Performance Analysis of The Statistical Priority-Based Multiple Access
Performance Analysis of The Statistical Priority-Based Multiple Access
Abstract—Statistical Priority-based Multiple Access (SPMA) is CTS packet containing the message indicating resource
the MAC protocol used for Tactical Targeting Network allocated to the sender is sent back. In this way, it is
Technology(TTNT), the next generation of Data Link System guaranteed that different nodes get orthogonal resource.
of the US Army. As a new MAC protocol on testing and to be However the use of RTS/CTS increases the time cost to
used in the near future, SPMA is required to support for second level.
multiple different Classes of Services(COS), provide a much
lower latency for packets with high priority and an extremely
high first transmission success rate for all packets sent out. All
these properties make SPMA a much better protocol for
Aeronautical Ad-hoc Network(AANET) than others. In this
paper we propose a simple but accurate analytical model to
compute the Slot Transmission Probability(STP) in
assumption of saturated input. With the STP, we get the mean
delay, packet loss rate, throughput and other properties of the
system. Simulation implemented support the accuracy of the
analytical model. All results show that SPMA can guarantee
the timeliness and reliability of the highest priority and
maintain the stability of the system throughput.
° g j (0, t ) e
O jt
B. Waveform Used by SPMA ,i t1
fi (t ) ®j 0 j 0
The waveform used by SPMA is a combination °1, i 0 (2)
of frequency-hopping and time-hopping. Once the Channel ¯
Occupancy allows the packet to be sent, the packet will be In(2), we assume that priority 0 is the highest priority.
parsed into a polarity of sub blocks hopped in time and The back-off of priority 0 would never be interrupted. If no
frequency [10]. Turbo code is used to do channel coding. packets with higher priority come during the process period,
FIG.3 shows the case in which sub blocks from different the mean service time of a packet with priority i should be:
users are transmitted simultaneously.
m a i 1 K m i 1 i 1
31
In FIG.5 we show plots of Γ(PSTP ) versus Pout. The
intersection point stands for the STP of the system. FIG.6
W WLPH shows the STP we get through the fixed-point equation(10)
Figure 4. Statistical sliding window. and the result from simulations. The simulation result has
tiny difference with the theoretical analysis result. The
thresholds set for priority 0 , 1, 2, 3 are 22, 18, 14, 10
respectively, which could assure that the packets sent out be
°1 J ,j 0
° i recovered from the sub blocks received with the probability
° j j
(4) higher than 99 percent . Threshold setting will be discussed
\ (ji ) ®J i fi (ba )(1 J i ),1 d j d m in the following part.
° a1
° j m
°J i fi (ba ) fi (bm ) (1 J i ), m d j d K
j m
¯ a1
We define Ui Oi X i and U
i 0
Ui . According to ¦
M/G/1 queuing theory, the probability that the priority of the
packet on service equals i is as follow:
Ui iO Xi
Pi
U P max
¦O
Figure 5. Plot of Γ(PSTP ) versus Pout
j Xj (6)
j 0
According to(3),(5) and (6), we finally get the STP as :
P max
1 (7)
PSTP ¦ p p
i 0
i
(i )
sent
Xi
In FIG.4 WT is the statistical sliding window. When a
packet get on service at time moment t, the Channel
Occupancy statistic will be compared with the threshold of
this packet. Here we express the STP as Pout. We assume
that the traffic load is same to all the nodes in the network.
Then we get that the distribution of the total number of
packets, transported in the sliding window WT , N follows
Binomial distribution as following:
P( N k ) Cnk ( Pout
k
(1 Pout )nk (8)
Figure 6. STP in analysis and simulation.
In(8), n = WT *nodeNum and nodeN um is the total node B. Transmission Success Rate
number in the network. According to(8), we get γi as (9). In SPMA, once a packet is sent out, the priority of
Ri each packet will be meaningless. All sub blocks in the
J i 1 ¦ P( N k ), 0 d i d Pmax channel have the same rate to collide with others. The
k 0 (9) number of sub blocks transported on one frequency in
each second has the mean value as
Ri is threshold set for priority i. (8) and (9) show Nb nodeNum Pout ˈNf is the number of frequency
that γi is an expression of Pout while PSTP is an expression O
G Nf
of γi . It is now natural to expect that the equilibrium points. We assume the length a sub block is Tb and all
behavior of the system will be characterized by the solutions
of the following fixed-point equation: the sub blocks sent out are distributed in Poison. The
probability that a sub block have no collision with others
Pout *( PSTP ) (10) is Pbs = e−2Tb λ. According to the Turbo coding theory, at
32
least half of the total sub blocks should be collision free D. Mean Delay
torecover the original packet. We get the probability that a The priority queues could be analyzed as a M/G/1 pre-
packet sent out could be recovered as: emptive priority queue shown in FIG.8. New packet finds
Nb
its location in the M/G/1 queue according to its priority and
Ps ¦C
i Nb /2
i
P (1 Pbs ) Nb i
i
Nb bs
(11)
generation time.
The mean delay of a packet is defined as the time period
since the time it get into its priority queue to being captured
The thresholds setting need to assure a 99 first by the receiving terminal. The mean delay of a packet with
success. We simulated the case in which that all the priority i is E(T (i)) expressed as(13).
packets have the same priority. And get the threshold which
guarantees a first success higher than 99 as the threshold for E (Ts(i ) ) E ( Di X i Ii Tp Tt ) (13)
the highest priority. FIG.7 shows the success rate versus Di contains service time the packet needs for packets
threshold. The parameters used are shown in Section IV. As already in the queue with higher or the same priority.
we can see in FIG.7, 22 and 15 should be the threshold set Residual service time when the packet arrive is also a part of
for the highest priority when the length of statistical sliding Di. According to the theory of M/G/1 priority queue we get
window is 60 and 40 respectively. The thresholds of other mean as below:
priorities should not exceed the threshold of the highest
priority.
¦
i
j 0
U j E ( Aj ) (14)
E ( Di ) i 1
(1 ¦ U j )(1 ¦ U j )
i
j 0
j 0
33
node numbers. As we can see in the figure, throughput goes
up as the traffic load growing and then maintains at a stable
level. Yet the figure does not show it , we can imagine that
the line of nodeNum = 5 will goes up to about 19Mbps
with the load growing. The theoretical saturated throughput
get from (12) is shown in Table II, and it is almost the same
as the simulated result shown in FIG.9. FIG.10 shows the
packet loss rate of the system when the node number is 15. A
packet is thought to be lost when its back-off time exceeds K
or the queue of its priority is filled at the moment it is
generated. We can see that the loss rate of packets with
priority 0 keeps nearly 0 until the traffic load goes up to 104
packets/s. Packets of priority 3 are completed blocked when
the traffic load is about 1000 packets/s.
The mean delay of packets sent out is shown in Fig.11.
As shown in the figure, mean delay of priority 3 and priority
4 goes up to a peak and then falls down to zero gradually.
The traffic load corresponding to the peak point is the load at Fig.ure 10. Packet loss rate of the system.
where the loss rate of packets with the same priority goes up
to nearly 100 percent in FIG.10. The mean delay of packets
with priority 0 keeps nearly 40 slots while the load is blow
14000 packets/s . In our simulation the largest value of mean
delay of priority 0 happens when the load is 50000 packets/s
as 374 slots, about 7.48 milliseconds.
TABLE I. PARAMETERS USED FOR
SIMULATION.
Parameters Values
Packet Lenght(L) 1000bits
Number of sub blocks from one packet(Nb) 32
Number of frequency points(Nf ) 30
Lenght of sub block(Lb) 100bits
Length of each priority queue(Lq ) 100
Minimum back-off window(W) 32
Channel transmission rate(Vchannel) 10e6bps
V. CONCLUSION
In the paper, we present a fixed-point way to analyze the
SPMA MAC protocol. By solving the fixed-point equation,
we get STP the probability that one node have a packet sent
out in an arbitrary slot. With the STP, we get the expression
of system throughput. We also analyzed the mean delay of
packets with different priority using of M/G/1 queuing
theory. Relationship between threshold setting and packet
transmission success rate is also analyzed in this paper. Both
analysis and simulation results show that SPMA could
provide extremely short delay to packets with the highest
priority and a first success higher than 99 percent for all
packets sent out. The throughput of system could also
maintains in a stable level by using SPMA.
ACKNOWLEDGEMENT
This work is supported by the National Natural Science
Foundation of China (No.61631004) and the National Sci-
Figure 9. Throughput of the system.
ence and Technology Major Project of China under Grant
2016ZX03001017.
34
REFERENCES COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012. IEEE,
2012: 1-6.
[6] Xu D, Zhang H, Zheng B, et al. “A priority differentiated and multi-
[1] Wu J, Stojmenovic I. “Ad hoc networks[J]. COMPUTER-IEEE channel MAC protocol for airborne networks[C]//Communication
COM- PUTER SOCIETY-, 2004, 37(2): 29-31. Soft- ware and Networks (ICCSN), 2016 8th IEEE International
[2] Rak J, Jonsson M, Vinel A. A taxonomy of challenges to resilient Conference on. IEEE, 2016: 64-70.
message dissemination in VANETs[C]//Telecommunications [7] Li J, Zhou Y, Lamont L, et al. “Packet delay in UAV wireless
Network Strategy and Planning Symposium (Networks), 2016 17th networks under non-saturated traffic and channel fading conditions[J].
International. IEEE, 2016: 127-132. Wireless personal communications, 2013, 72(2): 1105-1123.
[3] Böhm A. Delay-sensitive wireless communication for cooperative [8] Clark S M, Hoback K A, Zogg S J F. “Statistical priority-based
driving applications[D]. Halmstad University Press, 2013. multiple access system and method: U.S. Patent 7,680,077[P]. 2010-
[4] Li J, Gong E, Sun Z, et al. “An interference-based distributed TD- 3-16.
MA scheduling algorithm for aeronautical ad hoc [9] Bianchi G. “Performance analysis of the IEEE 802.11 distributed
networks[C]//Cyber- Enabled Distributed Computing and Knowledge coor- dination function[J]. IEEE Journal on selected areas in
Discovery (CyberC), 2013 International Conference on.IEEE, 2013: communications, 2000, 18(3): 535-547.
453-460. [10] Zogg S J, Clark S M, Haendel R S, et al. “Waveform for virtually
[5] Ripplinger D, Narula-Tam A, Szeto K. Scheduling vs. random access simultaneous transmission and multiple receptions system and method:
in frequency hopped airborne networks[C]//MILITARY U.S. Patent 7,830,781[P]. 2010-11-9.
35