3. Analysis
The method for formulating aggregate throughput optimal flow rate allocation as an optimization problem, for random topologies, when interference is treated as noise, is presented in detail in our prior work [
24]. In this study we consider the case where receivers may employ SIC, thus, we will introduce some modifications in the aforementioned framework. For that reason, we present all necessary notations in
Table 1 along with the final form of the corresponding optimization problem.
The set denotes the nodes and its cardinality is denoted by . We assume m flows that need to forward traffic to destination node D. The analysis that follows can also be applied for the case where multiple flows have different destination nodes. The set represents the m disjoint paths employed by these flows. is used to denote the number of links in path . is the set of nodes that cause interference to packets sent from i to j and its size is denoted by . In addition, is used to denote the source node of the flow employing path , while returns the index of the path where node i belongs. Moreover, denotes the transmission probability of the originator of the flow. and denote the average throughput, measured in packets per slot, achieved by link and flow forwarded over path , respectively. Let also denote the id of the n interfering node for link . For each node i, denotes its transmission probability, given that there is a packet available for transmission in its queue. As already discussed, for flow originators it indicates the rate at which flow is injected on a path, while for relay nodes it is assumed fixed to a specific value.
The average throughput for a link
,
, can be expressed through (
10). Average throughput for that link,
, is expressed through the probability of a successful packet reception over that link and is denoted by (
10). Estimating thus a link’s
average throughput, requires enumerating all possible subsets of active transmitters. Assuming that all nodes contribute with interference to transmissions over link
and a network with
N nodes, all such subsets of interfering nodes for
are
. In (
10),
l enumerates all possible subsets of active transmitters, while
becomes one if the
node in
is assumed active in the
subset examined. For each such subset, indexed by
l in (
10), the corresponding success probability of link
, given that this subset of nodes is active, is expressed through
presented in (
13). Note that, when interference cancelation is employed at node
j, then the expression for the success probability
is based on (
9), presented in
Section 2.2.
where
where
, & is the logical bitwise AND operator. In (
12),
denotes an indicator function whose value becomes one if
and zero otherwise. The reason for employing this indicator function is discussed at the end of this section. As also described in
Section 4, transmission probability and position for every node can be propagated periodically to all other nodes through the routing protocol’s topology control messages. Position information is used to infer each link’s success probability based on either (
5), or (
9), depending on whether interference is treated as noise (IAN), or successive interference cancelation (SIC) is employed at the receiver. The average aggregate throughput achieved by all flows is expressed through
, where
.
Aggregate throughput optimal flow rates, that also provide bounded packet delay, for a set of flows and a specific wireless topology can be estimated by solving the following optimization problem:
where,
.
In the above optimization problem, constraint set
ensures that the maximum data rate for any flow does not exceed one packet per slot, while also allowing paths to remain unutilized. Constraint
ensures that the flow injected on each path, that is the throughput of that path’s first link, is limited by the flow that can be serviced by any subsequent link of that path. In this way, data packets are prevented from accumulating at the relay nodes, providing bounded packet delay. For the rest of the paper, this constraint will be referred to as,
bounded delay constraint and the corresponding optimization problem as the
flow allocation optimization problem. Moreover, the scheme that determines the flow to be assigned on each path based on the above optimization problem will be referred to as the
Throughput Optimal Flow Rate Allocation (TOFRA) scheme for the rest of the study. In [
24], we have presented the conditions for non-convexity of the corresponding optimization problem for an illustrative topology. In the next section, we solve this problem by simulated annealing.
Going back to the indicator function in (
12), the reason for employing it is the following: assume that the flow assigned on a path is zero packets per slot. This means that relay nodes along this path will have no packets to transmit to their next hops. However, while enumerating all interfering nodes for expressing a specific link’s average throughput through (
10), relay nodes that belong to a path to which zero flow is assigned will be assumed to contribute with interference. This is due to the assumption mentioned in the system model that all nodes always have packets available for transmission. Employing, however, the function present in (
12), a relay node
i that belongs to a path where zero flow is assigned (
), will not be considered to contribute with interference.
5. Evaluation
The evaluation process of the aforementioned scheme consists of four parts. In the first one, the accuracy of the model employed by the TOFRA scheme for capturing the average aggregate flow throughput (AAT) observed in the simulated scenarios is explored. In the second part, the gain in terms of throughput that can be achieved at the network level, by combining TOFRA flow allocation scheme with SIC is explored. In the third part, we compare TOFRA with different flow allocation schemes, both in terms of delay and AAT. Finally, we evaluate the accuracy of the simulated annealing method for identifying the flow rates that achieve the globally maximum average aggregate throughput.
For the remainder of this section, the notion of asymmetry for two interfering links will be used to denote the difference between the average received SNR over them. As far as SIC is concerned, it has been shown that performance gain increases with the asymmetry among interfering links [
19]. For that reason, three different topologies are explored, based on the one presented in
Figure 2. Different topology instances are derived by fixing the distances between pairs of nodes. The corresponding distance values employed are summarized in the table incorporated in the same figure. For all three topologies, two unicast flows are assumed, sourced at nodes, 1 and 2, respectively. Flow
, is forwarded to
d, through path
, while flow
, through
. Assuming such a traffic scenario, in topology 1 presented in
Figure 2, transmissions along link
experience interference from node 2. If similar SINR threshold (
) values, for all transmitters, are further assumed, then the received signal on
R from 2, constituting the interference, is received with higher power compared to the signal received from 1. In a similar manner, in topologies 1 and 2, transmissions along link
experience interference from
R. The signal constituting interference from
R is received with higher power at
d than the signal carrying data packets sent from 2.
Based on these remarks, for each topology in
Figure 2, we consider different interference handling approaches. For topologies 1 and 2, three different approaches for handling interference are explored. In the first one, interference at nodes
R,
d is treated as noise. In the second approach, SIC is applied on
R, as described in
Section 3. In the third one, destination
d, first tries to decode the message from
R, remove its contribution (interference) to the received signal, and then decode the message from 2. Finally, as far as topology 3, depicted in
Figure 2, is concerned, three approaches are also explored. The first two approaches are the same with topologies 1 and 2. In the third one, however, where the destination resides closer to transmitting node 2 instead of
R,
d first tries to decode the message received from 2 (interference), remove its contribution to the received signal, and then decode the message from node
R. For the rest of the section, we will also use the term successive interference cancelation to describe how interference is handled at destination
d. To distinguish among the different approaches discussed above for handling interference, they are labelled after:
IAN,
SIC(R),
SIC(R,d), with
SIC(R,d) denoting that SIC is applied at both
R and
d.
As far as allocation of flow (data rates) on different paths is concerned, three different schemes are explored. The first scheme is TOFRA (presented in
Section 3).
Full MultiPath (
FMP) assigns one packet per slot on each path. Finally, the third scheme explored employs only a single path (best path) to forward traffic to the destination. Based on how
best path is identified, we explore two variants: in the first one, denoted as BP
, best path is considered as the one exhibiting the highest end-to-end success probability, and is identified through:
. In the second variant, denoted as BP
, best path is defined as the one that has the
widest bottleneck link, which can be formulated as identifying path
:
. In the first two topologies explored, BP
utilizes path
to the destination, while in the third one,
. BP
on the other hand, deploys path
, for all three topologies explored. Applying SIC for the cases of the best-path variants and the topologies presented in
Figure 2 is meaningless since, when path
is used, destination
d receives no interference, while in the case of
, the interference received at
d, from 1, is insignificant due to the large distance between them. For both aforementioned best-path variants, the flow assigned on the utilized single path is calculated by solving a single-path version of the optimization problem (P2), presented in
Section 3, through the simulated annealing technique.
Different simulation scenarios are generated as follows: for each topology presented in
Figure 2, one of the aforementioned flow allocation schemes is employed. For each flow allocation scheme, three variants are simulated based on how interference is handled at each receiving node. The variant denoted by
FMP-IAN for example, assigns one packet per slot on each path, while interference is treated as noise at each receiver. For
FMP-SIC(R), SIC is assumed at receiving node
R. To capture the effect of interference on success probability, four different SINR threshold values are employed:
,
,
, and
. In each simulation scenario, flows carrying constant bit rate, UDP traffic, are generated while the simulation period is 20,000 slots. Queues for flow originators are kept backlogged for the whole simulation period. For the relay node present in
Figure 2, the queue may become empty during a slot, i.e, queues for relay nodes are not assumed to be saturated in all the simulated scenarios.
In the first part of the evaluation process, we explore whether the proposed model accurately captures the average aggregate flow throughput (AAT) observed in the simulation results.
Table 3,
Table 4 and
Table 5, summarize the flow rates assigned on each path, along with the corresponding value for AAT achieved by TOFRA, derived from both the numerical and the simulation results. Recall that flow rates assigned on each path are identified by sources, by solving a topology specific instance of the flow allocation optimization problem presented in
Section 3. The path loss exponent assumed for deriving numerical results is
and link distances are those presented in
Figure 2.
The average deviation between the AAT derived from the model described in
Section 3 and the one observed in the simulated results, is
, over all topologies,
values, and TOFRA variants employed. There are several reasons for this deviation. The main one is related to the assumption of the model, for AAT, concerning saturated queues at the relay nodes. In our analysis, it is assumed that whenever a relay node attempts to transmit a packet, there is always one available in its queue. In the simulated scenarios, however, a relay node’s queue may be empty at a specific slot. In this way, the considered model for the AAT overestimates the interference experienced by any link in the simulated scenarios and thus, underestimates the average throughput achieved over that link. Due to the assumption concerning saturated queues at the relay nodes, it also overestimates the collision probability at each relay node, due to concurrent packet transmission and reception events. At the end of this section, we also discuss how this underestimation of a link’s average throughput may also affect queueing delay. Apart from that, in the analysis presented in
Section 3, a packet is not assumed to be dropped after a larger number of failed retransmissions. In the simulation parameters presented in
Table 6, however, a maximum retransmit threshold equal to 3 is adopted. This suggests that, after three failed transmissions, a specific packet is dropped. This may result in lower throughput for the link over which that packet is retransmitted, but will also result in reduced interference imposed on neighbouring links. Finally, in the analysis, we have assumed that whenever a packet is transmitted, it is a packet carrying data. In the simulated scenarios, however, all nodes either perform periodic emission of routing protocol’s control messages or forwarded specific topology control packets. This means that specific slots are spent carrying routing protocol’s control messages, instead of data packets, resulting in our analysis overestimating the AAT observed in the simulated results.
In the second part of the evaluation process, we explore the gain in terms of throughput that can be achieved by employing SIC, instead of treating interference as noise (IAN). More precisely, we explore the AAT achieved by the aforementioned flow allocation schemes, when different approaches for handling interference are followed (discussed above).
Figure 3,
Figure 4 and
Figure 5 present the corresponding AAT values for the three topologies summarized in
Figure 2.
Table 3,
Table 4 and
Table 5 show that applying SIC instead of IAN, at both receiving nodes
R,
d, proves gainful in terms of AAT, when
= 0.5. For the case of the TOFRA flow allocation scheme, the gain is
,
, and
, respectively, for the three topologies considered. It should also be noted that the gain in terms of throughput, for SIC, is less significant when it is applied only to receiver
R. For
= 0.5, employing SIC at
R, instead of IAN, results in
,
, and
higher AAT, for the three topologies explored. Applying SIC on
R, increases the success probability on link
, from
to
, for
= 0.5 and from
to
for
= 2.0. Consequently, transmitter 1 will manage to deliver a larger portion of its traffic to
R, when SIC is employed at
R, instead of IAN, which will also result in an increased number of packets transmitted from
R to
d. This will have a negative effect on the average throughput of link
since it will experience increased interference. Focusing on the first topology presented in
Figure 2,
= 0.5 and the TOFRA flow allocation scheme we observe the following; when interference is treated as noise at all receivers, the fraction of data packets transmitted over
that are retransmitted due to noise, signal attenuation, interference, and fading, is
. In the scenario where SIC is employed at
R, the corresponding fraction of retransmitted packets increases to
. This shows that improving the success probability at a relay node by applying SIC, will also increase the interference imposed on its next hop. Consequently, the number of packets that are retransmitted will increase, limiting the gain in terms of AAT. As
Table 3,
Table 4 and
Table 5 also show, for higher
values, applying SIC instead of IAN, for the case of TOFRA, either offers insignificant gain or results in lower average aggregate throughput. As already discussed, applying SIC at
R significantly increases the success probability on link
, with TOFRA also increasing the amount of flow assigned on path
. However, if the increased interference on link
is not compensated by the gain of utilizing path
, the average aggregate flow throughput (AAT) observed, may be lower compared to the case where IAN is applied at each receiver.
As far as the relation between interfering links asymmetry and gain in terms of throughput of SIC over IAN is concerned, the following remark is also interesting. As already discussed above, the success probability of link
increases from
to
, for
= 0.5, when SIC is employed at
R, instead of IAN. Accordingly, in topology 1 for example, the success probability of link
increases from
to
for
= 0.5, when SIC is employed at
d, instead of IAN. This increase in the success probability is significantly lower than the corresponding one for link
. The reason for this is the different asymmetry between interfering links for the two receivers. As
Figure 2 also shows, the distance of interfering node 2 from
R is much smaller than the distance between 1 and
R. The distances, however, of nodes 2 and
R, from
d, are very similar. A notable effect of combining SIC with the TOFRA flow allocation scheme is the utilization of paths that were assigned zero flow when IAN was applied at receiving nodes. As
Table 3,
Table 4 and
Table 5 show, the utilization of path
becomes non-zero for all topologies and
values considered when SIC is employed.
In the third part of the evaluation process, the proposed scheme is compared with FMP and best path-based flow allocation schemes, both in terms of throughput and delay. Variants of the TOFRA scheme achieve higher AAT than the corresponding full multipath (FMP) variants, for all topologies and
values employed. The main reason for this is that FMP assigns one packet per slot on each path in an interference unaware manner, resulting in a higher fraction of data packets retransmitted due to interference. This performance gap becomes even more profound when large SINR threshold values are assumed where the success probability of all links is decreased. Considering topology 3, with
= 0.5 for example, TOFRA-SIC(
) achieves
higher AAT than the corresponding FMP variant (FMP-SIC(
)). Compared to BP
, TOFRA-IAN achieves the same AAT, for almost all scenarios explored, since they both utilize at full rate path
. The only exception to this is the scenario based on topology 3, where
= 0.5. In this scenario, the corresponding TOFRA variant also utilizes path
. When TOFRA, however, is combined with SIC, at both
R and
d and a low
is employed, it achieves higher AAT. In topology 3 for example, when a
value equal to
is employed, TOFRA-SIC(
) achieves
higher AAT than BP
. It should be noted, however, that the prospect of higher throughput for TOFRA is limited by the number of paths available. In [
24,
26] where several paths are employed in parallel, TOFRA outperforms the corresponding best-path variant. Finally, the best-path variant, which selects the path with the widest bottleneck link, in terms of success probability (BP
), utilizes path
for topologies 1 and 2, and
for topology 3. However, as
Table 3,
Table 4 and
Table 5 show, TOFRA assigns zero flow on path
for most scenarios explored, when interference is treated as noise. This shows that utilizing this path in parallel with
would result in lower AAT. As also shown in
Figure 3,
Figure 4 and
Figure 5, BP
achieves the lowest AAT among all schemes, for topologies 1 and 2, and performs the same with BP
for topology 3. To summarize, simulation results presented in
Figure 3,
Figure 4 and
Figure 5 reveal that TOFRA, when combined with SIC at both the relay and the destination, achieves the highest AAT than all flow allocation schemes in almost all topologies and
values considered. The only exception is the simulation scenarios derived from Topology 1 and
values
and
. In these scenarios, the variant of TOFRA that treats interference as noise achieves the highest AAT along with
.
In this part of this section, the aforementioned flow allocation schemes are also compared in terms of delay. More precisely, the average flow delay, measured in slots, for each scheme is estimated. Before discussing simulation results, the following definitions are necessary: for each flow, end-to-end flow delay will be used to denote the average per-packet end-to-end delay, for all packets forwarded by that flow. End-to-end delay for a packet is the interval between that packet’s first transmission attempt at the source of the flow and the time when the packet is successfully received at the destination of the corresponding flow. For the rest of the section, average flow delay will be referred to as flow delay.
Figure 6,
Figure 7 and
Figure 8 present average flow delay for the three topologies described in
Figure 2 and the four SINR threshold values considered. For the rest of the section, end-to-end flow delay will be referred to as
flow delay.
As these figures show, for all three topologies explored, TOFRA-IAN achieves the same delay with BP
, for all
values considered. The only exception to this is the simulated scenario based on topology 3, with
= 0.5. In this scenario, TOFRA-IAN also assigns flow on path
. The flow assigned on path
is also increased in the case where TOFRA is combined with SIC. As
Table 3 for example shows, for the second topology and
= 0.5, TOFRA assigns
packets per slot on path
, when SIC is applied at both
R and
d. Consequently, a larger number of packets will experience queueing delay at
R and also increased retransmissions due to inter-path interference. The effect of queueing delay on flow delay is extensively discussed in the rest of the section. This effect is also validated if BP
is considered for topologies 1 and 2. In these topologies, BP
forwards all packets through path
.
Figure 6,
Figure 7 and
Figure 8 show that it experiences significantly higher flow delay than all other schemes with the exception of full multipath variants FMP-SIC(
R), FIM-SIC(
). The second reason behind the increased delay of TOFRA, when combined with SIC, is related to the accuracy with which the model presented in
Section 3 captures the average throughput of a link and is discussed in the next paragraph.
To validate the effect of queueing delay on flow delay, the throughput ratio for a relay, along with average queue length are employed. For the case of relay node
R, in
Figure 2 for example, throughput ratio is defined as:
. A value for that ratio larger than one would suggest queueing at the relay, since packets arrive at a rate faster than the rate with which they can be serviced (delivered to
d). This results in an unstable queue at the relay node and consequently in packets experiencing unbounded delay. A value for that ratio that is one, would imply a sub-stable queue at
R. In this case, packets may experience an increased queueing delay. Additionally, the average queue length for each node, especially for the relays, is calculated from simulated results.
Figure 6,
Figure 7 and
Figure 8 also show that, for all topologies and
values explored, FMP-IAN achieves significantly lower flow delay than TOFRA variants that employ SIC, although FMP is expected to experience more failed packets due to increased inter-path interference. In order to explore this delay gap between FMP and TOFRA variants, topology 2, with
= 0.5, is used as an example. Moreover, we focus on FMP-IAN and TOFRA-SIC(
) variants. As the simulation results show, FMP-IAN indeed experiences a larger number of failed transmission due to noise, signal attenuation, interference, and fading. For link
, this ratio is
for FMP-IAN and
for TOFRA-SIC(
). As far as path
is concerned, it is also interesting to note that FMP-IAN manages to deliver to
R, only
of the packets sent over link
, while the corresponding value for TOFRA-SIC(
) is
. Taking into account these ratios, TOFRA-SIC(
) is expected to experience higher queueing delay than FMP-IAN. Indeed, the average queue length for relay node 1 is
packets, for the case of FMP-IAN, and
packets when TOFRA-SIC(
) is employed.
Comparing different TOFRA variants in terms of average flow delay shows that when SIC is applied, instead of IAN, average flow delay exhibits a significant increase. As
Table 3,
Table 4 and
Table 5 show, when TOFRA is combined with SIC, maximum AAT is achieved by utilizing path
in parallel with
, for all topologies explored. The gap in terms of delay may imply that TOFRA variants that employ SIC experience increased queueing delay. To validate this, the simulation scenario based on topology 2 with
= 0.5, is used as an example. First, the throughput ratio for relay node
R is estimated, for the two TOFRA variants that employ SIC, from simulation results. The value of this ratio is
, and
, respectively, for the two considered variants, suggesting that the queue at
R becomes unstable. However, as already discussed in the first part of the evaluation process, the model employed for the average aggregate flow throughput, may underestimate the actual average throughput of a link observed in the simulation scenarios. In this way, the average throughput of a specific link may be higher than the average throughput of a subsequent link which results in an
unstable queue at the relay. The second reason is that SIC improves the success probability of link
and, thus, increases the number of packets that are successfully delivered to
R, when compared to TOFRA-IAN, resulting in a larger average queue size.
For all topologies and
values explored, when full multipath (FMP) is combined with SIC, either at
R, or both at
R and
d, it experiences by far higher average flow delay than all other flow allocation schemes discussed. For topology 1, in
Figure 2 and
= 0.5 for example, the flow delay observed in the simulation results, for FMP-SIC(
R) and FMP-SIC(
), is
and
slots, respectively. However, this is expected, since FMP assigns traffic on paths in an interference-unaware manner, experiencing a large number of failed packets due to increased interference. Secondly, it does not adjust the flow assigned on a path based on the one that can be serviced by its bottleneck link, resulting thus, in unstable queues at the relay nodes. For the case of topology 1 with
= 0.5 mentioned above, the throughput ratio at
R for FMP-SIC(
R) and FMP-SIC(
) is
and
, respectively.
As a brief overview of the results concerning flow delay, when TOFRA is combined with SIC, either at the relay or at both the relay and the destination, the delay achieved is significantly worse than TOFRA variant that treats interference as noise (TOFRA-IAN). The reason is that in all simulated scenarios, TOFRA-IAN forwards all traffic to the destination through a single hop path . Consequently, packets do not experience a queueing delay at relay node R as in the case of TOFRA-SIC(R) and TOFRA-SIC().
In the final part of the evaluation process, we explore the accuracy with which the simulated annealing method approaches the flow rates that achieve the globally maximum AAT. Towards this direction, a brute force search algorithm is implemented. The brute force algorithm explores all different combinations, of values for the optimization problem’s variables. Different values of a specific variable are generated using a specific step size with values for that variable ranging in
. Our goal is to compare the solution to the flow allocation problem identified by the simulated annealing and the brute force algorithm. An insignificant gap between the two solution points would suggest that simulated annealing has accurately managed to identify the flow rates that achieve the highest AAT among all feasible solution points. To assist visual inspection of the gap between the solution identified by the simulated annealing and brute force algorithms, we plot the corresponding solutions for a subset of the simulation scenarios explored in this section. More precisely, we focus on Topology 1 of
Figure 2, SINR threshold values
, and
and all three TOFRA variants.
Figure 9,
Figure 10,
Figure 11,
Figure 12,
Figure 13 and
Figure 14 compare the average aggregate throughput (AAT) achieved by TOFRA when flow rates assigned on each path are estimated through simulated annealing (TOFRA
) or through the brute force search algorithm using a step of
(TOFRA
). The flow rates that need to be fixed so as to maximize AAT are
and
, respectively. Moreover, two different SINR threshold (
) values are considered,
, and
. In the aforementioned figures, values for the AAT, measured in packets per slot, are presented on the vertical, z-axis. Values for the AAT that are equal to
correspond to a combination of flow rates that do not constitute a feasible solution to the flow allocation optimization problem. This suggests that the bounded delay constraint (also discussed in
Section 3) is violated. As these figures show, the solution identified by simulated annealing lies very close to the pair of
and
values, that achieve the highest AAT according to the BF algorithm.