# Performance Analysis of Collision of Exponential Jitter Mechanism in Wireless Networks

- 58 Downloads

## Abstract

Jittering, a small delay imposed before forwarding a packet, has been used in wireless communication for many purposes. For instance, AODV routing protocol uses jitter mechanism to prevent simultaneous transmission of nodes in route discovery stage, which reduces collisions. Recently, many works have studied possibility of using different random variables with different parameters for jittering rather than a simple uniform random variable. It has been shown that other random variables including Exponential and Pareto distributions can also be beneficial. In this paper, we first propose a discrete time Markov model to capture the behavior of nodes in route discovery stage when they use exponential distribution for their jitter mechanism. With this model, we obtain the number of collisions and route discovery time mathematically, which is proven to be accurate by simulation. We also use our model to find the optimum value of \(\lambda\), exponential distribution parameter, which somehow minimize the probability of collision and route discovery time. We further obtain some equations that give us the relation between parameters of different jitter mechanisms such that their route discovery stage takes almost equal time, which is used for fair comparison. Finally, we show that the exponential jitter mechanism using our optimum \(\lambda\) outperform other jitter mechanisms.

## Keywords

Markov model Jitter mechanism Wireless routing protocol## 1 Introduction

Broadcast or flooding has many applications in wireless networks such as Wireless Sensor Networks (WSNs), Mobile Ad Hoc Networks (MANETs), and Vehicular Ad Hoc Networks (VANETs) [1]. In many routing protocols, flooding is an important part of route discovery phase in which a source tries to find a path to a destination using flooding, like AODV [2].

In simple flooding algorithm, all nodes that receive RREQ packets forward the packet only once. However, that all adjacent nodes receive the RREQ packet and schedule forwarding almost at the same time leads to packet collisions. To ameliorate this situation, each node schedules a random back-off time so that the chance of simultaneous transmission reduces [3]. This mechanism, standardized in [4], is called jitter mechanism.

The effect of jitter has been studied in some wired and wireless IP networks [5, 6]. The influence of broadcast mechanism for different applications in wireless ad hoc networks has been also studied. For instance, the effect of broadcast traffic on CSMA, which uses back-off mechanism, has been studied in [7]. One of the most useful application of Jitter mechanisms is in route discovery stage. This mechanism has been already recommended for many routing protocols such as AODV [2] and LOADng [8].

The effect of uniform jitter mechanism on route discovery stage has been widely studied in [9, 10, 11]. In uniform jitter mechanism, each node selects the jitter value randomly from a uniform distribution, \(U\sim [0,C]\), where *C* is the maximum value of jitter [12]. Other jitter mechanisms based on uniform distribution, in which the parameters of uniform distribution are only different, have been also studied. For instance, window jitter mechanism uses \(U\sim [\alpha C,C]\) where \(\alpha \in (0,1)\) [3, 13]. In [14], the usefulness of jitter mechanisms based on other distributions such as Exponential and Pareto has been studied.

In broadcast and jitter mechanisms, collision and time required to finish the whole stage is highly important. Some works have already proposed analytical models for flooding in MANET [15] and collision in AODV routing protocol [16]. However, the effect of behavior of other mechanisms, such as exponential jitter mechanism, has not been studied yet. In this paper, we analytically model the route discovery stage of exponential jitter mechanism and use our model to find the optimum value of Exponential distribution parameter.

In Sect. 2, we propose two discrete time Markov chains (DTMC) to capture the behavior of the networks in route discovery stage. We also obtain the optimum value of Exponential distribution parameter which leads to fewer collisions and low discovery time in Sect. 3. In Sect. 4, we obtain some formulas that allow us to select parameter of uniform and window jitter mechanisms such that their comparison with exponential jitter mechanism becomes fair. In Sect. 5, not only our models are validated by simulations, but also our analysis toward finding optimum parameter for exponential jitter mechanism is shown to be beneficial. Finally, the conclusion is given in Sect. 6.

## 2 Markov Models

In this section, we aim to model the route discovery process of reactive routing protocols by an absorbing DTMC. The transmission range of all nodes are assumed to be equal. Whenever a node sends a packet, all nodes in its transmission range will receive the packet. We called the area whose nodes receive this packet a receiving area which is a circle of radius R, defined as the tranmission range. We assume that if one observes the behavior of any arbitrary receiving area, almost same behavior will be measured regarding route discovery process. Although it might not be completely true in reality, this assumption makes the analytical modeling feasible. Hence, we aim to model one of these receiving area.

We have provided two models. Our first model is simpler, but not very accurate. However, since it contains fewer number of states and has a 2-dimensional structure, it can be shown and understand easier. Our second model is built upon our first model and is more accurate. Since it has a 3-dimensional structure, it is not possible to show the corresponding Markov chain clearly, but its similarity to our first model helps to comprehend the model.

### 2.1 First Model

*n*neighboring nodes receiving this RREQ packet choose random delay from an exponential distribution and forward the RREQ packet after the delay. This is called exponential jitter mechanism [14]. We assume all receiving nodes are contributing in route discovery process and there is no other traffic in the network. Given that the time needed to send and propagate a packet is

*s*, we divide the time into slots of size

*s*and assume that nodes only send RREQ packets at the beginning of slots. This assumption will be elminated in the second model. The first slot, at time \(t=0\), indicates the reception of RREQ packet by all neighboring nodes. We assume all nodes forward the RREQ packet only once whether the transmission is successful or unsuccessful. The probability that a node forward the RREQ packet at the first slot, denoted by

*P*(1), is as follows

*P*(

*i*), is equal to

*P*(1) owing to the memoryless property of exponential distribution. Thus, the probability of forwarding is hereafter represented by

*P*without any time index. It is assumed that all nodes use the same parameter for exponential distribution, \(\lambda\). Hence, The probability that

*k*nodes forward in the slot

*t*, knowing that

*i*nodes have already forwarded in the previous slots, has a binomial distribution, denoted by \(N_{(i,k)}(t)\). This can be expressed as follows (\(0\le i\le n , 0\le k\le n-i\))

*i*,

*P*, is independent of the time, \(N_{(i,k)}(t)\) is also independent of the time. As a result, we drop the

*t*index and write \(N_{(i,k)}\). Now, an absorbing discrete time Markov chain (DTMC) is built upon these slots. Let \(\pi _{(i,k)}\) (\(0\le i\le n ,\ 0\le k\le n-i\)) denotes the states of the DTMC in which

*i*represents the number of nodes that have already forwarded the RREQ packet in the previous slots and

*k*represents the number of nodes that are forwarding the packet at this slot. The corresponding DTMC is shown in Fig. 1 for the case when there are only 3 nodes.

*N*(0, 0), DTMC stays at this state and with probability

*N*(0,

*i*) it moves to state \(\pi _{(0,i)}\). The only absorbing state is \(\pi _{(n,0)}\) in which all nodes had already forwarded their RREQ packet. Thus, transition probabilities of the DTMC is given by

**Lemma 1**

*The multiplication of*\(N_{(i,j)}\)

*and*\(N_{(0,i)}\)

*can be expressed as a multiplication of*\(N_{(i,0)}\)

*and*\(N_{(0,i+j)}\)

*as follows*

*Proof*

It can be easily proven by substituting *N* from its definition in Eq. (2). \(\square\)

**Lemma 2**

*The function*\(\psi _{(m)}\)

*can also be expressed as follows*

*Proof*

*n*nodes is shown in Fig. 2. Since, the absorbing DTMC always starts at state \(\pi _{(0,0)}\), we only need to compute the first row of the fundamental matrix. The components of the first row can be obtained by solving the following system of equations [17]

**Theorem 1**

*The number of visit of the state*\(\pi _{(i,j)}\),

*that is the components of the first row of the fundamental matrix of the DTMC of exponential jitter mechanism, is as follows*

*Proof*

*n*. Thus, the number of collisions is as follows

### 2.2 Second Model

In our first Markov model, we assumed that nodes start their transmission at the beginning of each slot. In reality, however, no common routing protocol such as AODV and DSR imposes such a restriction. In other words, packets may be transmitted at any time during each slot. As a result, a packet sent in the middle of a slot can collide with a packet sent at the beginning of the next slot. This kind of collision that happens between two adjacent slots cannot be captured by our first model. In this subsection, we extend our model to capture these kinds of collisions as well.

Let \(\pi _{(k,j,i)}\) (\(i+j+k\le n\) and \(0 \le k,j,i\)) denotes the states of the DTMC in which *k* represents the number of nodes that had already forwarded the RREQ packet before the last slot, *j* represents the number of nodes that have already forwarded the RREQ packet in the last slot and *i* represents the number of nodes that are forwarding the packet at this slot. Since this DTMC has 3-dimensional structure, it is not possible to draw its figure clearly.

*i*packets in the current slot while considering that no RREQ packet has been sent in previous slots,

*i*nodes out of

*n*nodes (\(N_{(0,i)}\)) must choose this slot. To have

*i*packets in the current slot while considering that

*j*RREQ packets have been sent in last slot and no RREQ has been sent before the last slot,

*i*nodes out of remaining \(n-j\) nodes (\(N_{(j,i)}\)) must choose this slot, which is shown by Eq. (16). Finally, in order to have

*i*packets in the current slot while considering that

*j*and

*k*RREQ packets have been sent in last slot and before the last slot, respectively,

*i*nodes out of remaining \(n-j-k\) nodes (\(N_{(j+k,i)}\)) must choose this slot. Note that this can happen in

*k*different ways which is shown by Eq. (17).

**Theorem 2**

*The number of visit of the state*\(\pi _{(k,j,i)}\)

*of our second model is as follows*

*Proof*

## 3 Optimizing Exponential Jitter Mechanism

In the exponential jitter mechanism, the distribution parameter (\(\lambda\)) has a crucial role. By increasing the value of \(\lambda\), number of collisions increases, but, at the same time, the discovery time (or the time required to finish the route discovery stage) decreases. Therefore, it is not clear what would be the best value for \(\lambda\).

For jitter mechanisms based on Uniform distribution, some characteristics and formulas were proposed which help to choose the distribution parameters [10, 11, 13]. However, the only paper studied other jitter mechanisms [14], such as Exponential and Pareto, did not investigate how one should set the parameters of such jitter mechanisms, which is in fact non-trivial. In this section, using the performance metrics we obtained from our Markov models, we propose a formula to help set the Exponential parameter of jitter mechanism which tries to minimize probability of collision and discovery time simultaneously.

*V*, as follows

*V*which will be shown to be useful in comparison with other jitter mechanism.

^{1}As the number of nodes increases, the probability of collision also increases if all nodes use a fixed value of \(\lambda\). Hence, the maximum value of

*V*must occurs at lower \(\lambda\) when the number of nodes increases, as it is shown in Fig. 4. To find the value of \(\lambda\) which maximizes the preceding equation, we solve the derivative of the equation when it is equal to zero as follows

## 4 A Step Toward Fair Comparison

In the last section, we obtained \(\lambda _{opt}\) that maximizes the probability of successful transmission and minimizes delay to some extent. Comparison of exponential jitter with other jitter mechanisms such as uniform jitter would be inconclusive if one mechanism is better at one performance parameter and the other is better at another. Therefore, we aim to set the distribution parameters of these mechanisms such that their route discovery time becomes almost equal. Therefore, comparing the number of collisions would be fair. Note that in all common routing protocols the first RREQ packet that reaches the destination indicates the final route. Since we assume that the wireless network is homogeneous and the behavior of the network regarding RREQ transmission are similar in all parts of the network, we only need to study the first RREQ delay in one part of the networks instead of evaluating the whole route discovery time. We will later show by simulation that by setting distribution parameters of different jitter mechanisms in a way that their first RREQ delay becomes equal, their route discovery time becomes also equal.

*t*, which is the complementary cumulative distribution function (CCDF), is equal to the probability that all nodes get greater value than

*t*from exponential distribution, as follows

## 5 Simulation

In this section, we first validate our models with simulation and show that our second model perfectly fits simulation results. Then, we compare the exponential jitter mechanism with uniform and window jitter mechanisms. To do so, we use \(\lambda _{opt}\) as the exponential jitter parameter and use Eqs. (32, 33) to obtain the value of uniform and window jitter parameters. Finally, we will show that our analysis leading to \(\lambda _{opt}\) establish a jitter mechanism which outperforms other jitter mechanisms in terms of collision.

We conducted our simulations with ns2 in which 200 nodes were randomly deployed in region of 1000 \(\times\) 3000 m. Transmission range of all nodes was 250 m and 5 pairs of connection established during each simulation. Note that different nodes, even if they are in vicinity of each others, may experience different number of collisions. Moreover, nodes that are busy sending a packet cannot detect any collision. To solve these problems, we deployed 10 listening nodes that only observe the network and capture the number of collisions. These listening nodes were not allowed to contribute to any packet transmission.

*n*represents the number of nodes in each forwarding region, or the number of nodes that each listening node can hear. As it is mentioned before, our first model underestimates the number of collisions since it cannot capture the collision between two adjacent slots. Our second model, however, predicts the number of collisions accurately, as it is shown in Fig. 5a. Interestingly, both models almost predict the number of slots to finish all transmission in a region accurately, as it is shown in Fig. 5b.

In Fig. 6, the number of collisions and route discovery time of 3 jitter mechanisms are shown. We used \(\lambda _{opt}\) as the exponential jitter parameter. Equations (32, 33) were also used to obtain distribution parameters of uniform and window jitter mechanisms. Note that *n* in these equations represents the number of nodes in each forwarding region, not the total number of nodes in the network, denoted by *N*. Needless to say, *n* can be obtained using \(n=\frac{N \pi R^2 }{S}\), in which *R* is the transmission range and *S* is the area of the network. As it is shown in Fig. 6a, exponential jitter mechanism with \(\lambda _{opt}\) always outperforms the other mechanisms. Fig. 6b shows that our analysis in Sect. 4 is valid and almost all jitter mechanisms have equal route discovery time.

## 6 Conclusion

In this paper, we formally analyzed the performance metric of exponential jitter mechanism. By modeling the route discovery stage of wireless routing protocols with absorbing discrete time Markov chain, we captured the behavior of this stage regarding number of collisions and route discovery time. This allowed us to see the effect of exponential distribution parameter on the number of collision and route discovery time. Having defined a new performance parameter, we found a formula to obtain the optimum value exponential parameter. We have also obtained two formulas that relate the parameter of uniform and window jitter mechanisms such that their route discovery time becomes almost equal. Finally, we conducted a set of simulations to validate our model and show that our analysis of the optimum value of exponential jitter parameter contributes to fewer collisions in comparison with other jitter mechanisms.

## Footnotes

- 1.
This formula is picked arbitrarily for convenient. In fact, any equation that allows us to maximize \(\pi _{(0,0,1)}\) and minimize \(\pi _{(0,0,0)}\) at the same time can be used here.

## References

- 1.Reina, D. G., Toral, S. L., Johnson, P., & Barrero, F. (2015). A survey on probabilistic broadcast schemes for wireless ad hoc networks.
*Ad Hoc Networks*,*25*, 263–292.CrossRefGoogle Scholar - 2.Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. Internet RFC 3561.Google Scholar
- 3.Cordero, J. A., Jacquet, P., & Baccelli, E. (2012). Impact of jitter-based techniques on flooding over wireless ad hoc networks: Model and analysis. In
*Proceedings of the 31st IEEE international conference on computer communications (INFOCOM 2012)*(p. 2530), Orlando, FL, USA.Google Scholar - 4.Clausen, T., Dearlove, C., & Adamson, B. (2008). Jitter Considerations in MANETs. IETF Inf. RFC 5148.Google Scholar
- 5.Chung, J. M., Soo, H. M., & Jeong, W. C. (2004). Jitter analysis of homogeneous traffic in wireless differentiated services networks. In
*Proceedings of the 13th IEEE workshop on local and metropolitan area networks (LANMAN 2004)*(pp. 187–192).Google Scholar - 6.Daniel, E. J., White, C. M., & Teague, K. A. (2003). An interarrival delay jitter model using multistructure network delay characteristics for packet networks. In
*Proceedings of the 37th IEEE Asilomar conference on signals, systems and computers*(pp. 1738–1742), New York, NY (U.S.).Google Scholar - 7.Oliveira, R., Bernardo, L., & Pinto, P. (2009). The influence of broadcast traffic on IEEE 802.11 DCF networks.
*Computer Communications*,*32*(2), 439–452.CrossRefGoogle Scholar - 8.Clausen, T., de Verdiere A. C., Yi, J., Niktash, A., Igarashi, Y., Satoh, H., & Herberg, U. (2014). The LLN on-demand ad hoc distance-vector routing protocol-next generation. IETF Internet Draft (work in process) draft-clausen-lln-loadng. 3 July 2014.Google Scholar
- 9.Rezaei, S., & Hemmatyar, A. M. (2016). Study of uniform jitter mechanism for metric-based wireless routing. In
*1st international conference on new research achievements in electrical and computer engineering (ICNRAECE)*.Google Scholar - 10.Cordero, J. A., Jiazi, Y., & Thomas, C. (2014). An adaptive jitter mechanism for reactive route discovery in sensor networks.
*Sensors*,*14*(8), 14440–14471.CrossRefGoogle Scholar - 11.Cordero, J. A. (2013). A probabilistic study of the delay caused by jittering in wireless flooding.
*Wireless Personal Communications*,*73*(3), 415–439.CrossRefGoogle Scholar - 12.Jiazi, Y., Cordero, J. A., & Thomas, C. (2013). Jitter considerations in on-demand route discovery for mobile ad hoc networks. In
*Proceedings of the 16th international conference on network-based information systems (NBiS)*(pp. 170–177), Gwanju, South Korea.Google Scholar - 13.Cordero, J. A., Juan, A., Jiazi, Y., & Thomas, C. (2013). Optimization of jitter configuration for reactive route discovery in wireless mesh networks. In
*The 11th international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt)*(pp. 452–459), Tsakuba City of Science, Japan.Google Scholar - 14.Rezaei, S., & Hemmatyar, A. M. (2016). Impact of jitter mechanisms on metricbased wireless routing protocols. In
*IEEE international conference on wireless communications, signal processing and networking*.Google Scholar - 15.Viswanath, K., & Obraczka, K. (2006). Modeling the performance of flooding in wireless multi-hop ad hoc networks.
*Computer Communications*,*29*(8), 949–956.CrossRefGoogle Scholar - 16.Heni, M., Bouallegue, A., & Bouallegue, R. (2015). Collision avoidance in a power controller and reactive routing protocol in wireless mobile network.
*Wireless Personal Communications*,*85*(3), 825–840.CrossRefGoogle Scholar - 17.Trivedi, K. S. (2008).
*Probability and statistics with reliability, queuing and computer science applications*. New York: Wiley.MATHGoogle Scholar