Figures
Abstract
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.
Citation: Yang X, Wang L, Xie J, Zhang Z (2018) Cross-layer model design in wireless ad hoc networks for the Internet of Things. PLoS ONE 13(5): e0196818. https://doi.org/10.1371/journal.pone.0196818
Editor: Chi-Tsun Cheng, Hong Kong Polytechnic University, HONG KONG
Received: October 4, 2017; Accepted: April 22, 2018; Published: May 7, 2018
Copyright: © 2018 Yang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper and its Supporting Information files.
Funding: This study was supported in part by the National Natural Science Foundation of China (No. 61301093, 61601372, and 61601373). There was no additional external funding received for this study.
Competing interests: The authors have declared that no competing interests exist.
Introduction
Nowadays, the Internet of Things (IoT) has greatly changed the way we live, work and study [1]. As one of the most important and critical part of the IoT, considerable progress has been made in the field of wireless ad hoc networks (WANET) recently, particularly with respect to improving their transmission performance [2]. WANET are networks in which nodes can communicate with others by wireless transmissions without the help of centralized coordinator [3]. Nowadays, many efforts are made in the improvement of networks performance like throughput. But WANETs still suffer from unbalanced resources between high traffic and low traffic periods, which constrains their transmission performance.
In response to these ongoing issues, numerous researchers have focused on media access control (MAC) protocols and code caching schemes in the physical (PHY) layer for WANETs [4]. For caching technique, it is an essential way to enhance the throughput and reduce latency of wireless networks [5]. The key point of caching is duplicating contents in memories distributed across the network, which can then be exploited to deliver requested content. Almotairi and Shen [6] proposed a distributed multi-channel MAC protocol to improve the throughput of networks. However, the protocol demonstrated unstable performance when network traffic fluctuated between high and low levels. Jiang and Du [7] presented a prediction-based time division multiple access (TDMA) MAC protocol for wireless networks denoted as PTMAC. While the protocol reduced transmission collision effectively, the throughput of networks was not improved. Moreover, it is subjected to transmission directions. A novel network coding aware cooperative MAC protocol denoted as NCAC-MAC has been proposed [8] that improves the throughput and reduces the delay of wireless networks. However, the collision of networks limits further improvement. Regarding the various code caching schemes developed, an uncoded caching scheme [9] has demonstrated relatively poor caching efficiency, while centralized code caching has demonstrated an index coding problem. Compared to the centralized code caching scheme, decentralized code caching (DCC) is more flexible, and can adapt to different numbers of user nodes. In addition, the DCC scheme can alleviate transmission congestion more effectively than the centralized scheme.
This paper presents a fundamentally novel cross-layer model based on modifications in the MAC layer and PHY layer to address the low throughput problem and reduce the transmission congestion of WANETs, especially for burst transmission networks. Here, a new content-division multiplexing (ContDM) transmission scheme is applied in the MAC layer, and is assisted by DCC in the PHY layer. Collectively, the proposed model is denoted as the ContDM-DCC (CDDC) model. Use of the ContDM scheme in the CDCC model allows for the effective employment of the transmission content in networks. This scheme also promotes efficient transmission during high traffic periods and makes better use of channels during low traffic periods. Use of DCC in the CDCC model improves network flexibility and facilitates the implementation of the model in large scale WANETs. The combination of the ContDM scheme with DCC allows the proposed model to solve the unbalanced resource problem by utilizing the characteristics of high and low traffic in networks. The solution of this problem significantly improves the transmission performance of WANETs. Simulation results demonstrate that the proposed model can enhance the throughput and packet deliver rate (PDR) in WANET systems.
Transmission model description
The overall transmission process includes two stages: placement stage and delivery stage. The placement stage is initiated when the WANET traffic is low, and the delivery stage occurs when network traffic is high. In this work, we assume that the content request distribution conforms to a Zipfian distribution, which can distinguish between content with high and low frequencies of occurrence [10]. To briefly describe the Zipfian distribution, we assume a number of elements N, which, in our model, is the number of data packets that must be transmitted at the same time. The rank of each element is denoted by k and s is the value of the exponent characterizing the distribution. Therefore, the frequency of elements of rank k is obtained as .
We employ the Pareto distribution in the proposed model to distinguish between content with high and low frequencies of occurrence. The Pareto distribution is regarded as a continuous counterpart of the Zipfian distribution, and has a cumulative distribution function (CDF) given as fx(x) = 1−(xm/x)α for some number x ≥ xm, where xm is the minimum possible value of a random variable X whose values are consistent with a Pareto distribution, and α is a positive parameter denoted as the Pareto index. In this letter, we simplify the processing by selecting α = log45 = log5/log4, which is approximately 1.161. This is also denoted as the 80–20 law, where the top 20% of the content with the highest frequency of occurrence accounts for 80% of the transmission tasks in a network. The 80–20 law is widely used in information theory and information transmission.
In the placement stage, nodes pre-fetch high-likelihood content from the server, and save the content as cache in their memory. This represents the preparation phase of ContDM transmission. It is worth noting that the server in the proposed networks acts as a backend database. It does not control or affect the accessing of nodes. All nodes still make up an ad hoc network. The placement stage is regarded as the initialization and setting of the transmission. Here, high-likelihood content is directly sent by the nodes from their cache rather than through the server, which simplifies the transmission process. Meanwhile, low-likelihood content is still saved on the server, and sent by the server to the nodes when required. The simplified transmission process obtained by the caching of high-likelihood content can improve the transmission performance of WANETs effectively by avoiding traffic congestion in transmission channels among servers.
At the first step of the delivery stage, each user node presents requests for its required content. Then, neighboring nodes seek content in their cache and send useful content to the corresponding user nodes according to the ContDM scheme. The content in its neighbors are pre-fetched in the cache in low traffic period. In ContDM scheme, each neighboring node seeks to divide information into content items and to transmit content to corresponding receiving users, some of which require the same high-likelihood content. This process is illustrated in Fig 1, where node S is the sender, nodes A, B, C, and E are within the transmission range of S, node D is within the transmission range of B, but not within the transmission range of S. The cache of S contains n items of high-likelihood content based on the Zipfian distribution. Each content item has an overhead consisting of the location and size of the content. In Fig 1, S receives requests from neighboring nodes. According to the requests, S sends content 1 to A and C, sends content 2 to D with a hop via B, and sends content 3 to E. Node C only wants content 1, whereas A and D want low-likelihood content from the server. As a result of the pre-fetch operation involving S, the server can reduce its transmission pressure, and the performance of the network is thereby improved. Therefore, the ContDM scheme enhances WANET efficiency by conducting pre-fetching operations during low traffic periods, and the transmission performance of WANETs is improved during high traffic periods when an increasing number of users require high-likelihood content.
In content delivery process of the proposed transmission model, we assume that the sender node S has pre-fetched and cached n content items from the server, some of which are subsequently sent to various receiving nodes A–E.
In the proposed model, we utilize DCC in the transmission process. In addition, DCC is introduced for WANET in which the data packets are encoded uniformly at random and cached. These characteristics can help to improve the throughput of the networks. The content is denoted according to the receiving node N, and every content item is divided into eight sub-contents:
(1)
where x ∈ [1,2,3……n] represents the content items. For the example presented in Fig 1, content 1 requested by A is presented as
(2)
which is the same as that requested by C. Content items 2 and 3 requested by nodes D (via B) and E, respectively, are divided similarly as content 1. We assume that, in this delivery stage, three content items (1, 2, and 3) are required for transmission. Firstly, S sends the coded packet A23 ⊕ B13 ⊕ E12, where ⊕ denotes bitwise XOR, because it is useful to all receivers. Then, S sends packets A2 ⊕ B1, A3 ⊕ E1, and B3 ⊕ E2 because they are useful to nodes A and B, A and E, and B and E, respectively. Finally, S sends A∅, B∅, and E∅, which are useful to nodes A, B, and E, respectively. Clearly, the content required by D is the same as that required by B, and that of C is the same as A. The server utilizes the DCC scheme when sending content to A and D as well. Therefore, DCC addresses the problem of asynchronous users, and improves the flexibility of networks.
DCC can also improve transmission performance in multi-hop transmission. To illustrate this advantage of DCC, the multi-hop transmission process of the proposed model is presented in detail based on the example shown in Fig 1, which describes the transmission route from S to D via B. According to the definition given in (1), we divide the content requested by D into eight sub-contents:
(3)
In this way, B acts as a relay node in the transmission. This DCC process is illustrated in Fig 2, where the straight lines with arrows represent transmission routes and directions from S to B and B to D. Hence, as shown by the bold line in Fig 2, if D requires D123, DCC takes advantage of the fact that B has already received and cached D12 prior to this transmission, and S need only send D3 to B, whereupon B sends D123 to D to complete the transmission. In this way, transmission time and collisions are reduced, resulting in increased throughput.
It is an example based on Fig 1 of two-hop transmission from node S to node D via node B as a relay node based on content structured according to DCC.
The process flow of the proposed model is illustrated in Fig 3. As discussed, high-likelihood content is determined according to the 80–20 law, and high-likelihood content is cached by nodes during the idle time of low traffic periods, preparing for transmission to receivers. If the high-likelihood content required by a receiver has not been pre-fetched and cached, its request will be sent by the server. All content of low likelihood is transmitted by the server in the WANET system.
The algorithm is based on Yes/No (Y/N) judge model.
Analysis and simulations
Analysis
We first present a performance analysis of the proposed model. In the proposed network, we employ a retransmission scheme based on the carrier-sense multiple access with collision avoidance (CSMA/CA) mechanism, such that, if a sender node i fails in contending for transmission or the packets are not successfully received by a receiver node, node i will retransmit the packet after a back-off period in the range [0,wi), where , and the value of ωi depends on the number of unsuccessful transmission packets sent by i. In our system, the total number of nodes participating in transmission is n, and the set of these nodes is represented as Sn. The set Sc represents the set of nodes contending for transmission. If a node in Sc has a transmission task, it will send packets within a period
. Otherwise, the transmission is failed. Thus, the probability of a packet being successfully transmitted for Sc can be given by
(4)
where
represents the probability that packet transmission has failed. Therefore, the probability of successful transmission, herein defined as the PDR, can be expressed as
(5)
where PSD represents the probability of successful transmission without retransmission,
and
represent the probability of successful retransmission for nodes i and j, respectively, and PC represents the probability of a node contending for transmission. In addition, we assume that the content requiring transmission is a Markov process. According to the example shown in Fig 2, the probability that content Da(n+1) must be transmitted at time Tn+1 is given as follows.
(6)
Here, Da1,Da2…Da(n+1) ∈ Content 2(D).
The throughput of the presented model is defined as
(7)
Here,
is the stationary probability of the Markov process discussed above, and
is the total transmission time of node i, which can be calculated as
(8)
where
,
, and
are the successful transmission time, empty slot time, and contending time of node i, respectively.
Simulations
In the simulations, we assume that the collection of all nodes in the WANET covers an area 2000 m × 2000 m square, and that the transmission range of each node is 20 m. The simulations were conducted using the NS-3.26 discrete event network simulator. The parameters are summarized in Table 1. We compared the throughput and PDR performances of our CDCC model with those of the uncoded caching model, centralized code caching model, PTMAC, and NCAC-MAC. High-likelihood content was determined according to the 80–20 law in the simulations, and the CDCC model was simulated with w = 23 = 8 or w = 24 = 16. In addition, PTMAC does not use back-off scheme to reduce collision, NCAC-MAC utilizes random back-off scheme, and uncoded caching and centralized coded caching are not depend on back-off period. Hence, we just define the values of back-off period for CDDC to show the difference of performance.
Fig 4 shows the simulated throughput versus the number of nodes for the various transmission models considered. To include obvious high and low traffic periods in the simulations, we divided the simulation period into 2N equal periods, and assigned M slots to each period, where N and M are integers. Low traffic periods were assigned to the 1st, 3rd, …, (2N − 1)th periods, where an average of either 25% or 10% of the nodes of all slots had transmission tasks, while high traffic periods were assigned to all other periods, where an average of either 75% or 90% of the nodes of all slots had transmission tasks. These are respectively represented herein as the 25%–75% condition (denoted in the figures by '//') and the 10%–90% condition (denoted in the figures by '#'). We employed N = 5 in the simulations. The simulation results shown in Fig 5 and Fig 6 employ only the 25%–75% condition.
The simulation is based on two conditions, 25%–75% condition and 10%–90% condition, respectively.
This comparison is based on 25%–75% condition.
This simulation is based on 25%–75% condition.
From Fig 4, we note that, under the 25%–75% condition, the CDCC model with w = 23 = 8 has a throughput that is nearly 12% and 18% greater than those of PTMAC and NCAC-MAC, respectively, when the number of nodes is less than 140. The main reason for this greater throughput is that coded caching helps the ContDM scheme to utilize high-likelihood content efficiently. In addition, fewer nodes lead to a faster coded caching process. For greater than 160 nodes, NCAC-MAC has a better performance than PTMAC owing to its cooperative scheme, but still has a slightly smaller throughput than that of the CDCC model. The reason is that the greater number of nodes in the CDCC model can provide more high-likelihood content, which can reduce transmission pressure and improve throughput. Under the 10%–90% condition, we note that the CDCC model demonstrates a significantly higher throughput than the other models considered. The reason for this much higher throughput is that the more highly contrasting high and low traffic periods allow for nearly all high-likelihood content to be cached in low traffic periods, which substantially reduces transmission pressure on servers during high traffic periods. The throughput of PTMAC obviously decreases with an increasing number of nodes because the collision avoidance scheme is influenced by transmission from all directions during high traffic periods. In addition, NCAC-MAC cannot adapt to the fluctuating traffic, and demonstrates 20% to 30% less throughput than the CDCC model. Fig 5 shows that the proposed CDCC scheme provides higher throughput than the uncoded caching and centralized code caching models under the 25%–75% condition. For the condition of 50%-50% high-low traffic, the proposed protocol shows a similar throughput to NCAC-MAC when the number of nodes is less than 100 and a less throughput when there are more than 100 nodes in the networks. It means that CDDC is a better choice in burst transmission networks. In addition, we note that a larger value of w also provides a higher throughput.
Fig 5. shows the reason why we select 8 sub-contents scheme in the simulations. In the simulations, the high-low-traffic rate is denoted as 25%-75%. The 4 sub-contents scheme, as described in (9), does not take full use of the sub-contents scheme, so when the number of nodes is small, the throughput is unsatisfactory. On the other hand, the 16 sub-contents scheme, as described in (10), works worse in large scale nodes networks. Because too many contents transmitted by large numbers of nodes more easily lead to collisions in the transmission. That is why the throughput of 16 sub-contents decreases significantly when the number of nodes is more than 100.
Fig 7 shows the PDR values of the five models under the 25%–75% condition, where the CDCC model was simulated with w = 23 = 8. PDR is a crucial evaluation of network performance, and also influences the throughput of networks. We note that the PDR values of all five models decrease with an increasing number of nodes. The CDCC model demonstrates the highest PDR among the four models considered due to its use of DCC and the effect of caching on the retransmission scheme. Here, if content is unsuccessfully transmitted, the sender only needs to retransmit the missing sub-content rather than the entire content. While the PDR values of both PTMAC and NCAC-MAC are only 3–5% less than that of the CDCC model, the PDR values of the other two models considered are as much as 30% less than that of CDCC. The reasons for these substantially lower performances is that uncoded caching disturbs the asynchronous demand of networks and leads to a greater number of transmission collisions than CDCC, and centralized coded caching cannot handle with ContDM scheme efficiently in the network.
This simulation is based on 25%–75% condition.
As shown in Fig 8, we simulate the delay of CDDC and compare to PTMAC and NCAC-MAC. It is obvious that PTMAC performs better when the number of nodes is small than 140. CDDC has a similar delay to NCAC-MAC when the number of nodes is less than 100. However, for a large scale of networks with more than 160 nodes, CDDC has an about 3% and 20% delay than PTMAC and NCAC-MAC. The reason is that more nodes provide more popular contents caching, in this way, nodes can obtain contents more easily and reduce the traffic load and delay. Meanwhile, when the number of nodes is less than 100, the advantage of popular contents caching cannot counteract the delay which is caused by computational work, so CDDC does not have a better performance on delay reducing than others.
This simulation is based on 25%–75% condition.
Conclusion
In this paper, we present a cross-layer transmission model for WANETs based on ContDM in the MAC layer combined with DCC in the PHY layer. In the proposed model, the ContDM scheme can improve the transmission performance of a WANET by making full use of low traffic periods to reduce transmission pressure during high traffic periods. Relative to the uncoded caching and centralized code caching schemes, DCC is more flexible, making it well suited for use in large scale WANETs. In addition, DCC can also reduce transmission congestion. Simulation results show the improvements on the transmission performance. These improvements are also of great benefit to practical WANET applications such as the IoT and vehicle networks, particularly for burst communication systems. In the future, we will focus on reducing energy consumption and developing applications of the proposed transmission model.
References
- 1. Ye Q, Zhuang W. Distributed and adaptive medium access control for Internet-of-Things-enabled mobile networks. IEEE Internet of Things Journal. 2017 Apr;4(2):446–60.
- 2. Shi H, Prasad RV, Onur E, Niemegeers IG. Fairness in wireless networks: Issues, measures and challenges. IEEE Communications Surveys & Tutorials. 2014 Jan 1;16(1):5–24.
- 3. Kiskani M. K., & Sadjadpour H. R. (2017). Throughput analysis of decentralized coded content caching in cellular networks. IEEE Transactions on Wireless Communications, 16(1), 663–672.
- 4.
Jeon, S. W., Hong, S. N., Ji, M., & Caire, G. (2015, June). Caching in wireless multihop device-to-device networks. In Communications (ICC), 2015 IEEE International Conference on, pp. 6732–6737. 10.1109/ICC.2015.7249398
- 5. Al-Medhwahi M, Hashim F, Ali BM, Sali A. Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks. PloS one. 2016 Jun 3;11(6):e0156880. pmid:27257964
- 6. Almotairi KH, Shen XS. A distributed multi-channel MAC protocol for ad hoc wireless networks. IEEE Transactions on Mobile Computing. 2015 Jan 1;14(1):1–3.
- 7. Jiang X, Du DH. PTMAC: A prediction-based TDMA MAC protocol for reducing packet collisions in VANET. IEEE Transactions on Vehicular Technology. 2016 Nov;65(11):9209–23.
- 8. Wang X, Li J. Network coding aware cooperative MAC protocol for wireless ad hoc networks. IEEE transactions on Parallel and Distributed Systems. 2014 Jan;25(1):167–79.
- 9. Maddah-Ali MA, Niesen U. Coding for caching: fundamental limits and practical challenges. IEEE Communications Magazine. 2016 Aug;54(8):23–9.
- 10. Kiskani M. K., & Sadjadpour H. R. (2017). A Secure Approach for Caching Contents in Wireless Ad Hoc Networks, IEEE Transactions on Vehicular Technology. 66(11), pp. 10249–10258.