Keywords

1 Introduction

Because user behavior become more and more complicated and many kinds of traffic flow exist in the network, researchers proposed much more routing approaches and measurement methods for new network architecture [1,2,3]. Many researches concentrate on how to measure the traffic, build the traffic model and improve the scheduling by using the traffic model [4,5,6,7]. For guaranteeing the QoS of emerging services, new scheduling strategies are proposed [8,9,10,11]. Due to the situation of the crowed mobile communication, resources utilization [12,13,14,15], spectral efficiency [16,17,18,19] and energy-efficiency [20,21,22] become hotspots. A large number of researches also focus on flow level of traffic reconstruction [23,24,25]. New scheduling schemes, which based on the traffic characters, effectively improve the experience of users [26,27,28,29].

Researchers have explored the relationship between the number of scheduled user and the QoS requirement by the effective capacity model of wireless communication theory [12]. To some extent, the QoS is influenced by the traffic flow. Unlike the other services, the bursty data service has more sophisticated flow which is very difficult to predict [30,31,32]. The measurements of network traffic of bursty data service have shown that traffic characteristics include features which are more efficiently described in terms of fractal rather than conventional stochastic processes [33]. We found fractal dimension and long-range dependence in statistical moments that exist in corporate, local, and wide-area networks.

The rest of this paper is organized as follows. In the second section, we introduce the system model. In the third section, we present the traffic model under QoS constraint for multi-hop wireless networks. Simulation parameters and results are described in the fourth section. Finally, the conclusions are presented in the fifth section.

2 System Model

In a communication system with stable links, the switching and routing devices usually employ a large buffer to prevent the loss of packets when the arriving rate from the service source is higher than transmission rate over a short time. The key problem of QoS guarantee thus lies in analyzing the arriving queue. However, during the transmissions of these emerging bursty data services, such as speech cloud and remote control based on real-time video, we must consider the low reliability, time-varying channel and moving users of wireless environment. The effective capacity concept is a function of the probability of nonempty buffer and the QoS exponent of connection. In many researches, effective capacity is more suitable to measure the transmission capacity of time-varying channels [34,35,36,37,38]. Effective capacity model is shown in Fig. 1.

Fig. 1.
figure 1

Effective capacity model

The QoS requirement can be formulated as

$$ P_{r} \left( {\mathop {\hbox{max} }\limits_{1 \le i \le N} Q_{i} \left( 0 \right) > B} \right) \le \in \cdot $$
(1)

With a large buffer size B, given a QoS constraint \( \in \) and by choosing \( \uptheta = - \log \left( \in \right)/B \), the QoS requirement can be expressed as an effective capacity problem:

$$ \lambda \le \mathop {\hbox{min} }\limits_{1 \le j \le N} C_{k} \left( \theta \right) $$
(2)

where

$$ C_{k} \left( \theta \right) = \frac{1}{\theta }\mathop {\lim }\limits_{n \to \infty } \frac{ - 1}{n}\ln {\text{E}}\left( {e^{{ - \theta \mathop \sum \limits_{t = 1}^{n} r_{k} \left( t \right)}} } \right) $$
(3)

and \( r_{k} \left( t \right) \) is the rate allocated to user k in cell j at time t. We assume that the scheduling scheme at the base station picks the K users out of a set of N active users for stochastic transmission with the same probability. Thus, the \( r_{k} \) can be written as

$$ {\text{r}}_{k} \left( t \right) = \left\{ {\begin{array}{*{20}c} {\frac{{N_{f} }}{K}\left( {1 - \frac{B}{S}} \right)\log_{2} \left( {1 + \frac{1}{{I_{j}^{scheme} }}} \right), w.p.\frac{K}{N}, } \\ {0, w. p.1 - \frac{K}{N}.} \\ \end{array} } \right. $$
(4)

In a multi-hop wireless networks, the average packet latency at a site meets the condition [33]:

$$< t > = \mathop \smallint \nolimits_{0}^{\infty } {\text{t}} \cdot {\text{f}}\left( {\text{t}} \right){\text{dt}} = \infty$$
(5)

where, \( {\text{f}}\left( {\text{t}} \right) > 0; \mathop \smallint \limits_{0}^{\infty } {\text{f}}\left( {\text{t}} \right){\text{dt}} = 1. \) The corresponding expression for \( {\text{f}}\left( {\text{t}} \right) \) is a PDF:

$$ {\text{f}}\left( {\text{t}} \right) = \frac{\upgamma}{{\left( {1 + {\text{t}}} \right)^{{\upgamma + 1}} }},0 <\upgamma < 1 $$
(6)

This probability density function characterizes the long-range statistical dependence in bursty data service traffic model. A CDF function can be introduced as \( {\text{F}}\left(\uptau \right) \) [33]:

$$ {\text{F}}\left(\uptau \right) = 1 - \mathop \smallint \limits_{0}^{\uptau} {\text{f}}\left( {\text{t}} \right){\text{dt}} = \frac{1}{{\left( {1 +\uptau} \right)^{\upgamma} }} $$
(7)

where \( \uptau \) is the time a packet stays at an intermediate site x of the virtual connection. We suppose that the site is a connection device with an infinite buffer, the most probable number of packets in site x at the moment t can be denoted as:

$$ {\text{n}}\left( {{\text{x}};{\text{t}}} \right) = \mathop \smallint \limits_{0}^{\text{t}} {\text{n}}\left( {{\text{x}} - 1;{\text{t}} -\uptau} \right){\text{f}}\left(\uptau \right){\text{d}}\uptau + {\text{n}}_{0} \left( {\text{x}} \right){\text{F}}\left( {\text{t}} \right) $$
(8)

where \( n_{0} \left( x \right) \) is the initial number of packets in the buffer of site x before the packet’s arrival from site x-1. In this notation, the equation of packet migration can be presented as

$$ \varGamma \left( {1 -\upgamma} \right){\text{D}}_{\text{t}}^{\upgamma} \left[ {{\text{n}}\left( {{\text{x}};{\text{t}}} \right)} \right] = - \frac{{\partial {\text{n}}\left( {{\text{x}};{\text{t}}} \right)}}{{\partial {\text{x}}}} + \frac{{{\text{n}}_{0} \left( {\text{x}} \right)}}{{{\text{t}}^{\upgamma} }} $$
(9)

Where the left part of Eq. (9) is the fractional derivative of function \( {\text{n}}\left( {{\text{x}};{\text{t}}} \right) \) with an exponent parameter \( \upgamma \), and

$$ {\text{D}}_{\text{t}}^{\upgamma} \left[ {{\text{n}}\left( {{\text{x}};{\text{t}}} \right)} \right] = \frac{1}{{\varGamma \left( {1 -\upgamma} \right)}}\mathop \smallint \limits_{0}^{\text{t}} \frac{{{\text{n}}\left( {{\text{x}};{\text{t}}} \right)}}{{\left( {{\text{t}} -\uptau} \right)^{\upgamma} }}{\text{d}}\uptau \cdot $$
(10)

Taking into account the discrete character of change of the variable x, [33] solves Eq. (17) subject to the following initial conditions: \( {\text{n}}_{0} \left( 0 \right) = {\text{n}}_{0} \) and \( {\text{n}}_{0} \left( {\text{k}} \right) = 0 \), \( {\text{k}} = 1,2, \ldots \) In [33], the Eq. (8) can be rewritten as:

$$ \text{n}\left( {\text{k;t}} \right) = \text{n}_{0} \left\{ {\frac{1}{{\text{t}^{\upgamma} }} - \text{k}\frac{{\varGamma^{2} \left( {1 -\upgamma} \right)}}{{\varGamma \left( {1 - 2\upgamma} \right)t^{{2\upgamma}} }} - \text{k}\varGamma \left( {1 -\upgamma} \right) \cdot \frac{1}{{\varGamma \left( { -\upgamma} \right)\text{t}^{{{\gamma + 1}}} }}} \right\} $$
(11)
$$ \text{n}\left( {\text{k;t}} \right) = \text{n}_{0} \left\{ {\frac{1}{{\text{t}^{\upgamma} }} - \text{k}\left[ {\frac{{\varGamma^{2} \left( {1 -\upgamma} \right)}}{{\varGamma \left( {1 - 2\upgamma} \right)}} \cdot \frac{1}{{\text{t}^{{{2\gamma }}} }}\text{ + }\frac{{\varGamma \left( {1 -\upgamma} \right)}}{{\varGamma \left( { -\upgamma} \right)}} \cdot \frac{1}{{\text{t}^{{{\gamma + 1}}} }}} \right]} \right\} $$
(12)

Taking into account the asymptotic property of the obtained solution, we can get

$$ {\text{n}}\left( {0;{\text{t}}} \right) = {\text{n}}_{0} \left\{ {\frac{1}{{{\text{t}}^{\upgamma} }}} \right\} $$
(13)

For k = 1, the following expression is obtained:

$$ {\text{n}}\left( {1;{\text{t}}} \right) = {\text{n}}_{0} \left\{ {\frac{1}{{{\text{t}}^{\upgamma} }} - \left[ {\frac{{\varGamma^{2} \left( {1 -\upgamma} \right)}}{{\varGamma \left( {1 - 2\upgamma} \right)}} \cdot \frac{1}{{{\text{t}}^{{2\upgamma}} }} + \frac{{\varGamma \left( {1 -\upgamma} \right)}}{{\varGamma \left( { -\upgamma} \right)}} \cdot \frac{1}{{{\text{t}}^{{\upgamma + 1}} }}} \right]} \right\} $$
(14)

Finally in [33], with the initial conditions \( {\text{n}}\left( {0;{\text{t}}} \right) = {\text{n}}_{0} \cdot\updelta\left( {\text{t}} \right) \), the cumulative number of blogged packets is presented as:

$$ \begin{aligned} {\text{c}}\left( {{\text{m}};{\text{t}}} \right) = {\text{n}}_{0}^{2} \varGamma \left( {1 -\upgamma} \right)\left[ {\frac{1}{{\varGamma \left( {1 - 2\upgamma + 1} \right)}} \cdot \frac{1}{{{\text{t}}^{{2\upgamma - 1}} }} - {\text{m}}\frac{{\varGamma \left( {1 -\upgamma} \right)}}{{\varGamma \left( {1 - 3\upgamma + 1} \right)}} \cdot \frac{1}{{{\text{t}}^{{3\upgamma - 1}} }}} \right] \hfill \\ = {\text{n}}_{0}^{2} \varGamma \left( {1 -\upgamma} \right){\text{t}}^{{1 - 2\upgamma}} \left[ {\frac{1}{{\varGamma \left( {2 - 2\upgamma} \right)}} - {\text{m}}\frac{{\varGamma \left( {1 -\upgamma} \right)}}{{\varGamma \left( {2 - 3\upgamma} \right)}} \cdot \frac{1}{{{\text{t}}^{\upgamma} }}} \right] \hfill \\ \end{aligned} $$
(15)

This correlation function decays hyperbolically with increasing t. Therefore for \( \upgamma < 1 \), such random processes have a fractal-like scaling behavior. Set m = 0, we get:

$$ {\text{D}}\left( {\text{t}} \right) = {\text{c}}\left( {0;{\text{t}}} \right) = \frac{{{\text{n}}_{0} \varGamma \left( {1 -\upgamma} \right)}}{{\varGamma \left( {2 - 2\upgamma} \right)}}{\text{t}}^{{1 - 2\upgamma}} $$
(16)

3 Traffic Model Under QoS Constraint

Effective capacity theory provides a powerful framework to describe the relationship between transmission rate fluctuations and QoS constraints. The proposed model adopts only one QoS exponent parameter that represents two parameters, namely a delay constraint and buffer size. When the QoS exponent θ is equal to 0, rate fluctuations do not affect the effective capacity, which is equal to the average transmission rate. As the QoS requirement becomes stricter, the transmission rate fluctuations lead to a decline in effective capacity, which corresponds to the probability of delay violation. More specifically, higher fluctuation levels lead to lower effective capacity, which means higher probability of delay violation. The transmission rate fluctuations and QoS constraints is shown in Fig. 2.

Fig. 2.
figure 2

The transmission rate fluctuations and QoS constraints

With a fixed buffer size B and QoS constraint:

$$ \uptheta = \frac{ - \ln \left( \in \right)}{\text{B}} $$
(17)

The \( \in \) represents the violation probability:

$$ \Pr \left( {\text{t} > \frac{B}{{C\left(\uptheta \right)}}} \right) < \in $$
(18)

Combining the Eq. (7), we obtain:

$$ \in = \text{F}\left(\uptau \right) = \frac{1}{{\left( {1 +\uptau} \right)^{\upgamma} }} $$
(19)

Finally, we get a rough relationship between QoS parameter and the fluid model parameter \( \upgamma \):

$$ \upgamma = \log_{{\left( {1 + \frac{\text{B}}{{\text{C}\left(\uptheta \right)}}} \right)}} \left( {\frac{1}{ \in }} \right) $$
(20)

4 Simulation and Results

We make simulation with fixed buffer size and QoS constraint to investigate the relationship between the QoS requirement and traffic model. Considering 10 intermediate sites, the violation probability is set as 0.001. The buffer size and bandwidth are set as 10Mbits and 10 MHz, respectively.

The simulation results are shown in Fig. 3. It shows the relationship between latency constraint and the distribution character of the fluid model. The expected blogged packet in one site is presented in Fig. 4. It based on the dynamic channel state that can achieve a certain QoS.

Fig. 3.
figure 3

QoS requirement and distribution of fluid model.

Fig. 4.
figure 4

QoS requirement and blogged length.

As shown in Fig. 3, When the latency constraint is between [−2, 2], the allowable arrival rate remains constant; when the latency constraint is between [2, 8], the allowable arrival rate gradually decreases; when the latency constraint is between [8, 10], the allowable arrival rate almost approaches 0. As shown in Fig. 4, When the latency constraint is between [−2, 4], the expected blogged packet number remains constant, When the latency constraint is between [4, 10], the expected blogged packet number gradually increase.

As shown in Fig. 5, in the scope of our simulation, we can find that the probability of data loss increases gradually with the decrease of buffer capacity. So in order to reduce packet loss, we should increase the buffer size as much as possible.

Fig. 5.
figure 5

Packet loss rate and buffer size

5 Conclusion

We explore the possibility of an indefinitely long packet delay at an intermediate node in Multi-hop wireless networks with QoS constraint. The QoS constraint is described as effective capacity, which is related to violation probability. To describe the traffic model of busrty data service, we adopt fractional calculus fluid model. The simulation results show that the effective capacity affects the traffic model. As the latency constraint increases, the allowable arrival rate remains constant. It will gradually decreases after specific number of the latency constraint. On the other hand, the packet loss rate increases as the buffer gets smaller, so we should try to maximize the buffer size.