A tandem queueing model for delay analysis in disconnected ad hoc networks

Ahmad Al Hanbali*, Roland De Haan, Richard J. Boucherie, Jan Kees Van Ommeren

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations


Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-tolerant networking which exploits the mobility of the nodes by letting them operate as relays according to the store-carry-and-forward paradigm. In this work, we analyze the delay performance of a small mobile ad hoc network by considering a tandem queueing system. We present an exact packet-level analysis by applying ideas from the polling literature. Due to the state-space expansion, this analysis cannot efficiently be applied for all model parameter settings. For this reason, an analytical approximation is constructed and its excellent performance has extensively been validated. Numerical results on the mean end-to-end delay show that the switch-over time distribution impacts this metric only through its first two moments. Finally, we study delay optimization under power control.

Original languageEnglish
Title of host publicationAnalytical and Stochastic Modeling Techniques and Applications - 15th International Conference, ASMTA 2008, Proceedings
Number of pages17
StatePublished - 2008
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5055 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


  • Ad hoc networks
  • Autonomous server
  • Delay-tolerant networking
  • Performance analysis
  • Tandem queueing model

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)


Dive into the research topics of 'A tandem queueing model for delay analysis in disconnected ad hoc networks'. Together they form a unique fingerprint.

Cite this