End-to-End Delay Analysis in Cognitive Radio Ad Hoc Networks with Different Traffic Models

Delay and throughput are important metrics for network performance. We analyze the end-to-end delay of cognitive radio ad hoc networks for two trafficmodels: backlogged and geometric, respectively. By modelling the primary users as a Poisson point process and the secondary network deploying multihop transmissions, we derive the closed-form expression for the end-to-end delay in secondary networks. Furthermore, we optimize the end-to-end delay in terms of the hop number and the secondary transmission probability, respectively. The range of the optimal hop number and the equation satisfied by the optimal transmission probability are obtained for backlogged sourcemodels.The equationmet by the optimal hop number is presented for geometric sourcemodels.


Introduction
With the rapid development of real-time transmissions in wireless communication networks, delay analysis has gained more and more attention in the literature.Compared with single-hop transmission, the analysis of multihop delay is more challenging.Since many factors can impact the end-toend delay in multihop networks, such as routing algorithm, network topology, traffic model, and data scheduling, and since it is unrealistic to analyze the end-to-end delay by taking all factors into consideration, we simplify the network topology as a "line network" by neglecting the routing algorithm to complete the analysis of end-to-end delay.
A "line network" consists of a source, many relays, and a destination with all relays being distributed along line from a source to its destination.So far, much research has been conducted on the performance of "line network."In [1,2], end-to-end propagation speed is determined without the delay constraints with a channel model combined pathloss, fading with noise.Accordingly, the tradeoff between single-hop transmission and multihop transmission subject to an end-to-end delay constraint is studied in [3].In [4], end-to-end packet delivery probability is derived based on the distances between neighboring nodes in a Poisson point process (PPP).In [5], "line network" is decomposed into many independent queues, and the end-to-end delay is determined by considering the combination of TDMA and ALOHA access protocol.All these works do not take the traffic style of the source node into consideration.With the increasing requirement for various types of traffic [6,7] (such as document, video, and audio), it becomes important to characterize the network performance considering different types of traffic.In [8], the correlations between traffic statistics and channel qualities are investigated accompanied with their impact on the performance of multihop networks.In [9], the end-to-end delay is studied in Poisson network considering two traffic models: backlogged and geometric.
However, prior studies only focused on homogeneous networks without considering heterogeneous network model.A practical network usually consists of interdependent, interactive, and hierarchical network components which leads to a heterogeneous network structure.Different from [9], the purpose of this paper is to conduct a systematic study of the endto-end delay in cognitive radio (CR) ad hoc networks which is one of heterogeneous network models.In this paper, we evaluate the end-to-end delay of CR ad hoc networks in which the secondary nodes are assumed to be placed to form a line network.We derive the closed-form expression for the endto-end delay for backlogged and geometric arrival model of source traffic, respectively.Primary and secondary networks are supposed to be two PPPs which are independent of each other.Similar to that, in [9], waiting delay is considered by importing the node buffer accompanied with propagation delay.And the waiting delay of each node is modeled as a M/M/1 model with infinite buffer.
The paper is organized as follows.Section 2 defines the system model and symbol notations.Section 3 analyzes the end-to-end delay of CR ad hoc network.Section 4 derives the end-to-end delay of secondary network for two traffic models.Section 5 presents the numerical results and some discussions.Finally, conclusions are drawn in Section 6.

System Model
We consider a scenario where primary users and secondary users coexist in the same two-dimensional plane.Secondary users employ underlay spectrum sharing method to access the licensed channel, that is, transmit their packets while keeping the quality of service (QoS) of primary network.In the following, we will define the primary and secondary network models, respectively.

Primary Network Model.
Assume that the locations of primary transmitters follow a PPP Φ PT with density   .Each primary receiver associates with one designated primary transmitter with   distant away.According to the displacement theorem [10], the locations of the primary receivers formulate another PPP Φ PR with density   .All transmitters are assumed to send their packets with the same power   .Signals undergo path-loss and small scale Rayleigh fading so that the power caught by a receiver is   ℎ −  , where ℎ is the small scale fading coefficient having exponential distribution with mean of 1 and  > 2 is the path-loss factor.

Topology.
Secondary network is composed of many multihop paths, each of which comprises a source user,  − 1 relay users, and a destination user.The distance from a source user to its destination is . Figure 1 is the topology of a twohop network.Supposing that all source users are distributed as a PPP with density   , then all relay users formulate a PPP with density ( + 1)  .All relay users are equidistantly distributed on the line from source user to the destination user; one hop distance is /.Index  = 0, . . .,  as the source, the relay, and destination users.The power of all transmitters is assumed to be the same and is represented by   .Time is divided into slots and all users are synchronized to one clock.We assume no space reuse on one path; that is, users along one path are not allowed to send packets in the same time slot.Therefore, the locations of secondary transmitters in each slot follow a PPP with density   .Each user has an infinite buffer in which data is queued by FIFO (first-in-first-out) mode.

Traffic Model.
In data networks, there are many types of traffic, such as video, audio, and files.Different traffic model has different impacts on the network performance.Similar to that in [9], we consider the end-to-end delay for two traffic models in this paper: backlogged and geometric: (i) Backlogged sources: source users always have data packets to send.
(ii) Geometric sources: data packets arrive at the source user with probability  each  time slots.

MAC Protocol.
A combination of TDMA and ALOHA protocol is adopted.Since time is divided into slots, source, relay, and destination users send their packets in turn at the beginning of each slot.The source and relay users will send their packets when they are permitted to transmit, with probabilities   and , respectively.Packets are successfully received at the time slot if signal-to-interference ratio (SIR) caught by their receivers is greater than the threshold .
Otherwise, the source and relay users will receive a negative feedback and the packets are still put first in the queue for retransmission.Take a two-hop transmission with backlogged sources; for example, set  = 0 when the source user of a path begins to send packets with probability   .If the SIR at the relay user is greater than , an ACK will be sent to the source, which indicates that the packets are successfully received by the relay, and the packets will be discarded from the queue of the source.Otherwise, the packets are still at the head of the queue in the source.At the beginning of the next time slot, the relay users will transmit their packets with probability .Similarly, the destination will send an ACK to the relay if it successfully received the packets.And the relay discards the current packets from its queue according to the ACK.At the beginning of the next time slot, the sources transmit their packets in the queue again and so on.In this paper, we ignore the ambient thermal noise and consider the interference coming from both the secondary transmitters and the primary transmitters, which is different from [9].

SIR Based Successful Transmission.
We consider the wireless channel which undergoes both large scale path-loss and small scale Rayleigh fading.Power gain of the channel in both networks is given by where  is the link distance.
(i) We consider a typical primary receiver  on the origin; its transmitter  can successfully send the packets to it if and only if where  is the sum of interference coming from other concurrent transmitters.(ii) Considering a certain secondary user  along an arbitrary path accessing the channel at time , its next hop user  + 1 could successfully receive the packets from user  if and only if where   () is the sum of interference of other transmitters at time .

Successful Transmission Probability
Successful transmission probability is the probability that a receiver could receive the packets successfully from its transmitter in a time slot.

Successful Transmission Probability of Standalone Primary
Network.When the secondary network is absent, based on the SIR transmission criterion, the successful transmission probability of a typical primary transmitter  0 is given by where   = ∑ ∈Φ PT \ 0   ℎ|| − is the sum of interference power of other primary transmitters. 0 is the outage constraint of the primary network.

Successful Transmission Probability of the Secondary Net-
work with Backlogged Sources.When the secondary network is presented, the successful transmission probability of both primary and secondary networks is closely related to the density of the secondary transmitters due to the interference they introduced.Supposing secondary user  accesses the channel at  = 0, for backlogged traffic sources, the distribution of secondary transmitters in each time slot is characterized in Lemma 1 as follows.
Lemma (i) Time slots begin at  = 0 or mod ( + 1, ) = 0: in these time slots, secondary source users transmit their packets with probability   .Since source users are conformed to a PPP with density   in each time slot, therefore, the distribution of secondary transmitters is a PPP with density     .(ii) Time slots begin at any other .In these slots, relay users are allowed to send their packets.Unlike source users, relay users will transmit with a certain probability which is the product of the probability of nonempty queue and the probability of accessing channel.According to M/M/1 queue model, the probability that the queue of a relay buffer is nonempty is     /  =   /.Therefore, the probability of relay users sending their packets is  =   / ⋅  =   .Since there is no intraroute interference along each multihop route and the relay users send their packets in turn, as such secondary transmitters in these time slots follow a PPP with density     .
In conclusion, whenever the source users or the relay users are permitted to send packets, the distribution of the secondary transmitters follows a PPP with density     .
This completes the proof.
According to Lemma 1, the successful transmission probability of the primary network is where   () is the Laplace transformation of the probability density function (PDF) and Substituting  =  −1     into (8) and putting these results into (7), we have Since the outage constraint of primary network is  0 ,  2 SUC must satisfy  2 SUC ⩾ 1 −  0 .Putting  2 SUC into the inequality, we solve the density range of secondary users for backlogged sources as All   in the following analysis must meet the limit in (10).Supposing that each user in a multihop path sends packets with probability  independently, we derive the successful transmission probability   for one single hop in the following lemma.

Lemma 2. Considering the given MAC protocol, the successful transmission probability for one single hop is given by
where with  =  1   /  , Proof.The successful transmission probability for one single hop along a multihop path for secondary network is where  1 is a predetermined threshold.Since there is no intrainterference but there is interinterference in secondary network, we have This completes the proof.

Successful Transmission Probability of the Secondary Network for Geometric Sources
Lemma 3. Supposing the packets arrive at the source users every  slots with probability , if  <    −1 min (,  −1 ), then the successful transmission probability of secondary network is and the probability of a secondary user to be a transmitter is where   =  −    ( 1 ) 2/ (/) 2 ,  =      2/ 1 (/) 2 and (⋅) is Lambert  function (Lambert  function is the unique solution of the function  =   ).
Proof.A queue can reach steady state if and only if  <    −1 min (,  −1 ).In this mode, the probability of a packet arriving at a relay user is .Thus, a secondary user could be transmissions at a probability And the successful probability of a single-hop transmission is Combined with the result in (15), we have Rewrite (20) as or Substituting ( 22) into (20) and ( 18), respectively, we derive the results in ( 16) and (17).
In addition, (−/  ) has unique solution when −/  ⩾ − −1 .Combined with the condition of a queue reaching a steady state, we solve the following inequality and obtain the range of  as given in Lemma 3: The proof is completed.
The density of the secondary users is further limited by the following lemma.

Lemma 4. Supposing that the packets arrive at the source users every 𝑁 slots with probability 𝑎, the density of the secondary source users is bounded by
where  1 =    2/  2  .
Proof.Being overlaid with secondary network for geometric sources, the successful transmission probability of the primary network is Let  1 =    2/  2  ,  2 =    2/ 1 (/) 2 ; substitute  in (17) into (25); we have Take logarithm at both sides of the inequality above; we have Since This completes the proof.

Delay Analysis of CR Ad Hoc Networks
In this section, we assume the types of data transmission for each hop along the multihop route are independent of each other and study the end-to-end delay of CR ad hoc networks in a way similar to that in [5].

The End-to-End Delay of Secondary Network for Backlogged Sources
Theorem 5.In the case of backlogged sources, the end-to-end delay of an -hop path in the secondary network is given by Proof.The end-to-end delay is the sum of delays at source user and relays on a path.According to the TDMA and ALOHA combined MAC protocol, the propagation time from the source user to its relay is easyly obtained as follows: For relay users, the waiting time is also needed to be calculated.Since all users are assumed to transmit their packets independently, we only need to calculate the waiting time for one single relay and then produce it with ( − 1) to obtain the total waiting time along the multihop route.
Referring to the propagation time for source user, we have the propagation time for a relay as Take the first relay user, for example; the nonempty probability of its queue is  0 = 1 −    1 / 1 = 1 −   /.The probability of the relay user to be in  state is Based on Little's theorem [12], the queue length for steady state   is Since the average length of a queue equalling the data arrival rate produces the mean waiting time [12], the mean waiting time in a queue is And the end-to-end delay is Substituting   ,   , and   into (34), we obtain the result in (28).This completes the proof.

The End-to-End Delay of Secondary Network for
Geometric Sources.For a S-D multihop path, the probability of a packet arriving at each user (including source user and relay user) is .The probability of successful transmission is  2 .For simple calculation, we derive the upper bound of the end-to-end delay, which starts being calculated from the data packets arriving at the tail of the queue of a source user.
And the end-to-end delay is the sum of propagating time and waiting time of  users: According to Theorem 5, the propagating and the waiting time for each user could be obtained as follows: respectively.Therefore, the upper bound of the end-to-end delay is Summing the delay of the source user, we have the end-to-end delay as 4.3.Optimization of the End-to-End Delay.In the following, we will optimize the end-to-end delay for backlogged and geometric sources in terms of  and   .
Theorem 6.For backlogged source traffic model, the end-toend delay has an upper bound 2 , and Proof.For 0 <  < 1 and 0 <  1 < 1, it is obvious that 2 is the tight upper bound of the end-to-end delay  (1)  2 , which completes the proof.
Compared with  (1) 2 , 2 concludes the waiting time in the queue of the source user which has nothing to do with the hop number .Therefore, it is reasonable for us to optimize 2 instead of  (1)  2 in terms of hop number .
The proof is completed.
2 instead of  (2)   2 in the following: And the optimal hop number  * to minimize the end-to-end delay should meet the expression as follows: where The proof is similar to that of Proposition 7 and therefore is omitted.
In Figure 2, we illustrate  (1)  2 in (28) versus density of primary users   for backlogged source model.As shown in the figure, we see that  (1)  2 increases linearly with   .The reason is that, on the one hand, the increasing   leads to more interference from the primary users and, on the other hand, this also decreases the maximum allowable density of the secondary users which decreases the intrainterference.Since the effect of increasing of interinterference is larger than that of the reducing of the intrainterference, the probability of successful transmission for the secondary network becomes smaller which increases the end-to-end delay.Therefore, the density of the primary users plays a significant role in the delay performance of the secondary network.
In Figure 3, we show the end-to-end delay versus the density of the secondary source users for geometric sources with varied   .Given   = 1 × 10 −5 ,  = 0.05, we derive  ,2 = 2.346 × 10 −4 .It is shown that the end-to-end delay increases monotonically with increasing   in range (0, 1 × 10 −4 ).This explains that increased density of primary users will increase the interinterference and thus increase the endto-end delay of the secondary network.
In Figure 4, we show the end-to-end delay for backlogged sources versus the optimal hop number  * when   = 1 × 10 −4 .It is shown that the optimal hop number  * = 3 when   = 0.05 and  * = 4 when   = 0.15.It is worth noting   that higher transmission power of source user causes more intrainterference.In this case, we can reduce the hop distance to obtain maximized successful transmission probability and then the minimized end-to-end delay.Similarly, the higher the density of the primary transmitters, the larger the optimal hop number.
In Figure 5, we draw the end-to-end delay with backlogged sources versus transmission probability   of the source users.Since the necessary condition for node queue entering steady state is   < .It is shown that there is an optimal   in the range of (0, ) to minimize the end-to-end   delay.When  = 0.15, putting the parameters into (42), we solve the optimal transmission probability of the source users as  * = 0.041 which agrees with the numerical results shown in the figure .In Figure 6, we present the end-to-end delay for geometric sources versus hop number .It is seen that there is an optimal hop number  * to minimize the end-to-end delay no matter how the access probability of the relay users vary with .In addition, the larger the , the lower the delay.This is because when the access probability becomes larger, the waiting delay of each relay becomes smaller which leads to lower delay.

Conclusions
We studied the end-to-end delay in CR ad hoc networks for two traffic sources models: backlogged and geometric.First, we modelled the primary users as PPP and the secondary users opportunistically access the channel with a combination of TDMA with ALOHA protocol.Secondly, we derived the successful transmission probability for both the primary and the secondary networks, respectively.Thirdly, we obtained the closed-form expression for the end-to-end delay with the above two traffic models, respectively.Finally, by optimizing the end-to-end delay, we obtained the range of the optimal hop number for backlogged sources and we also present an equation with which the optimal hop number should satisfy geometric sources.The numerical results showed that (1) due to the outage constraints of the primary network, an optimal hop number and transmission probability for source user could be derived to minimize the end-to-end delay for backlogged sources and (2) an optimal hop number can be got to minimize the end-to-end delay for geometric sources.

Figure 1 :
Figure 1: Topology of a two-hop network.

Proposition 8 .
If the packets arrive at the source user in a probability  each N time slot, we optimize Density of primary users:  P  S = 0.2 *  S,m1  S = 0.5 *  S,m1  S = 0.8 *  S,m1

Figure 2 :
Figure 2: End-to-end delay versus density of primary users for backlogged source model.

Figure 3 :
Figure 3: End-to-end delay versus density of secondary source users for geometric source model.

Figure 4 :
Figure 4: Optimal hop number versus density of secondary source users.

Figure 5 :
Figure 5: End-to-end delay for backlogged sources versus transmission probability of the secondary source users.

Figure 6 :
Figure 6: End-to-end delay for backlogged sources versus hop number.
1.For backlogged sources and   < , secondary transmitters follow a PPP Φ  () with density     within any time slot (,  +   ].Proof.Considering that secondary transmitters send their packets independently and have the same successful transmission probability   , the queue of a relay user can reach a steady state if and only if     <   ; that is,   < .Under the steady state circumstance, we discuss the distribution of secondary transmitters in the following two cases: