The ratio model between throughput and delay based on payload transmission time in wireless blockchain network

In wireless blockchain network (WBN), it is necessary to study the impact of delay performance on blockchain technology with different data rates, because the throughput performance is not the only goal. We propose an analysis model to evaluate network performance based on both delay performance and network performance. Firstly, we separate the communication process from business process in WBN, and package the business data into the payload in a frame. Secondly, we define throughput-time \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S_V$$\end{document}SV as a ratio of throughput to data transmission rate and propose a ratio model of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S_V$$\end{document}SV to network delay. Then, we analyze the ratio model with the parameter of payload transmission time, which is defined as a ratio of payload in a frame to data transmission rate. Using the DATA/ACK type in IEEE 802.11, we learn that the optimal payload transmission time is independent of node number and only determined by some interframe space of access mechanism and propagation time. Finally, we analyze the performance of network delay and throughput between DATA/ACK type and RTS/CTS/DATA/ACK type based on payload transmission time. The simulation data verify the validity and accuracy of the proposed model.

of throughput performance. Although throughput and network delay are two main parameters of DCF mechanism, they cannot be directly used to evaluate performance of WBN. In fact, there are two problems that need to be solved. One problem is the impact of different data rates on performance evaluation in heterogeneous devices; Another problem is the independence of data transmission process and business process of blockchain technology, as well as the balanced performance of throughput and delay.
In this paper, we try to find the optimization scheme of access parameters based on delay performance. We focus on the different data rates of heterogeneous devices in WBN, and analyze the impact of variable payload length on the balance relationship between throughput and delay. From the communication perspective, we simplify the business process of WBN, and package the business data into the payload in the medium access control (MAC) frame during performance analysis. Also we introduce the parameter of payload transmission time, which can cover the difference of multiple data transmission rates. Then, we analyze the different increase rates of throughput and network delay based on the payload transmission time. We want to find a balance that delay performance can determine access parameters and obtain a higher increase rate of throughput than that of network delay.
The rest of the paper is organized as follows. We first introduce data process and business process of blockchain technology in "Preliminaries" section. We then briefly describe the state of the art of in "State of the art" section. In "Ratio model based on payload transmission time" section, we propose a ratio model of throughput to network delay, followed by the analysis of the optimal payload transmission time and the limitation of requestto-send/clear-to-send (RTS/CTS) type based on the payload transmission time. Simulation, numerical results and analysis are shown in "Simulation and analysis" section. Finally, "Conclusion" section concludes the paper.

Preliminaries
In this section, we first introduce the data exchange process in DCF mechanism. Then, we give the business process of blockchain technology and some simplifications.

Data exchange process in DCF.
The main mechanism is the DCF mechanism in IEEE 802.11. Before sending a data frame in DCF mechanism, the source node can use a handshaking technique, known as RTS/ CTS, to reserve the channel. The usage of RTS/CTS frames is intended to reduce the collision time before sending long data frame. The DCF mechanism provides two types of data exchange: RTS/CTS/DATA/ACK type and DATA/ACK type. We start our analysis with DATA/ACK type as shown in Fig. 1, in which the data frame length directly affects network performance of throughput and network delay.
During the DATA/ACK type, nodes sense the states of channel before sending data frames. If the channel is idle, nodes with a frame will decrease one value of the backoff window. When the value of backoff window is zero, the tagged node begins to send a frame. If the tagged node gets the ACK frame, it will initiate a new frame transmission as shown in Fig. 1a. If the tagged node doesn't receive an ACK frame, there may be a collision in the channel in Fig. 1b. If other nodes detect a busy channel state, they freeze all activity and wait for the duration of a successful data transmission time or collision time.
In the decrease process of backoff window, there are some activities of other nodes in the channel, like idle event, collision event and successful transmission event. If there is a successful transmission, the tagged node needs to stop the decrease process of backoff window for an additional period of time named distributed inter-Frame space (DIFS) ( T DIFS ). For collisions in the channel, the tagged node will wait for an additional period of time named extended interFrame space (EIFS) ( T EIFS ) beyond the duration of collision events. The additional time of T EIFS and T DIFS will increase the network delay. The more activities other nodes have, the longer the network delay will be.
To decrease collision probability, nodes should have large and different backoff windows. Because the backoff window is randomly selected from the contention window (CW), the range of CW is an important parameter. W max denotes the maximum value of CW and W min is the minimum value of CW. It is a key step to adjust sizes of CW from W min to W max . The CW size ( W i ) of the ith data transmission increases in an exponential mode until reaching the maximum value W max .  We can see that LNs, FNs and AP have some unique data to process before transmitting different messages, which is the business feature of blockchain technology. We separate the data transmission process from the business process of blockchain technology. This means that the data transmission process only includes sending and receiving data. Transaction generation, storage and validation are not in the process of data transmission. These messages transmitted by LNs, FNS and AP are payloads in MAC frames. These payloads are transparent to the data transmission processes. We mainly analyze the performance of data transmission process and propose a new performance evaluation method that compromises throughput and delay in WBN.

State of the art
We define the network delay (or delay) as the time interval between the time when the packet reaches the head of the transmission queue and contends for the channel, and the time when the node receives the corresponding ACK frame. The throughput is defined as the payload transmitted during the network delay. Generally, the throughput performance of access mechanism is the only goal and there are two ways to improve throughput performance: one is to optimize the access mechanism for the lower collision probability of data transmission; The other is to increase the duration of data transmission. An analytical model 12 based on Markov chain model is proposed to analyze the saturation performance with access parameters like CW, which has been verified with a fixed payload (8184 bits) in a frame. Two steady-state operating points for the unsaturated networks and the saturated networks are proposed to analyze the performance with some access parameters, such as CW and cutoff (backoff) phase 13 . An adaptive access mechanism is analyzed 14 , which presents an optimal size of CW about the node number. These works mainly focus on analyzing and optimizing access parameters to reduce collision probability of data transmission. Some technologies, like methods of frame aggregation and transmission opportunity (TXOP), are used to obtain the maximum throughput. These methods of frame aggregation and TXOP can minimize the communication overhead of control frames and increase the duration of data transmission in the channel. These frame aggregation methods allow aggregating MAC frames into larger ones to be sent within a single TXOP. The TXOP methods allow node to sequentially transmit multiple frames within a parameter TXOP limit . The frame aggregation and TXOP can interact with each other and increase the throughput performance 7,15 . The two-level frame aggregation, the optimal length of frame aggregation and aggregation efficiency are analyzed under some conditions, such as, different data rates or BERs [16][17][18] . However, the network delay is not an independent metric to evaluate network performance, but just another expression of throughput performance, which can be calculated based on the throughput performance. The parameter TXOP limit settings and TXOP sharing mechanism are analyzed to meet the needs of different services and maximize the throughput of differentiated traffic 19 . The method of Block ACK is analyzed to reduce the exchange of control frames [20][21][22] .
In order to improve throughput, access parameters are usually optimized, such as reducing collision probability or prolonging payload transmission time. In the simulation of DATA/ACK type, 33bytes, 40bytes, 1000bytes, 1023bytes, 1500bytes and other regular effective data lengths are usually adopted 12,14,21,23 . Although these chosen data are used to verify the correctness of the optimization schemes in throughput performance optimization, their lengths have no clear meaning.
In WBN, the delay is more important and needs deeper study. However, there is no effective optimization scheme of access parameters based on delay performance. Queuing delay and consensus delay are analyzed 10 , and there is no distinguish between business content and data transmission process. Due to the mixing of business process of blockchain technology and data transmission process, the complexity of analysis is increased. The communication delay between lightweight IOT devices and blockchain nodes is analyzed 24 . However, there are few www.nature.com/scientificreports/ methods for wireless delay optimization. Delay is usually another calculation of throughput performance. That is, after obtaining the optimal throughput, relevant access parameters are used to calculate delay. In WBN, the main method also focuses on throughput performance optimization. Based on the throughput performance and delay performance, the scalability limitation of blockchain is studied on block size and block interval 4,25,26 . The deferred execution mechanism is analyzed to get stable sequential blocks for better throughput performance 25 . Four block access control methods are studied, and a discard strategy is proposed to remove forked blocks 3 . The consensus mechanisms of PoW and PoS are studied [27][28][29] .
If the transmitted data is large, RTS/CTS frames can be used for channel reservation. The use of RTS/CTS frames can decrease the probability of data retransmission for higher throughput 5,10 , and the normal reason is the large collision duration of data frame, which means the used RTS/CTS frames have short duration of transmission if collisions occur. With the increased data transmission rates, the collision durations caused by data frame decrease and the overhead of RTS/CTS frames will maintain a high percentage in the data transmission cycle. Based on the simulation experiment, the relationship between throughput performance and RTS threshold is analyzed 30 ; The dynamic adjustment of RTS threshold is analyzed 31 by conducting an experimental characterization of RTS/CTS as a function of packet size, transmission rate, and network contention. The calculations of RTS threshold in bits are proposed 32,33 , and the effects of successful transmission probability, control frame rate and data transmission rate on RTS threshold are analyzed. The function of RTS/CTS frames can also be applied together with other technologies, such as compressed sensing technology 34 . Relevant application scenarios include frequency domain 35 , linear ad hoc network 36 , high-speed train 37 , data privacy and security [38][39][40][41] . For different transmission rates, the RTS threshold defined in time will be more fit. Once the protocol is chosen, the control frame rate and collision probability can also be considered as constants. Therefore, the analysis based on payload transmission time will be more valuable.
Once the protocol or optimization scheme is determined, the access parameters will also be fixed. With the increase of payload length and different data transmission rates, it is complex to analyze and evaluate the network performance. How does the payload length in a frame affect the network performance? Is the throughput increase rate equal to the network delay increase rate? A single parameter of throughput or delay cannot be used to evaluate the optimization scheme. Based on the payload transmission time, we propose an evaluation method combining throughput and delay, then the effectiveness and correctness of the evaluation are analyzed and verified.

Ratio model based on payload transmission time
We assume that every node is saturated, which means each node always has data to send. We also assume nodes transmit with the DATA/ACK type. Firstly, we propose the ratio model of throughput-time to network delay. Secondly, we analyze the optimal payload transmission time based on the ratio model. Lastly, we compare the network performance between RTS/CTS/DATA/ACK type and DATA/ACK type.
Ratio model of throughput to network delay. Analysis of network delay. According to the data exchange of DATA/ACK, we have the successful transmission time T S and collision time T C as where σ is the propagation time. T SIFS denotes the duration of the Short InterFrame Space (SIFS). t DATA is the payload transmission time in a frame, which is the main interest in this work. T HEAD and T ACK denote transmission time of frame headers and transmission time of ACK frame respectively. There are two parts in the frame header length: One part is the PHYsical header length T PHY HEAD , and the transmission rate is the same as the control frame rate. Another is the Medium Access Control header length T MAC HEAD , using the same rate as data transmission rate. The time of frame header is where T PHY HEAD is determined by the control frame transmission rate. Since the control frame transmission rate is basically fixed, T PHY HEAD is usually constant. The data transmission rate will take different values according to the network conditions. Therefore, the value of T MAC HEAD is dynamic. For given the data transmission rate, frame header length T HEAD is fixed, and then the length of the transmitted frame can easily be calculated with values of the payload length.
We analyze states of busy channel and have where τ is the attempt probability that a node transmits in randomly chosen slot time. p is the conditional collision probability that means probability of a busy channel.
are probabilities of collision and successful data transmission respectively. With the conditional collision probability p, the CW minimum value W 0 , the maximum transmission number K, the backoff stage m and the backoff multiplier factor , we have www.nature.com/scientificreports/ The calculations of p and τ can establish a fixed point formulation by using numerical techniques. Then, the values of p C and p S can also be calculated.
Since nodes randomly choose numbers of backoff window in the range of CW, the mean sizes of backoff window are important for the decrease process of backoff window. Let E[U (j) ] denote the mean sizes of backoff window and it means the average waiting slot numbers before the jth transmission attempt. We have where W 0 is the initial CW size.
We start from the performance of network delay, and get the calculation of network delay E[D] as and (p S · T DIFS + p C · T EIFS + T SLOT ) as π 1 , π 2 and β 1 respectively. π 1 is the mean value of slot that the tagged node needs to wait for to complete a data transmission with the parameter of conditional collision probability p and transmission attempts K. β 1 · π 1 represents the idle channel duration due to no data transmission. T S · (p S · π 1 + 1) means the duration of the successful data transmissions. T C · (p C · π 1 + π 2 ) means the duration of the collisions in the channel.
We have network delay as According to a steady network with known node numbers, these values of parameters π 1 , π 2 and β 1 are normally fixed, and these values of parameters can be assumed to be constant for normal analysis. Other parameters, like T HEAD , T SIFS , T DIFS and T ACK , are predefined and cannot be optimized. t DATA is the payload transmission time and its value is equal to the ratio of payload to data transmission rate.
In (9), we find that there is a linear relationship between network delay E[D] and the payload transmission time t DATA . If t DATA = 0 , no packet is sent successfully, and the value of network delay is not equal to '0' for some control frames exchange. The value of network delay increases with the increase of t DATA . The short time of t DATA means the short transmitted payload length. The long time of t DATA means the long payload length. Only based on the performance of network delay, we cannot conclude the optimal payload length and the payload transmission time t DATA . Then, we further analyze throughput performance.
Ratio of throughput to data rate. According to 14 , we have a calculation of throughput as where E[P] is the transmitted payload in a frame. The E[P](1 + p S · π 1 ) represents all successfully transmitted data. The E[D] means the network delay. The calculation of throughput in (10) is closely connected with network delay. However, E[P](1 + p S · π 1 ) only represents the received payload and has nothing to do with data transmission rate, which means that it does not reflect any information related to data transmission rate. The difference of throughput in (10) caused by multiple data transmission rates cannot be analyzed carefully.
To analyze the throughput performance with different data transmission rates, we define a parameter of throughput-time S V that means a ratio of throughput to data transmission rate. Let V(t) denote the data transmission rate. We have For given access mechanism, S V is a function of payload transmission time t DATA in (12), which means the sum of the total time used to transmit the payload during the mean value of network delay. The throughput-time performance increases as the t DATA increases in a reasonable values range. The maximum value of S V is approximately equal to 1+p S ·π 1 1+p·π 1 +π 2 with large t DATA (t DATA ≫0) . The larger the t DATA value is, the longer the throughputtime performance has. The large t DATA value means long payload length, which is also limited by memory space and is not suitable for practical application. Because of the linear relationship between S and S V ( S = S V * V (t) ), we do not strictly distinguish the performance between the throughput and the throughput-time in this paper.
Ratio model of throughput-time to network delay. Combined with analyses of network delay in (9) and throughput-time S V in (12), there is only one variable parameter t DATA in throughput-time and network delay. Then, we further analyze the relationship between the increase rate of S V and the increase rate of network delay with the increase of payload transmission time.
We define a ratio model of throughput-time S V to network delay E[D] as In (13), we propose an analysis model considering throughput-time and network delay, which is a new evaluation metric. In this evaluation metric, network delay and throughput-time (throughput) play the same important function, and there is only one variable parameter t DATA . By establishing the analysis model in (13), we further analyze the throughput-time S V and network delay with parameter of payload transmission time. Combined with (9) and (12), we can have According to the analysis model of (14), there is only one variable parameter t DATA in a steady-state network. If the data exchange protocol is determined, all access parameters are known, and the payload transmission time will be the main parameter to determine the throughput-time and network delay performance. We will further analyze the different increase rates between throughput-time and network delay with the variable parameter t DATA .
Optimal payload transmission time. The analysis model in (14) has two main questions to be answered: Question One: When the payload transmission time t DATA changes, is there a balance between the high increase rate of throughput-time S V and the low increase rate of network delay? That is, whether there is a turning point between the increase rate of throughput-time and that of network delay. We try to find the range of parameter t DATA that has higher increase rate of throughput than that of network delay, and then we can evaluate the performance with low network delay and high throughput. Question Two: Does the balance point have practical values? If the payload transmission time in a frame is too long or too short, it cannot be used in practical applications. We further analyze the effect of payload transmission time on throughput and network delay performance.
Trend analysis of ratio function. With an assumption of continuous values of t DATA , we can get a first-order derivative of F(t DATA ) as where G(t DATA ) = (1+p s ·π 1 )(1+p·π 1 +π 2 ) (t DATA (1+p·π 1 +π 2 )+β 2 ) 3 > 0 and g = β 2 (1+p·π 1 +π 2 ) > 0. Once the data exchange protocol is determined, the parameters of G(t DATA ) and g can also be considered as constants, and there is only one variable parameter t DATA in (15). Obviously, F ′ (t DATA ) is continuous with the assumption of continuous t DATA > 0 . We have According to (16), the values of F ′ (t DATA ) are larger than '0' if t DATA < g and the values of F ′ (t DATA ) are smaller than '0' if t DATA > g . We have a conclusion that F(t DATA ) can reach the maximum value when t DATA = g . There is a balance between the increase rate of S V and the increase rate of network delay with increase of t DATA . When values of t DATA are smaller than g, the increase rates of S V will be higher than that of network delay and it's better to increase the payload transmission time t DATA to get better throughput performance. When values of t DATA are larger than g, the increase rates of S V will be lower than that of network delay, which means that the (12) = t DATA · (1 + p S · π 1 ) t DATA · (1 + p · π 1 + π 2 ) + β 2 www.nature.com/scientificreports/ increase rate of network delay will be higher than that of the S V with increased t DATA although the throughput may have larger values. In (13), we present a performance analysis model considering both throughput and network delay. In this model, we obtain a balance point that the increase rate of throughput is higher than that of delay. By selecting values of payload transmission time, we can obtain the network delay and the throughput for given an access mechanism. The network delay is an important parameter that can be used to evaluate the network performance. For 'Question One' as described above, we can answer: When the payload transmission time t DATA changes, there is a balance between the large increase rate of throughput-time S V and the low increase rate of network delay.
Payload transmission time of DATA/ACK type. Based on parameters of DATA/ACK type in IEEE 802.11, we can get an approximate calculation of g as According to (17), the optimal payload transmission time is independent of the number of nodes, and its value is determined by the access mechanism parameters and propagation time. The SIFS, DIFS and EIFS have an effect on the calculation of payload transmission time g. With multiple data rates, the optimal payload transmission time keeps the same, although the optimal values of frame length are different. For given data transmission rate V(t), we further calculate the optimal payload length L optimal payload as In the calculation of payload length (18), the data transmission rate V(t) is high and will be higher, although the payload transmission time g is constant and short. The higher the data rate is, the longer the payload length will be. We do not discuss the longer payload length and long propagation time in this work. Obviously, the optimal value of g is not too large based on the parameters of IEEE 802.11, and the frame length is not too long for some data transmission rates. For 'Question Two' as described above, we can answer: For some data transmission rates that are not very high, the optimal payload transmission time can be used in practical applications.   If the payload transmission time is shorter than h t , the DATA/ACK exchange type is more effective than the RTS/ CTS/DATA/ACK exchange type due to the shorter network delay. In this case, the exchange time of control frames (RTS/CTS frames) occupies large percentage in a data transmission cycle, and the payload transmission time is too short. We conclude as

Analysis between RTS/CTS/DATA/ACK and
In (25), we analyze ranges of payload transmission time based on delay performance between RTS/CTS/ DATA/ACK type and DATA/ACK type. As above analyses, the value of h t is an important threshold for determining the usage of RTS/CTS frames. According to (24), we can learn that h t contains some control frames transmission time and ratio of successful transmission probability to collision probability. Normally, the transmission time of these control frames and interframe spaces are fixed for any network sizes. The successful transmission probability and collision probability, however, vary with different network sizes. The analysis in (24) shows a more accurate RTS threshold than that in 32,33 .
In this section, we analyze the ratio model of throughput-time to network delay based on the payload transmission time, which eliminates the difference of data transmission rate and can effectively evaluate the performance of throughput and network delay. The ratio model is a convex function, and its maximum value means that the increase rate of throughput is higher than that of the network delay. The optimal payload transmission time is short and the corresponding payload length can be used in practical application. We further analyze the network performance between RTS/CTS/DATA/ACK type and DATA/ACK type based on the payload transmission time. Using the ratio model, we can optimize the access scheme in WBN and adjust the access parameters according to the delay performance. (23) h t = (T RTS − T HEAD )

Simulation and analysis
Results of payload transmission time. We verify the ratio model of S V to network delay in the OPNET modeler. Each node always has data to send and exchanges the data exchange with the DATA/ACK types. The characteristic of physical layer is the direct sequence spread spectrum. In this section, we set the transmission rate of control frames as 1 Mbps. The transmission rates of data frames are 5.5 Mbps and 11 Mbps. We give the analysis results at 11 Mbps. Based on (17), we can obtain g ≈ 637 µs , and the payload length is equal to 876 Bytes at 11 Mbps data rate. We select 1023 Bytes as a referential payload length in a frame 12 , which is 744 µs for 11 Mbps data transmission rate. We calculate and select 876 Bytes/637 µs as the optimal payload length/payload transmission time. The full payload transmission time and frame lengths are listed in Table 1. We list the main simulation parameters in Table 2 and get results in Fig.2..
As shown in Fig. 2, the throughput (throughput-time) performance and network delay performance increase with the increase of payload transmission time, corresponding to the increase of payload length in the frame. With the increase of payload transmission time, the ratio curves of S V to network delay have the same change trend. They increase firstly to reach the peak value, and then decrease. The peak values appear at the same value of payload transmission time for network with different node numbers, which confirms the correctness of the analysis in this paper. Due to the lower collision probability, the data of 40 nodes are higher than that of 50 nodes in Fig. 2c,d, which means that throughput/(network delay) of 40 nodes is larger/(shorter) than that of 50 nodes.
The errors between the analysis results and the simulation results at 11 Mbps data rate are due to the cumulative errors caused by the separate analysis method of network delay or throughput-time. With larger values of payload transmission time than the peak value, the network delay has higher increase rate than the throughputtime does, although the throughput will increase with long payload length. The main reason for the higher increase rate of network delay may be the long judgment time of collision event. Based on the curves, we get two points: One is that there is a peak ratio of S V to network delay; The other is that the peak value is independent of node numbers and data rates, and its value is determined by the access mechanism parameters and propagation time.
Results between RTS/CTS/DATA/ACK type and DATA/ACK type. We can learn in (4) that the probability of busy channel p increases with the network nodes, and it means that more nodes lead to larger values of p. Due to p = p S + p C , the collision probability p C increases faster than the successful transmission probability p S with increase node number in the network. The more number of nodes there is, the lower the ratio of successful transmission probability to collision probability will be. With parameters in Table 2, we give the payload transmission time and payload length in Table 3. The simulated data are shown in Fig. 3.
As shown in Fig. 3 We also obtain similar results in Fig. 3c for 100 nodes network. There are two reasons: One is that the RTS/CTS frames can indeed reduce the collision duration of long payloads; The other is that the collision probability is high enough to exceed the overhead of the RTS/CTS frames exchange.  www.nature.com/scientificreports/ From above results, we can learn that the ratio p S /p C of 100 nodes is lower than that of 90 nodes, which means that the threshold L payload (100 nodes) is smaller than the threshold L payload (90 nodes) . The throughput performance of DATA/ACK type is better than that of RTS/CTS/DATA/ACK type when the payload transmission time is shorter than h t . It can be inferred that when the data rates are higher (larger than 11 Mbps), the DATA/ACK type is better for data transmission, and the throughput performance and delay performance are better than that of RTS/CTS/DATA/ACK type. In WBN, the business data of blockchain technology exchanged at one time are not large, and the transmitted payload in one frame will not be too long. Because the throughput performance is not the only goal, we can analyze the network performance based on the payload transmission time in networks with different data rates. Based on the above analysis results, we can select the suitable payload length for better throughput performance and delay performance by DATA/ACK type.

Conclusion
In WBN, delay performance is very important, and throughput performance is not the only goal. We have proposed an analytical model that the delay performance and throughput performance are equally important, which can be used to evaluate the network performance in networks with different data rates. We have separated the data transmission process from the business process of blockchain technology. We have proposed a ratio model of throughput-time to network delay. We have studied the performance between throughput and delay at different data transmission rates in WBN. We have obtained the optimal payload transmission time, which can be used for the optimization scheme of access parameters in WBN. Based on the DATA/ACK type, we have analyzed the different increase rates between the throughput-time and network delay with the increase of payload transmission time.
The data transmission process involves network status, throughput performance and delay performance. Communication throughput includes transaction throughput. Communication delay generally does not include transaction delay. Because the transaction delay contains an important processing delay, the processing delay is much longer than the communication delay. Based on the ratio model proposed in this paper, the performance of communication throughput and transaction throughput will be significantly affected if the communication delay includes or does not include transaction delay. The relevant conclusions in this work can be used to analyze consensus mechanisms and forks caused by delay, like in blockchain security and resource-limited network. For blockchain securities, especially the process level security, the delay reflects the network state and should further constrain (increase or decrease) the throughput performance. The constrained devices can send the computing requirements to the cloud, thereby constructing an access network based on the edge cloud. Next, we will focus our interest on the consensus mechanisms and blockchain securities.

Data availability
The datasets used and/or analysed during the current study available from the corresponding author on reasonable request.  In a network of 100 nodes, we get the payload length of 100 nodes L payload (h 100 t ) = 1771 (Bytes) , which is shorter than the payload length of 90 nodes L payload (h 90 t ) = 1862 (Bytes) . When it is smaller than the threshold h t , the throughput performance and delay performance of DATA/ACK type are better than that of RTS/CTS/DATA/ACK type.