- Research
- Open Access

# Modeling packet loss probability and busy time in multi-hop wireless networks

- Muhammad Zeeshan
^{1}Email authorView ORCID ID profile, - Asad Ali
^{1}, - Anjum Naveed
^{1}, - Alex X. Liu
^{2}, - Ann Wang
^{2}and - Hassaan Khaliq Qureshi
^{1}

**2016**:168

https://doi.org/10.1186/s13638-016-0664-7

© Zeeshan et al. 2016

**Received: **26 April 2016

**Accepted: **30 June 2016

**Published: **15 July 2016

## Abstract

Throughput imbalances among contending flows are known to occur when any carrier sense multiple access (CSMA)-based protocol is employed in multi-hop wireless networks. These imbalances may vary from slight difference in throughput to complete starvation in which some flows are unable to acquire channel accesses. The root cause of such imbalances is the lack of coordination when CSMA medium access control (MAC) protocols are employed in multi-hop wireless networks. In this paper, we accurately predict per-flow throughput in general multi-hop wireless networks while addressing CSMA’s coordination problem. Unlike the previous work, our analytical throughput prediction model can clearly differentiate between links interfering from transmission range and carrier sensing range. Modeling of conditional packet loss probability and busy time sensed by each station is critical for per-flow throughput prediction in arbitrary networks. The calculation of both these parameters largely depends on MAC behavior due to geometrical configuration of interfering stations; we accurately compute conditional packet loss probability and busy time based on geometrical configuration of the interfering stations and predicted per-flow throughput. Our analytical results demonstrate improved accuracy, indicate throughput imbalances, and provide better understanding of CSMA-based protocol behavior in multi-hop wireless networks that can be used to design fair, scalable, and efficient MAC layer protocols.

## Keywords

- Two-flow analysis
- Wireless mesh network (WMN)
- MAC behavior
- Throughput imbalances
- Starvation
- Packet loss probability
- Carrier sense range (CSR)

## 1 Introduction

After quite a few years of research in multi-hop wireless network, we are still unable to see these technologies in widespread commercial use because of many reasons such as lack of experimental deployments and industrial entrust. However, multi-hop wireless networks have a promising future; their immediate application may be extension of network coverage area and improved connectivity, but many variants of multi-hop wireless networks have already made their way, and deployments will increase in near future. These may include but not limited to medical, emergency, environmental, battlefield sensor networks, telematics applications for individual drivers, public safety and security, broadband internet, vehicular network/MANETs, home/office networks, cognitive radio networks, and even data center networks. In short, deployment of multi-hop wireless technologies will surely transform our daily life with innovative applications having greater impact.

When all stations in multi-hop wireless networks are not in a single-radio range, carrier sense multiple access-based medium access control (MAC) protocols (two-way or four-way handshake) are known to exhibit severe throughput imbalances and few flows are even starved completely. It is very critical to analytically model such behavior and predict per-flow throughput for designing efficient networking protocols. Flow starvation can be modeled by computing conditional packet loss probability and busy time duration sensed by each station in the network. Accurate modeling of MAC behavior is very critical for modeling starvation and predicting per-flow throughput. However, traditional metrics like aggregate throughput and latency are not suitable for this purpose. In this work, we develop analytical model for conditional packet loss probability, computation of busy time, and per-flow throughput prediction for all the flows in multi-hop wireless network.

Modeling packet loss probability is very critical in per-flow throughput prediction, and it depends on MAC behavior which is strongly tied with geometry of contending links. Per-flow throughput prediction and starvation modeling in [1] are based on embedded two-flow classification of [2], which actually defines geometrical relations between two contending flows and their MAC behavior. Two-flow classification of [2] assumes the same transmission and carrier sense range and do not clearly differentiate between links interfering from transmission and carrier sense range. Therefore, the proposed throughput modeling in [1] is for radio range, i.e., carrier sense range and such modeling do not differentiate between interference from transmission and carrier sense range. Interfering link being in transmission range means that stations can receive and decode each other’s request to send/clear to send (RTS/CTS) and are able to set network allocation vector (NAV), but this is not the case when stations are in sensing range of each other, and this is a fundamental differentiation to consider while modeling throughput due to MAC behavior in wireless mesh network (WMN).

Most of the existing literatures address some aspects of per-flow throughput prediction; few [3, 4] of them ignored the inherent coordination discrepancy when carrier sense multiple access (CSMA)-based MAC protocols are employed in multi-hop WMN. This inherent coordination discrepancy was first modeled in [1] and is largely due to information asymmetry between contending flows. Some of the literature is unable to model behavior of comprehensive MAC protocol like 802.11 [5–8]. Analysis of 802.11 protocols is mostly done for backlogged stations [3, 9, 10]; only model in [1] predicts per-flow throughput for any given flow rates in the WMN. In [1], they also highlighted that few dominant flows acquire the maximum transmission opportunities where as most of the flows are starved and this starvation is due to an inherent coordination discrepancy in CSMA-based MAC protocols when employed in WMN.

Understanding wireless interaction between two contending flows, their MAC behavior and impact on each other’s throughput are critical in predicting per-flow throughput of links in general WMNs. In our prior work [11, 12], we identified 25 unique two-flow scenarios that can occur in general WMN and classified them into six categories based on link location, MAC behavior, and throughput imbalances. We compute the occurrence probability of each identified category and also show which categories of two-flow wireless interactions are more common than others. We also compute and simulate throughput profile of each category to show how these flows affect each other’s throughput. Unlike a prior work on two-flow [2], two-flow classification in [12] takes more realistic assumption of different transmission and carrier sense range, and it can clearly differentiate between links interfering from transmission and carrier sense range.

In this work, we model packet loss probability of individual station based on our prior geometric analysis of a two-flow classification in [12], and unlike [1], our proposed model can clearly differentiate between interference from transmission and carrier sense range. We also devised a simplified disk model for computation of busy time durations and rate of their arrival sensed by a station in dense wireless network. We calculate per-flow throughput based on our modeling of packet loss probability and busy time. We validate our packet loss probability and busy time modeling along with throughput prediction via comparison of analytical and simulation results. We also compare our analytical results with those of [1], and a higher accuracy in throughput prediction is achieved by our proposed throughput prediction model and also provides a better understanding of throughput imbalances between contending flows when CSMA-based MAC protocols are employed in multi-hop wireless network.

- (i)
We devised a simplified disk model for calculating busy time sensed by a station in dense multi-hop WMN, and this model inherently embed geometrical location of all interfering transmitters and receivers around that particular station. This also helps differentiate between stations interfering from transmission and carrier sense range.

- (ii)
We accurately model packet loss probability for each station in multi-hop WMN, and this modeling can clearly differentiate between interference from transmission range and carrier sense range.

- (iii)
We predict per-flow throughput for each station based on its packet loss probability and busy time experienced. Knowledge of per-flow throughput and MAC behavior is very critical for designing future protocol for all variants of multi-hop WMN and this greatly helps in identifying dominating and starving flows in the arbitrary network.

- (iv)
Model validation and simulation results show that our packet loss probability, busy time, and throughput modeling improved the accuracy and overall understanding of MAC behavior in multi-hop WMN.

In the remainder of the paper, related literature on modeling CSMA-based MAC protocol is discussed in Section 2. Section 3 presents modeling of throughput whereas model for packet loss probability is described in Section 4 and busy time computation algorithm in Section 5. In Section 6, the proposed models are validated by simulations and analytical results, and Section 7 concludes this work.

## 2 Related work

Analytical modeling of MAC protocol for single-hop wireless network was presented in [13] for Aloha protocol and in [14] for CSMA-based MAC. Recently, analytical models for throughput characterization have been proposed for 802.11 with backlogged stations [9, 10]. Analysis of single-hop networks is easy and straightforward as all the stations are within same contention region, have same picture of the channel, and can coordinate for efficient channel utilization. However, this is not the situation for multi-hop general wireless mesh networks. Prediction of per-flow throughput and starvation is more challenging for multi-hop WMN and existing literature either worked with limited analytical details or detailed analysis only exists for restricted geometric topologies. We will first discuss IEEE standardization efforts for multi-hop wireless mesh networks and then talk about more relevant work in existing literature.

The latest version of IEEE 802.11s standard released in 2012 [15] specifies the MAC and physical specifications for mesh networks. It comprises of a mandatory coordination function called enhanced distributed channel access (EDCA) and an optional coordination function named mesh coordination channel access (MCCA). EDCA is a modified version of distributed coordination function (DCF of 802.11n) with smaller durations for arbitration inter frame space (AIFS) and reduced maximum window size values to accommodate priority traffic in the wireless network. Smaller AIFS are used for higher priority flows whereas larger AIFS is used for low priority flows. Similarly lower value of maximum window size is selected for priority flows and vice versa. EDCA was originally designed to provide quality of service (QoS) at MAC layer for single hop wireless local area network (WLAN) in IEEE 802.11e, but later, it is also recommended to be used as MAC for multi-hop WLAN in IEEE 802.11s. EDCA is known to incur throughput imbalances among the same or even higher priority flows and there are known situations in which higher priority flows also starve [16]. Researchers have made many efforts to make improvements in EDCA, but more work is done for QoS provisioning analysis for real time flows in WLAN.

MCCA is an optional coordination function in IEEE 802.11s mesh mode. MCCA is a distributed transmission opportunity allocation algorithm in which mesh stations coordinate their intended transmission duration using request and acknowledgment procedures. MCCA-enabled mesh stations also coordinate their resource allocation vectors (RAV) to two-hop neighbors using regular MCCA opportunity (MCCAOP) advertisements [16, 17]. MCCA enabled mesh stations are also required to contend for channel access among non-MCCA stations within their reserved duration. Even after reservation, MCCAOP owner cannot have guaranteed access because of simultaneous transmissions made by non-MCCA mesh stations [18].

Talking about coexistence of EDCA and MCCA with traditional DCF, EDCA was originally designed to provide QoS at MAC layer in single hop WLAN, i.e., IEEE 802.11e. The same is recommended as MAC for 802.11s; it translates traffic into four different priority classes by differentiating the arbitration inter frame space (AIFS) slot length and backoff windows size [15]. While co existing with DCF, EDCA with AIFS value equal to 2 performs well and provides an effective mechanism for priority flows to get channel access whereas the performance of EDCA is almost the same as that’s of legacy DCF when AIFS is equal to 3. Differentiated AIFS length is more effective in providing QoS as compared to differentiation of backoff window size [19]. MCCA is an optional access mechanism for mesh stations whereas EDCA is mandatory, so it is most likely that MCCA enabled mesh stations will be contending with non-MCCA stations (both EDCA and legacy DCF), who are unaware of reservations made by MCCAOP owner. Any reservation made by MCCA enabled stations will not be guaranteed due to collision introduced by non-MCCA mesh stations; hence, the performance of MCCA enabled station is very deteriorating in general WLAN [15, 18, 19]. Being an optional access mechanism, no efforts have been made to improve the performance of MCCA.

In [20], the authors analyzed the delay and capacity of CSMA-based access protocol for two-hop wireless networks. Analyzing 802.11, [21] developed a Markov chain throughput analysis model for flow-in-middle (FIM) geometric configuration of stations and [22] presented queuing theoretic analysis for Information Asymmetric configuration of stations. But both of these are based on specialized geometric configuration and also do not model per-flow throughput in multi-hop wireless networks.

Michele Garetto et al. in [1] classified existing models for CSMA based protocols into two groups, one group follows transmission set approach whereas other follow station based approach. Authors in [5] presented a continuous Markov chain model based on transmission set approach to check if the given input rate can be supported by a network. An iterative method results in product form solution and decides whether the given input data rate is feasible to transmit on a network or not. Same model was extended by [7, 8] replacing links by stations. But [5] was not able to capture the comprehensive access mechanism behavior specifically did not model packet loss due to MAC behavior and also lacked binary exponential backoff mechanism. Being an NP-complete problem, it is also not feasible to compute all the independent sets in a general wireless networks as proposed by [5].

Each flow in the network is viewed in isolation in station-based approach, and packet loss probability is a function of transmission probabilities of contending flows in the radio range. Approach based on station is more efficient than transmission set as it does not include computation of independent sets [1]. Employing station based approach, [4] models 802.11 with captured effects and also addressed the hidden station problem but did not used binary exponential backoff. Carvalho and Garcia-Luna-Aceves [3] proposed a model for throughput computation of backlog link in flows and employed most of the 802.11 mechanisms including RTS/CTS, network allocation vector (NAV) and also modeled channel errors for all links. But the proposed model do not consider inherent coordination discrepancy which CSMA-based protocols incurs when employed in multi-hop wireless network.

Michele Garetto et al. in [1] highlighted inherent coordination discrepancy when CSMA based protocol is employed in multi-hop wireless networks. They modeled per-flow throughput prediction and identified dominant and starving flows in the network. For throughput prediction, they computed unknown variables in throughput formula like busy period *b* experienced by an individual station and its average busy duration *T*
_{
b
}, also computed most complicated variable in an arbitrary topology that is conditional packet loss probability *p*. As mentioned earlier that computation of packet loss probability depends on geometric configuration of the stations in the network and computation of conditional packet loss probability in [1] depends on two flow analysis in [2] and both approaches do not differentiate between interfering links in transmission and carrier sense range.

Researchers proposed few throughput estimation models for multi-hop wireless networks. Beakcheol Jang et al. [23] proposed analytical model for saturated throughput but only addresses interference from hidden terminal for infrastructure 802.11 network. Bruno Nardelli et al. in [24] derived a closed form expression for throughput characterizing hidden terminals, information asymmetry, and flow-in-the-middle. Thomas Begin et al. [25] proposed a throughput prediction modeling framework which caters the effect of interference on capacity of contending flows in scenarios including two flows in opposite directions and hidden node problem. These models [23–25] address subset of the overall problem and are unable to characterize throughput imbalances due to location of interfering links.

Among other related literatures, few studies tried to estimate and model the throughput of flows in the network based on gathered measurements [26–28]. Both the studies [27, 28] are limited as they are simulation-based and both use general DCF as underlying MAC protocol. There are some studies on capacity scaling for mobile nodes in multi-hop wireless networks. Michele Garetto et al. [29] did an asymptotic capacity analysis for general mobile ad hoc networks. In [30], Authors extended previous capacity scaling laws [29] for more wider class of wireless networks. In another extension of the same study [31], they also considered correlated movements of a group of nodes and assume fast mobility with an objective to maximize throughput of individual node. They discovered that correlated movement of wireless nodes have impact on delay and throughput of the network and at times can lead to better throughput performance as compared to independent node mobility. S. Razak et al. in [32] also tried to predict imbalance based on two-flow analysis but again their work is unable to clearly differentiate between interference form transmission and carrier sense range.

Few studies are also done on proposing programmable MAC to adopt to temporal interference profiles in general multi-hop wireless network. Ilenia Tinnirello et al. [33] proposes wireless MAC processor with an ability to execute programmable MAC commands on runtime to achieve desired MAC operation using low cost hardware wireless cards. They implemented wireless MAC processor for only three wireless scenarios as a proof of concept and validated that future wireless MAC needs access flexibility and adaptability. Giuseppe Bianchi et al. in [34] propose MAClets, a software program that can be executed over wireless cards, reconfigures MAC protocol seamlessly and enable MAC adaptation to current spectrum conditions for optimized performance. They validate the viability and flexibility of the proposed concept with help of different experiments. Later in [35], Giuseppe Bianchi et al. argued that an abstract description of MAC logic as extensible finite state machine appears to be viable and effective solution for deploying and modeling realistic programmable MAC protocols.

Taking an overview of more recent literature, authors in [37] proposed a game theoretic distributed channel assignment algorithm for assigning partially overlapped channels in wireless mesh network. The proposed algorithm achieved near optimal performance in average care, and this work concluded that overlapping channel assignment can exhibit improved performance as compared to traditional channel assignment strategies with orthogonal channels. The authors in [38] proposed a semi-random backoff counter only after a successful transmission by a wireless node. After a successful transmission, a wireless node is recommended to set its backoff to a deterministic value but behave normally after a failed transmission attempt. Such a solution can easily be implemented with slight modification in 802.11 DCF and 802.11e EDCA. The results demonstrated higher performance for both small- and large-scale wireless mesh networks. CodePipe [39], a reliable multi-cast protocol in proposed which is energy efficient, achieves a higher throughput and is quite fair in lossy wireless networks. It proposes four key techniques including inter-batch coding, opportunistic feeding, LP-based opportunistic routing structure, and fast batch moving. Simulation analysis shows that proposed protocol outperforms two existing multi-cast protocols including Pacifier and MORE.

A cooperative MAC protocol is proposed in [40]; it improves the multiple access performance and cooperation efficiency in wireless ad hoc networks. It employs three different techniques for rapid relay selection including contention resolution phase (CRP), priority differentiation phase (PDP), and rate differentiation phase (RDP). Theoretical and simulation analyses revealed the fact that proposed MAC protocol outperforms both 2rcMAC and CoopMACA protocols. The work in [41] propose orthogonal frequency division multiple access-based coordinated and distributed resource allocation algorithm for cellular networks with an objective to improve their self organization and stabilize their frequency reuse patterns. The authors in [42] insist that careful spatial reuse-ability can greatly improve throughput in multi-hop wireless network. To support their argument, they proposed spatial reusability-aware single-path routing (SASR) and anypath routing (SAAR) protocols and compared them with existing routing protocols to demonstrate significant end to end throughput.

A femtocell downlink cell-breathing control framework is proposed in [43] to maintain a good balance between data rate and coverage. It also propose a voting based FEmtocell Virtual Election Rule (FEVER) direct mechanism that requires users to only share their channel quality statistics to the base station of femtocell. Enhanced system performance is verified by extensive simulations. ITCD, a cross layer distributed topology control algorithm, is proposed in [44] which jointly considers both the delay constraint and interference constraint. The proposed algorithm considers node mobility along with three types of delay including queuing, contention, and transmission delays. Simulation results supported the argument that proposed algorithm is capable of reducing delay and improving performance specifically in delay constrained wireless networks.

## 3 Throughput modeling

In this section, we describe throughput modeling of a station in multi-hop wireless network. It is evident from existing literatures [1, 2, 10] that modeling private view of a station serves better purpose in predicting per-flow throughput. We follow the same approach to evaluate the CSMA/CA-based channel access mechanism in WMN. We made following assumptions: (i) ignore physical layer issues; (ii) fix transmission and carrier sense range; (iii) stations within transmission range can decode message and also set NAV whereas stations in carrier sense range can sense the channel busy but cannot decode the message (RTS/CTS/DATA/ACK); (iv) collision is considered when a station receives more than one packet at the same time from different stations within its carrier sensing range; and (v) error-free channel and packets received from stations within transmission range is decoded correctly when there is no collision. The assumption of simplified physical layer channel does not affect the analysis as we are modeling MAC layer parameters.

_{ s }, T

_{ σ }, T

_{ b }, and T

_{ c }, respectively, and their probabilities are denoted by Ï

*Π*

_{ s }, Ï

*Π*

_{ σ }, Ï

*Π*

_{ b }, and Ï

*Π*

_{ c }.

*τ*is the probability that the station tries to transmit after an idle slot,

*p*is the probability that transmitted packet will be lost, and

*b*is the probability that the channel becomes busy after an idle slot due to activity of other stations [9]. The occurrence probabilities of each of the above channel states are Ï

*Π*

_{ σ }= (1 -

*τ*) (1 -

*b*), Ï

*Π*

_{ s }=

*τ*(1 –

*p*), Ï

*Π*

_{ c }=

*τ*

*p,*and Ï

*Π*

_{ b }= (1 -

*τ*)

*b*. The throughput of a station is given by \(T_{P}=\frac {{\Pi }_{s}}{\Delta }\), where

*Δ*(in seconds) is the average duration of all states on the channel and throughput is given in [1]:

*τ*which actually is function of

*p,*and in [36], it is also shown that similar expression for

*τ*can be driven for general multi-hop wireless networks employing arbitrary windows distribution and exponential backoff multipliers. Complete expression of

*τ*for CSMA Multi-hop network considering maximum window size and maximum retransmit limit is given as [1]:

where *W*
_{0} represents minimum window size, *m* is upper limit for retry, *q*=1−2*p* and *m*
^{′} is the value of backoff stage (*m*
^{′}<=*m*). \({\overline {T}}_{c}\) and \(\overline {T_{s}}\) are average durations of a colliding and successful transmission and have already been evaluated in [9], and these two values work the same for both single-hop and multi-hop arbitrary topologies. There are only two unknown quantities in throughput formula in Eq. 1: (i) conditional packet loss probability *p* and (ii) probability of busy period *b* and \({\overline {T}}_{b}\) is average duration of busy period. We model both these quantities in the following two sections: packet loss probability is modeled in Section 4 whereas occurrence probability *b* of a busy period and its average duration \({\overline {T}}_{b}\) are computed in the Section 5.

## 4 Packet loss probability modeling

We model conditional packet loss probability *p* of any station *i* in an arbitrary network. Conditional packet loss probability is the most critical and complicated variable to be computed for predicting per-flow throughout in multi-hop WMN. Previous literature ignored comprehensive behavior of CSMA based MAC protocol and geometric location of the interfering links, and both these reasons cause stations to have large values of packet loss probability *p*. Conditional packet loss probability depends on geometric configuration of flows in the immediate neighborhood. When all the stations are within transmission range of each other, then DCF is able to coordinate among stations and transmission attempts are within well defined time durations. Conditional packet loss probability of such scenario is given by 1−(1−*τ*)^{
n−1} here *n* denotes number of stations in the network [9]. But there is inherent problem in DCF when employed in multi-hop network scenario that DCF is unable to synchronize all stations in the network.

*p*

_{ss}; (ii) asymmetric incomplete state with probability

*p*

_{ais}; (iii) symmetric incomplete state with probability

*p*

_{sis}; and (iv) destination connected with probability

*p*

_{dc}. In the following subsections, we analyze each type and describe exact geometric configuration. The probability of each identified type is calculated independently and then combined to compute the total packet loss probability. Transmissions which do not suffer from any of these losses are successful.

*l*and

*l*

^{′}, where

*i*and

*j*are the transmitter and receiver of link

*l*and

*i*

^{′}and

*j*

^{′}are transmitter and receiver of link

*l*

^{′}. Each flow’s transmitter and receiver are within transmission range of each other to comprise a flow and packet loss probability models how link

*l*

^{′}interferes the transmission of link

*l*in different geometrical configuration.

### 4.1 Loses due to sender sensing (SS)

*p*

_{ss}(

*i,i*

^{′}) of collision probability that a link

*l*(

*i,j*) is interfered by station

*i*

^{′}due to its simultaneous transmission, assuming distance

*d*(

*i,i*

^{′})<

*R*

_{S},

*d*(

*j,i*

^{′})<

*R*

_{S}and

*d*(

*i,i*

^{′})>

*R*

_{T}where

*R*

_{S}and

*R*

_{T}represent carrier sense range and transmission range. To compute

*p*

_{ss}(

*i*,

*i*

^{′}), we need to compute conditional probability

*c*(

*i*

^{′}/

*i*) that station

*i*

^{′}tries to transmit a packet at the same time when station

*i*was already transmitting. Probability

*p*

_{ss}is given by

*p*

_{ss}(

*i*,

*i*

^{′})=

*c*(

*i*

^{′}/

*i*)

*τ*(

*i*

^{′}), and conditional probability

*c*(

*i*

^{′}/

*i*) can be computed as:

Equation 4 computes the probability of *i*
^{′} to initiate a transmission when *i* is already transmitting and does this by dividing the probability of idle system state (no station is active) over probability of all regions where station *i* can become active. *Q*(*D*), *Q*(*Φ*), and *A*(*i*) are calculated in the next section for busy time computation. *Q*(*D*) represents that the probability of stations in a region are jointly in the On period, *Q*(*Φ*) is an empty set representing a situation when none of the station in any region is active, and *A*(*i*) is a set of regions where station *i* can become active.

### 4.2 Loses due to asymmetric incomplete state

Losses due to information asymmetry are of a serious concern as they can cause very large values of packet loss probability, and these losses are more severe than any other type as far as starvation is concerned. Accurate modeling of asymmetric incomplete state (AIS) scenario is very critical in defining the MAC behavior in arbitrary network. In information asymmetric scenario, both the transmitters are not in transmission range of each other (*d*(*i,i*
^{′})>*R*
_{T}) (but they can be in carrier sensing range or disconnected) and one of the receiver is also not in the transmission range of the opposite transmitter (*d*(*j*
^{′},*i*)>*R*
_{T}) (but can be in carrier sense range or disconnected). And further, we identify two types of AIS scenarios: one scenario in which the other receiver is in transmission range of the opposite transmitter (*d*(*j,i*
^{′})<*R*
_{T}), and in second scenario, the other receiver is in carrier sense range of its opposite transmitter (*d*(*j,i*
^{′})>*R*
_{T})*and* (*d*(*j,i*
^{′})<*R*
_{S}). We model these both scenarios independently and that is actually how our model differentiates between these two ranges (transmission and carrier sense range).

*l*(

*i,j*) is interfered from link

*l*

^{′}(

*i*

^{′},

*j*

^{′}) if the above mentioned geometric configuration stands true for both scenarios. In this scenario, station

*i*only has a chance of successful transmission if it is able to send first packet (DATA for two-way and RTS for four-way handshake) when link

*l*

^{′}is not active. The packet loss probability when one of the receivers is in transmission range of its opposite transmitter (

*d*(

*j,i*

^{′})<

*R*

_{T}) is given:

*X*(

*i*

^{′}/

*i*) is given as:

*τ*(

*i*

^{′}) is the probability that transmitter

*i*

^{′}of link

*l*

^{′}tries to initiate a transmission right after a busy period ends and

*X*(

*i*

^{′}/

*i*) is the probability that successful transmission of

*i*is only possible when first transmitted packet reached

*j*during a period when link

*l*

^{′}was inactive and

*d*is the size of first packet. The activity of link

*l*

^{′}is modeled as On/Off periods sensed by receiver

*j*when transmitter

*i*tries to transmit, and On/Off periods are calculated during busy time computation in Section 5. The packet loss probability

*p*

_{ais−csr}(

*i*,

*i*

^{′}) for the scenario when the second receiver is in carrier sense range of its opposite transmitter (

*d*(

*j,i*

^{′})>

*R*

_{T}) and (

*d*(

*j,i*

^{′})<

*R*

_{S}) is given as:

*i*reached its receiver

*j*during a period when link

*l*

^{′}is inactive. The total probability of

*p*

_{ais}(

*i,i*

^{′}) is given as:

### 4.3 Loses due to symmetric incomplete state

*l*(

*i,j*) and

*l*

^{′}(

*i*

^{′},

*j*

^{′}) when both the transmitters are disconnected (

*d*(

*i,i*

^{′})>

*R*

_{S}) and both the receivers are within transmission or carrier sense range of the opposite transmitters. This geometric configuration is also known as near hidden terminal problem in existing literature. Packet loss in SIS happens when one transmitter attempts to transmit during the time when the other transmitter was already transmitting its first packet and both packets collide at the receivers. We model these types of losses independently; the packet loss probability when both the receivers are in carrier sense range of their opposite transmitters (

*d*(

*j,i*

^{′})>

*R*

_{T}), (

*d*(

*j,i*

^{′})<

*R*

_{S}), (

*d*(

*i,j*

^{′})>

*R*

_{T}), and (

*d*(

*i,j*

^{′})<

*R*

_{S}) is given as:

*d*(

*j,i*

^{′})<

*R*

_{T}) and (

*d*(

*i,j*

^{′})<

*R*

_{T}), the receivers within transmission range can set their NAV and coordinate transmission attempts. This probability is given as:

*c*(

*i*

^{′},

*i*) in Eq. 4,

*m*=⌊

*d*/

*σ*⌋,

*m*is transmission opportunities of station

*i*

^{′}during station

*i*was sending its first packet and

*d*is duration of first packet sent by station

*i*. Depending on the packet size, these losses can be higher, but being symmetric, these affect both the flows equally and decrease in value of

*τ*decreases chances of repeated collisions. Equation for total probability of losses due to SIS is given as:

### 4.4 Losses due to destination connected

*l*(

*i,j*) suffers losses because of the activity of link

*l*

^{′}(

*i*

^{′},

*j*

^{′}) when both transmitters are in carrier sense range or disconnected (

*d*(

*i,i*

^{′})>

*R*

_{T}); both the receivers are also in carrier sense range or disconnected from their opposite transmitters (

*d*(

*i*

^{′},

*j*)>

*R*

_{T}) and (

*d*(

*j*

^{′},

*i*)>

*R*

_{T}). But both receivers are within transmission (

*d*(

*j,j*

^{′})<

*R*

_{T}) or carrier sensing range (

*R*

_{T}<

*d*(

*j,j*

^{′})<

*R*

_{S}) of each other. With this geometric configuration, the station that attempts first will have a successful transmission and the station starts second will experience losses as its receiver will not be able to reply CTS due to the activity of opposite transmitter or receiver. For the scenario when two receivers are within carrier sense range of each other (

*R*

_{T}<

*d*(

*j,j*

^{′})<

*R*

_{S}), we compute this packet loss probability of station

*i*such that

*i*

^{′}attempts to transmit during the active period of link

*l*which is given as:

*T*

_{ON}(

*i*

^{′}) and \({\overline {T}}_{\text {OFF}}(i')\) are iteratively computed while monitoring activity of link

*l*

^{′}. In scenarios when both the receivers are within transmission range of each other (

*d*(

*j,j*

^{′})<

*R*

_{T}), the probability of packet loss is much higher because network allocation vector will be set during transmission of CTS by

*j*and hence

*j*

^{′}will not be able to reply CTS to its own transmitter, i.e.,

*i*and

*i*

^{′}will keep on trying to initiate transmission and its backoff windows size will be increased as well. This probability is given as:

*m*=⌊

*d*/

*σ*⌋ and

*d*=CTS. In this equation,

*τ*(

*j*

^{′})

^{ m }makes sure that station

*i*

^{′}is also aware of the activity of link

*l*and is able to set NAV as being in transmission range of station

*j*. The total probability of losses due to destination connected scenario is:

## 5 Busy time computation

In this section, we compute the duration of time when channel is sensed busy by a station due to the activity of other stations around it in WMN. According to IEEE 802.11 MAC, there are two types of situation in busy time sensing: one is virtual carrier sense when network allocation vector (NAV) is set by stations during initial coordination (RTS/CTS) but NAV can only be set to stations within transmission ranges of both transmitter and receiver. The second type of busy time sensed due to physical carrier sense from the stations in transmission/carrier sense ranges of both transmitter and receiver. Busy time computation is simple when all stations are in single transmission range as in single-hop network and they can coordinate their transmission using RTS/CTS mechanism of CSMA carrier avoidance mechanism. But computing busy time becomes very challenging when there are stations in carrier sense range and their transmission can overlap on a sensing station.

Prior work in [1] modeled busy time average durations and rate of arrival of busy events in a four-step process including computation of maximal clique and their reduction, computation of active regions, and then finally, busy time. But their proposed model do not differentiate between busy time senses due to the activity of stations within transmission range or carrier sense range (outside transmission range) because they treated these both ranges as single sensing range. As compared to [1], the uniqueness of our work lies in meticulous differentiation between busy time sensed due to the activity of stations in transmission and carrier sense range are detailed in Algorithm 4. We also devise computationally efficient Algorithms [1–4] for modeling busy probability *b*(*i*) and average busy duration \({\overline {T}}_{b}(i)\). According to Eq. 1, these two quantities *b*(*i*) and \({\overline {T}}_{b}(i)\) along with conditional packet loss probability *p*(*i*) computed in Section 4 are required to predict per-flow throughput of each transmitting stations in a dense WMN.

Algorithm 1 details the outline of busy probability and average duration of a busy period sensed by station in network, and for computations of these quantities, it invokes procedures in Algorithms 2, 3 and 4. We now briefly elaborate the functionality of these Algorithms. Algorithm 2 computes activation rate and average busy duration sensed by a station due to the activity of a group of stations called regions around sensing station *i*. Initially *n* number of stations are placed in a rectangular area of width×length (*w*×*l*) in pairs of a transmitter and a receiver making sure that each receiver is in transmission range of its receptive transmitter and their coordinates are saved. The next step finds all the stations within transmission and carrier sense range of station *i* and also saves the type of station whether it is a transmitter or a receiver.

Next, Algorithm 2 sequentially invokes procedure *O*
*v*
*e*
*r*
*l*
*a*
*p*
*p*
*i*
*n*
*g*
*R*
*e*
*g*
*i*
*o*
*n*
*s*(*i*) to compute overlapping active regions around station *i* whom transmission activity is sensed by station *i*. We discuss computation of overlapping regions in more details while describing Algorithm 4. Initially, we assume Poisson distribution for busy period activation rate *λ*(*i*) and exponential distribution for average durations \({{\overline {T}}_{\text {ON}}}\) of busy activity, but later, both these quantities are iteratively recomputed until they are converged. Algorithm 2 then computes the activation rate *λ*(*U*
_{
u
}) of each region by summing activation rates of individual stations *λ*(*i*) in that region, and finally computes average activity duration \({{\overline {T}}_{\text {ON}}}\) of all regions. Algorithm 2 returns the value of average activity duration \({{\overline {T}}_{\text {ON}}}\) back to main procedure for further throughput computation of each transmitting station *i*.

Algorithm 3 computes the two required quantities *b*(*i*) and \({\overline {T}}_{b}(i)\) for throughput computation. It first computes the deactivation rate *μ*
_{
u
} for all the virtual nodes (previously referred to as active regions) and also computes independent sets *D* of these virtual nodes using conflict graph. An independent set consists of virtual nodes in which transmitting stations can make simultaneous successful transmissions, and *Q*
_{
d
} is the probability of each independent set *d*. Activation rate *g*
_{
u
} is computed iteratively keeping the total probability *Q*
_{
D
} of the system below one (*Q*
_{
D
}≤1); *Q*
_{
D
} also includes the probability *Q*
_{
ϕ
} when none of the virtual node (i.e., region) is currently active and transmitting. The average duration of idle period \({\overline {T}}_{idle}(i)\) for each station *i* is computed based on their activation rate *g*
_{
u
}, and then \({\overline {T}}_{\text {idle}}(i)\) is used to compute the first required quantity that is average duration of busy period \({\overline {T}}_{b}(i)\) sensed by each station *i*. In the later part of Algorithm 3, *n*
_{
e
}(*i*) is computed that are the average number of events sensed by a station *i* during a busy period, and then finally, *n*
_{
e
}(*i*) is used to compute second required quantity, i.e., probability *b*(*i*) that station *i* senses a busy period right after an idle slot.

*i*to compute activation of each station

*λ*

_{ i }as well as for each region

*λ*

_{ u }. Figure 2 elaborates region formation in which three circles with radius as carrier sense range are drawn around station

*i*to cover all stations around it and regions are only made within carrier sense range of station

*i*because as per 802.11 CSMA/CA protocol, the stations within transmission range set their network allocation vector to schedule transmissions with coordination using RTS/CTS mechanism. Algorithm 4 returns set of stations, i.e.,

*U*

_{ u }in each identified region

*u*∈

*U*and Algorithm 3 use these regions for computation of activation rates (

*λ*(

*i*) and

*λ*

*U*

_{ u }).

## 6 Simulation and model validation

Analytical parameters

Parameter | Value (ms) |
---|---|

Channel occupied by successful transmission | 9.6 |

Channel occupied by a collision | 0.417 |

Duration of first packet | 0.288 |

Duration of CTS | 0.24 |

Idle channel | 0.02 |

Maximum retry limit | 6 |

Backoff stage at which window size is max | 5 |

Minimum window size | 16 |

### 6.1 Fraction of busy time sensed

- iDo not consider stations within transmission range of station
*i*for modeling its throughput assuming that RTS/CTS mechanism worked to set the network allocation vectors of stations within transmission range. - ii
Record the number of other transmitting stations within carrier sense range of station

*i*that are interfering with stations*i*’s transmission. - iii
Overlapping region formation in Algorithm 4 during busy time computation only considers stations within carrier sense range of station

*i*as interference from carrier sense range is the worst as hidden and exposed station stations are in carrier sense range of station*i*. - iv
Packet loss probability computation also differentiates between stations interfering from transmission range and carrier sense range and models them separately for accurate computation of packet loss probability.

Figure 5 shows that the fraction of busy time sensed by each transmitting station is higher in proposed model as compared to the reference model [1]. As busy time sense by a stations largely depends on number and location of interfering links around that transmitting station *i*, these values vary much from each other predicting the realistic nature of general wireless network. The fraction of busy time sensed is high in proposed model due to that fact that now it is able to sense transmissions of links that are outside carrier sense range while the reference model in [1] is only able to sense busy time from within transmission range.

### 6.2 Conditional packet loss probability

### 6.3 Contribution of packet loss probability due to information asymmetry

### 6.4 Transmission probability comparison

As mentioned earlier, the proposed per-flow throughput prediction model accurately caters the effect of links interfering from outside transmission range. It can be seen in Fig. 10 that transmission probability of the proposed model is less than that of [1]; it actually indicates increased interference from contending flows and alternately decreased throughput. The proposed model can clearly differentiate between interfering links from transmission and carrier sense range, and we now have established the fact that links interfering from carrier sense range severely affect the throughput of a flow in general multi-hop wireless network.

### 6.5 Analytical throughput

### 6.6 Simulation throughput

## 7 Conclusions

Existing literature for predicting per-flow throughput and starvation in general multi-hop WMS is not able to differentiate between links interfering from transmission and carrier sense range and is independent of geometric location of contending stations. Conditional packet loss probability is very complex and critical parameter as far as throughput prediction is concerned. Packet loss probability and MAC behavior is closely dependent on geometric configuration among the stations in arbitrary network.

We model fraction of busy time and conditional packet loss probability for realistic general wireless mesh scenario based on an accurate geometric configuration of stations. We compute per-flow throughput of all the stations in general multi-hop wireless network. Analytical results validated our model and also supported the argument that our model can clearly differentiate between interfering links from transmission and carrier sense range. The proposed model is more accurate in per-flow throughput prediction in comparison with existing literature. This work provides better understanding of CSMA based MAC protocols in arbitrary networks and aids toward designing more effective future networking protocols.

## Declarations

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## Authors’ Affiliations

## References

- M Garetto, T Salonidis, EW Knightly, et al., in
*INFOCOM*. Modeling per-flow throughput and capturing starvation in csma multi-hop wireless networks (IEEEUSA, 2006).Google Scholar - M Garetto, J Shi, EW Knightly, in
*Proceedings of the 11th Annual International Conference on Mobile Computing and Networking*. Modeling Media Access in Embedded Two-flow Topologies of Multi-Hop Wireless Networks (IEEE and ACMUSA, 2005), pp. 200–214.Google Scholar - MM Carvalho, JJ Garcia-Luna-Aceves, in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking. A Scalable Model for Channel Access Protocols in Multihop Ad Hoc Networks (ACM, 2004), pp. 330–344.Google Scholar
- HS Chhaya, S Gupta, Performance modeling of asynchronous data transfer methods of ieee 802.11 mac protocol. Wireless Netw.
**3**(3), 217–234 (1997).View ArticleGoogle Scholar - RR Boorstyn, A Kershenbaum, B Maglaris, V Sahin, Throughput analysis in multihop csma packet radio networks. Commun. IEEE Trans.
**35**(3), 267–274 (1987).View ArticleGoogle Scholar - M-S Chen, R Boorstyn, in
*Proceedings of the IEEE INFOCOM Conference*. Throughput Analysis of Code Division Multiple Access (CDMA) Multihop Packet Radio Networks in the Presence of Noise (IEEEUSA, 1985), pp. 310–316.Google Scholar - FA Tobagi, JM Brazio, in
*INFOCOM*, 83. Throughput Analysis of Multihop Packet Radio Networks Under Various Channel Access Schemes (IEEEUSA, 1983), pp. 381–389.Google Scholar - X Wang, K Kar, in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 1. Throughput Modelling and Fairness Issues in CSMA/CA Based Ad-Hoc Networks (IEEE, 2005), pp. 23–34.Google Scholar
- G Bianchi, Performance analysis of the ieee 802.11 distributed coordination function. Selected Areas Commun. IEEE J.
**18**(3), 535–547 (2000).View ArticleGoogle Scholar - Calì, F, M Conti, E Gregori, Dynamic tuning of the ieee 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. (ToN).
**8**(6), 785–799 (2000).View ArticleGoogle Scholar - M Zeeshan, A Naveed, in Network Protocols (ICNP), 2013 21st IEEE International Conference On. Interference and Capacity Analysis in Multi-Hop Wireless Mesh Networks (IEEE, 2013), pp. 1–3.Google Scholar
- M Zeeshan, A Naveed, Medium access behavior analysis of two-flow topologies in ieee 802.11 wireless networks. EURASIP J. Wireless Commun. Netw.
**2016**(1), 1–18 (2016).View ArticleGoogle Scholar - N Abramson, in Proceedings of the November 17-19, 1970, Fall Joint Computer Conference. The Aloha System: Another Alternative for Computer Communications (ACM, 1970), pp. 281–285.Google Scholar
- L Kleinrock, F Tobagi, et al, Packet switching in radio channels: part i—carrier sense multiple-access modes and their throughput-delay characteristics. Commun. IEEE Trans.
**23**(12), 1400–1416 (1975).View ArticleMATHGoogle Scholar - IS Association, IEEE Standard 802.11-2012 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (IEEE, 2012).Google Scholar
- L Lei, T Zhang, X Song, S Cai, X Chen, J Zhou, Achieving weighted fairness in WLAN mesh networks: An analytical model. Ad Hoc Netw.
**25:**, 117–129 (2015).View ArticleGoogle Scholar - GR Hiertz, D Denteneer, S Max, R Taori, J Cardona, L Berlemann, B Walke, Ieee 802.11 s: the wlan mesh standard. Wireless Commun. IEEE.
**17**(1), 104–111 (2010).View ArticleGoogle Scholar - MS Islam, MM Alam, CS Hong, S Lee, EMCCA: An enhanced mesh coordinated channel access mechanism for IEEE 802.11 s wireless mesh networks. Commun. Netw. J.
**13**(6), 639–654 (2011).View ArticleGoogle Scholar - G Bianchi, I Tinnirello, L Scalia, Understanding 802.11 e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations. Netw. IEEE.
**19**(4), 28–34 (2005).View ArticleGoogle Scholar - I Gitman, On the capacity of slotted aloha networks and some design problems. Commun. IEEE Trans.
**23**(3), 305–317 (1975).MathSciNetView ArticleGoogle Scholar - C Chaudet, IG Lassous, E Thierry, B Gaujal, in Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. Study of the Impact of Asymmetry and Carrier Sense Mechanism in IEEE 802.11 Multi-Hops Networks Through a Basic Case (ACM, 2004), pp. 1–7.Google Scholar
- S Ray, JB Carruthers, D Starobinski, Evaluation of the masked node problem in ad hoc wireless lans. Mobile Comput. IEEE Trans.
**4**(5), 430–442 (2005).View ArticleGoogle Scholar - B Jang, ML Sichitiu, Ieee 802.11 saturation throughput analysis in the presence of hidden terminals. IEEE/ACM Trans. Netw. (TON).
**20**(2), 557–570 (2012).View ArticleGoogle Scholar - B Nardelli, EW Knightly, in INFOCOM, 2012 Proceedings IEEE. Closed-Form Throughput Expressions for CSMA networks with collisions and hidden terminals (IEEE, 2012), pp. 2309–2317.Google Scholar
- T Begin, B Baynat, I Guérin-Lassous, T Abreu, Performance analysis of multi-hop flows in IEEE 802.11 networks: A flexible and accurate modeling framework. Performance Evaluation. 96:, 12–32 (2016).Google Scholar
- A Kashyap, S Ganguly, SR Das, in Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking. A Measurement-Based Approach to Modeling Link Capacity in 802.11-Based Wireless Networks (ACM, 2007), pp. 242–253.Google Scholar
- W Wang, B Leong, WT Ooi, Mitigating unfairness due to physical layer capture in practical 802.11 mesh networks. Mobile Comput. IEEE Trans.
**14**(1), 99–112 (2015).View ArticleGoogle Scholar - E Fitzgerald, S Bastani, B Landfeldt, in Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access. Intention Sharing for Medium Access Control in Wireless LANS (ACM, 2015), pp. 21–30.Google Scholar
- M Garetto, P Giaccone, E Leonardi, in Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Capacity Scaling in Delay Tolerant Networks with Heterogeneous Mobile Nodes (ACM, 2007), pp. 41–50.Google Scholar
- M Garetto, P Giaccone, E Leonardi, Capacity scaling in ad hoc networks with heterogeneous mobile nodes: The subcritical regime. IEEE/ACM Trans. Netw. (TON).
**17**(6), 1888–1901 (2009).View ArticleGoogle Scholar - D Ciullo, V Martina, M Garetto, E Leonardi, Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks. IEEE/ACM Trans. Netw. (TON).
**19**(6), 1745–1758 (2011).View ArticleGoogle Scholar - S Razak, V Kolar, NB Abu-Ghazaleh, Modeling and analysis of two-flow interactions in wireless networks. Ad Hoc Netw.
**8**(6), 564–581 (2010).View ArticleGoogle Scholar - I Tinnirello, G Bianchi, P Gallo, D Garlisi, F Giuliano, F Gringoli, in INFOCOM, 2012 Proceedings IEEE. Wireless Mac Processors: Programming Mac Protocols on Commodity Hardware (IEEE, 2012), pp. 1269–1277.Google Scholar
- G Bianchi, P Gallo, D Garlisi, F Giuliano, F Gringoli, I Tinnirello, in Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies. Maclets: Active Mac Protocols over Hard-Coded Devices (ACM, 2012), pp. 229–240.Google Scholar
- G Bianchi, I Tinnirello, in Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. One Size Hardly Fits All: Towards Context-Specific Wireless Mac Protocol Deployment (ACM, 2013), pp. 1–8.Google Scholar
- A Kumar, E Altman, D Miorandi, M Goyal, in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 3. New Insights from a Fixed Point Analysis of Single Cell IEEE 802.11 wlans (IEEE, 2005), pp. 1550–1561.Google Scholar
- PB Duarte, ZM Fadlullah, AV Vasilakos, N Kato, On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE J. Selected Areas Commun.
**30**(1), 119–127 (2012).View ArticleGoogle Scholar - Y He, J Sun, X Ma, AV Vasilakos, R Yuan, W Gong, Semi-random backoff: towards resource reservation for channel access in wireless lans. IEEE/ACM Trans. Netw. (TON).
**21**(1), 204–217 (2013).View ArticleGoogle Scholar - P Li, S Guo, S Yu, AV Vasilakos, Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Trans. Parallel Distributed Syst.
**25**(12), 3264–3273 (2014).View ArticleGoogle Scholar - K Liu, X Chang, F Liu, X Wang, AV Vasilakos, A cooperative mac protocol with rapid relay selection for wireless ad hoc networks. Comput. Netw.
**91:**, 262–282 (2015).View ArticleGoogle Scholar - D López-Pérez, X Chu, AV Vasilakos, H Claussen, On distributed and coordinated resource allocation for interference mitigation in self-organizing lte networks. IEEE/ACM Trans. Netw. (TON).
**21**(4), 1145–1158 (2013).View ArticleGoogle Scholar - T Meng, F Wu, Z Yang, G Chen, AV Vasilakos, Spatial reusability-aware routing in multi-hop wireless networks. IEEE Trans. Comput.
**65**(1), 244–255 (2016).MathSciNetView ArticleGoogle Scholar - C-Y Wang, C-H Ko, H-Y Wei, AV Vasilakos, A voting-based femtocell downlink cell-breathing control mechanism. IEEE/ACM Trans. Netw. (TON).
**24**(1), 85–98 (2016).View ArticleGoogle Scholar - XM Zhang, Y Zhang, F Yan, AV Vasilakos, Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans. Mobile Comput.
**14**(4), 742–754 (2015).View ArticleGoogle Scholar