use the request to send RTS frame, and the short inter-frame space SIFS is assumed to be zero.
In most network configurations, this probability is very small and negligible. Hence, we let it be zero so that we can derive the detailed expressions for \(T_s\) and \(T_c\).
\(Prb\{A\}\) denotes the probability that case A happens.
According to the 1901 standard, only the fully loaded station buffer can cause the drop packet problem.
We do not need to measure the end-to-end successful transmission delay \(Max\{T_{0H},T'_{0H}\}\), since there is a strict corresponding relation between G and \(Max\{T_{0H},T'_{0H}\}\).
Note that there is still a deviation between simulation results and numerical analysis results, since the DCP of 1901 can enhance the system jitter.
If a station triggers the DCP at backoff stage k, it has to jump to the next backoff stage (or reenters this backoff stage, if it is already at the last backoff stage).
References
Homeplug alliance (2016). www.homeplug.org. Accessed 12 June 2016
Faure JP, Allen JD et al (2010) IEEE standard for broadband over power line networks: medium access control and physical layer specifications. IEEE Std 1901–2010 10(2):1–1589
Zhu N, Diethe T, Camplani M et al (2015) Bridging e-health and the internet of things: the sphere project. IEEE Intell Syst 30(4):39–46
Sayed M, Tsiftsis TA, Al-Dhahir N (2017) On the diversity of hybrid narrowband-plc/wireless communications for smart grids. IEEE Trans Wirel Commun 16(17):4344–4360
Shlezinger N, Shaked R, Dabora R (2018) On the capacity of MIMO broadband power line communications channels. IEEE Trans Commun 66(10):4795–4810
Artale G, Cataliotti A, Cosentino V, Cara DD, Giovanni T (2018) A new low cost power line communication solution for smart grid monitoring and management. IEEE Instrum Meas Mag 21(2):29–33
Vlachou C, Banchs A, Herzen J, Thiran P (2014) Performance analysis of MAC for power-line communications. In: SIGMETRICS 2014. ACM, Austin, TX, USA, 16–20 June 2014, pp 585–586
Vlachou C, Banchs A, Herzen J, Thiran P (2014) Analyzing and boosting the performance of power-line communication networks. In: Proceedings of the 10th International on Conference on Emerging Networking Experiments and Technologies, CoNEXT 2014. ACM, Sydney, Australia, 2–5 Dec 2014, pp 1–12
Vlachou C, Banchs A, Herzen J, Thiran P (2014) On the MAC for power-line communications: modeling assumptions and performance tradeoffs. Semiotica 2007(166):97–104
Vlachou C, Banchs A, Salvador P (2016) Analysis and enhancement of CSMA/CA with deferral in power-line communications. IEEE J Sel Areas Commun 34(7):1978–1991
Vlachou C, Banchs A, Herzen J, Thiran P (2017) How CSMA/CA with deferral affects performance and dynamics in power-line communications. IEEE/ACM Trans Netw 25(1):250–263
Hao S, Zhang HY (2019) From homogeneous to heterogeneous: an analytical model for IEEE 1901 power line communication networks in unsaturated conditions. IEICE Trans Commun E102–B(8):1636–1648
Kang J, Kim Y, Kim K (2009) Hidden terminal of Korea Standard PLC protocol in access network. In: IEEE International Symposium on Power Line Communications and Its Applications 2009. IEEE, Dresden, Germany, 29 Mar–1 April 2009, pp 85–88
Dong LF, Shu YT, Chen HM, MA MD (2008) Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks. Sci China Ser F (Inf Sci) 51(4):408–416
Abreu T, Baynat B, Begin T, Guerin-Lassous I (2013) Hierarchical modeling of IEEE 802.11 multi-hop wireless networks. In: ACM International Conference on Modeling 2013. ACM, Barcelona, Spain, pp 143–150
Abreu T, Baynat B, Begin T, Nguyen N (2014) Modeling of IEEE 802.11 multi-hop wireless chains with hidden nodes. In: ACM International Conference on Modeling 2014. ACM, QC, Canada, Sept 2014, pp 159–162
Begin T, Baynat B, Abreu T (2016) Performance analysis of multi-hop flows in IEEE 802.11 networks. Perform Eval 96(C):12–32
Aydogdu C, Karasan E (2011) An analysis of IEEE 802.11 DCF and its application to energy-efficient relaying in multihop wireless networks. IEEE Trans Mobile Comput 10(10):1361–1373
Aydogdu C, Karasan E (2016) Goodput and throughput comparison of single-hop and multi-hop routing for IEEE 802.11 DCF-based wireless networks under hidden terminal existence. Wirel Commun Mobile Comput 16(9):1078–1094
Kafaie S, Hossam AM, Chen Y, Dobre OA (2018) Performance analysis of network coding with IEEE 802.11 DCF in multi-hop wireless networks. IEEE Trans Mobile Comput 17(5):1148–1161
Shahbaz R, Mohammed G, Ali M (2018) Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: a general framework. IEEE Trans Commun 66(11):5430–5443
Qi W, Jaffres-Runser K, Xu Y et al (2017) TDMA versus CSMA/CA for wireless multi-hop communications: a stochastic worst-case delay analysis. IEEE Trans Ind Inform 13(2):877–887
Rahman D-M, Naderi YM, Chowdhury KR (2016) Performance analysis of CSMA/CA based medium access in full duplex wireless communications. IEEE Trans Mobile Comput 15(6):1457–1470
Rosenkrantz WA, Simha R (1992) Some theorems on conditional Pasta: a stochastic integral approach. Oper Res Lett 11(3):173–177
Bolch G, Greiner S, De Meer H, Trivedi KS (1998) Queuing networks and Markov chains. Wiley, Hoboken
Saloff-Coste L (1997) Lectures on finite Markov chains. Springer, Berlin
Bagaa M, Chelli A, Djenouri D, Taleb T, Balasingham I, Kansanen K (2017) Optimal placement of relay nodes over limited positions in wireless sensor networks. IEEE Trans Wirel Commun 16(4):2205–2219
Bulusu S, Mehta N, Kalyanasundaram S (2018) Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge. IEEE Trans Wirel Commun 17(2):1053–1065
Acknowledgements
The author would like to thank the editor and four anonymous reviewers for helpful comments that have improved the quality of the paper. This work is supported by the National Natural Science Foundation of China (No. 61772386).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: The derivation process of \(\tau _i\) for station i
Let \(\varPsi =\varSigma ^m_{k=1}b_{k,1}\cdot (1-p_i)(1-\mu ^i_0)+E(1-\nu _i)\), we first deduce the expressions of \(b_{1,r}\) and \(d_{1,g}\):
Based on the above derivation, we further let \(H^i_2=b_{1,1}p_i+d_{1,1}\), \(b_{2,r}\) and \(d_{2,g}\) be derived as follows:
By using recursion method, the generalized expressions of \(b_{k,r}\) and \(d_{k,g}\) (\(k\in [2,m-1]\)) can be written as:
where \(H_k\) is given by
To investigate the mathematical relation of \(\varPsi \) and \(H^i_k\) (\(k\in [2,m-1]\)), we first extend the expression of \(H^i_2\)
Similarly, we use recursion method to get the generalized expression of \(H^i_k\) (\(k\in [2,m-1]\))
Considering the reentrancy of the last backoff stage, let \(H^i_m=b_{m,1}p_i+d_{m,1}\). \(b_{m,r}\) and \(d_{m,g}\) be represented as:
Based on the definition of \(H^i_m\), we can build the relation of \(H^i_m\) and \(H^i_{m-1}\) as follows:
Solving Eq. 57, we have
In addition, E can be expressed as
Let \(F^i_k=H^i_k\cdot \varPsi ^{-1}\), then we can get Eq. 2 and finally write \(\tau _i=\sum ^m_{k=1}b_{k,1}\) as Eq. 1.
Appendix 2: The derivation process of Prb \(\{T^i_{mac}=(r-1)E[slot]+t_s\}\) (Eqs. 23–25)
\(Prb\{T_{mac}=(r-1)E[slot]+t_s\}\) denotes the probability that a successful transmission occurs at a backoff stage (\(k\in [1,m]\)) and just needs \(r-1\) slot times and a successful duration \(t_s\) (since the packet can be definitely successfully transmitted in the last time slot). Therefore, \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) is determined by the probability that station i jumps from the initial state E to backoff stage k (\(k\in [1,m]\)), and the probability that the chosen backoff counter at backoff stage k is r (\(r\in [1,W_k]\)) without triggering the DCP.Footnote 11
Firstly, we assume that the successful transmission occurs at backoff stage 1 and needs \((r-1)E[slot]+t_s\) slot times. Let \(P^i_{J_{(E\rightharpoonup k)}}\) be the probability that station i jumps from the empty state E to backoff stage k (\(k\in [1,m]\)), we have
As mentioned earlier (see Sect. 4.1), the probability that the chosen backoff counter at backoff stage k is r (note that if a successful transmission requires \((r-1)E[slot]+t_s\) slot times, we need to choose r as the initial backoff counter, since \(\lceil \frac{(r-1)E[slot]+t_s}{E[slot]}\rceil =r\), \(r\in [1,W_k]\)) without triggering the DCP can be, respectively, given by
Thus, for (\(k=1\)), \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) can be expressed as Eq. 23.
Based on the 1901 standard, a station jumps to the next backoff stage through attempting an unsuccessful transmission or triggering the DCP. Thus, the probability \(P^i_{J_{(k\rightharpoonup k+1)}}\) that station i at backoff stage k jumps to backoff stage \(k+1\) can be written as
Because of the reentrancy of the last backoff stage m (caused by an unsuccessful transmission attempt or triggering the DCP), the probability that station i jumps from the empty state E to backoff stage k (\(k\in [2,m]\)) can be, respectively, expressed as follows:
For (\(k\in [2,m-1]\))
For (\(k=m\))
Through the above analysis, if the successful transmission occurs at backoff stage k (\(k\in [2,m]\)) and needs \((r-1)E[slot]+t_s\) slot times, \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) can be, respectively, expressed as Eqs. 24 and 25.
Appendix 3: The computational complexity analysis about executing IEEE 1901 MAC protocol and solving the theoretical model
Firstly, we analyze the computational complexity of executing IEEE 1901 MAC protocol. In a multi-hop PLC network, each station independently executes the CSMA/CA process of IEEE 1901 protocol, and the pseudocode can be given as follows:
The CSMA/CA process of IEEE 1901 protocol | |
---|---|
1: Set the deferral counter \(d_k\) for each stage | |
2: For a station entering stage k | |
3: Choose an initial backoff counter r (\(r\in [1,W_k]\)), execute the backoff process and sense the medium state | |
4: If the station senses the medium busy \(d_k+1\) times, then | |
5: If \(k<m\) (m represents the last stage) | |
6: jump to the next stage \(k+1\), and repeat the procedure in 3 | |
7: Else (\(k==m\)) | |
8: Reenter the last stage and execute the backoff process | |
9: Else (sense the medium busy less than \(d_k+1\) times) | |
10: Continue to execute the backoff process and sense the medium state. |
Analyzing this algorithm, it can be regarded as a modified CSMA/CA algorithm, and its computational complexity is determined by the network size and the expected number of backoff counters consumed by each station to occupy the medium.
As mentioned in Appendices (1 or 2), the IEEE 1901 protocol allows unlimited retransmission attempts; in other words, whether the expected number of backoff counters consumed by each station to occupy the medium is a constant should be examined. Recalling the derivation of medium access delay (Eqs. 23–26 and Appendix 2), the expected number of backoff counters consumed by each station to occupy the PLC medium C can be written as
Further reviewing Eq. 64 in Appendix 2, we can find that although unlimited retransmission attempts are allowed by IEEE 1901, the corresponding probability that a station transmits the packet at the last backoff stage m is still convergent. Accordingly, it is certain that C is a constant.
Thus, for the multi-hop PLC network, the computational complexity of executing IEEE 1901 protocol can be written as
where N represents the network size.
Secondly, we analyze the computational complexity of solving our theoretical model.
Our model provides a theoretical framework to analyze the MAC performance for multi-hop IEEE 1901 PLC networks. To solve the results of this model, we need to calculate \(p_i\), \(\mu ^i_0\) and \(\nu ^i\). Many numerical methods can be used to find the values of \(p_i\), \(\mu ^i_0\) and \(\nu ^i\). Here, fixed-point iteration (FPI) method is employed, and the pseudocode is as follows:
Fixed-point iteration method | |
---|---|
1: Select any values of \(p_i(0)\), \(\mu ^i_0(0)\) and \(\nu ^i_0(0)\), which are not absurd (for \(K=1\), \(\mu ^i_0(0)\) is directly set to be one) | |
2: From the theoretical model proposed in our paper, find the value of \(\tau _i(0)\) | |
3: Calculate new \(p_i(1)\), \(\mu ^i_0(1)\) and \(\nu ^i(1)\) by using the theoretical model, and repeat the process (through iterating calculation) | |
4: If \(|p_i(T+1)-p_i(T)|<\theta \), \(|\mu ^i_0(T+1)-\mu ^i_0(T)|<\theta \) and \(|\nu ^i(T+1)-\nu ^i(T)|<\theta \) (\(\theta \) is the threshold termination value we defined), replace \(p_i\) with \(p_i(T+1)\), \(\mu ^i_0\) with \(\mu ^i_0(T+1)\) and \(\nu ^i\) with \(\nu ^i(T+1)\), and then calculate the MAC metrics which we need. |
Clearly, if we set a reasonable \(\theta \), we can finally derive the results of the theoretical model in a finite number of iteration times (i.e., a constant) \(C_{iteration}\). Thus, the computational complexity of solving the theoretical model can be given by
Rights and permissions
About this article
Cite this article
Hao, S., Zhang, Hy. Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environment. J Supercomput 76, 2715–2747 (2020). https://doi.org/10.1007/s11227-019-03065-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-03065-4