Skip to main content
Log in

Symptotics: a framework for estimating the scalability of real-world wireless networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

We present a framework for non-asymptotic analysis of real-world multi-hop wireless networks that captures protocol overhead, congestion bottlenecks, traffic heterogeneity and other real-world concerns. The framework introduces the concept of symptotic scalability to determine the number of nodes to which a network scales, and a metric called change impact value for comparing the impact of underlying system parameters on network scalability. A key idea is to divide analysis into generic and specific parts connected via a signature—a set of governing parameters of a network scenario—such that analyzing a new network scenario reduces mainly to identifying its signature. Using this framework, we present the first closed-form symptotic scalability expressions for line, grid, clique, randomized grid and mobile topologies. We model both TDMA and 802.11, as well as unicast and broadcast traffic. We compare the analysis with discrete event simulations and show that the model provides sufficiently accurate estimates of scalability. We show how our impact analysis methodology can be used to progressively tune network features to meet a scaling requirement. We uncover several new insights, for instance, on the limited impact of reducing routing overhead, the differential nature of flooding traffic, and the effect real-world mobility on scalability. Our work is applicable to the design and deployment of real-world multi-hop wireless networks including community mesh networks, military networks, disaster relief networks and sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. For example a multi-hop wireless network with directional antennas—is asymptotically unscalable  [4], but theoretically scales to 14000 nodes with a \(30^{\circ }\) beamwidth [7].

  2. The typical multi-hop wireless network is asymptotically unscalable [2]. While our framework can accommodate asymptotically scalable networks as well, these are largely uninteresting from a symptotic viewpoint as the scalability is infinite nodes.

  3. An alternate model/assumption would be multiple unicast transmissions at the link layer, and can also be easily analyzed with our framework if necessary.

  4. This is assuming the carrier sense range is same as transmission range. In reality, the carrier sense range depends on the radio. The assumptions is not critical in the context of the framework, that is, should the carrier sense range be two hops, one would merely replace the signature component to 4.

  5. More precisely, \(N \times \lambda \times O\big (\sqrt{\frac{N}{\rho }}\big ) \le N/\rho \implies N \le O\big ( \frac{1}{\lambda ^2\rho }\big ).\)

  6. Technology choices offer a range of factor-of improvements, and rather than pick different \(\alpha\)’s for each, we have simply picked the smallest integer factor, namely 2, for simplicity. The relative CIVs for \(\alpha = 2\) should adequately capture the relative CIVs with other \(\alpha\)’s for our purposes.

  7. Although our impact analysis has not considered mobile networks, we have used an LSU source rate of 0.2 LSUs per second which captures mobilities with link dynamics of up to once every 5 s.

References

  1. Morrow, G. R. (1970). Proclus: A commentary on the first book of Euclid’s Elements. Princeton: Princeton University Press.

    Google Scholar 

  2. Gupta, P., & Kumar, P. R. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46, 388–404.

    Article  MathSciNet  MATH  Google Scholar 

  3. Grossglauser, M., & Tse, D. (2002). Mobility increases the capacity of ad-hoc wireless networks. IEEE/ACM Transactions on Networking, 10, 477–486.

    Article  Google Scholar 

  4. Yi, S., Pei, Y., & Kalyanaraman, S. (2003). On the capacity improvement of ad hoc wireless networks using directional antennas. In In 4th ACM MobiHoc, pp. 108–116.

  5. Franceschetti, Massimo, Dousse, Olivier, Tse, David N. C., & Thiran, Patrick. (2007). Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transaction on Information Theory, 53(3), 1009–1018.

    Article  MathSciNet  MATH  Google Scholar 

  6. Ozgur, A., Leveque, O., & Tse, D. N. C. (2007). Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Transaction on Information Theory, 53, 3549–3572.

    Article  MathSciNet  MATH  Google Scholar 

  7. Ramanathan, R., Allan, R., Basu, P., Feinberg, J., Jakllari, G., Kawadia, V., et al. (2010). Scalability of mobile ad hoc networks: Theory vs practice. PROC. IEEE MILCOM, 2010, 493–498.

    Google Scholar 

  8. Stein, W. A. et al. (2011). Sage mathematics software (Version 4.7.2). The Sage Development Team. http://www.sagemath.org.

  9. Ciucu, F., Hohlfeld, O., & Hui, P. (2010). Non-asymptotic throughput and delay distributions in multi-hop wireless networks. In 48th annual allerton conference, pp. 662 –669, October.

  10. Penna, F., Garello, R., Figlioli, D., & Spirito, M. A. (2009). Exact non-asymptotic threshold for eigenvalue-based spectrum sensing. In Proceedings of CROWNCOM ’09, pp. 1 –5, June.

  11. Liebeherr, J., Burchard, A., & Ciucu, F. (2010). Non-asymptotic delay bounds for networks with heavy-tailed traffic. In Proceedings of IEEE INFOCOM, pp. 1–9, March.

  12. Jun, Jangeun, & Sichitiu, M. L. (2003). The nominal capacity of wireless mesh networks. Wireless Communications, IEEE, 10(5), 8–14.

    Article  Google Scholar 

  13. Bisnik, N., & Abouzeid, A. (2006). Delay and throughput in random access wireless mesh networks. In Proceedings of ICC ’06, Vol.1, pp. 403–408.

  14. Bianchi, G. (2000). Performance analysis of the ieee 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), 535–547.

    Article  Google Scholar 

  15. Jangeun, J., Peddabachagari, P., & Sichitiu, M. (2003). Theoretical maximum throughput of ieee 802.11 and its applications. In Proceedings of of NCA 2003, June.

  16. Jindal, Apoorva, & Psounis, Konstantinos. (2009). The achievable rate region of 802.11-scheduled multihop networks. IEEE/ACM Transaction on Network, 17, 1118–1131.

    Article  Google Scholar 

  17. Clausen, T., & Jacquet, P. (2003). Optimized link state routing. In IETF RFC, Vol. 3626.

  18. Nguyen, D., & Minet, P. (2007). Analysis of mpr selection in the olsr protocol. In Proceedings of AINAW ’07, Vol. 2, pp. 887–892, May.

  19. Mergen, G., & Tong, L. (2005). Stability and capacity of regular wireless networks. IEEE Transaction on Information Theory, 51(6), 1938–1953.

    Article  MathSciNet  MATH  Google Scholar 

  20. Barrenetxea, Guillermo, Berefull-Lozano, Baltasar, & Vetterli, Martin. (2006). Lattice networks: capacity limits, optimal routing, and queueing behavior. IEEE/ACM Transaction on Network, 14, 492–505.

    Article  Google Scholar 

  21. Zhang, Ning, & Anpalagan, Alagan. (2010). Sensitivity of swan qos model in manets with proactive and reactive routing: a simulation study. Telecommunication Systems, 44, 17–27.

    Article  Google Scholar 

  22. Baras, J. S., Perumal, S., Tabatabaee, V., Somasundaram, K., & Purkayastha, P. (2008). Loss network models and multiple metric performance sensitivity analysis for mobile wireless multi-hop networks. In Proceedings of WICON ’08.

  23. Urgaonkar, R., Manfredi, V., & Ramanathan, R. (2013). Scalability analysis of grid-based multi-hop wireless networks. In IEEE communication systems and networks (COMSNETS).

  24. Ramanathan, R., Samanta, A., & La Porta, T. (2012). Symptotics: A framework for analyzing the scalability of real-world wireless networks. In Proceedings of the 9th ACM PE-WASUN, pp. 31–38. ACM.

  25. Hanly, S. V., & Tse, D. N. C. (1998). Multiaccess fading channels. II. Delay-limited capacities. IEEE Transactions on Information Theory, 44(7), 2816–2831.

    Article  MathSciNet  MATH  Google Scholar 

  26. Urgaonkar, R., & Neely, M. J. (2014). Delay-limited cooperative communication with reliability constraints in wireless networks. IEEE Transactions on Information Theory, 60(3), 1869–1882.

    Article  MathSciNet  Google Scholar 

  27. Shi, Yi, Thomas Hou, Y., Liu, Jia, & Kompella, Sastry. (2013). Bridging the gap between protocol and physical models for wireless networks. IEEE Transaction on Mobile Computing, 12(7), 1404–1416.

    Article  Google Scholar 

  28. Ramanathan, S. (1999). A unified framework and algorithm for channel assignment in wireless networks. Wireless Network, 5, 81–94.

    Article  Google Scholar 

  29. Young, C. D. (1996). Usap: A unifying dynamic distributed multichannel tdma slot assignment protocol. In Proceedings of IEEE MILCOM, October.

  30. Vassis, D., Kormentzas, G., Rouskas, A., & Maglogiannis, I. (2005). The IEEE 802.11g standard for high data rate wlans. IEEE Network, 19(3), 21–26.

    Article  Google Scholar 

  31. Redi, J., & Ramanathan, R. (2011). The DARPA WNaN network architecture. In MILITARY COMMUNICATIONS CONFERENCE, 2011—MILCOM 2011, pp. 2258–2263, November.

  32. Gupta, N., & Kumar, P. R. (2004). A performance analysis of the 802.11 wireless lan medium access control. Communications in Information and Systems, 3.

  33. Chen, Q., Schmidt-Eisenlohr F., Jiang, D., Torrent-Moreno, M., Delgrossi, L., & Hartenstein, H. (2007). Overhaul of ieee 802.11 modeling and simulation in ns-2. In Proceedings of MSWiM ’07, pp. 159–168.

  34. Gast, M.S. (2005). 802.11 Wireless networks: A definitive guide. O’Reilly Publications.

  35. Ray, S., Zhang, Y., Cao, G., La Porta, T. F., & Basu, P. (2011). Data replication in mobile tactical networks. In MILCOM 2011, Baltimore, November.

  36. Ciftcioglu, E. N., Ramanathan, R., & La Porta, T. F. (2013). Scalability analysis of tactical mobility patterns. In Military communications conference, MILCOM 2013–2013 IEEE, pp. 1888–1893, November.

  37. Hilton, P., & Pedersen, J. Catalan numbers, their generalization, and their uses. The Mathematical Intelligencer, 13, 64–75.

  38. Cormen, T., Leiserson, C. E., & Rivest, R. R. (1990). Introduction to algorithms. Cambridge, MA: MIT Press McGraw-Hill.

    MATH  Google Scholar 

Download references

Acknowledgments

Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-09-2-0053.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Ramanathan.

Additional information

The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding copyright notation here on.

Appendix: Shortest paths through degree-4 grid center

Appendix: Shortest paths through degree-4 grid center

We derive an approximate formula for the expected number of shortest paths between uniformly randomly selected nodes that go through the center of an m by m degree-4 grid containing \(N = m^2\) nodes.

Consider the route from source s to a destination d. For the path from s to d to go through the center, they must clearly lie in the opposite quadrant inclusive of the nodes parallel and perpendicular to the center. Let \(P_c(s,d)\) denote the probability that the path from s to d goes through the center, and Q(d) denote the probability that d is in the opposite quadrant. Then the expected number of paths through the center is given by

$$\begin{aligned} E[P_c] = Q(d_q)\cdot P_c(s,d)\cdot (N-1) \end{aligned}$$
(17)

Since we don’t count the center node c and s,

$$\begin{aligned} Q(d) = \frac{\left( \frac{m+1}{2}\right) ^2 - 1}{m^2 - 2} \approx \frac{1}{4} + \frac{1}{2m} \end{aligned}$$
(18)

\(P_c(s,d)\) depends upon the exact location of s and d. Instead of iterating over all values of s and d (which gets very complicated very quickly), we approximate it by assuming the average to be equal to when s and d are in the centers of their respective quadrants, and denote these nodes by \(s_q\) and \(d_q\). Let n(xy) denote the number of shortest paths from x to y. Then

$$\begin{aligned} P_c(s,d) = P_c(s_q,d_q) = \frac{n(s_q,c)\cdot n(c,d_q)}{n(s_q,d_q)} \end{aligned}$$
(19)
Fig. 12
figure 12

Reference figure for derivation

Given a square z by z grid, the number of shortest paths from one corner to another is \({2z \atopwithdelims ()z}\)[37]. Let \(b = m/4\). Then, from Fig. 12 and the above, we have

$$\begin{aligned} P_c(s,d) = \frac{{2b \atopwithdelims ()b}^2}{{4b \atopwithdelims ()2b}} \end{aligned}$$
(20)

The above is related to the concept of Catalan numbers [37]. The \(n{\hbox {th}}\) Catalan number and an approximate formula thereof [38] are given by

$$\begin{aligned} C_n = \frac{1}{n+1}\cdot {2n \atopwithdelims ()n} \approx \frac{4^n}{n^{1.5}\sqrt{\pi }} \end{aligned}$$
(21)

Using Eq. 21 in 20, we have

$$\begin{aligned} P_c(s,d) = \frac{((b+1)C_b)^2}{(2b+1)C_{2b}} \approx \frac{0.8(b+1)}{b^{1.5}} \end{aligned}$$
(22)

Re-substituting \(b = m/4\) in the above, and using this and Eq. 18 in 17, we have

$$\begin{aligned} E[P_c] &\approx \left( 0.25 + \frac{1}{2m}\right) \cdot m^2\cdot \frac{1.6(m+4)}{m^{1.5}} \\ &\approx 0.4\left( 1 + \frac{2}{m}\right) (m^{1.5} + 4m^{0.5})\\ &\approx 0.4\left( 1+ \frac{2}{\sqrt{N}}\right) (N^{\frac{3}{4}} + 4N^{\frac{1}{4}}) \end{aligned}$$

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramanathan, R., Ciftcioglu, E., Samanta, A. et al. Symptotics: a framework for estimating the scalability of real-world wireless networks. Wireless Netw 23, 1063–1083 (2017). https://doi.org/10.1007/s11276-016-1204-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1204-4

Keywords

Navigation