Wireless 3-hop Networks with Stealing Revisited: A Kernel Approach

Abstract Wireless multi-hop networks are an important type of networks, which have been studied in the literature by several researchers. For example, in a recent study, Guillemin et al. (2013) obtained exact tail asymptotics for the two stationary marginal distributions for wireless 3-hop networks with stealing based on boundary value problems. Efficient algorithms and good approximations for system performance could be derived based on this asymptotic property. However, it has been pointed out (see Fayolle and Iasnogorodski, 2014) that the key boundary value problem proposed in Guillemin et al. (2013) is incorrect, and an erratum by the authors has been published, Guillemin et al. (2014), with further details to appear in the near future. In this paper, we revisit this wireless 3-hop network with stealing. Using a different approach, the kernel method, we obtain exact tail asymptotics not only for the marginal distributions, but also for the joint distributions, which matches exactly with the results in Guillemin et al. (2013) (and Guillemin et al., 2011). Based on this result, impact of stealing can be clearly revealed.

[1]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[2]  P. Flajolet,et al.  Analytic Combinatorics: RANDOM STRUCTURES , 2009 .

[3]  Guy Fayolle,et al.  Random walks in the quarter plane with zero drift: an explicit criterion for the finiteness of the associated group , 2011 .

[4]  E. Bender Asymptotic Methods in Enumeration , 1974 .

[5]  Fabrice Guillemin,et al.  Wireless Multihop Networks with Stealing: Large Buffer Asymptotics via the Ray Method , 2011, SIAM J. Appl. Math..

[6]  Yiqiang Q. Zhao,et al.  PR ] 1 7 M ay 2 01 5 A Kernel Method for Exact Tail Asymptotics — Random Walks in the Quarter Plane ( In memory of Dr , 2015 .

[7]  Hui Li,et al.  Tail asymptotics for a generalized two-demand queueing model—a kernel method , 2011, Queueing Syst. Theory Appl..

[8]  Mireille Bousquet-Mélou,et al.  Generating functions for generating trees , 2002, Discret. Math..

[9]  Hui Li,et al.  Analysis of exact tail asymptotics for singular random walks in the quarter plane , 2013, Queueing Syst. Theory Appl..

[10]  Fabrice Guillemin,et al.  Wireless three-hop networks with stealing II: exact solutions through boundary value problems , 2013, Queueing Syst. Theory Appl..

[11]  David Starobinski,et al.  Understanding and Tackling the Root Causes of Instability in Wireless Mesh Networks , 2011, IEEE/ACM Transactions on Networking.

[12]  A. Oestreich,et al.  Letter to the Editors , 2009, Skeletal Radiology.

[13]  Fabrice Guillemin,et al.  First response to letter of G. Fayolle and R. Iasnogorodski , 2014, Queueing Syst. Theory Appl..

[14]  Donald E. Knuth The art of computer programming: fundamental algorithms , 1969 .