You are on page 1of 6

2019 IEEE 4th International Conference on Computer and Communication Systems

A Performance Analysis of the Data Gathering Model for Unslotted CSMA/CA in


Home Automation Environment

Mais A. Khalil David R. Siddle


Engineering Department Engineering Department
University of Leicester University of Leicester
Leicester, United Kingdom Leicester, United Kingdom
e-mail: makk2@leicester.ac.uk e-mail: drs13@leicester.ac.uk

Abstract—The medium access control (MAC) protocol attention, driven by an increased number of wireless
provided by the IEEE 802.15.4 standard (contention-based autonomous devices, the expansibility of the internet and a
CSMA/CA scheme) is not tailored to supply the QoS support drive to reduce errors and increase efficiency [6]. However,
demanded by real-time applications because of collisions, the IoT paradigm has spread out since to accommodate any
especially under high loads. The Internet of Things (IoT) object which has the capability to interact directly with its
exemplifies a networking paradigm which requires the regional neighbors. In this context, the Internet can be
incorporation and interoperability of diversified wireless regarded as a backbone network that connects a large
standards. Data delivery across such integrated frameworks number of smaller peripheral networks, each of which would
encounters challenges in terms of scalability and latency
group physical objects according to their physical properties
among other aspects. As a comprehensive analysis addressing
such constraints is not available, we have developed a new
and neighborhood relationships. In a standard WSN topology,
technique for data gathering and have performed experiments if every end node communicates directly with the access
to explore its effect on scalable network efficiency. The point, ignoring the neighbor nodes in the network and data
experimental network consisted of Waspmotes, programmed delivery mode, then the communication load would cause
in C++ in a scalable star topology, emulating a typical home performance degradation in throughput and latency and
IoT network. Performance parameters of the MAC layer were exhaust the system’s power resources. Therefore, the aim of
measured while varying the network size and sending this study was to investigate through experiment, what was
technique in non-beacon transmission mode. Results show that the best delivery technique in a scaled star topology network
network performance varies greatly with different delivery that could be later on applied in an IoT environment such as
modes, providing a theoretical basis for improving network a smart home environment.
structure in smart home applications.

Keywords-WSN; CSMA/CA; delivery modes; IoT

I. INTRODUCTION
A wireless sensor network (WSN) is a collection of
nodes deployed to measure and report certain parameters in
applications such as environmental, biomedical, surveillance
and security. Each sensor node consists of sensing,
processing, power and radio units [1], [2], [3]. Sensor nodes
report to specific sink-nodes which then convey information
to the internet. Fig. 1 depicts this WSN model [4].
Different data collection methods are used in a WSN, Figure 1. Multi-hop wireless sensor network model.
depending on the application. In an event-driven network,
the reporting process is triggered by one or more sensor II. RELATED WORK
nodes which observe an event and relay it to the monitoring
The MAC layer provides two different modes of channel
station. By contrast, in a demand-driven network the
access operation: the beacon and non-beacon mode. In the
reporting process, is initiated by the monitoring station and
non-beacon mode, the unslotted CSMA/CA mechanism is
sensor nodes report their data in response to a specified used to postpone for a random period of time and sense the
request. In a time-driven network, each sensor node sends channel before the packet transmission. The sensor node can
data in a periodic manner. A wildlife-monitoring WSN in a send the packet only when the channel is sensed to be idle.
forest is likely to be event-driven, whereas an inventory Otherwise, it delays for another random time period and
control system will probably be demand-driven. A hybrid checks the channel again. However, beacon mode (i.e with
system is one that can manage both classes, event and slotted CSMA/CA), comprises a Superframe structure with
demand-driven. an optional reservation-based mechanism called guaranteed
The Internet of Things (IoT) was first conceived by the time slot (GTS) [7] which is out of the paper scope. Diverse
MIT Auto-ID Center [5] and has acquired considerable research studies and analytical models for performance

978-1-7281-1322-7/19/$31.00 ©2019 IEEE 624


evaluation of the IEEE 802.15.4 have been proposed so far. association/disassociation. The coordinator acknowledges
The vast majority of these explorations take into account the the successful reception of the data by transmitting an
slotted version of the protocol, while the non-beacon mode optional acknowledgment frame. The transaction is now
(that is unslotted CSMA/CA) has attracted much less complete. This sequence is illustrated in the Fig. 2.
attention. though considerable divergence exists between the
two versions of protocol, the methodology adopted for the
analysis for both techniques share some similarities.
Therefore, we overviewed the most relevant work on the two
modes in terms of different IEEE802.15. 4 performance
metrics.
The influence of routing and multi-hop transmission on
both latency and power consumption in the slotted MAC
protocol was explored by Persia and Cassioli [8]. Buratti and
Verdone [9] determine the packet latency and packet
delivery ratio for N sensor nodes that try to report a single Figure 2. Communication to a Coordinator in a non-beacon-enabled PAN.
packet simultaneously to the gateway. Martelli et al. [10]
extended this work by taking into account the hidden node Zhang and Luo [15] proposed similar work, using
problem using the theory of stochastic geometry. However, different network topologies for different network size and
neither of these studies consider the effects of load. However, they didn’t consider the influence of network
acknowledgements and retransmissions. Guglielmo et al. [11] size and data delivery mechanism specifically on the star
consider unslotted CSMA/CA in event-driven applications topology. The goal of this paper is to fill this gap by
and assume that, when an event is detected, all (or a vast investigating the impact of data delivery model on the WSN
majority of) sensor nodes in the network begin sending data efficiency in terms of delay and packet delivery ratio.
simultaneously. A similar scenario is considered by Cao et al.
[12] provide an accurate model of 802.15.4 CSMA/CA III. CLASSIFICATION OF MAC PROTOCOLS IN WSNS
(which explores both the case with and without The main requirements of a traditional wireless network
retransmissions) and validate it extensively over simulations, MAC protocol are low latency, scalability, and high
but provide no experimental validation. Cao et al. in [12] bandwidth utilization leading to a good throughput. MAC
provide an analytical model concentrating on the periodic protocols can be classified into two fundamental categories
traffic in the slotted version of 802.15.4 CSMA/CA and this [16]: schedule-based protocols and contention-based
differs completely from the unslotted version in [11]. protocols.
Regarding data gathering techniques, Campobello et al. The protocols in the first category are essentially Time
in [13] introduced a simple analytical model to predict the Division Multiple Access (TDMA) protocols. In the
energy efficiency and reliability of different techniques. initialization period of TDMA protocols, the transmission
Simulation and analytical results show that the trade-off schedule is distributed by a centralized (master) node. After
between energy consumptions and reliability could drive the the initialization period, no control packets are required, so
choice of the data gathering technique to be used. The four- there is no overhead. TDMA protocols are collision free and
dimensional Moulik et al. [14] use Markov chain-based function best in single-hop networks environment. They
analysis of slotted CSMA/CA, including backoff-freezing adhere to rigid synchronization among nodes in order to
and acknowledged packet transmission to evaluate the coordinate node transmission slots. TDMA-based
effects of the inactive portion of a superframe on average mechanisms are not adaptive. Once the transmission
delay, and average power consumption. This work provides schedule is achieved, it cannot be altered to accommodate
optimized superframe order values that achieve trade-offs newly joined nodes. TDMA protocols suffer from a
between delay and power consumption as demanded by user- scalability problem. They cannot support a large number of
provided QoS requirements, corresponding to different nodes because of a significant increase of the latency with
contexts and scenarios. It should be noted that all the the number of nodes.
previous studies analyze the performance in either time- The second category of MAC protocols are Contention-
driven slotted CSMA/CA or event-driven unslotted based protocols which are basically Carrier Sense Multiple
CSMA/CA WSNs without taking into account the effect of Access (CSMA) protocols [17]. In CSMA, wireless sensor
network size and sending technique on IEEE.802.15.4 MAC nodes sense the communication medium and postpone their
layer performance in terms of delay and packet delivery ratio. transmission in the case of busy channel. CSMA protocols
In this study, we applied time-driven applications and are adaptive so they can easily accommodate newly added
consider that all nodes send periodic traffic by non-beacon- nodes, do not require severe synchronization among nodes,
enabled transmission to the sink in a scalable star topology. and can support a large number of sensor nodes (scalable).
In this mode, the generation of periodic beacon frames is Multi-hop communication is easier to handle in CSMA
disabled. When a device wishes to transfer data in a non- algorithms than in TDMA ones. On the other hand, CSMA
beacon-enabled PAN, it simply transmits its data frame, suffers from packet collision and idle listening problems.
using unslotted CSMA-CA, to the coordinator. The PAN Collisions require retransmission of data, which results in
coordinator is responsible for handling only device waste of energy resources. Idle listening incurs energy use

625
while nodes are neither transmitting nor receiving data. Idle of the received data. It represents a sink and a cluster head
listening is a considerable cause of energy waste in WSNs. among cluster members. Fig. 3 explains the testbed
depleting 50% to 100% of the energy required for receiving architecture. The nodes were configured as shown in table 1:
[18, 19].
The preferred scheduling technique in WSNs is TDMA, TABLE I. CONFIGURE INFORMATION
since it is more reliable, does not require a complex Characteristic Value Characteristic Value
hardware design and allows inactive nodes to enter the sleep Transmission 18 dB (60.6 Beacon enabled disenabled
state. Hence it provides excellent energy savings, but is not power level mW)
scalable, nor adaptive to the dynamic changes of the number Transmission 2.4GHz BE min 0
of nodes in the network. Consequently, we developed an bands
improved MAC mechanism who is more reliable and take Data rate 250kbps NB max 4
Receiver -96 dBm Acknowledgement enabled
into account the aforementioned issues. Scalability. A MAC sensitivity mode
protocol should adapt and run properly in a dynamic and
scalable topology.
B. Parameter Setting
IV. IMPLEMENTATION OF THE ANALYSIS
The main performance parameters measured in this
In this study, the scalability and data delivery technique analysis were delay and packet delivery ratio (PDR). Delay
of a single-hop star topology is considered, with a PAN in the MAC layer represents the end to end delay of each
coordinator at the center of the network, using, 2, 10 or 30 packet received by the 802.15.4 MACs of all WPAN nodes
end nodes which only communicate with the coordinator in a in the network and forwarded to the higher layers. MAC
periodic transmission (one packet every 2 seconds) using layer notifies the upper layers about successful transmission
unslotted CSMA/CA. Each node with pending packets starts or deletion of MAC packet. Hence, the MAC layer delay is
the CSMA/CA algorithm in the active period of its duty defined as the time interval from the instant packet received
cycle to detect the channel and send the packets. by MAC layer to the instant notification about the final status
A. Physical Testbed Scenario of the packet sent. In applications sensitive to time, a long
delay would seriously affect the quality of communication.
The experimental network was based on the Libelium PDR, P is defined as the ratio of total number of the received
Waspmote as hardware platform [20], due to its energy Acknowledgements ACKs from destination and the total
efficiency and ease of programming it in C++. This is an number of generated packets by the source node (GPacks).
open source microcontroller board based on the Mathematically, this is computed as in equation (1):
ATmega1281 chip. The XBee module is deployed as a radio
communication for MAC and PHY layers of the IEEE ்௢௧௔௟஺஼௄௦
802.15.4 standard, while a temperature sensor is used as a ܲ ൌ ்௢௧௔௟ீ௉௔௖௞௦ (1)
sensing part for the sensor node. Backoff exponent (BE) is a
random number determines the random backoff interval
before sensing the channel. Maximum number of CSMA 1) Node scale effect on the network performance in
backoff (NB) or sometimes called (macMaxCSMABackoffs) terms of packet delivery ratio and delay: Packets are
is the number of times that the node stays in the backoff generated at each end node at a rate of 0.5 per second. The
stage after unsuccessful channel sensing before the packet round time is one minute which refers to the total duration
being dropped. of transmission setup and continuous data processing phase.
Each end node will send one packet at a time to the sink.
The comparison between the three network sizes in terms of
packet delivery ratio and average delay is illustrated in Figs
4 and 5 respectively.
The PDR is 100% for a small network and decreased
gradually to about 80% for the network with N=30. The
delay increased, slowly between N=2 and N=10, but almost
doubled as the size was increased to 30.
2) The effect of sending technique on performance of a
Figure 3. Analysis testbed architecture.
scalable network: This experiment has been implemented
Two sensor node prototypes have been applied in this for two periodic sending techniques. The first is to send one
analysis, the simple and the advanced cluster head. The packet a time every 2 seconds and the second technique is
simple node performs sensing and communication only, transmitting one block of 30 packets at a time every 1
without any processing capabilities. This node is composed minute (1 round time). These techniques applied CSMA/CA
of a temperature sensor (MCP9700A) plugged to method. As a result, each physical node will send 30 packets
ANALOG6 pin of Waspmote board. It sends data packets to per round for both cases. The average values of MAC layer
the cluster head in hierarchical topology. The advanced delay and PDR of the different sending modes with varied
cluster head node performs communication and processing

626
node size were shown in Figures 6,7, and 8. It seems clear
from Figures 6 that in case of small network (2 nodes) the
PDR is the same (100%). Nevertheless, the periodic sending
technique with one block at a time for small network suffers
from collisions that produce more delay when sending one
block a time than one packet at a time for the same network
size as shown in Fig. 8. Fig. 7 demonstrates the strong
influence of data delivery mode on the average delay in
medium network. Therefore, sending one block of data at a
time produces higher delay than applying the other data
delivery technique for a scalable network especially in case
of large node size.
Figure 7. Impact of delivery mode on average delay in three network
sizes.

Figure 4. The packet delivery ratio with changing node size.

Figure 8. Impact of delivery mode on the average delay in small network.

3) Dynamic CSMA Mechanism: The results of this


analysis show that the periodic sending scheme suffers from
scalability issue. As an assumption, if the TDMA algorithm
is applied, the large network will suffer from high latency in
case of diverse traffic conditions with saturated or
unsaturated traffic for end sensor node. In a saturated
network, at the end of each transmission a node always has
a new packet available to transmit. A node in unsaturated
Figure 5. The Average delay value with changing node size.
networks, can also be in an idle state, during which it is not
attempting to transmit a packet nor performing the
CSMA/CA algorithm. More specifically, in a traditional
TDMA node with unsaturated data will lead to worse
bandwidth utilization as well as incur delay due to an
unused time slot in case that there is no dense data to be sent
over the channel. In our work we assume different traffic
circumstances depending on variation in data temperatures
values for each end node. As an example, in an experiment
with 10 nodes, round time equal 1 minute the sensed data is
variable in each time (such as temperature). Each node
allocated time slot of 5 seconds, so in every round the total
Figure 6. Impact of delivery mode on the packet delivery ratio in three frame time will equal to 50,000 ms (5000 ms * 10 nodes).
network sizes. Total delay for Dynamic CSMA in first round equal to
39597 ms, hence the saved time is 10,403 (50000 – 39597).

627
Fig. 9 demonstrates total delay for Dynamic CSMA in first application requirements) so that the channel allocated for
round equal to 39597 ms, hence the saved time is 10,403 each end node will vary in each round. At the end of each
(50000 – 39597). round the coordinator will send periodic request to every end
The BE value set up to zero to disable collision node. The analysis evaluation has been done within 4 rounds.
avoidance since first iteration, and thus the waiting delay is End node will initiate data transmission upon receiving data
null because of free medium contention. An experimental requested packet. Before sending the last data packet to the
work has been achieved to implement the dynamic CSMA sink, the end node includes an indicator at the end of payload
which means that the amount of data captured in each end to declare data transmission termination. In return, the
node will be variable according to a specific rules coordinator continues to issue a new data request to the other
(temperature higher/less than a certain value depend on the end nodes.

Static time division technique total slot time for 10 nodes = 50,000 ms
(5000(ms)/node)

Dynamic CSMA technique total slot time for 10 nodes (first round) =
39597 ms (less than 5000/node)

Figure 9. Total transmission time for static TDMA and dynamic CSMA during first round.

The dynamic time in the improved technique will depend V. CONCLUSION


on the sensed data values. By way of example, diversity in Experimental trials have been used to investigate the
temperature values. Fig. 11 demonstrates overall impact of different CSMA/CA parameters on the efficiency
transmission delay during the four rounds interval. Fig. 10 of WSNs of various size using IEEE802.15.4 in non-beacon-
demonstrates the mean and deviation of average delay in enabled mode. In the scenario considered, the packet
Dynamic CSMA. The mean value is 39,359 ms which is less delivery ratio decreased, and delay increased gradually as the
than 50,000 ms in traditional one. number of contending nodes grew. A comparison between
traditional TDMA and new improved delivery technique
shows that MAC parameters can be improved by applying
the newly developed scheme especially in large networks.
This scheme could be applied in IoT environments to ensure
better system performance by decreasing latency and
maximizing packet delivery ratio to achieve increased
bandwidth utilization.
ACKNOWLEDGMENT
The corresponding authors are grateful to the
Engineering Department in Leicester University in United
Kingdom as well as the Higher Committee of Education
Development in Iraq for financially supporting the current
Figure 10. The standard deviation of average delay in dynamic CSMA. research.
REFERENCES
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A
Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, pp.
102 - 114, Aug. 2002.
[2] D. Estrin, L.Giro, G. Pottie, and M.Srivastavat, “Instrumenting the
World with Wireless Sensor Networks,” in Proc. of IEEE Int. Conf.
on Acoustics, Speech, and Signal Processing, (ICASSP ‘01),
Berkeley, CA, May 2001, vol. 4, pp. 2033 - 2036.
[3] A. Abbasi, M. Younis, and K. Akkaya, “Movement-Assisted
Connectivity Restoration in Wireless Sensor and Actor Networks,”
IEEE Trans. on Parallel and Distributed Systems, vol. 20, no. 9,
pp.1366-1379, Sept. 2009.
[4] L. Zhang and Z. Wang, “Integration of RFID into Wireless Sensor
Wetworks: Architectures, Opportunities,” In Proc. of the 5th Int. Conf.
on Grid and Cooperative Computing Workshops (GCCW ‘06),
Figure 11. Total transmission time for static TDMA and dynamic CSMA Changsha, China, Oct. 2006, pp. 463–469.
within four rounds.
[5] D. L. Brock, “The Electronic Product Code”, MIT Auto-ID Center,
MIT-AUTOID-WH-002, January 2001.

628
[6] G. Santucci, “The Internet of Things,” in :Between the Revolution of [13] G. Campobello, A. Segreto, and S. Serrano, “Data gathering
the Internet and the Metamorphosis of Objects, H. Sundmaeker, P. techniques for wireless sensor networks: A comparison,”
Guillemin, P. Friess, & S. Woelffle, (Eds.) Forum American Bar International Journal of Distributed Sensor Networks, vol. 2016, 2016.
Association, pp. 11-24, Feb. 2010. [14] S. Moulik, S. Misra, C. Chakraborty, Performance Evaluation and
[7] Z. Xiao, J. Zhou , J. Yan , C. He , L. Jiang , and N. Trigoni, Delay-Power Trade-off Analysis of ZigBee Protocol”, IEEE, ISSN
“ Performance evaluation of IEEE 802.15.4 with real time queueing”, 1536-1233, pp. 1-14, 15 May 2018.
ScienceDirect press, Vol. 73, pp. 80-94, 27 February 2018. [15] C. Zhang and W. Luo, "Topology Performance Analysis of
[8] S. Persia and D. Cassioli, “Energy/latency trade-offs in geographic Zigbee Network in the Smart Home Environment," College of
routing for ultrawideband wireless sensor networks,” in Electrical and Information Engineering Guangxi University
SENSORNETS’12,pp. 115–118, 2012. of Science and technology, Guangxi Zhuang, 2013.
[9] C. Buratti, R. Verdone, “Performance Analysis of IEEE 802.15.4 Non [16] J. Wright, “Detecting Wireless LAN MAC Adddress Spoofing”,
Beacon-Enabled Mode”, IEEE Transactions on Vehicular home.jwu.edu/jwright.
Technology, Vol. 58, No.7, pp. 3480-3493, 2009. [17] J. Hall, M. Barbeau, and E. Kranakis, “Detection of Transient in
[10] F. Martelli, C. Buratti, and R. Verdone, “Modeling Query-Based Radio Frequency Fingerprinting using Signal Phase”, Internet and
Wireless CSMA Networks Through Stochastic Geometry”, IEEE Information Technology (CIIT), 2004.
Transactions on Vehicular Technology, Vol. 63, No. 6, July 2014. [18] T. Kohno, A. Briodo, and K. Claffy, “ Remote physical device
[11] D. D. Guglielmo F. Restuccia G. Anastasi M. Conti S. K. Das fingerprinting”, IEEE Transactions on Dependable and Secure
"Accurate and efficient modeling of 802.15.4 unslotted CSMA/CA Computing, vol.2, pp.93-108, 2005.
through event chains computation" IEEE Trans. Mobile Comput. vol. [19] C. Park, Q. Xie, P. H. Chou, and D. Node, “Wi-Fi-based Sensor Node
15 no. 12 pp. 2954-2968 Dec. 2016. for Real-Time Structural Safety Monitoring, the Fourth International
[12] X. Cao, J. Chen, Y. Cheng, S. Shen, and Y. Sun, “An Analytical Conference on Information Processing in Sensor Networks (IPSN),
MAC Model for IEEE 802.15.4 Enabled Wireless Networks with 2005.
Periodic Traffic”, IEEE Transactions on Wireless Communications, [20] Datasheet, W. (2018). Waspmote, Libelium Comunicaciones
to appear. DOI: 10.1109/TWC.2015.2435006 Distribuidas S.L, 1-27.

629

You might also like