Next Article in Journal
GWO-Based Joint Optimization of Millimeter-Wave System and Multilayer Perceptron for Archaeological Application
Previous Article in Journal
In Situ Non-Destructive Stiffness Assessment of Fiber Reinforced Composite Plates Using Ultrasonic Guided Waves
Previous Article in Special Issue
Research on Computing Resource Measurement and Routing Methods in Software Defined Computing First Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Latency Performance Analysis and Effective Relay Selection for Visible Light Networks

School of Information Science and Engineering, Shenyang Ligong University, Shenyang 110158, China
*
Author to whom correspondence should be addressed.
Submission received: 27 February 2024 / Revised: 19 April 2024 / Accepted: 22 April 2024 / Published: 25 April 2024
(This article belongs to the Special Issue Future Wireless Communication Networks (Volume II))

Abstract

:
In visible light communication (VLC), the precise latency evaluation of wireless access networks and the efficient forwarding strategy of core networks are the crux for end-to-end reliability provisioning. Leveraging martingale theory, an elegant latency-bounded reliability analysis framework is studied for the VLC network. Considering the characteristic that VLC links are easy to block, the martingale of the service process is constructed. Based on the time shift features, the martingale process related to latency is proposed for the VLC system, which models the influence of entanglement between aggregate arrivals and random service on latency. A stopping time event about latency is defined. Renting the stopping time theory, a tight upper bound of the unreliability with regard to latency is derived. In the core network, a dynamic forward backhaul framework is proposed, which uses the relay selection algorithm based on back-pressure theory to improve data transmission quality. The theoretical latency-bounded reliability matches the simulation results well, which verifies the effectiveness of the proposed analysis framework, and the proposed relay selection algorithm can also improve network performance under data-intensive transmission.

1. Introduction

In 5G and beyond, massive businesses with strict reliability requirements surge, which expects extensive bandwidth provisioning. This will lead to more severe spectrum shortages. Visible light communication (VLC) is a potential paradigm to ease the dilemma of radio frequency (RF) resources in the next-generation communication systems [1,2]. Benefiting from the characteristics of light, VLC can provide high transmission rates, ultra-wide frequency bands, high-energy efficiency, low cost, and indoor full coverage. It can be deployed as indoor high-speed data links for personal area networks and RFs in non-friendly environments. In critical scenarios, such as remote control in medical operating rooms and factory automation under strong magnetic interference, VLC is expected to embrace massive services with traffic possessing strong randomness, heterogeneity, and burstiness [3]. The data require the reliability of latency within the millisecond level to reach 99.99–99.999% [4,5]. For traffic featuring complex characteristics transmitted on visible light channels, we should explore an effective and precise evaluation method of reliability with regard to latency, which can reveal the influence of entanglement between visible light data traffic and visible light transmission schemes. Meanwhile, an efficient routing strategy needs to be explored for the VLC network.
In the VLC wireless network, the light-emitting diode (LED) access point (AP) carries packet flows from different services, which possess heterogeneous characteristics [6,7]. The convergence of heterogeneous visible light data flows intensifies the uncertainty of the aggregate traffic. In [8], the aggregate traffic was composed of multiple 2-state Markov-modulated Bernoulli processes (MMBP-2) and was tackled as one MMBP-2 by the Kronecker product operation. The proposed method is not of universal applicability and is unable to provide a theoretical result of the latency-bounded reliability. The stochastic network calculus (SNC) theory, effective bandwidth (EB), and effective capacity (EC) theories provide classical analysis methods of latency-bounded reliability. The union-bound inequality, as the key enabler in SNC, only supports capturing a loose upper bound of unreliability [9]. In the EB/EC framework, the stochastic traffic is tackled as a constant flow [10,11], which always triggers rougher theoretical results of latency performance, especially for bursty traffic.
Martingale, a random process throughout modern probability theory, has demonstrated great superiority in the precise analysis of the statistical reliability regarding latency. The theoretical upper bounds of unreliability derived in [9,12] are more precise than the existing conclusions. This martingale-based analysis framework is a milestone. In [13,14], the latency-bounded unreliability of the Markov-modulated on–off (MMOO) arrival process was analyzed in the ALOHA access scheme. Based on the results, the bandwidth resources were allocated reasonably. More importantly, martingales have been explored to support the evaluation of the end-to-end reliability of latency. In [15], a precise analysis framework of the end-to-end latency-bounded unreliability was introduced, where a multi-hop routing path was considered and the traffic was modeled as a Markov-modulated process. Then, the proposed method was extended in the 6G network scenarios [16]. For the system adopting the THz wireless access scheme, the end-to-end latency performance was analyzed for the traffic generated from virtual reality. In [17], we constructed an analysis framework of latency performance for the aggregate traffic, which was constituted by the heterogeneous Markov-modulated flows. The martingale of the queuing length was defined, and the latency-bounded unreliability was derived.
These remarkable conclusions have inspired our work on the statistical latency QoS analysis based on martingale theory. The framework in [17] is theoretical without specific application scenarios. In this paper, the latency analysis in the VLC network is focused on. The differences with [17] can be summarized as follows. (1) The cross-layer service process is modeled, which is the improvement of the proposed method in [17]. Specifically, in the physical layer, the Lambertian sources are considered and the channel gain is depicted. The Shannon Theorem is leveraged to model the achievable transmission rates, which achieves the mapping between the physical layer and the data link layer. We focus on the characteristic that the VLC links are easy to block. Blocking the line of sight (LoS) between the VLC AP and the targeted terminal at each time slot is considered a random variable, which triggers the stochastic features of the service process and further impacts the latency of the aggregate traffic. (2) Meanwhile, the martingale process related to latency is a proposed novelty, which is another way to analyze latency different from [17]. It introduces the statistical characteristics of the service scheme and data traffic into martingale parameters, which reveals the influence of random blocks of the VLC link and the burstiness of aggregate traffic on the latency. (3) The stopping time event about latency is defined, which is the time point when the system latency exceeds the threshold. Applying the stopping time theory to the latency-related martingale, the upper bound of the unreliability with regard to latency is captured. (4) More importantly, the end-to-end reliability provisioning is investigated in this paper, not just the air interface latency analysis.
Further, for the aggregate traffic forwarded by the VLC AP, an efficient routing algorithm is proposed based on the back-pressure theory in the core network. Some studies have investigated the utilization of back-pressure theory to improve network performance, specifically within the Transmission Control Protocol domain [18]. Additionally, alternative research has concentrated on employing back-pressure algorithms to facilitate relay selection in wireless sensor networks and wireless multi-hop networks [19]. Although the source node (LED access point) can adopt the classic back-pressure algorithm to promote the network capacity, the classic algorithm results in significant packet delays and poor node energy. Therefore, combining the latency performance analysis, we design a new link weight calculation method to make routing and scheduling decisions, which considers the data packet’s recent node record, the neighbor node’s remaining energy status, and the queue latency. Meanwhile, we note that no prior research has explored the integration of back-pressure theory in visible light network systems.
To summarize, in this paper, considering the VLC APs serve the aggregate traffic with burstiness, a precise analysis framework of the latency-bounded reliability is proposed. In the core network, an efficient routing algorithm is introduced for the complex aggregate traffic. The contributions can be concluded as follows.
  • The service process of the VLC network and the aggregate arrival process are modeled in the martingale domain. For the VLC link with a random block, the i.i.d. service process provided by the LED AP is considered. Through mapping the statistical features of random block behavior in the martingale parameters, the martingale of the service is constructed. Leveraging the relation between the spectral radius and the eigenvector in Markov chains, martingales of Markov-modulated arrival processes are defined.
  • We propose a martingale process related to latency, which models the impact of entanglement between complex arrivals and random service on the latency. A stopping time point at which the latency violates the threshold is considered. Based on the stopping time theory, the complementary cumulative distribution function of latency is obtained for the VLC network. We evaluate the latency in terms of burstiness, which is measured by the squared coefficient of variation.
  • When the LED AP node data reach the core network, a dynamic back-pressure algorithm based on energy and latency from aggregate traffic is proposed, which designs a new link weight calculation method to make routing and scheduling decisions. The modified back-pressure algorithm trades off three factors, including the data packet’s recent node record, the neighbor node’s remaining energy status, and the queue latency, to boost the network performance and data transmission quality. Meanwhile, our scheme is the first research to apply back-pressure theory in the visible light network.

2. The Network Model and the Queuing System

We consider a multi-service uplink communication scenario, as shown in Figure 1. The data flow from different services (business) is statistically heterogeneous. That is, diverse models are adopted to describe the randomness of flows. The data packets belonging to different flows could access the same VLC AP, where these flows compose the aggregate traffic. The targeted AP supplies the transmission rates for the aggregate traffic according to a specific scheme. Because of the randomness of the VLC channel and the block, the transmission process provided for the aggregate traffic is stochastic. Thus, the backlog and latency are triggered in the buffer of the targeted VLC AP.
A. 
The queuing system of aggregate traffic
In the VLC access network, the target terminal is associated with the nearest VLC AP. This terminal carries two services where the generated packet flows are heterogeneous. Thus, the aggregate traffic is transmitted from this terminal, as shown in Figure 1a. We consider the block of LoS between the VLC AP, and this terminal obeys a Bernoulli distribution of parameter 1 p . Then, the channel gain can be modeled as
h v = ( b + 1 ) A p 2 π d 2 cos b ( φ i r ) g o f f ( φ i n ) cos ( φ i n ) , p 0 , 1 p ,
where b is the Lambertian index, and b = 1 / log 2 ( cos ( ϑ 1 / 2 ) ) . ϑ 1 / 2 is the half-intensity radiation angle. A p is the area of reviewer photodetector (PD). d is the distance between the AP and the terminal. g o f is the gain of the optical filter. φ i n and φ i r are the angle of incidence and irradiance between VLC AP and the terminal, respectively. f ( φ i n ) is the optical concentrator gain, which is a function of φ i n
f ( φ i n ) = r 2 sin 2 ( Θ ) , 0 φ i n Θ 0 , φ i n > Θ
where r is the refractive index, and Θ is the semi-angle of the field of view (FoV) of the PD.
Based on the Shannon theorem, the achievable transmission rate between AP and the terminal, which is defined as R V L C ( n ) , can be given as
R V L C ( n ) = W V L C × log 2 1 + p ( n ) h v 2 σ V L C 2 [ b i t s / s ] ,
where W V L C is the system bandwidth, and p ( n ) is the transmission power. σ V L C 2 is the noise power.
The access process of the packets from aggregate traffic can be modeled as a queuing system, as is presented in Figure 1b. These two flows constituting the aggregate traffic are independent and described as the four-state Markov-modulated multinomial process (MMMP-4) and the interrupted multimomial process (IMP), respectively, which are introduced in part B in detail. These are the arrival processes of the queuing system. The access process is modeled as the service process provided by the AP. Because latency is often described in units of packets, the arrival process and the service process are modeled from the perspective of packets/slots. Without loss of generality, the length of packets is assumed to be fixed. The flows from different services have the same priority. Thus, the first-in-first-out (FIFO) scheduling scheme is adopted in the buffer.
In Figure 1b, A i ( m , n ) , i = 1 , 2 is the accumulated arrival processes in [ m , n ] of flow i. A i ( m , n ) can be written as A i ( m , n ) = k = m n a i ( k ) , where a i ( k ) is the number of arrival packets of flow i at time slot k. The arrival process { a 1 ( n ) , n 0 } is modeled as an MMMP-4, and { a 2 ( n ) , n 0 } is modeled as an IMP, which are bursty and heterogeneous. Let A ( m , n ) denote the aggregate accumulated arrival process from slot m to slot n. Similarly, the accumulated service process S ( m , n ) provided by the VLC AP is also a bivariate process, S ( m , n ) = k = m n s ( k ) , where { s ( n ) , n 0 } is the service process. s ( n ) is the number of the served packets at slot n. In this paper, s ( n ) is a random variable following a Bernoulli distribution with successful probability p and service rate C. s ( n ) can be given by
s ( n ) = C p 0 1 p packets / slot ,
where C = R V L C ( n ) T L . T s/slot is the duration of a slot and L bits/packet is the length of a packet. To simplify the subsequent analysis, C is assumed as a constant.
Based on SNC, the departure process D ( 0 , n ) can be defined by A ( 0 , n ) and S ( 0 , n ) using (min, +) convolution. The backlog process { Q ( n ) , n 0 } in the buffer is defined as
Q ( n ) = sup n 0 { A ( 0 , n ) S ( 0 , n ) } ,
and the latency W ( n ) at slot n is
W ( n ) = inf { k 0 : A ( 0 , n k ) D ( 0 , n ) } .
B. 
The heterogeneous arrival models
The MMMP-4 is proposed to describe the interweaving arrival characteristics of packet flows from different services in a terminal. A 2D Markov chain is considered, which is denoted as { X 1 ( n ) , Z 1 ( n ) } . X 1 ( n ) = { U 1 , V 1 } represents the service that generates the packets. Z 1 ( n ) = { N , Y } models whether there are packets generated at time slot n. Z 1 ( n ) = N means that no packet is arriving, while Z 1 ( n ) = Y means that packets are generated. Corresponding to U 1 and V 1 , packet arrival probabilities at each slot are λ 1 and γ 1 , respectively. If service U 1 generates packets at slot n, the number of packets is R M 1 , and in the other case, it is R M 2 . Thus, the state space of the MMMP-4 model is { ( U 1 , N ) , ( U 1 , Y ) , ( V 1 , N ) , ( V 1 , Y ) } . The state transition probabilities between two services, U 1 and V 1 , are p 1 and q 1 , respectively. Based on [17], the state transition matrix of the 2D Markov chain is defined as T 1 .
The IMP model is proposed to embody the bursty and sporadic arrival characteristics of the small data service. It is also a 2D Markov chain, which is denoted as { X 2 ( n ) , Z 2 ( n ) } . X 2 ( n ) = { U 2 , V 2 } . V 2 represents the service that generates the packets. In state U 2 , there are no packets generated. Z 2 ( n ) = { N , Y , I } describes whether there are packets at slot n. Z 2 ( n ) = N represents that no packet arrives in state V 2 , and Z 2 ( n ) = Y represents that R I 2 packets arrive in state V 2 . It is worth noting that Z 2 ( n ) = I means that no packets arrive in idle state U 2 with probability one. The state space of the IMP model is { ( U 2 , I ) , ( V 2 , N ) , ( V 2 , Y ) } . The state transition probabilities between U 2 and V 2 are p 2 and q 2 , respectively. In V 2 , the packet generation process is stochastic and follows a multinomial distribution with the arrival probability γ 2 and the number of arrival packets R I 2 . The state transition matrix of the IMP is T 2 . The MMMP-4 model and IMP model are shown in [17].

3. Martingale-Based Latency-Bounded Reliability Analysis

The arrival and service processes are described by martingales in this part. The upper bound of the latency-bounded unreliability is analyzed based on the stopping theory.
A. 
Martingale constructions of arrival and service processes
Firstly, we introduce the definition of martingales.
Definition 1 (martingales).
Let ( Ω , F , P ) be a probability space and { F t } t 0 be a filtration, i.e., a non-decreasing sequence of σ-fields of F , F t F t + 1 , t 0 . A random sequence { X ( t ) , t 0 } is adapted to { F t } t 0 . That is, X ( t ) is measurable with respect to F t , t 0 . If
(1) 
E [ | X ( t ) | ] < , t 0
(2) 
E [ X ( t + 1 ) | F t ] = X ( t ) , t 0 ,
holds, then { X ( t ) , t 0 } is a martingale sequence.
Further, if E [ X ( t + 1 ) | F t ] X ( t ) , then { X ( t ) , t 0 } is a supermartingale.
As a powerful mathematical method, martingales can provide us with a framework to depict heterogeneous arrivals with burstiness. Martingale processes are inclusive, which shows that other random processes are transformed as martingale processes by martingale construction. Meanwhile, martingale can provide a modularized description method for arrival and service processes, which contributes to the model, analyzes the features of the backlog process (the difference between two random processes), and further enables the analysis of latency for aggregate traffic. It is noted that the inequality formulary of martingales supports the upper bound analysis of unreliability with regard to latency naturally. We construct the martingale processes of arrival and service, respectively, as follows.
Definition 2 (Martingale of arrival).
Consider a Markov process { x ( n ) , n 0 } , which is F t -measurable. The state space is N = { 1 , 2 , , N } . The state transition matrix is T = [ T i , j ] N × N . T i , j = P { x ( t + 1 ) = j | x ( t ) = i } . The arrival process is Markov modulated, i.e., a ( t ) = f ( x ( t ) ) and A ( m , n ) = j = m t f ( x ( j ) ) , n m 0 . Define a θ -transform for T as T θ = [ T i , j θ ] N × N , θ > 0 . T i , j θ = T i , j e θ f ( x ( t + 1 ) ) . The spectral radius of T θ is s p ( T θ ) , s p ( T θ ) > 0 , and the corresponding eigenvector is V a = [ V i a ] N × 1 , V a 0 . The random process
M a ( m , n ) = V x ( n ) a e θ [ A ( m , n ) ( n m ) K a ] ,
is constructed as a martingale relative to { F t } t 0 . Then, M a ( m , n ) is admitted as a martingale of arrival { a ( n ) , n 0 } . The function K a is
K a = log s p ( T θ ) θ .
We use the definition of martingales to prove Definition 2.
Proof. 
It is obvious that s p ( T θ ) < and V x ( t ) a < . Thus, E [ | M a ( m , n ) | ] < , n 0 holds. We can write that
E [ V x ( n + 1 ) a e θ [ A ( m , n + 1 ) ( n + 1 m ) K a ] | F n ] = e θ [ A ( m , n ) ( n m ) K a ] e θ K a × x ( n + 1 ) N V x ( n + 1 ) a e θ f ( x ( n + 1 ) ) P { x ( n + 1 ) | x ( n ) } = ( a ) e θ [ A ( m , n ) ( n m ) K a ] e θ K a × x ( n + 1 ) N V x ( n + 1 ) a T x ( n ) , x ( n + 1 ) θ = e θ [ A ( m , n ) ( n m ) K a ] e θ K a ( T θ V ) x ( n ) a = ( b ) e θ [ A ( m , n ) ( n m ) K a ] e θ K a s p ( T θ ) V x ( n ) a = M a ( m , n )
(a) is from the basic operation of conditional expectation and the definition of T i , j θ . ( T θ V a ) i is the ith element of vector ( T θ V a ) . Then, (b) holds due to the relation between the eigenvector and eigenvalue, i.e., T θ V a = s p ( T θ ) V a , and the definition of K a .    □
For the MMMP-4 and IMP models, the martingale parameters are V x 1 ( t ) a , K a 1 , and V x 2 ( t ) a , K a 2 respectively, which are related to T 1 and T 2 . The corresponding specific formulas can refer to [17].
Similar to the martingale of arrival, the martingale of the i.i.d. service process is constructed as described in Definition 3.
Definition 3 (Martingale of service).
The service process is { s ( n ) , n 0 } , which is G n -measurable. The moment generating function is Ψ ( θ ) = E [ e θ s ( n ) ] < , θ > 0 . The accumulated service process of s ( n ) is { S ( m , n ) , n m 0 } . Then, the random process
M s ( m , n ) = V s ( n ) s e θ [ ( n m ) K s S ( m , n ) ] ,
is constructed as a martingale relative to { G n } n 0 . M s ( m , n ) is admitted as a martingale of service { s ( n ) , n 0 } . The function K s is
K s = Ψ ( θ ) θ .
Proof. 
According to Ψ ( θ ) < , θ > 0 , we can get E [ | M s ( m , n ) | ] < , n 0 . Meanwhile,
E V s ( n ) s e θ [ ( n + 1 m ) K s S ( m , n + 1 ) ] | G n = ( a ) e θ [ ( n m ) K s S ( m , n ) ] e θ K s E V s ( n + 1 ) s e θ s ( n + 1 ) = ( b ) e θ [ ( n m ) K s S ( m , n ) ] e θ K s V s ( n ) s e θ s ( n + 1 ) = M s ( m , n ) .
(a) is because of the i.i.d. property. To support formula (b), V s ( n ) s is set as a constant. The proof is completed based on Ψ ( θ ) = E e θ s ( n + 1 ) .    □
Based on the characteristics of martingale processes, the backlog process can be modeled in the martingale domain, which facilitates the analysis of the latency performance.
Definition 4 (Martingale of backlog).
The martingales of arrival and service are defined as Definition 2 and 3. Define the product of (7) and (10) as the martingale of backlog M L ( n ) by the restriction of θ * ,
M L ( n ) = i = 1 2 V x i ( n ) a V s ( n ) s e θ * ( A ( m , n ) S ( m , n ) ) ,
where θ * = s u p { θ > 0 : K a 1 + K a 2 K s } .
B. 
The latency-bounded unreliability
Theorem 1. 
Consider a link for the aggregate traffic. The service process is modeled as { s ( n ) , n 0 } . The aggregate traffic is { a 1 ( n ) + a 2 ( n ) , n 0 } . The martingale of arrival is defined by Definition 2, and the martingale of service is in Definition 3. Then, the latency-bounded unreliability of the link holds for k > 0 ,
P { W ( n ) k } E [ V x 1 ( 0 ) a ] E [ V x 2 ( 0 ) a ] E [ V s ( 0 ) s ] H e θ * K s k ,
where H = m i n { V x 1 ( n ) a V x 1 ( n ) a V s ( n ) s : a 1 ( n ) + a 2 ( n ) s ( n ) > 0 } . k is the latency threshold.
The proof of Theorem 1 is based on the stopping time theory of martingale, as shown in Theorem 2 of [17].
Proof. 
Define a stopping time T for the martingale of backlog M L ( n ) , which is the first time that the backlog exceeds threshold σ , i.e., T = m i n { n : A ( 0 , n ) S ( 0 , n ) σ } . Let T n = m i n { T , n } . For M L ( n ) , Theorem 2 is used. The probability of system backlog exceeding threshold σ can be obtained
P { Q ( n ) σ } E [ V x 1 ( 0 ) a ] E [ V x 2 ( 0 ) a ] E [ V s ( 0 ) s ] H e θ * σ .
The detailed derivation process can refer to [17]. Based on the definition of the departure process, the latency-bounded probability, P { W ( n ) k } can be transformed as follows.
P { W ( n ) k } = P A ( 0 , n k ) D ( 0 , n ) P max n k l { A ( l , n k ) S ( l , n ) } 0 = P max n k l { A 1 ( l , n k ) ( n k l ) K a 1 + A 2 ( l , n k ) ( n k l ) K a 2 + ( n l ) K s S ( l , n ) } k K s
According to the time shift feature of martingales, it is obvious that
M l L s ( n k ) = i = 1 2 V x i ( n k ) a V s ( n k ) s e θ * ( A ( l , n k ) S ( l , n ) ) ,
is also a martingale process. M l L s ( n k ) can be regarded as a martingale related to latency. To complete the latency analysis, the stopping time event about latency is defined as S W = { W ( n ) k } and can be transformed as
S W = { A 1 ( l , n k ) ( n k l ) K a 1 + A 2 ( l , n k ) ( n k l ) K a 2 + ( n l ) K s S ( l , n ) k K s }
Then, the first time slot that S W occurs is the stopping time T W .
T W = inf { n > 0 : A 1 ( l , n k ) ( n k l ) K a 1 + A 2 ( l , n k ) ( n k l ) K a 2 + ( n l ) K s S ( l , n ) k K s }
Combined with the derivation of (15) and renting the stopping time theory for the martingale process M l L s ( n k ) , we can derive that
E [ M l L s ( 0 ) ] = i = 1 2 E [ V x i ( 0 ) a ] E [ V s ( 0 ) s ] H e θ * K s k P { T W n }
When T W , we can obtain P { W ( n ) k } = P { T W } . The proof is completed.    □

4. Relay Selection for Visible Light Network

We assume that the visible light network is represented by G = ( V , L ) . V is the set of all nodes in the network, and L is the set of all links in the network. The nodes are static and the communication links are bidirectional. The topology changes as nodes die or links fail. All visible light nodes have the same configuration.
We set the network operation by time sharing, i.e., t 0 , 1 , 2 , . At each time slot t, the back-pressure algorithm activates a set of interference-free links in the network. When the new data arrive in the network, each node makes routing and transmission scheduling decisions, and the visible light packets are delivered to the appropriate destinations. The back-pressure algorithm divides the visible light packet types according to the difference in the destination. Each packet in the network records information about the source and destination nodes. Q i d t is denoted as the total number of packet types on node i at time slot t. If d = i , then Q i d t = 0 , indicating that node i is the destination node for the d number packets. Each node maintains up to N (total number of nodes) queues for storing packets arriving at different destination nodes.
π is denoted as the set of link scheduling, and Γ denotes the set of all schedulable links under the interference condition. The back-pressure algorithm used in the visible light network is as follows.
STEP-1: Calculating the weights of the links. The link ( m , n ) is any link in the network, the node n is a neighboring node of the node m within the network communication range, and d is the destination node in the network. We calculate the backlog difference of different kinds of packets between node m and node n, while the value of the backlog difference must be the positive integer, as follows,
d i f f m n d t = max Q m d t Q n d t , 0
where d i f f m n d t denotes the backlog difference of the packet queue of node d between node m and node n at time slot t. Q m d t and Q n d t are the queue length values for node m and node n, respectively.
We select the maximum value of all the queue backlog differences as the weight of the link, as follows,
w m n t = max d D d i f f m n t
where D is the set of all destination nodes. w m n t is a maximum value in the set of all different kinds of packet queue backlog differences d i f f m n t . At time slot t, we make c m n * t as the optimal packet with w m n t value for link ( m , n ) .
STEP-2: Selecting schedulable links. We set the optimization function as follows,
π t = arg max π Γ m , n μ m n t w m n t
where Γ denotes the set of all schedulable links under the interference model. μ m n is the link transmission rate. π t is the set of optimal transmission links.
STEP-3: Selecting routing paths. At time slot t, link ( m , n ) under the routing and scheduling policy, we transmit the optimal kind of packet c m n * t from node m to node n.
The back-pressure algorithm for the relay selection in the visible light network is shown in Algorithm 1. We illustrate the workflow of the algorithm with a simple example. Figure 2 shows a visible light communication uploading network. There are three relay nodes C, D, and E, and three different destinations X, Y, and Z. From the figure, we can see the backlog number, i.e., the queue length value, corresponding to each packet type at each node, as shown in Table 1. We assume that the link ( C , D ) rate is μ c d = 4 packets/slot, and the link ( C , E ) rate is μ c e = 2 packets/slot. The neighboring node C at time slot t are only D and E.
Algorithm 1 The back-pressure algorithm for the relay selection in visible light network
Input: 
G = ( V , L ) , m, μ Web G, Node m, Link rate μ
Output: 
Routing strategy
   1:
procedure Original back-pressure
▹Calculate Weight
   2:
for all links ( m , n ) L  do
   3:
    for all d D do Packet type d
   4:
         d i f f m n d t Q m d t Q n d t
   5:
    end for
   6:
     w m n t max d D d i f f m n d t
   7:
 
   8:
     c m n * t arg max { d D d i f f m n d t } Packet types with maximum weight
   9:
end for
▹ Link Scheduling
  10:
for all π Γ  do
  11:
     s u m π ( m , n ) L μ m n t w m n t The sum of the products of link weight and rate
  12:
end for
  13:
π t arg max π Γ s u m π
▹ Data Transferring
  14:
for all ( m , n ) L : ( Q m d t Q n d t ) > 0  do
  15:
    transfer packets c m n * t from m to n
  16:
end for
  17:
end proceduce
First, we use Equation (21) to compute the queue backlog difference for different kinds of packets X, Y, and Z for link ( C , D ) and link ( C , E ) , respectively. The values of queue backlog difference for different kinds of packets are shown in Table 2.
Then, we calculate the weights of the two links ( C , D ) and ( C , E ) , respectively, by Equation (22); the results are shown in Table 3.
Next, we derive the schedulable links. At time slot t, for node C, the link scheduling sets ( C , D ) and ( C , E ) interfere with each other, they cannot be scheduled simultaneously. The rate of link ( C , D ) is μ c d = 4 packets/slot, the rate of link ( C , E ) is μ c e = 2 packets/slot, and μ C D w C D t = 4 × 6 = 24 , μ C E w C E t = 2 × 6 = 12 . We can find that μ C D w C D t > μ C E w C E t , so we select link ( C , D ) . The optimal data packet type is Y and the optimal transmission rate is μ C D t .
Finally, at time slot t, the routing decision of node C is that packets of type Y will be transmitted to node D at a rate of 4 packets/slot through link ( C , D ) for several packets.

5. Simulations and Results Analysis

Firstly, the derived theoretical result is evaluated in part A, and the relay selection algorithm is analyzed in part B.
A. 
The theoretical upper bound of the unreliability of latency
The dynamic change of packets in the queuing system is simulated, where the arrival process models the aggregate traffic. The simulation results of the latency-bounded unreliability are measured by the ratio of the number of slots where the latency exceeds the threshold to the total observation slots.
In Figure 3, the aggregate arrival process is composed of an MMMP-4 process and an IMP process. The service process is modeled as a geometric distribution. The model parameters are summarized in Nomenclature section. The upper bounds of unreliability regarding latency with different system load ρ is presented, where ρ is defined as the ratio of the average arrival rate to the average service rate. According to the system load, the corresponding service rate C can be determined. The simulation results of unreliability are presented by box plots. It can be shown that the upper bounds of unreliability with regard to latency match the simulated results well with different ρ . The analysis framework can provide effective results of latency performance for the aggregate traffic with heterogeneity and burstiness. Obviously, the system load plays a significant role in the reliability. In the heavy-load system ( ρ = 0.9 ), the latency-bounded reliability is terrible such that it cannot support almost any services with statistical reliability requirement even if the latency threshold is large.
In order to verify the advantages of the proposed analysis framework, we compare the theoretical results with the state-of-the-art ones based on EB/EC theory in Figure 4. In this part, the aggregate traffic consists of two identical MMOO processes. The parameters of the MMOO model are listed in Nomenclature section. The result based on the EB/EC theory refer to [20]. It can be shown that the upper bound of unreliability obtained in this paper is much tighter than the compared one. The martingale-based theoretical results match the simulations well. The gap between the EB/EC-based results and the simulated values is obvious. Our analysis method can provide a more precise analysis for the latency performance of the Markovian aggregate traffic. The EB/EC theory assumes bursty traffic as the constant fluid, which makes it impossible to reflect the influence of complex random characteristics of aggregate traffic on latency performance.
Next, we analyze the impact of the burstiness of the aggregate traffic on the latency-bounded unreliability. Two measurement parameters of burstiness are adopted, which are the Hurst and squared coefficient of variation ( C V ). We change the state transition probabilities of the arrival models to influence the burstiness of aggregate traffic. The Hurst parameter is computed by the method of rescaled adjusted range analysis in this paper. Corresponding to the adjusted state transition probabilities ( { 0.1 , 0.01 , 0.001 } ), the Hurst parameter is { 0.5904 , 0.8495 , 0.9140 } , respectively. The C V of MMMP-4 can be derived as in (24), where R a v b is the average rate of the MMMP-4 model. A larger Hurst parameter or C V indicates a stronger burstiness of the traffic. The latency-bounded unreliability versus latency threshold with different Hurst parameters is shown in Figure 5, and the unreliability versus C V is in Figure 6. In Figure 5 and Figure 6, the system loads are 75 % and 60 % , respectively, which are relatively high. The latency performance decreases sharply with the burstiness. The system will become unsustainable when the system load is high along with a bursty arrival. With the C V rising from 5 to 20, the system could only provide a best-effort QoS in the current service configuration. For the aggregate traffic with complex stochastic features, the impacts of burstiness on the latency-bounded reliability must be considered.
C V = 2 R a v b ( p 1 + q 1 ) 2 + ( p 1 λ 1 R M 1 + q 1 γ 1 R M 2 ) ( 1 p 1 q 1 ) ( p 1 + q 1 ) q 1 λ 1 R M 1 + p 1 γ 1 R M 2 + λ 1 γ 1 R M 1 R M 2 ( 1 p 1 q 1 ) R a v b 1 .
Finally, the impacts of system load on the latency performance are analyzed. Figure 7 presents the results of latency-bounded unreliability versus R a v of the aggregate traffic, R a v = R a v b + R a v i . When R a v < 4 packets/slot, the system load is lower than 66.7 % . If the threshold k is relatively loose, the latency-bounded reliability is acceptable. However, for the business with strict latency threshold requirements ( k = 25 to 70), the unreliability increases linearly with the system load. System load is an essential factor impacting the latency performance. If the system load goes too high, latency performance is unsatisfactory even if the latency threshold is moderate and the average arrival is not too large. From another perspective, even if the load is not high, the strong burstiness of arrivals may cause latency thresholds (those relatively small) to be violated frequently. The dotted lines in Figure 7 support our analysis.
B. 
Relay selection algorithm performance
We compare two relay selection algorithms: (1) our proposed relay selection algorithm based on the back-pressure theory, and (2) the traditional relay selection algorithm based on the max–min criterion method. In Figure 8, we show the evaluation of two relay selection algorithms through the average link throughput. From the figure, we can find that the average link throughput continues to increase with the increasing packet arrival rate, under two relay selection algorithms. Our proposed relay selection algorithm always achieves higher throughput than the traditional relay selection algorithm. It shows that the back-pressure theory can alleviate bandwidth limitations.
In Figure 9, we plot the relationship between the signal-to-noise ratio (SNR) threshold and outage traffic flows, under traditional and our proposed relay selection algorithm. If the SNR is still lower than the SNR threshold after the relay selection algorithm optimization, the transmission channel will be interrupted, i.e., outage traffic flows are interrupted. From the figure, we find that when the SNR threshold increases, both relay selection algorithms increase the number of outage traffic flows. However, the number of outage traffic flows from our proposed algorithm is significantly lower than that of the traditional algorithm. The result confirms that our proposed relay selection algorithm can provide better reliability network performance.

6. Conclusions

In this paper, we propose a novel latency-bounded reliability analysis framework based on martingales for the queuing system, where the aggregate traffic with burstiness is considered. The martingale of Markov-modulated arrival processes and the martingale of i.i.d. service processes are constructed, respectively. Leveraging the multiplicative property of martingales, the martingale of the backlog is proposed to model the buffer behavior of aggregate arrivals. Renting the stopping time theory, a tight upper bound of the unreliability with regard to latency for the aggregate traffic is derived. Meanwhile, in the core network, based on the back-pressure theory, a reasonable relay selection algorithm is proposed to boost the network performance and data transmission quality. Simulations verify the effectiveness of the proposed analysis framework. The latency performance is analyzed in terms of burstiness and the system load. When Hurst > 0.8, the latency-bounded unreliability is up to 10 1 level, and the system is unable to provision any reliability guarantee. For the aggregate traffic with sharp burstiness, more resources should be configured.

Author Contributions

Conceptualization, B.Y.; data curation, B.Y.; formal analysis, B.Y.; funding acquisition, B.Y. and X.L.; investigation, X.L.; methodology, X.L.; project administration, X.L.; resources, X.L.; software, B.Y. and X.L.; validation, B.Y. and X.L.; visualization, X.L.; writing—original draft, B.Y. and X.L.; writing—review and editing, B.Y. and X.L. All authors have read and agreed to the published version of the manuscript.

Funding

The work of B. Yu and X. Liu was supported in part by the National Natural Science Foundation of China under Grant 62202215, in part by the General Young Talents Project for Scientific Research grant of the Educational Department of Liaoning Province under Grant JYTQN2023061 and JYTQN2023050, in part by the SYLU-introduced high-level talents scientific research support plan under Grant 1010147001128 and 1010147001205, in part by Shenyang Science and Technology Talent Special Project RC230794.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Nomenclature

The commonly used parameters:
ParametersNomenclature
The state transmission probability of the MMMP-4 model p 1
The state transmission probability of the MMMP-4 model q 1
The packet arrival probability corresponding to U 1 in the MMMP-4 model λ 1
The packet arrival probability corresponding to V 1 in the MMMP-4 model γ 1
The packet arrival rate corresponding to U 1 in the MMMP-4 model R M 1
The packet arrival rate corresponding to V 1 in the MMMP-4 model R M 2
The state transmission probability of the IMP model p 2
The state transmission probability of the IMP model q 2
The packet arrival probability corresponding to V 2 in the IMP model γ 2
The packet arrival rate corresponding to V 2 in the IMP model R I 2
The successful access probabilityp
The service rateC
The state transmission probability of the MMOO model p a
The state transmission probability of the MMOO model p b
The packet arrival rate corresponding to ON in the MMOO modelR

References

  1. Pathak, P.H.; Feng, X.; Hu, P.; Mohapatra, P. Visible light communication, networking, and sensing: A survey, potential and challenges. IEEE Commun. Surv. Tutor. 2015, 17, 2047–2077. [Google Scholar] [CrossRef]
  2. Rehman, S.U.; Ullah, S.; Chong, P.H.J.; Yongchareon, S.; Komosny, D. Visible light communication: A system perspective—Overview and challenges. Sensors 2019, 19, 1153. [Google Scholar] [CrossRef] [PubMed]
  3. Matheus, L.E.M.; Vieira, A.B.; Vieira, L.F.M.; Vieira, M.A.M.; Gnawali, O. Visible light communication: Concepts, applications and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3204–3237. [Google Scholar] [CrossRef]
  4. Popovski, P.; Stefanovic, C.; Nielsen, J.J.; de Carvalho, E.; Angjelichinoski, M.; Trillingsgaard, K.F.; Bana, A.-S. Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC). IEEE Trans. Commun. 2019, 67, 5783–5801. [Google Scholar] [CrossRef]
  5. Kim, K.S.; Kim, D.K.; Chae, C.-B.; Choi, S.; Ko, Y.-C.; Kim, J.; Lim, Y.-G.; Yang, M.; Kim, S.; Lim, B.; et al. Ultrareliable and Low-Latency Communication Techniques for Tactile Internet Services. Proc. IEEE 2019, 107, 376–393. [Google Scholar] [CrossRef]
  6. Qian, L.; Chi, X.; Zhao, L. Hybrid Access Algorithm for eMBB Terminals with Heterogeneous QoS in MPR aided VLC system. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  7. Hammouda, M.; Akın, S.; Vegni, A.M.; Haas, H.; Peissig, J. Link Selection in Hybrid RF/VLC Systems Under Statistical Queueing Constraints. IEEE Trans. Wirel. Commun. 2018, 107, 2738–2754. [Google Scholar] [CrossRef]
  8. Dong, W.; Chi, X.F.; Liu, Z.C.; Zhu, Y.H. Queuing theory based analysis for packet jitter of mixed services. J. China Univ. Posts Telecommun. 2014, 21, 71–76. [Google Scholar] [CrossRef]
  9. Ciucu, F.; Poloczek, F.; Schmitt, J. Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1896–1904. [Google Scholar]
  10. Chen, S.C.; Thomas, J.A. Effective bandwidth in high-speed digital networks. IEEE J. Sel. Areas Commun. 1995, 13, 1091–1100. [Google Scholar] [CrossRef]
  11. Wu, D.P.; Negi, R. Effective capacity: A wireless link model for support of quality of service. IEEE Trans. Wirel. Commun. 2003, 2, 630–644. [Google Scholar]
  12. Poloczek, F.; Ciucu, F. Service-martingales: Theory and applications to the delay analysis of random access protocols. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, 26 April–1 May 2015; pp. 945–953. [Google Scholar]
  13. Zhao, L.; Chi, X.; Zhu, Y. Martingales-Based Energy-Efficient D-ALOHA Algorithms for MTC Networks with Delay-Insensitive/URLLC Terminals Co-Existence. IEEE Internet Things J. 2018, 5, 1285–1298. [Google Scholar] [CrossRef]
  14. Qi, R.; Chi, X.; Zhao, L.; Yang, W. Martingales-Based ALOHA-Type Grant-Free Access Algorithms for Multi-Channel Networks with mMTC/URLLC Terminals Co-Existence. IEEE Access 2020, 8, 37608–37620. [Google Scholar] [CrossRef]
  15. Yun, H.; Li, H.; Zheng, C.; Zhu, H. End-to-End Backlog and Delay Bound Analysis for Multi-Hop Vehicular Ad Hoc Networks. IEEE Trans. Wireless Commun. 2017, 16, 6808–6821. [Google Scholar]
  16. Fantacci, R.; Picano, B. End-to-End Delay Bound for Wireless uVR Services over 6G Terahertz Communications. IEEE Internet Things J. 2021, 8, 17090–17099. [Google Scholar] [CrossRef]
  17. Yu, B.; Chi, X.; Sun, H. Delay analysis for aggregate traffic based on martingales theory. IET Commun. 2020, 14, 760–767. [Google Scholar] [CrossRef]
  18. Seferoglu, H.; Modiano, E. TCP-aware Backpressure Routing and Scheduling. IEEE Trans. Mob. Comput. 2016, 15, 1783–1796. [Google Scholar] [CrossRef]
  19. Yang, S.; Adeel, U.; Tahir, Y.; McCann, J.A. Practical Opportunistic Data Collection in Wireless Sensor Networks with Mobile Sinks. IEEE Trans. Mob. Comput. 2017, 16, 1420–1433. [Google Scholar] [CrossRef]
  20. Ozmen, M.; Gursoy, M.C. Wireless Throughput and Energy Efficiency with Random Arrivals and Statistical Queuing Constraints. IEEE Trans. Inf. Theory 2016, 62, 1375–1395. [Google Scholar] [CrossRef]
Figure 1. Scenario diagram. (a) is the network scenario. (b) is the corresponding queuing model.
Figure 1. Scenario diagram. (a) is the network scenario. (b) is the corresponding queuing model.
Sensors 24 02748 g001
Figure 2. The visible light communication network for relay selection. Both A and B are source nodes, and there are three relay nodes, C, D, and E, and three different destinations, X, Y, and Z.
Figure 2. The visible light communication network for relay selection. Both A and B are source nodes, and there are three relay nodes, C, D, and E, and three different destinations, X, Y, and Z.
Sensors 24 02748 g002
Figure 3. The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R M 1 = 3 packets/slot, R M 2 = 4 packets/slot, p 2 = 0.1 , q 2 = 0.5 , R I 2 = 20 packets/slot, p = 0.5 .
Figure 3. The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R M 1 = 3 packets/slot, R M 2 = 4 packets/slot, p 2 = 0.1 , q 2 = 0.5 , R I 2 = 20 packets/slot, p = 0.5 .
Sensors 24 02748 g003
Figure 4. The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed of two identical Markov modulated on–off (MMOO) processes, p a = 0.1 , q a = 0.5 , R = 5 packets/slot, p = 0.5 .
Figure 4. The simulated and theoretical results of latency-bounded unreliability, where the aggregate traffic is composed of two identical Markov modulated on–off (MMOO) processes, p a = 0.1 , q a = 0.5 , R = 5 packets/slot, p = 0.5 .
Sensors 24 02748 g004
Figure 5. The latency-bounded unreliability of aggregate traffic with different Hurst parameters, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = q 1 = p 2 = q 2 { 0.1 , 0.01 , 0.001 } , λ 1 = 0.4 , γ 1 = 0.6 , R M 1 = 30 packets/slot, R M 2 = 1 packets/slot, γ 2 = 0.6 , R I 2 = 30 packets/slot, p = 0.5 , C = 40 packets/slot.
Figure 5. The latency-bounded unreliability of aggregate traffic with different Hurst parameters, where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = q 1 = p 2 = q 2 { 0.1 , 0.01 , 0.001 } , λ 1 = 0.4 , γ 1 = 0.6 , R M 1 = 30 packets/slot, R M 2 = 1 packets/slot, γ 2 = 0.6 , R I 2 = 30 packets/slot, p = 0.5 , C = 40 packets/slot.
Sensors 24 02748 g005
Figure 6. The latency-bounded unreliability of aggregate traffic vs. C V , where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R a v b = 5 packets/slot, p 2 = 0.1 , q 2 = 0.5 , γ 2 = 0.6 , R I 2 = 10 packets/slot, p = 0.5 , C = 20 packets/slot.
Figure 6. The latency-bounded unreliability of aggregate traffic vs. C V , where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R a v b = 5 packets/slot, p 2 = 0.1 , q 2 = 0.5 , γ 2 = 0.6 , R I 2 = 10 packets/slot, p = 0.5 , C = 20 packets/slot.
Sensors 24 02748 g006
Figure 7. The latency-bounded unreliability of aggregate traffic vs. R a v , where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R a v b [ 0.8 , 2.6 ] packets/slot, p 2 = 0.1 , q 2 = 0.5 , γ 2 = 0.6 , for the IMP model, R a v i [ 0.5 , 2.3 ] packets/slot, p = 0.5 , C = 12 packets/slot. The dashed circle corresponds to the strict threshold and the solid circle corresponds to the loose threshold.
Figure 7. The latency-bounded unreliability of aggregate traffic vs. R a v , where the aggregate traffic is composed as a four-state Markov-modulated multinomial process (MMMP-4) and an interrupted multimomial process (IMP), p 1 = 0.1 , q 1 = 0.5 , λ 1 = 0.4 , γ 1 = 0.6 , R a v b [ 0.8 , 2.6 ] packets/slot, p 2 = 0.1 , q 2 = 0.5 , γ 2 = 0.6 , for the IMP model, R a v i [ 0.5 , 2.3 ] packets/slot, p = 0.5 , C = 12 packets/slot. The dashed circle corresponds to the strict threshold and the solid circle corresponds to the loose threshold.
Sensors 24 02748 g007
Figure 8. The relationship between packet arrival rates and link throughput under two different relay selection algorithms.
Figure 8. The relationship between packet arrival rates and link throughput under two different relay selection algorithms.
Sensors 24 02748 g008
Figure 9. The relationship between signal-to-noise ratio (SNR) threshold and outage traffic flows under two different relay selection algorithms.
Figure 9. The relationship between signal-to-noise ratio (SNR) threshold and outage traffic flows under two different relay selection algorithms.
Sensors 24 02748 g009
Table 1. The queue length in the node.
Table 1. The queue length in the node.
LengthNodeXYZ
Typology
C892
D431
E241
Table 2. Different packet backlog values.
Table 2. Different packet backlog values.
Backlog DifferenceLinkXYZ
Typology
(C, D) d i f f C D X t = 8 4 = 4 d i f f C D Y t = 9 3 = 6 d i f f C D Z t = 2 1 = 1
(C, E) d i f f C E X t = 8 2 = 6 d i f f C E Y t = 9 4 = 5 d i f f C E Z t = 2 1 = 1
Table 3. Link weight.
Table 3. Link weight.
LinkWeight
(C, D) w C D t = max d D d i f f C D t = 6
(C, E) w C E t = max d D d i f f C E t = 6
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, B.; Liu, X. The Latency Performance Analysis and Effective Relay Selection for Visible Light Networks. Sensors 2024, 24, 2748. https://0-doi-org.brum.beds.ac.uk/10.3390/s24092748

AMA Style

Yu B, Liu X. The Latency Performance Analysis and Effective Relay Selection for Visible Light Networks. Sensors. 2024; 24(9):2748. https://0-doi-org.brum.beds.ac.uk/10.3390/s24092748

Chicago/Turabian Style

Yu, Baozhu, and Xiangyu Liu. 2024. "The Latency Performance Analysis and Effective Relay Selection for Visible Light Networks" Sensors 24, no. 9: 2748. https://0-doi-org.brum.beds.ac.uk/10.3390/s24092748

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop