Artigo Acesso aberto Revisado por pares

Energy efficiency, latency and reliability trade‐offs in M2M uplink scheduling

2021; Institution of Engineering and Technology; Volume: 15; Issue: 15 Linguagem: Inglês

10.1049/cmu2.12201

ISSN

1751-8636

Autores

Moses Kwasi Torkudzor, Štefan Schwarz, Jamal‐Deen Abdulai, Markus Rupp,

Tópico(s)

IoT and Edge/Fog Computing

Resumo

IET CommunicationsVolume 15, Issue 15 p. 1907-1916 ORIGINAL RESEARCH PAPEROpen Access Energy efficiency, latency and reliability trade-offs in M2M uplink scheduling Moses K Torkudzor, Corresponding Author Moses K Torkudzor mtorkudzor@yahoo.com Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, Ghana Correspondence Moses K Torkudzor, Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, Ghana. Email: mtorkudzor@yahoo.comSearch for more papers by this authorStefan Schwarz, Stefan Schwarz CD-Lab for Dependable Wireless Connectivity, Institute of Telecommunications, TU Wien, Vienna, AustriaSearch for more papers by this authorJamal-Deen Abdulai, Jamal-Deen Abdulai Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, GhanaSearch for more papers by this authorMarkus Rupp, Markus Rupp CD-Lab for Dependable Wireless Connectivity, Institute of Telecommunications, TU Wien, Vienna, AustriaSearch for more papers by this author Moses K Torkudzor, Corresponding Author Moses K Torkudzor mtorkudzor@yahoo.com Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, Ghana Correspondence Moses K Torkudzor, Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, Ghana. Email: mtorkudzor@yahoo.comSearch for more papers by this authorStefan Schwarz, Stefan Schwarz CD-Lab for Dependable Wireless Connectivity, Institute of Telecommunications, TU Wien, Vienna, AustriaSearch for more papers by this authorJamal-Deen Abdulai, Jamal-Deen Abdulai Department of Computer Engineering and Computer Science, University of Ghana, PMB, Legon, Accra, GhanaSearch for more papers by this authorMarkus Rupp, Markus Rupp CD-Lab for Dependable Wireless Connectivity, Institute of Telecommunications, TU Wien, Vienna, AustriaSearch for more papers by this author First published: 06 May 2021 https://doi.org/10.1049/cmu2.12201Citations: 1AboutSectionsPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinked InRedditWechat Abstract Issues of energy efficiency, latency and reliability have engaged researchers' attention in wireless communications for a long time due to their importance in the dependable delivery of data over wireless networks. The emergence of M2M communication and IoT has intensified this attention because energy efficiency and latency are critical factors affecting their performance. In this paper, a scheduler is designed by utilising the probability density function of the signal-to-noise ratio of Rayleigh fading channels to define a threshold used for resource allocation. This threshold, combined with the mean SNR of an M2M device, determines whether or not an M2M device is eligible for scheduling, given its instantaneous channel conditions. The trade-off between energy efficiency, latency and packet drop of this proposed scheduling strategy is investigated. The performance of the proposed scheduler is compared to round robin, maximum throughput, and proportional fair schedulers. Compared to these standard scheduling strategies, the scheduler provides the advantage of trading off latency for energy efficiency by tuning the threshold parameter. 1 INTRODUCTION Machine-to-Machine (M2M) communication has recently developed into an important technology generating significant revenues to mobile network operators. In this technology, nodes are equipped with sensor modules to monitor and collect various forms of data such as temperature, humidity, and pressure for onward transmission through communication networks. There are many applications of M2M communication, some of which are: smart metering, intelligent transportation, health care, smart city, public safety and consumer devices [1-4]. M2M communication, however, comes with peculiar challenges which are dependent on its typical characteristics, including a massive number of devices, small size data transmission, infrequent traffic patterns, and battery limitation in contrast to human-to-human (H2H) communications. These problems are well-known and are variously discussed [5-11]. Energy efficiency and low latency are very critical considerations in current and future wireless networks. Since the types of wireless services become increasingly diverse as technologies evolve, networks must also be built to meet the corresponding applications and different delay requirements, knowing when and how to trade off tolerable delay for low power [12]. Data transmission methods in wireless networks should be designed to achieve target delay and throughput at reduced power consumption [13]. The authors in [14] conduct an extensive survey of energy efficiency trade-off mechanisms and underscore the fact that trade-off techniques are needed in each protocol layer to achieve energy efficiency. The challenges of reliability, energy efficiency, latency reduction, a massive increase in connection density, and capacity improvement are the main goals of fifth generation (5G) wireless networks [15]. In this paper, we extend our work in [16] which reveals maximum throughput scheduling (MTS) as more energy efficient compared to proportional fair scheduling (PFS) and round robin scheduling (RRS) to a design of a scheduler more energy efficient than MTS. We furthermore investigate the trade-off between energy efficiency, latency and reliability of this novel scheduler. The main contributions of the paper are: The signal-to-noise ratio's probability density function (PDF) of Rayleigh fading channels is employed to design a scheduler to investigate energy efficiency, latency and reliability trade-offs. Threshold parameters are defined in the scheduler which can be tuned to trade off latency for energy efficiency. Order statistics are employed to derive a closed-form analytic PDF expression for resource allocation by the scheduler. A closed-form analytic equation for expected energy efficiency and latency is also derived. The analytic results are validated using Monte Carlo simulations. Notation U is used to denote a set of M2M users, f ( · ) for PDF, F ( · ) for cumulative density function (CDF), P ( · ) for probability, and E ( · ) for expected value. The rest of the work is organised as follows: Section 2 discusses the related literature. In Section 3, we present the system model of our proposed scheduler. Designing the scheduler is covered in Section 4. In Section 5, we derive the SNR PDF of the scheduled user. Analytic equations for the performance measures are derived in Section 6. We discuss and analyse simulation results in Section 7. Section 8 finally concludes the work. 2 RELATED WORK Scheduling and resource allocation are considered as important strategies in wireless communication networks because of their ability to manage the limited radio resources at the access level in a way that maximises the system performance such as latency and energy consumption. A power allocation algorithm for massive M2M communication using Lagrange multipliers is proposed in [17] to decrease signalling overhead. The main objective behind this Lagrange multiplier power allocation algorithm in [17] is to maximise the total energy efficiency of a group of M2M devices, while satisfying the time delay of the M2M devices. Careful scheduling of sensed data can reduce power consumption for M2M nodes thereby increasing the lifetime of the M2M network [18]. In [19], a joint resource allocation and clustering algorithm was designed which maximises system energy efficiency. Uplink scheduling and transmit power control are investigated in [20] to minimise the energy consumption of battery-driven devices deployed in LTE networks using clustering techniques. According to [21], two main challenges affecting the effective operation of low power M2M networks including processing complexity and transmission range constraints are tackled through cooperative communication which employs M2M gateways as relays. However, some emerging research challenges of cooperative M2M communication indicated in [21] are an increase in end-to-end latency, complex scheduling, increased overhead, increased intra and inter network interferences, and the difficulty of clustering process due to the problem of uneven distribution of M2M devices. Maximum energy efficient uplink M2M data packets transmission is investigated in [22] by formulating it into a joint problem of modulation and coding scheme (MCS) selection, resource allocation, and power control. The allocation and scheduling scheme were formulated into a mixed-integer linear fractional programming problem which was reconstructed into a linear form and an optimisation scheme based on the Charnes–Cooper transformation and the Glover linearisation scheme was proposed. Results indicate that low data packets dropping ratios and optimal energy efficiency for a large number of M2M nodes were achieved. The inclusion of MCS in the scheduling and resource allocation in [22] is unique as it caters for modulation and coding aspects that impact this performance measures in wireless communication. The paper, however, did not consider circuit energy consumption. In [23], a jointly delay-optimal multiclass packet scheduler designed at the application server and M2M aggregators are presented. This work in [23] iteratively searches for an optimal fraction of time-sharing between all preemptive priority scheduling policies and uses a sigmoidal function to map delay requirements of classified QoS onto utility functions of packet delay to maximise proportionally fair system utility metric. The iterative approach reduced computational complexity resulting in near-minimal delay jitter for delay-sensitive traffic but at the expense of higher delay jitter for delay-tolerant traffic. It is thus not suitable for delay tolerant devices and also did not account for the effect of this in terms of energy efficiency. An uplink scheduling algorithm is proposed in [24] to solve the problem of the inability of the uplink scheduling to guarantee the transmission of real-time traffic packets within the delay period by establishing a target integer linear programming model using delay constraints of real-time traffic. The problem that the bandwidth of low priority traffic is insufficient and the overall QoS is affected when multi-class traffic is processed is also addressed in [24] by designing a priority adjustment algorithm for user equipment to choose lower priority traffic to be transmitted first when the transmission of higher priority traffic can be safely delayed without violating its delay constraints in a given TTI. When compared with dynamic Hungarian algorithm with modification, [24] shows better performance for fairness, throughput, number of packets delivered by the user having the worst channel conditions, and the delay metrics. In [25], packet dropping caused by delay constraint violation of M2M traffic at energy harvesting gateways is minimised by developing an optimisation framework. In designing this, rate and delay requirements, energy, data causality, and SC-FDMA constraints were taken into account. The optimisation problem was further expressed in terms of its discrete and continuous variables and solved by decomposing it into primal and master problems using generalised Benders decomposition. A low-complexity method was then proposed to solve the primal problem with a heuristic resource block allocation algorithm which performs better than two other benchmarked heuristic methods. However, ignoring of packet dropping at the M2M devices and the assumption of them having reliable energy sources would eventually degrade the performance in the real life situation. Other technologies being explored to reduce latency and energy consumption are computational task offloading, resource provisioning, and fog networking whose computing environment connects resources together to improve life through usage of computation resources at the network edge. This idea of fog computing is therefore to drive resource computation and storage towards the end-user to solve the problem of long-delay links between the cloud data center and end-user equipment. A comprehensive review of machine learning and stochastic-based computation offloading mechanisms in mobile edge computing environments are respectively compared in [26] and [27] under the performance metrics, case studies, utilised techniques, evaluation tools, advantages, and weaknesses. The performance metrics considered in [26, 27] are energy consumption, latency, QoS, quality of experience, response time, and cost. Optimisation of task scheduling in a fog computing environment is a challenging issue because it is considered an NP-hard problem [28]. In order to solve this problem, a task scheduling algorithm using the moth-flame optimisation algorithm which assigns an optimal set of tasks to fog nodes is presented in [28] which minimises total tasks execution. In fog networking, however, computational offloading of tasks for the delay-sensitive devices is done at the expense of additional transmission latency. This trade-off issue is formulated in [29] as a delay-sensitive data offloading problem considering the local task execution and transmission latencies to jointly optimise the computing and communication resources in the fog node. An offloading scheme in fog computing to reduce the weighted sum of energy consumption and total delay for task processing per end-user is proposed in [30]. This was achieved by formulating and solving a non-convex optimisation problem using semidefinite relaxation. The authors in [30] however ignored the cost due to local energy consumption to execute and offload a task at the fog node and remote cloud which will not present a comprehensive energy consumption model. A workload clustering-based resource provisioning mechanism presented in [31] for executing cloud-based applications reduces delay, cost, and energy consumption. Summary of scheduling algorithms under the performance metrics, technique, evaluation tools, advantages, and disadvantages is presented in table 1. 3 SYSTEM MODEL We consider in this paper an uplink multi-user system in a single cell scenario as shown in Figure 1. We assume a clustering scenario where n M2M devices (cluster members) communicate through an M2M gateway (cluster head) to the base station. However, only the communication between a single cluster head and its cluster members is investigated in this paper. FIGURE 1Open in figure viewerPowerPoint System model showing M2M devices communicating to eNB through M2M gateway The SNR γ u ( t ) , of an M2M user u at a given time instance t is: γ u ( t ) = P u | h u ( t ) | 2 σ u 2 (1)where P u , h u ( t ) and σ u 2 are the transmit power, the channel coefficient between the M2M device, the M2M gateway, and the variance of additive white Gaussian noise (AWGN), respectively. The channel coefficient h u ( t ) is a complex-valued Gaussian distribution with zero mean and unit variance which defines the Rayleigh fading channel whose PDF is used to design the scheduler. Channel coefficients are considered as uncorrelated over time. h u ( t ) = x u ( t ) + j y u ( t ) . (2)The achievable Shannon rate of transmission in bits/s, R u ( t ) of a user is: R u ( t ) = B log 2 1 + γ u ( t ) . (3)Here, B denotes the transmission bandwidth. The corresponding energy efficiency, EE u of the data transmission is: EE u ( t ) = R u ( t ) P c + P u . (4)Here, P c denotes the constant circuit power, which accounts for signal processing, amplification losses etc. 4 SCHEDULER DESIGN AND DESCRIPTION We use the SNR PDF of the Rayleigh fading channel to define a threshold for resource allocation. We utilise the average SNR γ ¯ u of the respective M2M devices and a threshold value T to determine the condition a device must satisfy in order to have a probability to be scheduled at that time instance. As demonstrated below, this approach allows to trade off energy efficiency, reliability, and latency by varying the threshold parameter. The average SNR of M2M user, u, is: γ ¯ u = P u σ u 2 . (5)We define the scheduling SNR threshold of user u as follows: k u = γ ¯ u T . (6)Let the subset of M2M users that have at the current time instance packets in their packet buffer to transmit be U 1 = { 1 , … , n } . Out of these users, the subset U 2 ⊆ U 1 defines the M2M users whose current SNR is at least k u , U 2 = { u ∈ U 1 | γ u ( t ) ≥ k u } . The M2M user, u, with the maximum SNR from the subset U 2 is then scheduled: u = argmax i ∈ U 2 γ i ( t ) . (7)Devices which do not meet the threshold condition at time instant t have the probability of meeting it at another instance. 5 DERIVATION OF THE SNR PDF OF THE SCHEDULED USER In the following, we derive the PDF of the SNR of the user that has been selected by the scheduler. According to (6), this PDF is determined by the maximum of the SNRs of the users in U 2 that meet the threshold condition. Hence, the PDF can be obtained from the order statistics of the users in U 2 . To simplify the derivation, we assume in the following that the average SNR γ ¯ u of all users is equal, i.e. γ ¯ u = γ ¯ , ∀ u and therefore, the threshold k u = k , ∀ u . We furthermore assume that all n users, i.e. U 1 = { 1 , … , n } have data to transmit. Assuming Rayleigh fading, the conditional PDF of the SNR of the users that satisfy the threshold condition is: f ( γ ( t ) | γ ( t ) ≥ k ) = λ e − λ γ ( t ) 1 C , k ≤ γ ( t ) ≤ ∞ . (8)Here, λ is a shape parameter computed as: λ = 1 / γ ¯ (9)and C is a normalising constant which is given as: C = ∫ k ∞ λ e − λ γ d γ = e − λ k . (10)Substituting Equation (10) into Equation (8) gives: f ( γ ( t ) | γ ( t ) ≥ k ) = λ e − λ ( γ ( t ) − k ) , k ≤ γ ( t ) ≤ ∞ . (11)This implies that the CDF of the SNR of the users that satisfy the threshold condition is: F ( γ ( t ) | γ ( t ) ≥ k ) = 1 − e − λ ( γ ( t ) − k ) . (12) We use order statistics to derive a closed-form expression for the SNR statistics of the user selected by our scheduler. The algorithm for closed-form solution of SNR PDF for the scheduled user is presented in Algorithm 1. The number of M2M users with packets to transmit whose current SNR is at least k is n 2 = | U 2 | . Since all the users in U 2 have the same SNR PDF, we apply order statistics to find the PDF of the SNR of the scheduled users. This PDF is obtained as the maximum order statistic since our scheduler selects the user with maximum SNR from the set U 2 . Hence, the SNR of the scheduled M2M user from the subset U 2 is given as: γ max ( t ) = max ( γ i ( t ) ) , i ∈ U 2 . (13)Applying order statistics to the PDF and CDF from Equations (11) and (12), respectively, and simplifying gives the PDF for the maximum order statistics of our scheduler as: f ( γ max ( t ) | | U 2 | = n 2 ) = n 2 ! ( n 2 − 1 ) ! 1 − e − λ ( γ max ( t ) − k ) n 2 − 1 · λ e − λ ( γ max ( t ) − k ) . (14)Given this conditional PDF of the SNR of the scheduled user, we can calculate the unconditional PDF as follows: f ( γ max ( t ) ) = ∑ n ∼ = 1 n P ( n ∼ users satisfying γ ( t ) ≥ k ) · f ( γ max ( t ) | | U 2 | = n ∼ ) = ∑ n ∼ = 1 n n n ∼ · P ( γ ( t ) ≥ k ) n ∼ · ( 1 − P ( γ ( t ) ≥ k ) ) n − n ∼ · f ( γ max ( t ) | | U 2 | = n ∼ ) = ∑ n ∼ = 1 n n n ∼ ( e − λ k ) n ∼ · ( 1 − e − λ k ) n − n ∼ · f ( γ max ( t ) | | U 2 | = n ∼ ) . (15) ALGORITHM 1. Algorithm for closed-form solution for SNR PDF of the scheduled user 1: Find U 1 = { 1 , … , n } , i.e. users with packets at the current time instance 2: Compute the SNR scheduling threshold, k u , using (6) 3: Find U 2 ⊆ U 1 , i.e. users with packets whose SNR is at least the threshold SNR 4: Schedule the user with max SNR according to (7) 5: Determine the conditional PDF of max SNR for the scheduled user from (14) under the condition that | U 2 | = n 2 6: Compute the unconditional PDF of the scheduled user using (15) 6 DERIVATION OF ANALYTIC EQUATIONS FOR THE PERFORMANCE MEASURES 6.1 Energy efficiency analytic equation In this section, we derive a closed-form analytic equation for the energy efficiency. Steps for deriving these closed solutions are respectively shown in Algorithm 1 and 2. We consider the same assumption γ ¯ u = γ ¯ , ∀ u as in Section 5 for the same purpose of simplifying the derivations. ALGORITHM 2. Closed-form energy efficiency analytic equation derivation algorithm 1: Run Algorithm 1 to determine the unconditional PDF, f ( γ max ( t ) ) of the scheduled user as in (15) 2: Use Equation (16) to find the expected energy efficiency of the scheduler 3: Calculate the conditional probability that a user is selected by the scheduler when it has already passed the first scheduling stage from Equation (18) 4: Using Equation (19), the unconditional probability of scheduling an M2M user is calculated 5: Determine the expected Energy Efficiency of an M2M user according to Equation (17) The expected energy efficiency of our scheduler, which schedules the M2M device with largest SNR out of those M2M devices that surpass the required SNR threshold of γ i ( t ) ≥ k , is: E ( EE s c ) = B P c + P u ∫ k ∞ log 2 ( 1 + γ max ) · f ( γ max ( t ) ) d γ max . (16)This means that the expected Energy Efficiency, E ( EE u ) , of M2M user u is: E ( EE u ) = E ( EE sc ) · P ( u sc ) . (17)In Equation (17), P ( u sc ) as derived in Equation (18), is the unconditional probability of scheduling an M2M device. 6.2 Latency analytic equation To estimate the expected latency analytic equation, we need to know the average number of the LTE frames N f required to transmit a single packet and the probability P ( u sc ) that a user is scheduled. To this end, we first calculate the conditional probability that a user is selected by the scheduler when it has already passed the first scheduling stage, i.e. γ i ( t ) ≥ k . In this case, when there are n ∼ other users in the second scheduling stage, the considered user is scheduled with probability 1 / ( n ∼ + 1 ) , since all users follow the same SNR statistics. The conditional probability is thus obtained as: P ( u sc | γ i ( t ) ≥ k ) = ∑ n ∼ = 0 n − 1 1 n ∼ + 1 n − 1 n ∼ · P γ i ( t ) ≥ k n ∼ · 1 − P γ i ( t ) ≥ k n − 1 − n ∼ = ∑ n ∼ = 0 n − 1 1 n ∼ + 1 n − 1 n ∼ · e − λ k n ∼ · 1 − e − λ k n − 1 − n ∼ . (18)In Equation (18), we sum over all possible numbers n ∼ of other users in scheduling stage 2. Within the sum, we calculate the probability that exactly n ∼ other users are in scheduling stage 2. Using Bayes' rule, the unconditional probability of scheduling an M2M user is therefore given as: P ( u sc ) = P γ i ( t ) ≥ k · P ( u sc | γ i ( t ) ≥ k ) = e − λ k · P ( u sc | γ i ( t ) ≥ k ) . (19)The average number of frames required to transmit a single packet is: N f = n bits R ¯ u (20)where n bits and R ¯ u are the number of bits per packet and the average number of transmitted bits per frame duration T f respectively. The average number of transmitted bits per T f is: R ¯ u = B · T f ∫ k ∞ log 2 ( 1 + γ max ) · f ( γ max ( t ) ) d γ max . (21)We therefore calculate the approximate latency L by estimating the number of frames an M2M user has to wait until it is scheduled N f times: E ( L ) ≈ N f · 1 P ( u sc ) . (22) ALGORITHM 3. Algorithm for closed-form latency analytic equation algorithm 1: Run Algorithm 2 to find the unconditional probability of scheduling an M2M user by using Equation (19) 2: Determine the average number of transmitted bits per frame duration using Equation (21) 3: Calculate the average number of frames required to transmit a single packet as in Equation (20) 4: The approximate latency of an M2M user is found using Equation (22) 6.3 Algorithm complexity We now discuss the problem complexity of the three algorithms as stated above. It can be seen from Algorithm 1 that it is linear in the number of users due to the linearity of the equations involved. Though Equations (14) and (15) in Algorithm 1 are complex yet we have them available in closed-form and so complexity is not an issue. Similarly, in Algorithms 1 and 2, we provide every mathematical equations in closed-form and the values can be calculated in linear complexity. 7 SIMULATION RESULTS DISCUSSION AND ANALYSIS 7.1 Performance investigation Following our model in Section 3, our communication network simulation test bed consists of one M2M gateway with n M2M nodes connected to the gateway in a cellular environment. We consider two different scenarios for the performance investigation, one in which all M2M devices have the same SNR and a second, in which they have different SNRs. Under each of these scenarios, we use a traffic model similar to [32] as shown in Figure 2 which generates packets randomly at time τ. After τ, subsequent packets are generated periodically at T [ ms ] . The packets are queued in the buffer and are scheduled when the respective M2M devices meet the scheduling condition discussed in Section 4. If packets are delayed in the buffer beyond the packet generation interval they are dropped making our traffic model delay-sensitive. We compare the performance of our scheduler, called SNR Threshold Scheduler (THS) with RRS, MTS and PFS. In RRS the same priority is given to allocating the same number of resource blocks (RBs) to each user in an ordered manner to maintain fairness. The MTS, on the other hand, allocates a different number of RBs to users based on their respective channel quality to maximise average throughput. The PRS allocates RBs to users with the best relative channel quality by keeping track of the average throughput of users in a past window to balance the maximisation of throughput and fairness. The performance measures considered for the respective scenarios include energy efficiency, latency, and the ratio of packets not successfully transmitted. The packets which are not successfully transmitted are those which were delayed in the buffer beyond the packet generation interval. FIGURE 2Open in figure viewerPowerPoint Traffic model explanation The simulation parameters are summarised in Table 2. The performance of the different SNR scenario for the energy efficiency, latency and reliability are respectively shown in Figures 3– 5. The average SNR in dB for M2M devices in this scenario are 44.77, 43.39, 42.01…7.53, 6.15, 4.77. As seen from Figure 3, the energy efficiency of our scheduler increases with a growing threshold, outperforming the other schedulers when the threshold is sufficiently large. It can be seen from Figures 3 and 4 that energy efficiency and latency increase respectively with growing threshold while reliability decreases as shown in Figure 5. Thus, THS is trading off energy efficiency for latency and reliability which means that for low latency and high reliability to be achieved, some energy efficiency has to be sacrificed. The increase in latency and decrease in reliability for THS as seen in Figures 4 and 5 is due to the fact that devices have to wait for some time for their SNR to meet the condition for scheduling. Energy is thus wasted by the devices while waiting to achieve the minimum SNR requirement of our scheduler. Therefore, it will be necessary to account for the loss of energy during idle time which has not been given much attention in the literature. As seen from Figure 4, MTS achieves the lowest latency with THS better than PFS and RRS until beyond threshold values of 2.08 and 2.79, respectively. In terms of reliability from Figure 5, the ratio of packet drop rate for THS and MTS are the same until a threshold value of approximately 1 where that of THS increases but is still better than that PFS and RRS until beyond threshold values of 1.89 and 2.55, respectively. However, a careful look at Figures 3– 5 reveals that for better performance to be achieved, our THS scheduler is the choice when operated at lower threshold values. TABLE 1. Summary of scheduling algorithm Paper Metric Technique Advantages Disadvantages Evaluation Tool [22] Energy efficiency. Bandwidth utilisation. Drop rate. Charnes–Cooper transformation and Glover linearisatio

Referência(s)