Abstract
In real time communication system, packets of lower prioritized flows suffer a longer queuing delay than the packets having higher priority. As a result, they reach at the destination in a long end-to-end delay and become less useful. In this paper, we have proposed a real time packet scheduling technique to minimize overall end-to-end delay among multiple flows. Here, elapsed time plays a major role to calculate priority of a packet. The packets, already spent a long queuing delay are re-assigned to lower priority. Also, the model reduces the priority of the higher prioritized packets when they are very early and approaching to the destination node. This model gives more importance to middle aged packets (neither too early nor too late with respect to packet creation and deadline of packet receiving) so that they can reach the destination within time bound. The model is experimented using NS-2 and performance has been compared with other queuing policies. Performance evaluation of this model exhibits moderated end-to-end latency of the flows and works more efficiently than other techniques.
Similar content being viewed by others
References
Rathnayaka, A. D., & Potdar, V. M. (2013). Wireless sensor network transport protocol: A critical review. Journal of Network and Computer Applications, 36(1), 134–146.
Hu, Y., Li, H., Chang, Z., & Han, Z. (2017). End-to-end backlog and delay bound analysis for multi-hop vehicular ad hoc networks. IEEE Transactions on Wireless Communications, 16(10), 6808–6821.
Akyildiz, I. F., & Kasimoglu, I. H. (2004). Wireless sensor and actor networks: Research challenges. Ad Hoc Networks, 2(4), 351–367.
Gungor, V. C., Vuran, M. C., & Akan, O. (2007). On the cross-layer interactions between congestion and contention in wireless sensor and actor networks. Ad Hoc Networks, 5(6), 897–909.
Akyildiz, I. F., Melodia, T., & Chowdhury, K. R. (2007). A survey on wireless multimedia sensor networks. Computer Networks, 51(4), 921–960.
Iqbal, M., Naeem, M., Anpalagan, A., Qadri, N., & Imran, M. (2016). Multi-objective optimization in sensor networks: Optimization classification, applications and solution approaches. Computer Networks, 99, 134–161.
Akyildiz, I., & Vuran, M. (2010). Wireless sensor networks. Advanced texts in communications and networking, Wiley. https://books.google.co.in/books?id=7YBHYJsSmS8C. Accessed 1 Dec 2014.
Xiong, B., Yang, K., Zhao, J., Li, W., & Li, K. (2016). Performance evaluation of openflow-based software-defined networks based on queueing model. Computer Networks, 102, 172–185.
Hu, D., Wu, J., & Fan, P. (2016). Minimizing end-to-end delays in linear multi-hop networks. IEEE Transactions on Vehicular Technology, 65(8), 6487–6496.
Akan, Ö. B., & Akyildiz, I. F. (2005). Event-to-sink reliable transport in wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 13(5), 1003–1016.
Liu, J., & Singh, S. (2001). Atcp: Tcp for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 19(7), 1300–1315.
Sundaresan, K., Anantharaman, V., Hsieh, H.-Y., & Sivakumar, R. (2005). Atp: A reliable transport protocol for ad hoc networks. IEEE Transactions on Mobile Computing, 4(6), 588–603.
Wan, C.-Y., Eisenman, S.B., & Campbell, A.T. (2003). Coda: Congestion detection and avoidance in sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems. ACM (pp. 266–279).
Wan, C.-Y., Campbell, A. T., & Krishnamurthy, L. (2005). Pump-slowly, fetch-quickly (PSFQ): A reliable transport protocol for sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 862–872.
Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.
Zhu, K., Li, W., Fu, X., & Zhang, L. (2015). Data routing strategies in opportunistic mobile social networks: Taxonomy and open challenges. Computer Networks, 93, 183–198.
Mahmood, M. A., Seah, W. K., & Welch, I. (2015). Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks, 79, 166–187.
Chen, L., Wang, W., Huang, H., & Lin, S. (2016). On time-constrained data harvesting in wireless sensor networks: Approximation algorithm design. IEEE/ACM Transactions on Networking, 24(5), 3123–3135.
Monowar, M. M., Rahman, M. O., Pathan, A.-S. K., & Hong, C. S. (2012). Prioritized heterogeneous traffic-oriented congestion control protocol for wsns. The International Arab Journal of Information Technology, 9(1), 39–48.
Iyer, Y.G., Gandham, S., & Venkatesan, S. (2005). Stcp: A generic transport layer protocol for wireless sensor networks. In Proceedings of the 14th international conference on computer communications and networks, 2005. ICCCN. IEEE (pp. 449–454).
Mishra, T.K., & Tripathi, S. (2014). Fair and reliable transmission control protocol for ad hoc networks. In 2014 Fourth international conference on advances in computing and communications (ICACC). IEEE (pp. 339–342).
Rosberg, Z., & Sabrina, F. (2009). Rate control of multi class priority flows with end-to-end delay and rate constraints for QoS networks. Computer Networks, 53(16), 2810–2824.
Kim, J. C., & Lee, Y. (2014). An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth. Computer Networks, 58, 158–179.
Fabini, J., & Zseby, T. (2016). The right time: Reducing effective end-to-end delay in time-slotted packet-switched networks. IEEE/ACM Transactions on Networking, 24(4), 2251–2263.
Gungor, V.C., & Akan, O. (2006). DST: Delay sensitive transport in wireless sensor networks. In 2006 International symposium on computer networks. IEEE (pp. 116–122).
Gungor, V. C., Akan, Ö. B., & Akyildiz, I. F. (2008). A real-time and reliable transport (rt) protocol for wireless sensor and actor networks. IEEE/ACM Transactions on Networking, 16(2), 359–370.
Cao, X., Liu, L., Cheng, Y., Cai, L. X., & Sun, C. (2016). On optimal device-to-device resource allocation for minimizing end-to-end delay in vanets. IEEE Transactions on Vehicular Technology, 65(10), 7905–7916.
Nazir, B., Hasbullah, H., & Madani, S. A. (2011). Sleep/wake scheduling scheme for minimizing end-to-end delay in multi-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1–14.
Li, H., Cheng, Y., Zhou, C., & Zhuang, W. (2013). Routing metrics for minimizing end-to-end delay in multiradio multichannel wireless networks. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2293–2303.
Jayachandran, P., & Andrews, M. (2010) Minimizing end-to-end delay in wireless networks using a coordinated edf schedule. In 2010 Proceedings IEEE INFOCOM . IEEE (pp. 1–9).
Mishra, T.K., & Tripathi, S. (2016) Node application and time based fairness in ad-hoc networks: An integrated approach. In Proceedings of 3rd international conference on advanced computing, networking and informatics. Springer (pp. 231–238).
NS-2.35. http://www.isi.edu/nsnam/ns. [Online; released Nov 4 2011] (2011).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Lemma 1
Elapsed time of a packet\(\varGamma _s(i)\)lies in [0−1]
Proof
According to Eq. 2, \(\varGamma _s(i)\) is the ratio between \(\lambda (i)\) and \(\delta\). Where \(\lambda\) is elapsed time, i.e., Always less than Round Trip Time (RTT) which is always less than expected end-to-end delay \(\delta\) . Trivially, \(\lambda\) is less than \(\delta\). If, any intermediate node is not the source node of the packet, \(\lambda\) can never become 0. Otherwise, it becomes 0, if the intermediate node is a source node. Hence, \(\varGamma _s(i) \ge 0\). Collectively, we can claim that \(\varGamma _s(i)\) lies in [0–1]. \(\square\)
Lemma 2
Weighted time of a packet lies in [0–0.5]
Proof
According to Eq. 3 weighted time of a packet (\(\eta (i)\)) depends on \(\varGamma _s(i)\). In Lemma 1 it is proved that \(\varGamma _s(i)\) lies in (0–1] and \(\eta (i)\) is taken as the minimum value of \(\varGamma _s(i)\) or \(1 - \varGamma _s(i)\). Hence, it is trivial that \(\eta (i)\) is always positive.
Case 1: If (\(\varGamma _s(i) <\) 0.5), \(1 - \varGamma _s(i) >\) 0.5. So, \(\eta (i)\) is \(\varGamma _s(i)\), i.e., \(\eta (i) <\) 0.5.
Case 2: If (\(\varGamma _s(i) >\) 0.5), (\(1 - \varGamma _s(i))<\) 0.5. Hence, \(\eta (i)\) is 1 - \(\varGamma _s(i)\), i.e., \(\eta (i) <\)0.5.
Case 3: If (\(\varGamma _s(i) =\) 0.5), \(\varGamma _s(i)\) and \(1 - \varGamma _s(i)\) is 0.5. Hence, \(\eta (i)\) is 0.5.
Now, considering all the cases it is proved that \(\eta (i)\) lies in [0–0.5]. \(\square\)
Lemma 3
The value of\(\textit{Priority}_{\textit{max}}\)lies between 1 and\(\root 2 \of {\textit{max}(\alpha )+\textit{max}(\beta )}\).
Proof
As we have shown in Eq. 4 integrated priority of a packet is calculated in the form of \(x^{\eta }\) where x is \(\textit{max}(\alpha )+\textit{max}(\beta )\). In Lemma 2 it proves that value of \(\eta\) ranges from 0 to 0.5. Hence, value of \(\textit{Priority}_{\textit{max}}\) lies between 1 and \(\root 2 \of {\textit{max}(\alpha )+\textit{max}(\beta )}\).
Rights and permissions
About this article
Cite this article
Mishra, T.K., Tripathi, S. Minimizing End-to-End Delay on Real-Time Applications. Wireless Pers Commun 107, 41–55 (2019). https://doi.org/10.1007/s11277-019-06239-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06239-8