Skip to main content
Log in

Minimizing End-to-End Delay on Real-Time Applications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In real time communication system, packets of lower prioritized flows suffer a longer queuing delay than the packets having higher priority. As a result, they reach at the destination in a long end-to-end delay and become less useful. In this paper, we have proposed a real time packet scheduling technique to minimize overall end-to-end delay among multiple flows. Here, elapsed time plays a major role to calculate priority of a packet. The packets, already spent a long queuing delay are re-assigned to lower priority. Also, the model reduces the priority of the higher prioritized packets when they are very early and approaching to the destination node. This model gives more importance to middle aged packets (neither too early nor too late with respect to packet creation and deadline of packet receiving) so that they can reach the destination within time bound. The model is experimented using NS-2 and performance has been compared with other queuing policies. Performance evaluation of this model exhibits moderated end-to-end latency of the flows and works more efficiently than other techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Rathnayaka, A. D., & Potdar, V. M. (2013). Wireless sensor network transport protocol: A critical review. Journal of Network and Computer Applications, 36(1), 134–146.

    Article  Google Scholar 

  2. Hu, Y., Li, H., Chang, Z., & Han, Z. (2017). End-to-end backlog and delay bound analysis for multi-hop vehicular ad hoc networks. IEEE Transactions on Wireless Communications, 16(10), 6808–6821.

    Article  Google Scholar 

  3. Akyildiz, I. F., & Kasimoglu, I. H. (2004). Wireless sensor and actor networks: Research challenges. Ad Hoc Networks, 2(4), 351–367.

    Article  Google Scholar 

  4. Gungor, V. C., Vuran, M. C., & Akan, O. (2007). On the cross-layer interactions between congestion and contention in wireless sensor and actor networks. Ad Hoc Networks, 5(6), 897–909.

    Article  Google Scholar 

  5. Akyildiz, I. F., Melodia, T., & Chowdhury, K. R. (2007). A survey on wireless multimedia sensor networks. Computer Networks, 51(4), 921–960.

    Article  Google Scholar 

  6. Iqbal, M., Naeem, M., Anpalagan, A., Qadri, N., & Imran, M. (2016). Multi-objective optimization in sensor networks: Optimization classification, applications and solution approaches. Computer Networks, 99, 134–161.

    Article  Google Scholar 

  7. Akyildiz, I., & Vuran, M. (2010). Wireless sensor networks. Advanced texts in communications and networking, Wiley. https://books.google.co.in/books?id=7YBHYJsSmS8C. Accessed 1 Dec 2014.

  8. Xiong, B., Yang, K., Zhao, J., Li, W., & Li, K. (2016). Performance evaluation of openflow-based software-defined networks based on queueing model. Computer Networks, 102, 172–185.

    Article  Google Scholar 

  9. Hu, D., Wu, J., & Fan, P. (2016). Minimizing end-to-end delays in linear multi-hop networks. IEEE Transactions on Vehicular Technology, 65(8), 6487–6496.

    Article  Google Scholar 

  10. Akan, Ö. B., & Akyildiz, I. F. (2005). Event-to-sink reliable transport in wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 13(5), 1003–1016.

    Article  Google Scholar 

  11. Liu, J., & Singh, S. (2001). Atcp: Tcp for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 19(7), 1300–1315.

    Article  Google Scholar 

  12. Sundaresan, K., Anantharaman, V., Hsieh, H.-Y., & Sivakumar, R. (2005). Atp: A reliable transport protocol for ad hoc networks. IEEE Transactions on Mobile Computing, 4(6), 588–603.

    Article  Google Scholar 

  13. Wan, C.-Y., Eisenman, S.B., & Campbell, A.T. (2003). Coda: Congestion detection and avoidance in sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems. ACM (pp. 266–279).

  14. Wan, C.-Y., Campbell, A. T., & Krishnamurthy, L. (2005). Pump-slowly, fetch-quickly (PSFQ): A reliable transport protocol for sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 862–872.

    Article  Google Scholar 

  15. Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.

    Article  Google Scholar 

  16. Zhu, K., Li, W., Fu, X., & Zhang, L. (2015). Data routing strategies in opportunistic mobile social networks: Taxonomy and open challenges. Computer Networks, 93, 183–198.

    Article  Google Scholar 

  17. Mahmood, M. A., Seah, W. K., & Welch, I. (2015). Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks, 79, 166–187.

    Article  Google Scholar 

  18. Chen, L., Wang, W., Huang, H., & Lin, S. (2016). On time-constrained data harvesting in wireless sensor networks: Approximation algorithm design. IEEE/ACM Transactions on Networking, 24(5), 3123–3135.

    Article  Google Scholar 

  19. Monowar, M. M., Rahman, M. O., Pathan, A.-S. K., & Hong, C. S. (2012). Prioritized heterogeneous traffic-oriented congestion control protocol for wsns. The International Arab Journal of Information Technology, 9(1), 39–48.

    Google Scholar 

  20. Iyer, Y.G., Gandham, S., & Venkatesan, S. (2005). Stcp: A generic transport layer protocol for wireless sensor networks. In Proceedings of the 14th international conference on computer communications and networks, 2005. ICCCN. IEEE (pp. 449–454).

  21. Mishra, T.K., & Tripathi, S. (2014). Fair and reliable transmission control protocol for ad hoc networks. In 2014 Fourth international conference on advances in computing and communications (ICACC). IEEE (pp. 339–342).

  22. Rosberg, Z., & Sabrina, F. (2009). Rate control of multi class priority flows with end-to-end delay and rate constraints for QoS networks. Computer Networks, 53(16), 2810–2824.

    Article  MATH  Google Scholar 

  23. Kim, J. C., & Lee, Y. (2014). An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth. Computer Networks, 58, 158–179.

    Article  Google Scholar 

  24. Fabini, J., & Zseby, T. (2016). The right time: Reducing effective end-to-end delay in time-slotted packet-switched networks. IEEE/ACM Transactions on Networking, 24(4), 2251–2263.

    Article  Google Scholar 

  25. Gungor, V.C., & Akan, O. (2006). DST: Delay sensitive transport in wireless sensor networks. In 2006 International symposium on computer networks. IEEE (pp. 116–122).

  26. Gungor, V. C., Akan, Ö. B., & Akyildiz, I. F. (2008). A real-time and reliable transport (rt) protocol for wireless sensor and actor networks. IEEE/ACM Transactions on Networking, 16(2), 359–370.

    Article  Google Scholar 

  27. Cao, X., Liu, L., Cheng, Y., Cai, L. X., & Sun, C. (2016). On optimal device-to-device resource allocation for minimizing end-to-end delay in vanets. IEEE Transactions on Vehicular Technology, 65(10), 7905–7916.

    Article  Google Scholar 

  28. Nazir, B., Hasbullah, H., & Madani, S. A. (2011). Sleep/wake scheduling scheme for minimizing end-to-end delay in multi-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1–14.

    Article  Google Scholar 

  29. Li, H., Cheng, Y., Zhou, C., & Zhuang, W. (2013). Routing metrics for minimizing end-to-end delay in multiradio multichannel wireless networks. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2293–2303.

    Article  Google Scholar 

  30. Jayachandran, P., & Andrews, M. (2010) Minimizing end-to-end delay in wireless networks using a coordinated edf schedule. In 2010 Proceedings IEEE INFOCOM . IEEE (pp. 1–9).

  31. Mishra, T.K., & Tripathi, S. (2016) Node application and time based fairness in ad-hoc networks: An integrated approach. In Proceedings of 3rd international conference on advanced computing, networking and informatics. Springer (pp. 231–238).

  32. NS-2.35. http://www.isi.edu/nsnam/ns. [Online; released Nov 4 2011] (2011).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tapas Kumar Mishra.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Lemma 1

Elapsed time of a packet\(\varGamma _s(i)\)lies in [0−1]

Proof

According to Eq. 2, \(\varGamma _s(i)\) is the ratio between \(\lambda (i)\) and \(\delta\). Where \(\lambda\) is elapsed time, i.e., Always less than Round Trip Time (RTT) which is always less than expected end-to-end delay \(\delta\) . Trivially, \(\lambda\) is less than \(\delta\). If, any intermediate node is not the source node of the packet, \(\lambda\) can never become 0. Otherwise, it becomes 0, if the intermediate node is a source node. Hence, \(\varGamma _s(i) \ge 0\). Collectively, we can claim that \(\varGamma _s(i)\) lies in [0–1]. \(\square\)

Lemma 2

Weighted time of a packet lies in [0–0.5]

Proof

According to Eq. 3 weighted time of a packet (\(\eta (i)\)) depends on \(\varGamma _s(i)\). In Lemma  1 it is proved that \(\varGamma _s(i)\) lies in (0–1] and \(\eta (i)\) is taken as the minimum value of \(\varGamma _s(i)\) or \(1 - \varGamma _s(i)\). Hence, it is trivial that \(\eta (i)\) is always positive.

Case 1: If (\(\varGamma _s(i) <\) 0.5), \(1 - \varGamma _s(i) >\) 0.5. So, \(\eta (i)\) is \(\varGamma _s(i)\), i.e., \(\eta (i) <\) 0.5.

Case 2: If (\(\varGamma _s(i) >\) 0.5), (\(1 - \varGamma _s(i))<\) 0.5. Hence, \(\eta (i)\) is 1 - \(\varGamma _s(i)\), i.e., \(\eta (i) <\)0.5.

Case 3: If (\(\varGamma _s(i) =\) 0.5), \(\varGamma _s(i)\) and \(1 - \varGamma _s(i)\) is 0.5. Hence, \(\eta (i)\) is 0.5.

Now, considering all the cases it is proved that \(\eta (i)\) lies in [0–0.5]. \(\square\)

Lemma 3

The value of\(\textit{Priority}_{\textit{max}}\)lies between 1 and\(\root 2 \of {\textit{max}(\alpha )+\textit{max}(\beta )}\).

Proof

As we have shown in Eq. 4 integrated priority of a packet is calculated in the form of \(x^{\eta }\) where x is \(\textit{max}(\alpha )+\textit{max}(\beta )\). In Lemma 2 it proves that value of \(\eta\) ranges from 0 to 0.5. Hence, value of \(\textit{Priority}_{\textit{max}}\) lies between 1 and \(\root 2 \of {\textit{max}(\alpha )+\textit{max}(\beta )}\).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, T.K., Tripathi, S. Minimizing End-to-End Delay on Real-Time Applications. Wireless Pers Commun 107, 41–55 (2019). https://doi.org/10.1007/s11277-019-06239-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06239-8

Keywords

Navigation