Next Article in Journal
Survival Probability, Particle Imbalance, and Their Relationship in Quadratic Models
Previous Article in Journal
Probabilistic Estimation and Control of Dynamical Systems Using Particle Filter with Adaptive Backward Sampling
Previous Article in Special Issue
Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks

by
Nikolaos Nomikos
1,*,
Themistoklis Charalambous
2,3,
Risto Wichman
4,
Yvonne-Anne Pignolet
5 and
Nikolaos Pappas
6
1
Department of Ports Management and Shipping, National and Kapodistrian University of Athens, 34400 Euboea, Greece
2
Department of Electrical and Computer Engineering, School of Engineering, University of Cyprus, 1678 Nicosia, Cyprus
3
Department of Electrical Engineering and Automation, School of Electrical Engineering, Aalto University, 02150 Espoo, Finland
4
Department of Information and Communications Engineering, School of Electrical Engineering, Aalto University, 02150 Espoo, Finland
5
Dfinity Foundation, 6300 Zurich, Switzerland
6
Department of Computer and Information Science, Linköping University, SE-60174 Linköping, Sweden
*
Author to whom correspondence should be addressed.
Submission received: 20 May 2024 / Revised: 26 July 2024 / Accepted: 29 July 2024 / Published: 30 July 2024
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications II)

Abstract

:
In this paper, a network comprising wireless devices equipped with buffers transmitting deadline-constrained data packets over a slotted-ALOHA random-access channel is studied. Although communication protocols facilitating retransmissions increase reliability, a packet awaiting transmission from the queue experiences delays. Thus, packets with time constraints might be dropped before being successfully transmitted, while at the same time causing the queue size of the buffer to increase. To understand the trade-off between reliability and delays that might lead to packet drops due to deadline-constrained bursty traffic with retransmissions, the scenario of a wireless network utilizing a slotted-ALOHA random-access channel is investigated. The main focus is to reveal the trade-off between the number of retransmissions and the packet deadline as a function of the arrival rate. Towards this end, analysis of the system is performed by means of discrete-time Markov chains. Two scenarios are studied: (i) the collision channel model (in which a receiver can decode only when a single packet is transmitted), and (ii) the case for which receivers have multi-packet reception capabilities. A performance evaluation for a user with different transmit probabilities and number of retransmissions is conducted. We are able to determine numerically the optimal probability of transmissions and the number of retransmissions, given the packet arrival rate and the packet deadline. Furthermore, we highlight the impact of transmit probability and the number of retransmissions on the average drop rate and throughput.

1. Introduction

Future wireless communication networks are envisioned to play a major role in enabling autonomous systems in the context of the Internet of Things (IoT), comprising connected vehicles, smart devices, or fully automated factories; see, for example, [1,2,3,4]. The data traffic produced from these wireless devices, referred to as machine-to-machine (M2M) communication, will significantly differ from the wireless traffic served by currently deployed wireless networks. In greater detail, wireless devices might transmit packets consisting of a few bytes of information, while being sporadically active. Moreover, a massive number of devices may demand ubiquitous connectivity, and the transmission of packets with extremely stringent latency and reliability requirements, as is the case of mission-critical M2M applications, supporting real-time closed-loop control, one of the essential mechanisms enabling such emerging applications [5,6,7].

1.1. Related Work

The rapid blooming of applications requiring deadline-constrained packet transmissions and multimedia broadcasting over wireless communication networks has stimulated research on deadline-constrained broadcasting, relying on scheduling [8,9,10,11] and random access [12,13,14,15,16,17,18,19,20]. The work in [12] obtained the optimal access probability of secondary nodes in a cognitive radio network, towards maximizing the successful delivery probability (SDP) under specific deadline constraints using simple slotted ALOHA. The issue of improving the reliability of deadline-constrained one-hop broadcasting, based on the slotted-ALOHA with retransmission was investigated in [13]. More specifically, the SDP was derived, as well as the optimal access probability for SDP maximization. Regarding retransmissions, their optimal value under specific throughput requirements was determined. Queuing analysis of deadline-constrained broadcasting, but without retransmission, was investigated in [14]. By modeling the system as a discrete-time Geo/Geo/1 queue with a specific delivery deadline, several performance metrics were investigated, including the loss probability, queue length distribution, mean waiting time, and SDP. Nevertheless, deadline-constrained broadcasting with retransmissions has not been analyzed yet. Furthermore, the paper in [15] studied a slotted-ALOHA network consisting of nodes with energy harvesting capabilities. For this setup, the author proposed an approximate analytical model for deriving the timely-delivery ratio, since the interaction of energy and data queues poses significant difficulties in obtaining an exact analytical model. In [16], the author derived the upper and lower throughput bounds in random access networks, employing power-domain non-orthogonal multiple access (NOMA). These expressions allowed for the acquisition of the traffic intensity, maximizing the lower bound, while the asymptotic maximum throughput was obtained for a large number of power levels. However, the impact of retransmissions and deadlines on the throughput performance was not investigated. Then, the author in [17] adopted the exploration of multi-channel ALOHA through preambles before transmitting data packets in machine-type communication (MTC), showing a maximum throughput improvement by a factor of 2 e 1 1.632 . In addition, a steady-state analysis with fast retrial was performed, highlighting that the delay outage probability is significantly reduced for a lightly loaded system. Another work examined a slotted-ALOHA random access network in [18], focusing on the age of information (AoI) performance. In greater detail, a stationary threshold-based age-dependent random access (ADRA) protocol was presented, enabling transmitting nodes to access the channel with a certain probability, as long as their instantaneous AoI surpassed a predefined threshold. Simulation results showed that ADRA provided better AoI performance than other age-oriented random access protocols. It should be noted that the impact of retransmissions and message expiration was not incorporated in the results. A novel random medium access control (MAC) scheme was presented in [19], relying on transmission opportunity prediction, measuring the transmitted-side interference. The authors used stochastic geometry to model the network topology and obtained a fixed-point equation to provide the optimal transmission probability to maximize the proportional fair throughput in the network. Even though the proposed scheme showed improved throughput performance, allowing more nodes to access the wireless medium, it introduced additional complexity by implementing a transmission opportunity prediction mechanism. Focusing on deadline-constrained broadcasting in random access networks, the authors in [20] aimed at enhancing the maximum achievable timely delivery ratio. Their solution relied on dynamic control, allowing each active node to accurately determine the transmission probability by considering the current delivery urgency and the knowledge of current contention intensity. Moreover, optimal control policies for cases where the contention intensity is fully available or incompletely known were derived, applying the Markov decision process (MDP) theory. Nevertheless, the presented results relied on the assumption of i.i.d. traffic, without considering generalized traffic patterns or bursty traffic.

1.2. Contributions

Overall, the contributions of this paper are as follows:
  • First, the successful transmission probability is obtained for the case where a new packet is generated after the successful transmission of the previous one has been completed or where that packet has been dropped, either due to reaching the maximum number of allowed retransmissions or expiration. In this part of the analysis, no data buffering is considered.
  • The second part of the analysis investigates stochastic bursty traffic with buffer-aided devices by means of a discrete-time Markov chain (DTMC) for single- and multi-packet reception. Two cases are distinguished:
    First, the case where a packet keeps being retransmitted until expiration or successful transmission. This case resembles that of [14]; however, a different DTMC is constructed, providing the SDP directly;
    Second, the case where the deadline value is larger than the number of allowed retransmissions. A similar construction of the DTMC is used and, as a result, the system performance is analyzed.
  • Simulation results are included, validating the theoretical findings and demonstrating the effect of different transmit probabilities and numbers of allowed retransmissions on the drop rate and the average throughput. Finally, the positive effect of MPR in the network, as expected, is highlighted.
It should be noted that, in this work, we focus on a single-carrier topology where two cases of packet reception by the destination are investigated, i.e., single- and multi-packet reception. Thus, in the results, we assume that multiple nodes are concurrently served on the same carrier. When a multi-carrier network is considered, our analysis and findings can be easily extended by separately investigating the reception performance for each carrier.
The findings of this study may be useful in practical code domain-based multi-packet reception (MPR), such as code-division multiple access (CDMA) and sparse code division multiple access (SCMA) systems, supporting deadline-constrained applications. At the same time, this paper can serve as a building block for investigating packet scheduling in random access cooperative networks with deadline constraints.

1.3. Structure

The remainder of the paper is structured as follows: Section 2 presents the system model adopted in this study and the necessary preliminaries. Then, Section 3.1 and Section 3.2 present the theoretical framework and analysis for the SDP when a packet is generated after the previous one has either been successfully transmitted or dropped. Furthermore, the impact of bursty traffic and buffering is also analyzed. In Section 4, the numerical and simulation results are presented, giving several insights about the performance of the considered scenario. Finally, in Section 5, we draw conclusions and discuss possible extensions and future research directions.

2. System Model and Preliminaries

In this section, the system model and the necessary preliminaries for the development of our study are presented.

2.1. Notation

Table 1 includes the notation used throughout the paper.

2.2. Network Model

In this work, a network comprising N nodes, being in transmission range and sharing the same wireless channel, is considered. While we could consider the case in which each node i in the network has its intended destination, in this paper, without loss of generality, we concentrate on the case where all the nodes transmit towards a common destination; this also motivates our work on multi-packet reception. Random access of the wireless medium is assumed and, thus, each node transmits with probability q i (for simplicity of exposition, the same value of q i is assumed for all nodes, i.e., q i = q i ). The time is slotted and each packet transmission requires one slot.
A widely used protocol to maintain reliable packet transmissions over unreliable communication is the automatic repeat request (ARQ) ([21], §5). Herein, we assume that nodes invoke ARQ, in which instantaneous and error-free acknowledgements/negative-acknowledgements (ACK/NACK) are transmitted by the receiver over a separate narrow-band channel.
Regarding the packet deadlines, when a new packet j is generated, it has a deadline D j (for simplicity, it is assumed that D j is the same for all packets, i.e., D j = D j ) and immediately enters the queue (in the case of bursty traffic). If the packet deadline expires before the packet reaches the destination, then the packet is dropped from the queue. Here, two cases are considered for the number of allowed retransmissions:
(a)
the case where each packet can be retransmitted until its expiration (i.e., retransmitted up to D 1 times), and
(b)
the case where the number of retransmissions is equal to n, where 1 n < D 1 .
Retransmissions are necessary when the packet does not reach the destination, either due to a collision or unsuccessful packet reception at the receiver, as a result of the wireless nature of the channel. As a convention, the transmission of a packet from the queue is performed at the start of the slot and packets enter the queue at the end of the slot.

2.3. Physical Layer Model

Let P i be the transmit power of node i, and g i be the channel coefficient between node i and the receiver. The received power, when node i transmits, is therefore g i s i , where g i is a random variable (RV) representing small-scale fading and s i is the received power factor. The received power factor s i is given by s i = P i r i α , where α is the path loss (PL) exponent. Let T i denote the set of nodes whose transmitted power appears as interference to the transmitted signal from node i. If node j T i , this transmission will appear as interference to the receiver when decoding the message from node i with a power of g j s j . The total interference and noise, denoted by I i , at the receiver when serving node i is given by
I i = j T i g j s j + η ,
where η 0 denotes the power of noise at the receiver other than interference from other nodes.
It is considered that a packet from node i is successfully transmitted to the receiver if, and only if, the signal-to-interference-and-noise ratio (SINR) exceeds a certain threshold γ , called the capture ratio, i.e.,
SIN R i = g i s i j T i g j s j + η γ .
When only node i transmits, the packet is successfully transmitted to the receiver if, and only if, the signal-to-noise ratio (SNR) exceeds γ , i.e.,
SNR i = g i s i η γ .
Under Rayleigh fading, g i is exponentially distributed [22]. When only node i transmits, the success transmission probability for node i is given by
p i , 0 = P g i η γ s i = exp η γ v i s i ,
where v i denotes the Rayleigh fading RV parameter (i.e., g i Rayleigh ( v i ) ).
When | T i | nodes transmit simultaneously with node i, the successful transmission probability for node i is given by ([23], Theorem 1)
p i , T i = exp γ η v i s i k T i 1 + γ v k s k v i s i .

2.4. Preliminary Analysis

The packet arrival process at a node i is assumed to follow the Bernoulli distribution with an average probability λ . Let μ denote the probability that a packet at the head of the queue of node i will be successfully transmitted to the destination in a given time slot. Then, for the case when b 1 other nodes are backlogged (where b N ), and only node i transmits, μ is given by μ 1 , where μ 1 is
μ 1 = p i , 0 q ( 1 q ) b 1 .
When b 1 other nodes are backlogged, and apart from node i, c 1 specific other nodes transmit ( 2 c b ), then μ is given by μ c 1 , where μ c 1 is
μ c 1 = p i , c 1 q c ( 1 q ) b c .
If we consider the case of any c 1 nodes out of the b 1 other nodes to transmit, then μ is given by μ c , where μ c is
μ c = b 1 c 1 p i , c 1 q c ( 1 q ) b c .
Combining all these cases together, the probability μ that a packet at the head of the queue of node i will be successfully transmitted to the destination in a given time slot is
μ : = k = 1 b μ k = k = 1 b b 1 k 1 p i , k 1 q k ( 1 q ) b k ,
where k denotes the number of nodes transmitting simultaneously, including node i.

3. Theoretical Analysis

This section provides a theoretical analysis for the SDP and the effect of bursty traffic and buffering.

3.1. SDP

In this part, the SDP analysis of a packet being at the head of the queue is given. Here, a new packet is generated after the previous one has been successfully delivered or dropped. Note that a packet might be dropped either due to expiration or by exceeding the number of allowed retransmissions n. Two cases are considered: (1) when n = 0 (i.e., one transmission is allowed), and (2) when 0 < n D 1 (the number of total transmissions is more than one but less than or equal to the deadline of the packet).
When the traffic is characterized by deadlines, an important metric is the SDP, given that the packet is at the head of the queue, p s ( n , D ) , which is the probability that a packet will be successfully delivered to the destination prior to its expiration or surpassing the total number of allowed transmission attempts, m n + 1 .

3.1.1. n = 0

First, the case for which no retransmissions are allowed is considered, i.e., when the allowed number of transmission attempts, m, is m = 1 . Then, p s ( n , D ) = p s ( 0 , D ) and becomes
p s ( 0 , D ) = μ + ( 1 q ) μ + + ( 1 q ) D 1 μ = μ k = 1 D ( 1 q ) k 1 = μ [ 1 ( 1 q ) D ] q .
Let ν μ / q , then (10) becomes
p s ( 0 , D ) = ν [ 1 ( 1 q ) D ] .

3.1.2. 0 < n D 1

Let S denote the event that a packet will be successfully transmitted within the desired deadline, and let X denote the event of the first transmission attempt. Then, p s ( n , D ) , 1 n D , is given by [13]
p s ( n , D ) = k = 1 D P ( S , n | X = k ) P ( X = k ) ,
where P ( · ) denotes the probability of an event and P ( · | · ) denotes the conditional probability of an event. Hence, the value of p s ( m , D ) can be computed iteratively by
p s ( n , D ) = q ν + 1 ν p s ( n 1 , D 1 ) + ( 1 q ) q ν + 1 ν p s ( n 1 , D 2 ) + ( 1 q ) 2 q ν + 1 ν p s ( n 1 , D 3 ) + + ( 1 q ) D 1 q ν + 1 ν p s ( n 1 , 0 ) = k = 1 D ( 1 q ) k 1 q ν + 1 ν p s ( n 1 , D k ) .

3.2. The Effect of Bursty Traffic and Buffering

In the previous section, we studied the case that a packet is directly generated once the previous one has been successfully transmitted or dropped. In this section, we consider the impact of bursty traffic and data buffering on the system performance. In greater detail, in a time slot, a packet will be generated with a given deadline, according to a probability λ , and will enter the queue. Our analysis focuses on a single node having bursty traffic, while the rest of the N 1 nodes are considered to always be backlogged, i.e., at least one packet always resides in the queues. It should be noted that this is the worst-case scenario, as the number of transmissions, and consequently the number of collisions, in a time slot are overestimated. A DTMC model of a system with bursty traffic is used, while the arriving packets are stored in a queue. Based on the number of allowed retransmissions, we consider two cases: (1) each packet can be retransmitted as many times as required for as long as it remains in the queue (i.e., n = D 1 number of retransmissions); (2) a limited number of retransmissions (i.e., n < D 1 ) is allowed for each packet.

3.2.1. Number of Retransmissions n = D 1

Here, the number of possible retransmissions is equal to the deadline. For a given deadline D, the DTMC has D + 1 states, where the states from 0 to D model the time passed. The DTMC includes two additional virtual states (i.e., states S and U) capturing the events of successful and unsuccessful delivery, respectively. State S is included to capture the successful packet transmission before expiration or dropping. The values of the transition probabilities from state S to any other state depend on the state prior to S. Then, state U models the event where a packet either expires or is dropped. An illustrative example of the DTMC for a deadline D = 3 is shown in Figure 1.
The transition probability matrix M for a deadline of D = 3 , which is column stochastic by construction, is given by
M = 1 λ μ ( 1 λ ) μ ( 1 λ ) 2 μ ( 1 λ ) 3 λ μ λ μ λ ( 1 λ ) μ λ ( 1 λ ) 2 0 1 μ μ λ μ λ ( 1 λ ) 0 0 1 μ μ λ .

3.2.2. Number of Retransmissions n < D 1

In this case, a packet drop might occur for two reasons: either the number of retransmissions has reached its maximum allowed value or the packet has expired. The main motive behind limiting the number of retransmissions is to reduce the number of packets residing in the queue and waiting to be transmitted, thus reducing the amount of packets that will expire, and increasing the system throughput. Given a deadline D, the DTMC has
D ( n + 1 ) + 1 n ( n + 1 ) 2
states including, similarly to the previous case, two additional virtual states, facilitating the visualization of the successful transmissions. For the case in which one retransmission is allowed ( n = 1 ), for example, the DTMC has 2 D states (for a deadline of 3, as illustrated in Figure 2, 6 states exist). As can be seen in (15), the construction complexity of the DTMC is only determined by the deadline D and the number of maximum retransmissions n and, hence, is independent of the number of users. The number of users only affects the transition probabilities of the DTMC. Hence, the results presented in this paper can also be applied to massive multi-access networks.
Remark 1.
Constructing the DTMCs that include these virtual states offers a framework for investigating the behavior of such advanced wireless communication systems, where packets may have a limited number of allowed retransmissions.
The throughput, T, of the system can be obtained by considering the probability of being in the virtual state s. This can be found by identifying the states from which a successful transmission can occur. In greater detail, the throughput is given by
T = s S π ( s ) μ ,
where π ( s ) denotes the steady state of state s in the DTMC, s being a state of the DTMC belonging to the set of states S capturing the event of a successful transmission. In the case of the DTMC in Figure 2, the set S consists of the states { 1 , ( 2 , 0 ) , ( 2 , 1 ) , ( 3 , 0 ) , ( 3 , 1 ) } .
The drop rate (or drop probability), D R , is correspondingly derived by considering the states from which a packet might be dropped, due to violating its deadline or absence of retransmissions. More specifically, the drop rate is given by
D R = f D F D π ( f D ) ( 1 μ ) + f F π ( f ) ( q μ ) ,
where π ( f D ) is the steady state of the states f D in the DTMC, belonging to the set of states F D , whose transmission is last. In the case of the DTMC in Figure 2, F D consists of the states { ( 3 , 0 ) , ( 3 , 1 ) } . The remaining states from which the last unsuccessful transmission of a packet can take place belong to the set of states F . In the case of the DTMC in Figure 2, F consists of the state { ( 2 , 1 ) } .
Remark 2.
In order to find the optimal transmission probability q with respect to a certain metric (e.g., minimize D R or maximize T), an optimization problem can be formulated. For example, to maximize throughput T, we propose the following optimization problem:
max q s S π ( s ) μ .
Note that both μ and the steady-state distribution π are functions of q, but since there is no known analytical expression of π with regards to q (yet), it is not possible to provide an analytical solution; hence, to solve this problem, we resort to numerical approaches.

4. Simulation and Numerical Results

This part presents simulation and numerical results using MATLAB®—R2022a for a topology comprising buffer-aided nodes with buffer size L = 3 and varying packet deadline values D. Our analysis does not consider the impact of varying the buffer size, as we assume that the buffer size is at least as big as the packet deadline value, and in cases where the buffer size exceeds this value, the packets at the back of the queue will never be transmitted. The topology is depicted in Figure 3, and it is considered that all the transmitting nodes have the same distance to the common destination. More specifically, the performance of a non-backlogged user is evaluated, in terms of drop rate and average throughput, measured in bps/Hz, for 105 time-slots, various transmit probabilities q and numbers of retransmission n values. It is noted that various cases are examined regarding the number of users in the network, i.e., N = 2 , 3 , 4 , 5 , where apart from the non-backlogged user, the other users are assumed to be backlogged. In addition, for the non-backlogged user, the packet arrival probability is λ = 0.5 , unless otherwise stated and the probability of a successful transmission is p i , 0 = 0.75 for the scenario with the collision channel model, while when MPR is allowed p i , 1 = 0.375 , p i , 2 = 0.1875 , p i , 3 = 0.09375 and p i , 4 = 0.046875 , calculated from (4) and (5) using the parameters in Table 2. Thus, here the MPR assumes that the receiver is equipped with multiple single-user detectors. It is noted that the network parameters in Table 2 were selected to correspond to an indoor environment where, due to clutter, line-of-sight (LoS) is not guaranteed and low-power nodes, such as sensors, transmit their data to a common sink, similarly to in the case of an Industry 4.0 topology.

4.1. Collision Channel Model

The first scenario focuses on a topology with N = 2 users, allowing only single-user transmission. So, when both users aim to access the channel, a collision occurs.

4.1.1. Number of Retransmissions n = D 1

The impact of varying q for n = D 1 = 2 allowed retransmissions is considered in this scenario. Figure 4 shows the drop rate results for different values of transmit probability q, equal for the two users. It can be seen that the drop rate for the non-backlogged user is minimized for a transmit probability value q = 0.5 . For lower q values, an increase in the drop rate is experienced, as the device does not access the frequently vacant wireless channel. In these cases, packets reside for more time slots in the queue, being consequently dropped due to expiration. Moreover, for higher q values, collisions may occur and the drop rate increases. Regarding the effect of λ , increasing the packet arrival probability results in an increased drop rate.
Then, Figure 5 illustrates the average throughput performance for different q values. Here, the maximum throughput is obtained when q = 0.5 . As has been already observed for the drop rate results, when this q value is adopted, the non-backlogged user enjoys improved throughput, as more packets are successfully transmitted towards the destination. More specifically, a q = 0.5 optimizes the trade-off between channel access and collisions with the packets of the backlogged user. In addition, increasing λ results in increased throughput for the non-backlogged user, while saturation can be seen when varying λ = 0.5 to λ = 0.75 and more evidently for λ = 0.95 .

4.1.2. Number of Retransmissions n < D 1

For this scenario, the maximum number of allowed retransmissions in the network is n = 1 . Figure 6 shows the drop rate performance for different q values. Again, a similar trend to the first scenario is observed. More specifically, for the non-backlogged user, the minimum drop rate is seen when q = 0.5 . As for the effect of n on the drop rate, a negligible increase is observed for larger q values, since n is equal to one and packets are dropped more often from the system, after a collision. It must be noted that similarly to the previous case, higher λ values lead to more packets being dropped.
Finally, Figure 7 depicts average throughput results for varying q values. The throughput performance closely follows that of the first scenario. So, for q = 0.5 , the maximum throughput is acquired for the non-backlogged user, while for higher q values, the average throughput slightly degrades. In conclusion, when both cases of n are considered, it can be observed that the performance of the non-backlogged user does not change and the number of retransmissions marginally affects the drop rate and the average throughput given small deadline values and a low number of users. Finally, throughput performance improves when higher λ values characterize the non-backlogged user’s traffic, resulting in saturation.

4.1.3. Comparisons

In this case, the system performance is compared, when all the packets are characterized by deadline values D = 5 , and additionally, (i) no retransmissions are attempted ( n = 0 ), (ii) some retransmissions are attempted (in this case n = 1 ), and (iii) as many retransmissions as needed are allowed ( n = D 1 = 4 ). We see in both Figure 8 and Figure 9 that the performance is improved, as more retransmission attempts are allowed. This is expected as, in this case, there are no packets with the same or lower deadlines residing further back in the queue, due to the fact that the inflow of packets is low and an equal deadline is assumed for all the packets.

4.2. Multi-Packet Reception

The second scenario investigates the impact of allowing MPR on the drop rate and throughput performance of the network. Here, the number of users N varies, i.e., N = 2 or N = 3 and D = 3 .

4.2.1. Number of Retransmissions n = D 1

Figure 10 depicts the drop rate performance when n = 2 retransmissions are allowed in a network with N = 2 users. As both users simultaneously transmit, a significantly different system behavior is observed compared to the previous scenario, due to the MPR capability. In greater detail, considering the fixed value of the successful transmission probability P, it can be observed that the drop rate reduces, as q increases and MPR is allowed, i.e., collisions do not occur in the network. In addition, increasing λ results in more instances of dropped packets, regardless of q.
Next, Figure 11 shows the throughput performance of the network. As was observed for the drop rate, the average throughput performance improves when the value of q increases. Since MPR is allowed, allowing both users to access the medium more frequently has a beneficial effect on the number of transmitted packets, and thus the average throughput is increased. In this case, a higher λ corresponds to significantly higher throughput as q increases, while for lower q values, the throughput is slightly affected. However, it is clearly seen that throughput performance saturates after λ = 0.75 .

4.2.2. Number of Retransmissions n < D 1

Figure 12 illustrates the drop rate performance for the same network when n = 1 retransmission is possible. It can be seen that the reduction in allowed retransmissions results in an almost negligible drop rate performance degradation for the non-backlogged user. Overall, the drop rate reduces in an identical fashion as in the case of n = 2 retransmissions, as q increases. On the contrary, when λ increases, the drop rate performance degrades.
Likewise, the average throughput performance is largely unaffected by reducing the value of n, as can be seen in Figure 13. More specifically, the average throughput sees a noteworthy increase at around 7% for q = 0.9 , i.e., when both users try to transmit with high probability. In this comparison, when λ = 0.25 , a slightly improved throughput is observed compared to the corresponding case of n = 2 , but for the other two λ values, the throughput is almost negligibly reduced.

4.2.3. Comparisons

Here, different cases with N = 2 , 3 , 4 , 5 users are considered and the impact of varying c, i.e., the number of simultaneously transmitting users on the drop rate and throughput performance is examined.
The drop rate results are depicted in Figure 14. It can be seen that when c = 1 , the drop rate first reduces until q = 0.3 for N = 2 , 3 and until q = 0.2 for N = 5 , since packet expiration due to inactivity is avoided. Then, as c increases, a worse drop rate performance is observed for all N values. However, when all users simultaneously transmit ( N = c ) and MPR is performed, the drop rate performance is enhanced, as q increases, independently of the number of users in the network. Meanwhile, in this case, the drop rate increases as N increases, due to the higher levels of interference in the network.
Finally, Figure 15 shows the average throughput results for the three different cases of N and a varying number of concurrently transmitting users c. Again, the results indicate that when MPR is allowed, the throughput is improved when all the users are able to transmit and access the channel with a higher probability. Moreover, increasing the number of users in the network N negatively affects throughput, as interference arises. In addition, for the case of c = 1 , a q > 0.3 for N = 3 , 4 and a q > 0.2 for N = 5 leads to reduced throughput.
It should be noted that even though we investigated the network performance for a different number of users N, taking values in the set N = { 2 , , 5 } , these users share a single wireless channel. Thus, the results presented in this study can facilitate the optimization of the trade-off between spectral efficiency and the number of concurrently transmitting users, considering their corresponding SDP and the service requirements. In addition, in practical network deployments, as the available spectral resources increase, the number of coexisting users and machines on multiple channels will correspond to the massive connectivity cases of IoT and MTC scenarios.

5. Summary and Future Directions

5.1. Summary

A network consisting of wireless devices transmitting deadline-constrained data using slotted-ALOHA random-access channels was considered. The performance of deadline-constrained transmission with retransmissions was studied, as the transmission of packets residing in queues might experience delays from retransmissions and they might become dropped before their turn comes for transmission. The goal of this study was to reveal and investigate the trade-off between the packet deadline and the number of allowed retransmissions, as a function of the packet arrival rate. Towards this end, the system was analyzed by using Markov chains, while numerical and simulation results highlighted the impact of different transmit probability values and the number of allowed retransmissions on the drop rate and the average throughput. Moreover, the effect of allowing multi-packet reception for different numbers of simultaneously transmitting users was shown.

5.2. Future Directions

There are several interesting research directions for extending this paper, in the context of MTC and 6G networks. One aspect that should be studied is related to MPR performance with direct sequence CDMA (DS-CDMA) or SCMA for improved multiple access by allowing multiple simultaneous transmissions [24]. In addition, the case of random access in cooperative networks with deadline constraints, departing from orthogonal schemes based on packet scheduling [25] should be analyzed. Moreover, the performance of random access in the context of grant-free NOMA [26,27] represents another important research area, together with the development of analytical methods to optimize the transmission probability q for each scenario. Furthermore, other metrics must be considered in the analysis, such as the freshness of the data [28,29]. Additional directions include the deployment of hybrid ARQ (HARQ) mechanisms, which encode the data with a forward error correction code, thus making the SDP higher in every retransmission [30,31], as well as power control mechanisms, studying the interplay between improving the successful transmission probability p i , 0 and the number of transmissions [32]. Finally, the adoption of machine learning to predict the transmission patterns of concurrently transmitting nodes through privacy-preserving federated learning algorithms [33] may be beneficial for network performance.

Author Contributions

Conceptualization, N.N., T.C., R.W., and N.P.; methodology, N.N., T.C., R.W., and N.P.; validation, T.C., Y.-A.P., and N.P.; formal analysis, N.N., T.C., R.W., and N.P.; investigation, T.C., Y.-A.P., and N.P.; writing—original draft preparation, N.N., T.C., and N.P.; writing—review and editing, R.W., and Y.-A.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Project MINERVA, funded by the European Research Council (ERC) through the European Union’s Horizon 2022 Research and Innovation Programme under Grant 101044629.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Yvonne-Anne Pignolet was employed by the company Dfinity Foundation. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACK/NACKAcknowledgements/Negative-Acknowledgements
ADRAAge-Dependent Random Access
AoIAge of Information
ARQAutomatic Repeat reQuest
CDMACode-Division Multiple Access
DS-CDMADirect Sequence CDMA
DTMCDiscrete-Time Markov Chain
HARQHybrid ARQ
IoTInternet of Things
M2MMachine-to-Machine
MACMedium Access Control
MDPMarkov Decision Process
MPRMulti-Packet Reception
MTCMachine-Type Communication
MUDMulti-User Detector
NOMANon-Orthogonal Multiple Access
PLPath Loss
RVRandom Variable
SCMASparse Code Division Multiple Access
SDPSuccessful Delivery Probability
SICSuccessive Interference Cancellation
SINRSignal-to-Interference-and-Noise Ratio
SNRSignal-to-Noise Ratio

References

  1. Park, P.; Ergen, S.C.; Fischione, C.; Lu, C.; Johansson, K.H. Wireless network design for control systems: A survey. IEEE Commun. Surv. Tutor. 2018, 20, 978–1013. [Google Scholar] [CrossRef]
  2. Nkenyereye, L.; Hwang, J.; Pham, Q.V.; Song, J. MEIX: Evolving Multi-Access Edge Computing for Industrial Internet-of-Things Services. IEEE Netw. 2021, 35, 147–153. [Google Scholar] [CrossRef]
  3. Wu, X.; Wang, J.; Li, P.; Luo, X.; Yang, Y. Internet of Things as Complex Networks. IEEE Netw. 2021, 35, 238–245. [Google Scholar] [CrossRef]
  4. Ssimbwa, J.; Lim, B.; Ko, Y.C. GFDM frame design for low-latency industrial networks. J. Commun. Netw. 2022, 24, 336–346. [Google Scholar] [CrossRef]
  5. Zhao, G.; Imran, M.A.; Pang, Z.; Chen, Z.; Li, L. Toward Real-Time Control in Future Wireless Networks: Communication-Control Co-Design. IEEE Commun. Mag. 2019, 57, 138–144. [Google Scholar] [CrossRef]
  6. Wu, C.K.; Tsang, K.F.; Liu, Y.; Zhu, H.; Wang, H.; Wei, Y. Critical Internet of Things: An Interworking Solution to Improve Service Reliability. IEEE Commun. Mag. 2020, 58, 74–79. [Google Scholar] [CrossRef]
  7. Choi, J.; Park, J.; Pokhrel, S. Explore-before-talk: Multichannel selection diversity for uplink transmissions in machine-type communication. J. Commun. Netw. 2021, 23, 23–33. [Google Scholar] [CrossRef]
  8. Master, N.; Bambos, N. Power control for packet streaming with head-of-line deadlines. Perform. Eval. 2016, 106, 1–18. [Google Scholar] [CrossRef]
  9. Mao, Z.; Koksal, C.E.; Shroff, N.B. Optimal online scheduling with arbitrary hard deadlines in multihop communication networks. IEEE/ACM Trans. Netw. 2016, 24, 177–189. [Google Scholar] [CrossRef]
  10. Fountoulakis, E.; Pappas, N.; Liao, Q.; Suryaprakash, V.; Yuan, D. An examination of the benefits of scalable TTI for heterogeneous traffic management in 5G networks. In Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, andWireless Networks (WiOpt), Paris, France, 15–19 May 2017; pp. 1–6. [Google Scholar]
  11. Hou, Y.; Liu, Z.; Sun, D. A novel MAC protocol exploiting concurrent transmissions for massive LoRa connectivity. J. Commun. Netw. 2020, 22, 108–117. [Google Scholar] [CrossRef]
  12. Bae, Y.H. Analysis of optimal random access for broadcasting with deadline in cognitive radio networks. IEEE Commun. Lett. 2013, 17, 573–575. [Google Scholar] [CrossRef]
  13. Bae, Y.H. Optimal retransmission-based broadcasting under delivery deadline constraint. IEEE Commun. Lett. 2015, 19, 1041–1044. [Google Scholar] [CrossRef]
  14. Bae, Y.H. Queueing analysis of deadline-constrained broadcasting in wireless networks. IEEE Commun. Lett. 2015, 19, 1782–1785. [Google Scholar] [CrossRef]
  15. Bae, Y.H. Modeling timely-delivery ratio of slotted Aloha with energy harvesting. IEEE Commun. Lett. 2017, 21, 1823–1826. [Google Scholar] [CrossRef]
  16. Choi, J. On Throughput Bounds of NOMA-ALOHA. IEEE Wirel. Commun. Lett. 2022, 11, 165–168. [Google Scholar] [CrossRef]
  17. Choi, J. On improving throughput of multichannel ALOHA using preamble-based exploration. J. Commun. Netw. 2020, 22, 380–389. [Google Scholar] [CrossRef]
  18. Chen, H.; Gu, Y.; Liew, S.C. Age-of-Information Dependent Random Access for Massive IoT Networks. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 930–935. [Google Scholar] [CrossRef]
  19. Choi, J.; Ko, S.W.; Yamamoto, K.; Kim, S.L. Random Access with Opportunity Detection in Wireless Networks. IEEE Wirel. Commun. Lett. 2019, 8, 1440–1443. [Google Scholar] [CrossRef]
  20. Gong, A.; Zhang, Y.; Deng, L.; Liu, F.; Li, J.; Shu, F. Dynamic Optimization of Random Access in Deadline-Constrained Broadcasting. IEEE Trans. Netw. Sci. Eng. 2023, 10, 2059–2073. [Google Scholar] [CrossRef]
  21. Leon-Garcia, A.; Widjaja, I. Communication Networks: Fundamental Concepts and Key Architectures; McGraw-Hill: New York, NY, USA, 2000; Volume 2. [Google Scholar]
  22. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: New York, NY, USA, 2005. [Google Scholar]
  23. Nguyen, G.D.; Kompella, S.; Wieselthier, J.E.; Ephremides, A. Optimization of transmission schedules in capture-based wireless networks. In Proceedings of the IEEE Military Communications Conference, San Diego, CA, USA, 16–19 November 2008. [Google Scholar]
  24. Zeng, J.; Lv, T.; Lin, Z.; Liu, R.P.; Mei, J.; Ni, W.; Guo, Y.J. Achieving Ultrareliable and Low-Latency Communications in IoT by FD-SCMA. IEEE Internet Things J. 2020, 7, 363–378. [Google Scholar] [CrossRef]
  25. Seo, H.; Hong, J.; Choi, W. Low Latency Random Access for Sporadic MTC Devices in Internet of Things. IEEE Internet Things J. 2019, 6, 5108–5118. [Google Scholar] [CrossRef]
  26. Abbas, R.; Shirvanimoghaddam, M.; Li, Y.; Vucetic, B. A novel analytical framework for massive grant-free NOMA. IEEE Trans. Commun. 2019, 67, 2436–2449. [Google Scholar] [CrossRef]
  27. Choi, J.; Ding, J.; Le, N.P.; Ding, Z. Grant-Free Random Access in Machine-Type Communication: Approaches and Challenges. IEEE Wirel. Commun. 2022, 29, 151–158. [Google Scholar] [CrossRef]
  28. Stamatakis, G.; Pappas, N.; Traganitis, A. Optimal Policies for Status Update Generation in an IoT Device With Heterogeneous Traffic. IEEE Internet Things J. 2020, 7, 5315–5328. [Google Scholar] [CrossRef]
  29. Fountoulakis, E.; Charalambous, T.; Nomikos, N.; Ephremides, A.; Pappas, N. Information freshness and packet drop rate interplay in a two-user multi-access channel. J. Commun. Netw. 2022, 24, 357–364. [Google Scholar] [CrossRef]
  30. Dosti, E.; Shehab, M.; Alves, H.; Latva-aho, M. Ultra Reliable Communication via Optimum Power Allocation for HARQ Retransmission Schemes. IEEE Access 2020, 8, 89768–89781. [Google Scholar] [CrossRef]
  31. Nadeem, F.; Shirvanimoghaddam, M.; Li, Y.; Vucetic, B. Delay-Sensitive NOMA-HARQ for Short Packet Communications. Entropy 2021, 23, 880. [Google Scholar] [CrossRef]
  32. Dosti, E.; Charalambous, T.; Wichman, R. Power Allocation for ARQ Two-Hop Cooperative Networks for Ultra-Reliable Communication. In Proceedings of the 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7. [Google Scholar]
  33. Choi, J.; Pokhrel, S.R. Federated Learning With Multichannel ALOHA. IEEE Wirel. Commun. Lett. 2020, 9, 499–502. [Google Scholar] [CrossRef]
Figure 1. DTMC with D = 3 when the number of allowed retransmissions is n = 2 . Note that the number of states in this case ( n = D 1 ) is equal to D + 1 states, including two additional virtual states capturing the events of successful (state S) and unsuccessful (state U) delivery.
Figure 1. DTMC with D = 3 when the number of allowed retransmissions is n = 2 . Note that the number of states in this case ( n = D 1 ) is equal to D + 1 states, including two additional virtual states capturing the events of successful (state S) and unsuccessful (state U) delivery.
Entropy 26 00655 g001
Figure 2. DTMC with D = 3 when the number of allowed retransmissions is n = 1 . Note that the number of states in this case ( n < D 1 ) is as given in (15). The idea behind this construction is to capture the state of all the packets in the queue.
Figure 2. DTMC with D = 3 when the number of allowed retransmissions is n = 1 . Note that the number of states in this case ( n < D 1 ) is as given in (15). The idea behind this construction is to capture the state of all the packets in the queue.
Entropy 26 00655 g002
Figure 3. The considered network topology with N transmitting nodes and a common destination. The network is chosen in this topology such that all the transmitting nodes have the same distance towards the common destination.
Figure 3. The considered network topology with N transmitting nodes and a common destination. The network is chosen in this topology such that all the transmitting nodes have the same distance towards the common destination.
Entropy 26 00655 g003
Figure 4. Drop rate for various q and λ values for the first DTMC for which n = D 1 = 2 . A perfect match between the numerical and simulation results is observed. Increasing λ results in more packet drops.
Figure 4. Drop rate for various q and λ values for the first DTMC for which n = D 1 = 2 . A perfect match between the numerical and simulation results is observed. Increasing λ results in more packet drops.
Entropy 26 00655 g004
Figure 5. Average throughput for various q and λ values for the first DTMC for which n = D 1 = 2 . Throughput is maximized when q = 0.5 . As λ increases, the throughput increases, and saturation is observed.
Figure 5. Average throughput for various q and λ values for the first DTMC for which n = D 1 = 2 . Throughput is maximized when q = 0.5 . As λ increases, the throughput increases, and saturation is observed.
Entropy 26 00655 g005
Figure 6. Drop rate for various q and λ values for the second DTMC for which D = 3 and n = 1 . Drop rate is slightly increased for higher q, compared to the case of n = D 1 . More packets are dropped when λ increases.
Figure 6. Drop rate for various q and λ values for the second DTMC for which D = 3 and n = 1 . Drop rate is slightly increased for higher q, compared to the case of n = D 1 . More packets are dropped when λ increases.
Entropy 26 00655 g006
Figure 7. Average throughput for various q and λ values for the second DTMC for which D = 3 and n = 1 . Throughput slightly reduces compared to the case of n = D 1 and increases for higher λ values.
Figure 7. Average throughput for various q and λ values for the second DTMC for which D = 3 and n = 1 . Throughput slightly reduces compared to the case of n = D 1 and increases for higher λ values.
Entropy 26 00655 g007
Figure 8. Drop rate for various q values for D = 5 and n = 0 , 1 , 4 . Drop rate performance improves for increasing n. Allowing n = 4 retransmissions offers a small drop rate reduction, compared to the case of n = 1 .
Figure 8. Drop rate for various q values for D = 5 and n = 0 , 1 , 4 . Drop rate performance improves for increasing n. Allowing n = 4 retransmissions offers a small drop rate reduction, compared to the case of n = 1 .
Entropy 26 00655 g008
Figure 9. Average throughput for various q values for D = 5 and n = 0 , 1 , 4 . Throughput is enhanced with increasing n. However, only a slight improvement is observed when n = 4 is adopted over n = 1 .
Figure 9. Average throughput for various q values for D = 5 and n = 0 , 1 , 4 . Throughput is enhanced with increasing n. However, only a slight improvement is observed when n = 4 is adopted over n = 1 .
Entropy 26 00655 g009
Figure 10. Drop rate for various q and λ values for the first DTMC for which n = D 1 = 2 and N = c = 2 . It is observed that the drop rate reduces as q increases when MPR is allowed. Higher λ values have a negative impact on the drop rate, independently of q.
Figure 10. Drop rate for various q and λ values for the first DTMC for which n = D 1 = 2 and N = c = 2 . It is observed that the drop rate reduces as q increases when MPR is allowed. Higher λ values have a negative impact on the drop rate, independently of q.
Entropy 26 00655 g010
Figure 11. Average throughput for various q and λ values for the first DTMC for which n = D 1 = 2 and N = c = 2 . As MPR is allowed, increasing q has a beneficial impact on throughput. For increased λ values, the throughput is significantly increased for higher q.
Figure 11. Average throughput for various q and λ values for the first DTMC for which n = D 1 = 2 and N = c = 2 . As MPR is allowed, increasing q has a beneficial impact on throughput. For increased λ values, the throughput is significantly increased for higher q.
Entropy 26 00655 g011
Figure 12. Drop rate for various q and λ values for the second DTMC for which D = 3 , n = 1 and N = c = 2 . Here, the drop rate slightly increases compared to the case of n = D 1 . A higher λ degrades the drop rate performance for all q values.
Figure 12. Drop rate for various q and λ values for the second DTMC for which D = 3 , n = 1 and N = c = 2 . Here, the drop rate slightly increases compared to the case of n = D 1 . A higher λ degrades the drop rate performance for all q values.
Entropy 26 00655 g012
Figure 13. Average throughput for various q and λ values for the second DTMC for which D = 3 , n = 1 , and N = c = 2 . The throughput performance is slightly worse compared to the case of n = D 1 . As λ increases, the throughput performance improves for larger q values.
Figure 13. Average throughput for various q and λ values for the second DTMC for which D = 3 , n = 1 , and N = c = 2 . The throughput performance is slightly worse compared to the case of n = D 1 . As λ increases, the throughput performance improves for larger q values.
Entropy 26 00655 g013
Figure 14. Drop rate for various q values for the first DTMC for which n = D 1 = 2 , N = 3 , 4 , 5 , and c = 1 , , N . A significantly different performance is observed when N > c compared to N = c where the drop rate reduces as q increases.
Figure 14. Drop rate for various q values for the first DTMC for which n = D 1 = 2 , N = 3 , 4 , 5 , and c = 1 , , N . A significantly different performance is observed when N > c compared to N = c where the drop rate reduces as q increases.
Entropy 26 00655 g014
Figure 15. Average throughput for various q values for the first DTMC for which n = D 1 = 2 , N = 3 , 4 , 5 , and c = 1 , , N . Throughput performance for N > c is optimal for different q values, while for N = c , an ever-increasing q provides better throughput.
Figure 15. Average throughput for various q values for the first DTMC for which n = D 1 = 2 , N = 3 , 4 , 5 , and c = 1 , , N . Throughput performance for N > c is optimal for different q values, while for N = c , an ever-increasing q provides better throughput.
Entropy 26 00655 g015
Table 1. Summary of notation.
Table 1. Summary of notation.
Symbol
NNo. of nodes in the network
DPacket deadline
nNo. of retransmissions
γ Signal-to-Interference-and-Noise Ratio (SINR) threshold
P t x Transmit power
P r x Received power
hSmall-scale fading random variable (RV)
sReceived power factor
α Path loss exponent
r i Distance between node i and the receiver
vRayleigh fading RV parameter
η Noise power at the receiver
qTransmission probability
pSuccess transmission probability
T Set of transmitting nodes
cNo. of transmitting nodes
λ Average probability of the packet arrival process
μ Success transmission probability of a packet at the head of the queue
ν Ratio of q over μ
bNo. of backlogged nodes
p i , c 1 Success transmission probability for node i when c nodes simultaneously transmit
p s ( n , D ) Success transmission probability before packet expiration or before reaching the allowed no. of retransmissions
SSuccessful transmission event
XFirst transmission attempt event
UUnsuccessful transmission event
MTransition probability matrix
π ( s ) Steady-state of state s belonging in the set of states S from which a successful transmission can take place
π ( f D ) Steady-state of state f D belonging in the set of states F D transmission is the last
F The rest of the states from which the last unsuccessful transmission of a packet can take place
Table 2. Network parameters.
Table 2. Network parameters.
ParameterSymbolValueUnit
SINR threshold γ i 0dB
Noise power η −115.4dBm
Transmit power P t x i 0.01W
Rayleigh RV parameter v i 1
Transmitter–receiver distance r i 100m
Transmitter–receiver PL exponent α i 4.5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nomikos, N.; Charalambous, T.; Wichman, R.; Pignolet, Y.-A.; Pappas, N. On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks. Entropy 2024, 26, 655. https://doi.org/10.3390/e26080655

AMA Style

Nomikos N, Charalambous T, Wichman R, Pignolet Y-A, Pappas N. On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks. Entropy. 2024; 26(8):655. https://doi.org/10.3390/e26080655

Chicago/Turabian Style

Nomikos, Nikolaos, Themistoklis Charalambous, Risto Wichman, Yvonne-Anne Pignolet, and Nikolaos Pappas. 2024. "On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks" Entropy 26, no. 8: 655. https://doi.org/10.3390/e26080655

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop