[go: up one dir, main page]

Skip to main content
Log in

Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

As one of the most promising networking technologies, power-line communication (PLC) networks have been gradually used not only in home networking systems but also in industrial IoT (Internet of things). Current studies of PLC medium access control (MAC) protocol (i.e., IEEE 1901) only focus on the single-hop environment; however, in practical industrial IoT and home access communication systems, PLC networks generally utilize a multi-hop architecture. In addition, due to the difference in the MAC standard between 802 series and 1901, existing analytical models of multi-hop IEEE 802.11 wireless networks are not suitable for multi-hop IEEE 1901 PLC networks. In this paper, we propose a theoretical model for performance analysis of multi-hop IEEE 1901 PLC networks, where the impacts of traffic rate (containing relay traffic), buffer size, deferral counter process of 1901, hidden terminal problem and multi-hop environment are comprehensively considered. The modeling process is divided into two parts. In the local modeling part, we construct a brand-new Markov chain model to investigate the carrier sense multiple access with collision avoidance process of IEEE 1901 protocol under the multi-hop environment. In the coupling queueing modeling part, we employ queueing theory to analyze the packet transmission procedure between successive hops. On the basis, we derive the closed-form expressions of throughput, medium access delay, packet blocking probability, end-to-end successful transmission delay and goodput. Through extensive simulations, we verify that our theoretical model can accurately estimate the MAC performance of IEEE 1901 PLC networks in the multi-hop environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. The carrier sensing region is assumed to be of circle shape.

  2. Although both 2-D DMC and ML DMC models can describe 1901’s CSMA/CA mechanism, the detailed mathematical description for CSMA/CA process of 1901 protocol in multi-hop environment is different from that in single-hop environment.

  3. The complexity of a Markov chain model is determined by the size of its corresponding balance equations, i.e., the size of state space. It should be stressed that this definition is not equal to the computational complexity of algorithm.

  4. 1901 allows unlimited retransmission attempts.

  5. This assumption relies on the fact that the 1901 standard does not use the request to send RTS frame, and the short inter-frame space SIFS is assumed to be zero.

  6. In most network configurations, this probability is very small and negligible. Hence, we let it be zero so that we can derive the detailed expressions for \(T_s\) and \(T_c\).

  7. \(Prb\{A\}\) denotes the probability that case A happens.

  8. According to the 1901 standard, only the fully loaded station buffer can cause the drop packet problem.

  9. We do not need to measure the end-to-end successful transmission delay \(Max\{T_{0H},T'_{0H}\}\), since there is a strict corresponding relation between G and \(Max\{T_{0H},T'_{0H}\}\).

  10. Note that there is still a deviation between simulation results and numerical analysis results, since the DCP of 1901 can enhance the system jitter.

  11. If a station triggers the DCP at backoff stage k, it has to jump to the next backoff stage (or reenters this backoff stage, if it is already at the last backoff stage).

References

  1. Homeplug alliance (2016). www.homeplug.org. Accessed 12 June 2016

  2. Faure JP, Allen JD et al (2010) IEEE standard for broadband over power line networks: medium access control and physical layer specifications. IEEE Std 1901–2010 10(2):1–1589

    Google Scholar 

  3. Zhu N, Diethe T, Camplani M et al (2015) Bridging e-health and the internet of things: the sphere project. IEEE Intell Syst 30(4):39–46

    Article  Google Scholar 

  4. Sayed M, Tsiftsis TA, Al-Dhahir N (2017) On the diversity of hybrid narrowband-plc/wireless communications for smart grids. IEEE Trans Wirel Commun 16(17):4344–4360

    Article  Google Scholar 

  5. Shlezinger N, Shaked R, Dabora R (2018) On the capacity of MIMO broadband power line communications channels. IEEE Trans Commun 66(10):4795–4810

    Google Scholar 

  6. Artale G, Cataliotti A, Cosentino V, Cara DD, Giovanni T (2018) A new low cost power line communication solution for smart grid monitoring and management. IEEE Instrum Meas Mag 21(2):29–33

    Article  Google Scholar 

  7. Vlachou C, Banchs A, Herzen J, Thiran P (2014) Performance analysis of MAC for power-line communications. In: SIGMETRICS 2014. ACM, Austin, TX, USA, 16–20 June 2014, pp 585–586

  8. Vlachou C, Banchs A, Herzen J, Thiran P (2014) Analyzing and boosting the performance of power-line communication networks. In: Proceedings of the 10th International on Conference on Emerging Networking Experiments and Technologies, CoNEXT 2014. ACM, Sydney, Australia, 2–5 Dec 2014, pp 1–12

  9. Vlachou C, Banchs A, Herzen J, Thiran P (2014) On the MAC for power-line communications: modeling assumptions and performance tradeoffs. Semiotica 2007(166):97–104

    Google Scholar 

  10. Vlachou C, Banchs A, Salvador P (2016) Analysis and enhancement of CSMA/CA with deferral in power-line communications. IEEE J Sel Areas Commun 34(7):1978–1991

    Article  Google Scholar 

  11. Vlachou C, Banchs A, Herzen J, Thiran P (2017) How CSMA/CA with deferral affects performance and dynamics in power-line communications. IEEE/ACM Trans Netw 25(1):250–263

    Article  Google Scholar 

  12. Hao S, Zhang HY (2019) From homogeneous to heterogeneous: an analytical model for IEEE 1901 power line communication networks in unsaturated conditions. IEICE Trans Commun E102–B(8):1636–1648

    Article  Google Scholar 

  13. Kang J, Kim Y, Kim K (2009) Hidden terminal of Korea Standard PLC protocol in access network. In: IEEE International Symposium on Power Line Communications and Its Applications 2009. IEEE, Dresden, Germany, 29 Mar–1 April 2009, pp 85–88

  14. Dong LF, Shu YT, Chen HM, MA MD (2008) Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks. Sci China Ser F (Inf Sci) 51(4):408–416

    MathSciNet  MATH  Google Scholar 

  15. Abreu T, Baynat B, Begin T, Guerin-Lassous I (2013) Hierarchical modeling of IEEE 802.11 multi-hop wireless networks. In: ACM International Conference on Modeling 2013. ACM, Barcelona, Spain, pp 143–150

  16. Abreu T, Baynat B, Begin T, Nguyen N (2014) Modeling of IEEE 802.11 multi-hop wireless chains with hidden nodes. In: ACM International Conference on Modeling 2014. ACM, QC, Canada, Sept 2014, pp 159–162

  17. Begin T, Baynat B, Abreu T (2016) Performance analysis of multi-hop flows in IEEE 802.11 networks. Perform Eval 96(C):12–32

    Article  Google Scholar 

  18. Aydogdu C, Karasan E (2011) An analysis of IEEE 802.11 DCF and its application to energy-efficient relaying in multihop wireless networks. IEEE Trans Mobile Comput 10(10):1361–1373

    Article  Google Scholar 

  19. Aydogdu C, Karasan E (2016) Goodput and throughput comparison of single-hop and multi-hop routing for IEEE 802.11 DCF-based wireless networks under hidden terminal existence. Wirel Commun Mobile Comput 16(9):1078–1094

    Article  Google Scholar 

  20. Kafaie S, Hossam AM, Chen Y, Dobre OA (2018) Performance analysis of network coding with IEEE 802.11 DCF in multi-hop wireless networks. IEEE Trans Mobile Comput 17(5):1148–1161

    Article  Google Scholar 

  21. Shahbaz R, Mohammed G, Ali M (2018) Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: a general framework. IEEE Trans Commun 66(11):5430–5443

    Article  Google Scholar 

  22. Qi W, Jaffres-Runser K, Xu Y et al (2017) TDMA versus CSMA/CA for wireless multi-hop communications: a stochastic worst-case delay analysis. IEEE Trans Ind Inform 13(2):877–887

    Article  Google Scholar 

  23. Rahman D-M, Naderi YM, Chowdhury KR (2016) Performance analysis of CSMA/CA based medium access in full duplex wireless communications. IEEE Trans Mobile Comput 15(6):1457–1470

    Article  Google Scholar 

  24. Rosenkrantz WA, Simha R (1992) Some theorems on conditional Pasta: a stochastic integral approach. Oper Res Lett 11(3):173–177

    Article  MathSciNet  Google Scholar 

  25. Bolch G, Greiner S, De Meer H, Trivedi KS (1998) Queuing networks and Markov chains. Wiley, Hoboken

    Book  Google Scholar 

  26. Saloff-Coste L (1997) Lectures on finite Markov chains. Springer, Berlin

    Book  Google Scholar 

  27. Bagaa M, Chelli A, Djenouri D, Taleb T, Balasingham I, Kansanen K (2017) Optimal placement of relay nodes over limited positions in wireless sensor networks. IEEE Trans Wirel Commun 16(4):2205–2219

    Article  Google Scholar 

  28. Bulusu S, Mehta N, Kalyanasundaram S (2018) Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge. IEEE Trans Wirel Commun 17(2):1053–1065

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to thank the editor and four anonymous reviewers for helpful comments that have improved the quality of the paper. This work is supported by the National Natural Science Foundation of China (No. 61772386).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu-yin Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1: The derivation process of \(\tau _i\) for station i

Let \(\varPsi =\varSigma ^m_{k=1}b_{k,1}\cdot (1-p_i)(1-\mu ^i_0)+E(1-\nu _i)\), we first deduce the expressions of \(b_{1,r}\) and \(d_{1,g}\):

$$\begin{aligned}&{\left\{ \begin{array}{ll} b_{1,r}=\varPsi \cdot \sum \limits ^{W_1}_{h=r} \frac{X^i_{1,h}}{W_1}; r\in [d_1+1,W_1]\\ b_{1,r}=\varPsi \cdot \sum \limits ^{W_1}_{h=d_1+1} \frac{X^i_{1,h}}{W_1}+\varPsi \cdot \sum \limits ^{d_1}_{h=r} \frac{1}{W_1}; \quad r\in [1,d_1]\\ \end{array}\right. } \end{aligned}$$
(46)
$$\begin{aligned}&d_{1,g}=\varPsi \cdot \frac{Y^i_1}{W_1}; \quad g\in [1,d_1+1] \end{aligned}$$
(47)

Based on the above derivation, we further let \(H^i_2=b_{1,1}p_i+d_{1,1}\), \(b_{2,r}\) and \(d_{2,g}\) be derived as follows:

$$\begin{aligned}&{\left\{ \begin{array}{ll} b_{2,r}=H^i_2\cdot \sum \limits ^{W_2}_{h=r} \frac{X^i_{2,h}}{W_2}; \quad r\in [d_2+1,W_2]\\ b_{2,r}=H^i_2\cdot \sum \limits ^{W_2}_{h=d_2+1} \frac{X^i_{2,h}}{W_2}+H^i_2\cdot \sum \limits ^{d_2}_{h=r} \frac{1}{W_2}; \quad r\in [1,d_2]\\ \end{array}\right. } \end{aligned}$$
(48)
$$\begin{aligned}&d_{2,g}=H^i_2\cdot \frac{Y^i_2}{W_2}; \quad g\in [1,d_2+1] \end{aligned}$$
(49)

By using recursion method, the generalized expressions of \(b_{k,r}\) and \(d_{k,g}\) (\(k\in [2,m-1]\)) can be written as:

$$\begin{aligned}&{\left\{ \begin{array}{ll} b_{k,r}=H^i_k\cdot \sum \limits ^{W_k}_{h=r} \frac{X^i_{k,h}}{W_k}; \quad r\in [d_k+1,W_k]\\ b_{k,r}=H^i_k\cdot \sum \limits ^{W_k}_{h=d_{k+1}} \frac{X^i_{k,h}}{W_k}+H^i_k\cdot \sum \limits ^{d_k}_{h=r} \frac{1}{W_k}; \quad r\in [1,d_k]\\ \end{array}\right. } \end{aligned}$$
(50)
$$\begin{aligned}&d_{k,g}=H^i_k\cdot \frac{Y^i_k}{W_k}; \quad g\in [1,d_k+1] \end{aligned}$$
(51)

where \(H_k\) is given by

$$\begin{aligned} H^i_k=b_{k-1,1}p_i+d_{k-1,1} \end{aligned}$$
(52)

To investigate the mathematical relation of \(\varPsi \) and \(H^i_k\) (\(k\in [2,m-1]\)), we first extend the expression of \(H^i_2\)

$$\begin{aligned} \begin{aligned} H^i_2&=\varPsi \cdot \frac{Y^i_1}{W_1}+ p_i\left( \varPsi \cdot \sum ^{W_1}_{h=d_1+1} \frac{X^i_{1,h}}{W_1}+\varPsi \cdot \sum ^{d_1}_{h=1} \frac{1}{W_1}\right) \\&=\varPsi \left( \frac{Y^i_1}{W_1}+p_i\sum ^{W_1}_{h=d_1+1} \frac{X^i_{1,h}}{W_1}+p_i\sum ^{d_1}_{h=1} \frac{1}{W_1}\right) \\&=\varPsi \left( \frac{Y^i_1(1-p_i)}{W_1}+p_i\right) \\ \end{aligned} \end{aligned}$$
(53)

Similarly, we use recursion method to get the generalized expression of \(H^i_k\) (\(k\in [2,m-1]\))

$$\begin{aligned} H^i_k =\prod\limits ^{k-1}_{h=1}\varPsi \left( \frac{Y^i_h(1-p_i)}{W_h}+p_i\right) ; \quad k\in [2,m-1] \end{aligned}$$
(54)

Considering the reentrancy of the last backoff stage, let \(H^i_m=b_{m,1}p_i+d_{m,1}\). \(b_{m,r}\) and \(d_{m,g}\) be represented as:

$$\begin{aligned}&{\left\{ \begin{array}{ll} b_{m,r}=(H^i_m+H^i_{m-1})\sum \limits ^{W_m}_{h=r} \frac{X^i_{m,h}}{W_m}; \quad r\in [d_m+1,W_m]\\ b_{m,r}=(H^i_m+H^i_{m-1})\left(\sum \limits ^{W_m}_{h=d_m+1}\frac{X^i_{m,h}}{W_m}+\sum \limits ^{d_m}_{h=r} \frac{1}{W_m}\right); \quad r\in [1,d_m]\\ \end{array}\right. } \end{aligned}$$
(55)
$$\begin{aligned}&d_{m,g}=(H^i_m+H^i_{m-1})\cdot \frac{Y^i_m}{W_m}; \quad g\in [1,d_m+1] \end{aligned}$$
(56)

Based on the definition of \(H^i_m\), we can build the relation of \(H^i_m\) and \(H^i_{m-1}\) as follows:

$$\begin{aligned} \begin{aligned}&H^i_m=(H^i_m+H^i_{m-1})\sum ^{W_m}_{h=g}\frac{Y^i_m}{W_m}+p_i(H^i_m+H^i_{m-1})\left( \sum ^{W_m}_{h=d_m+1}\frac{X^i_{m,h}}{W_m}+\sum ^{d_m}_{h=1} \frac{1}{W_m}\right); \\&\quad g\in [1,d_m+1] \end{aligned} \end{aligned}$$
(57)

Solving Eq. 57, we have

$$\begin{aligned} H^i_m=\frac{(p_i+\frac{(1-p_i)Y^i_m}{W_m})}{1-(p_i+\frac{(1-p_i)Y^i_m}{W_m})}\cdot H^i_{m-1} \end{aligned}$$
(58)

In addition, E can be expressed as

$$\begin{aligned} \begin{aligned} E&=E\nu _i+\sum ^m_{k=1}b_{k,1}(1-p_i)(1-\mu ^i_0)\\&=E\nu _i+\mu ^i_0\cdot \frac{\varPsi -E(1-\nu _i)}{1-\mu ^i_0}\\&=\frac{\varPsi (1-\mu ^i_0)}{1-\nu _i} \end{aligned} \end{aligned}$$
(59)

Let \(F^i_k=H^i_k\cdot \varPsi ^{-1}\), then we can get Eq. 2 and finally write \(\tau _i=\sum ^m_{k=1}b_{k,1}\) as Eq. 1.

Appendix 2: The derivation process of Prb \(\{T^i_{mac}=(r-1)E[slot]+t_s\}\) (Eqs. 2325)

\(Prb\{T_{mac}=(r-1)E[slot]+t_s\}\) denotes the probability that a successful transmission occurs at a backoff stage (\(k\in [1,m]\)) and just needs \(r-1\) slot times and a successful duration \(t_s\) (since the packet can be definitely successfully transmitted in the last time slot). Therefore, \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) is determined by the probability that station i jumps from the initial state E to backoff stage k (\(k\in [1,m]\)), and the probability that the chosen backoff counter at backoff stage k is r (\(r\in [1,W_k]\)) without triggering the DCP.Footnote 11

Firstly, we assume that the successful transmission occurs at backoff stage 1 and needs \((r-1)E[slot]+t_s\) slot times. Let \(P^i_{J_{(E\rightharpoonup k)}}\) be the probability that station i jumps from the empty state E to backoff stage k (\(k\in [1,m]\)), we have

$$\begin{aligned} P^i_{J_{(E\rightharpoonup 1)}}=1 \end{aligned}$$
(60)

As mentioned earlier (see Sect. 4.1), the probability that the chosen backoff counter at backoff stage k is r (note that if a successful transmission requires \((r-1)E[slot]+t_s\) slot times, we need to choose r as the initial backoff counter, since \(\lceil \frac{(r-1)E[slot]+t_s}{E[slot]}\rceil =r\), \(r\in [1,W_k]\)) without triggering the DCP can be, respectively, given by

$$\begin{aligned} {\left\{ \begin{array}{ll} \frac{1}{W_{k}};\quad r\in [1,d_k]\\ \frac{X^i_{k,r}}{W_{k}};\quad r\in [d_k+1,W_k]\\ \end{array}\right. } \end{aligned}$$
(61)

Thus, for (\(k=1\)), \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) can be expressed as Eq. 23.

Based on the 1901 standard, a station jumps to the next backoff stage through attempting an unsuccessful transmission or triggering the DCP. Thus, the probability \(P^i_{J_{(k\rightharpoonup k+1)}}\) that station i at backoff stage k jumps to backoff stage \(k+1\) can be written as

$$\begin{aligned} P^i_{J_{(k\rightharpoonup k+1)}}=p_i+[(1-p_i)\cdot \frac{Y^i_{k}}{W_{k}}] ;\quad m-1\ge k\ge 1 \end{aligned}$$
(62)

Because of the reentrancy of the last backoff stage m (caused by an unsuccessful transmission attempt or triggering the DCP), the probability that station i jumps from the empty state E to backoff stage k (\(k\in [2,m]\)) can be, respectively, expressed as follows:

For (\(k\in [2,m-1]\))

$$\begin{aligned} \begin{aligned} P^i_{J_{(E\rightharpoonup k)}}&=P^i_{J_{(E\rightharpoonup 1)}}\cdot \prod\limits ^{k-1}_{t=1}P^i_{J_{(t\rightharpoonup t+1)}}\\&=\prod\limits ^{k-1}_{t=1}p_i+[(1-p_i)\cdot \frac{Y^i_{t}}{W_{t}}] \end{aligned} \end{aligned}$$
(63)

For (\(k=m\))

$$\begin{aligned} \begin{aligned} P^i_{J_{(E\rightharpoonup m)}}&= P^i_{J_{(E\rightharpoonup 1)}}\cdot \prod\limits ^{m-1}_{t=1}P^i_{J_{(t\rightharpoonup t+1)}}\cdot \left\{1+\sum ^{+\infty }_{\eta =1}[p_i+(1-p_i)\cdot \frac{Y^i_{m}}{W_{m}}]^\eta \right\} \\&=\prod\limits ^{m-1}_{t=1}\left\{p_i+[(1-p_i)\cdot \frac{Y^i_{t}}{W_{t}}]\right\}\cdot \frac{1}{1-p_i-(1-p_i)\cdot \frac{Y^i_{m}}{W_{m}}} \end{aligned} \end{aligned}$$
(64)

Through the above analysis, if the successful transmission occurs at backoff stage k (\(k\in [2,m]\)) and needs \((r-1)E[slot]+t_s\) slot times, \(Prb\{T^i_{mac}=(r-1)E[slot]+t_s\}\) can be, respectively, expressed as Eqs. 24 and 25.

Appendix 3: The computational complexity analysis about executing IEEE 1901 MAC protocol and solving the theoretical model

Firstly, we analyze the computational complexity of executing IEEE 1901 MAC protocol. In a multi-hop PLC network, each station independently executes the CSMA/CA process of IEEE 1901 protocol, and the pseudocode can be given as follows:

The CSMA/CA process of IEEE 1901 protocol

1: Set the deferral counter \(d_k\) for each stage

2: For a station entering stage k

3: Choose an initial backoff counter r (\(r\in [1,W_k]\)), execute the backoff process and sense the medium state

4:   If the station senses the medium busy \(d_k+1\) times, then

5:      If \(k<m\) (m represents the last stage)

6:      jump to the next stage \(k+1\), and repeat the procedure in 3

7:      Else (\(k==m\))

8:      Reenter the last stage and execute the backoff process

9:   Else (sense the medium busy less than \(d_k+1\) times)

10:   Continue to execute the backoff process and sense the medium state.

Analyzing this algorithm, it can be regarded as a modified CSMA/CA algorithm, and its computational complexity is determined by the network size and the expected number of backoff counters consumed by each station to occupy the medium.

As mentioned in Appendices (1 or 2), the IEEE 1901 protocol allows unlimited retransmission attempts; in other words, whether the expected number of backoff counters consumed by each station to occupy the medium is a constant should be examined. Recalling the derivation of medium access delay (Eqs. 2326 and Appendix 2), the expected number of backoff counters consumed by each station to occupy the PLC medium C can be written as

$$\begin{aligned} C=\frac{E[T_{mac}]}{E[slot]} \end{aligned}$$
(65)

Further reviewing Eq. 64 in Appendix 2, we can find that although unlimited retransmission attempts are allowed by IEEE 1901, the corresponding probability that a station transmits the packet at the last backoff stage m is still convergent. Accordingly, it is certain that C is a constant.

Thus, for the multi-hop PLC network, the computational complexity of executing IEEE 1901 protocol can be written as

$$\begin{aligned} O(C\cdot N)=O(N) \end{aligned}$$
(66)

where N represents the network size.

Secondly, we analyze the computational complexity of solving our theoretical model.

Our model provides a theoretical framework to analyze the MAC performance for multi-hop IEEE 1901 PLC networks. To solve the results of this model, we need to calculate \(p_i\), \(\mu ^i_0\) and \(\nu ^i\). Many numerical methods can be used to find the values of \(p_i\), \(\mu ^i_0\) and \(\nu ^i\). Here, fixed-point iteration (FPI) method is employed, and the pseudocode is as follows:

Fixed-point iteration method

1: Select any values of \(p_i(0)\), \(\mu ^i_0(0)\) and \(\nu ^i_0(0)\), which are not absurd (for \(K=1\), \(\mu ^i_0(0)\) is directly set to be one)

2: From the theoretical model proposed in our paper, find the value of \(\tau _i(0)\)

3: Calculate new \(p_i(1)\), \(\mu ^i_0(1)\) and \(\nu ^i(1)\) by using the theoretical model, and repeat the process (through iterating calculation)

4: If \(|p_i(T+1)-p_i(T)|<\theta \), \(|\mu ^i_0(T+1)-\mu ^i_0(T)|<\theta \) and \(|\nu ^i(T+1)-\nu ^i(T)|<\theta \) (\(\theta \) is the threshold termination value we defined), replace \(p_i\) with \(p_i(T+1)\), \(\mu ^i_0\) with \(\mu ^i_0(T+1)\) and \(\nu ^i\) with \(\nu ^i(T+1)\), and then calculate the MAC metrics which we need.

Clearly, if we set a reasonable \(\theta \), we can finally derive the results of the theoretical model in a finite number of iteration times (i.e., a constant) \(C_{iteration}\). Thus, the computational complexity of solving the theoretical model can be given by

$$\begin{aligned} O(C_{iteration}\cdot N)=O(N) \end{aligned}.$$
(67)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hao, S., Zhang, Hy. Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environment. J Supercomput 76, 2715–2747 (2020). https://doi.org/10.1007/s11227-019-03065-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03065-4

Keywords

Navigation