Professional Documents
Culture Documents
4 MAC Protocol
for Scalable Data Collection in Dense Sensor
Networks
Kiran Yedavalli Bhaskar Krishnamachari
Department of Electrical Engineering - Systems Department of Electrical Engineering - Systems
University of Southern California University of Southern California
Los Angeles, California, 90089 Los Angeles, California, 90089
Email: kyedaval@usc.edu Email: bkrishna@usc.edu
Abstract—We find that the IEEE 802.15.4 MAC protocol higher (lower) than this constant. This yields a distributed
performs poorly for one-hop data collection in dense sensor channel feedback-based control mechanism that changes the
networks, showing a steep deterioration in both throughput and transmission probabilities of nodes dynamically towards the
energy consumption with increasing number of transmitters. We
propose a channel feedback-based enhancement to the protocol optimal. We develop an enhanced version of the IEEE 802.15.4
that is significantly more scalable, showing a relatively flat, slow- MAC protocol using this feedback scheme.
changing total system throughput and energy consumption as the In our modeling and evaluation, we consider two extremes
network size increases. A key feature of the enhancement is that of the one-hop data collection spectrum in dense sensor
the back-off windows are updated after successful transmissions networks: one-shot and continuous data collection. In one-
instead of collisions. The window updates are based on an
optimality criterion we derive from mathematical modeling of shot data collection, each node sends only a single packet
p-persistent CSMA. (this could be the response to a one-shot query) and once that
packet is transmitted the node is no longer in contention for the
I. I NTRODUCTION channel. In continuous data collection, we assume that each
IEEE 802.15.4 is an important standard for low-rate low- node is backlogged, i.e. always has a packet to transmit.
power wireless personal area networks that is in increasing In both cases, we find that the IEEE 802.15.4 protocol
commercial use for a diverse range of embedded wireless performs poorly in dense settings, showing a steep reduction
sensing and control applications. The standard provides spec- in throughput and increase in energy with network size. In
ifications for both the physical layer and the medium access contrast, the enhanced protocol that we propose is significantly
control (MAC) protocol. more scalable, showing a relatively flat, slow-changing total
We characterize the performance of the IEEE 802.15.4 system throughput and energy as the number of transmitters
MAC for one-hop data collection in a star topology where is increased. This is illustrated in figure 1.
there are multiple transmitters and a single receiver. Our
primary focus is on settings where the number of transmitters 80
Packet Length = 50 Bytes
Throughput (Kbps)
these devices. 0
50 55 60 65 70 75 80 85 90 95 100
IEEE 802.15.4
6 Enhanced IEEE 802.15.4
the expected time between successful receptions is a constant Fig. 1. Performance of Proposed Enhancement compared to IEEE 802.15.4
for a given packet size when the transmission probabilities for Continuous Data Collection
are optimal. Further, we find that when the transmission
probability is lower (higher) than the optimal, the ratio is The rest of this paper is organized as follows. In Section II
we present an overview of IEEE 802.15.4 and model it as a
Kiran Yedavalli is currently with Cisco Systems Inc. in San Jose, California.
This work was funded in part by NSF through grants numbered CNS-0435505, p-persistent CSMA with changing p. In Section III we present
CNS-0347621, CNS-0627028, CNS-0325875. the modeling and optimization of p-persistent CSMA and
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
characterize the performance of the IEEE 802.15.4 MAC in Start: BE = 3
Choose a time slot
Section IV. In Section V we present a channel feedback-based
Wait
medium access control technique and adapt it to present the BE = min(BE+1, aMaxBE)
Choose a new time slot Time = chosen slot?
Sense
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
N Number of nodes in the network
In this paper we mainly focus on dense sensor networks p Transmission probability
in which at-least 50 nodes contend for the channel in either L Length of packet in time slots
scenario. We assume that the packet lengths are deterministic δ Time slot length (320 µsecs)
ξR Power consumption in Receive state
and constant. ξT Power consumption in Transmit state
n Number of nodes in an epoch
C. Model Tn Delay in an epoch with n nodes
Now, we model the IEEE 802.15.4 MAC as a p-persistent En Energy consumption in an epoch with n nodes
ΦCD (N ) Throughput in bps in CD
CSMA MAC with changing p. Before we present the MAC ΣCD (N ) Energy consumption per node per successful
model, we describe the assumptions made and the energy packet transmission in CD
model used. ∆OSD (N ) Delay in secs to obtain packets from
N nodes in OSD
• Assumptions: Let the number of sensor nodes in the ΣOSD (N ) Energy consumption in Joules to obtain
radio range of the sink be N . All sensor nodes are packets from N nodes in OSD
pT
opt (n, L) Transmission probability that minimizes
synchronized to a global time which is divided into slots epoch delay
of equal length and each node transmits at the beginning pE
opt (n, L) Transmission probability that minimizes
of a time slot. Let the packet length be L time slots. epoch energy consumption
A sensor node is informed of its packets’ successful TABLE I
transmission through acknowledgement packets (ACKs) N OTATION
from the sink. Failure to receive an ACK from the sink
implies a collision. The ACK is sent by the sink as soon
as the packet reception is completed. Table I summarizes
the notations used. same probability the next time it finds two consecutive
• Energy Model: According to the IEEE 802.15.4 standard free time slots. If more than one node transmits in the
a node can exist in any one of the following four states - same time slot it results in a collision and if a node is
Shutdown, Idle, Transmit, Receive. For CD, we assume involved in a collision for the first time it changes its
that the nodes are either in the Trasmit or the Recieve transmission probability to p2 . On a second collision its
state and are not concerned with the Shutdown or Idle transmission probability is changed to p3 and it remains
states. For OSD, again each node is either in the Transmit constant beyond the second collision.
or the Recieve state until its packet is transmitted, after We evaluate the accuracy of our model using simulations2 .
which the node moves to the Shutdown state permanently. The results are averaged over 1000 random trials with 100
Let the power consumed in the Transmit state be ξT different random seeds. For the CD scenario, we simulated
and the power consumed in the Recieve state be ξR . the protocol for 10000 time slots for a packet length of 50
According to [1], ξR = 35 mW and ξT = 31 mW for the Bytes (or 5 time slots).
highest transmission power. The power consumed in the Figure 3 plots the simulation results comparing the IEEE
Shutdown state is negligible . 802.15.4 and our p-persistent CSMA model and shows that our
• MAC Model: In [16] the authors model the IEEE model is reasonably accurate. Next, we determine the optimal
802.15.4 MAC in the contention access period (CAP) as performance of a generic p-persistent CSMA MAC with a
a non-persistent CSMA with back-off. They approximate similar time slot structure and characterize the performance
the three original uniform-random back-off windows to of IEEE 802.15.4 MAC in comparison to that.
geometrically distributed back-off windows with param-
eters p1 , p2 and p3 such that pi = BO2i +1 , (1 ≤ i ≤ 3) III. P -P ERSISTENT CSMA MAC
where BOi is the original uniform-random back-off win-
In this section we model and analyze a generic p-persistent
dow size. With BO1 = 8, BO2 = 16 and BO3 = 32, the
1 1 1 CSMA MAC and determine the transmission probabilities that
respective values of p1 , p2 and p3 are 4.5 , 8.5 and 16.5 .
optimize its performance.
In this paper we further simplify this model to a p-
persistent CSMA in which the probability of transmission A. Overview
changes from p1 to p2 to p3 with each collision and
remains constant after two collisions at p3 . The key In a slotted p-persistent CSMA ([2]), each node senses the
difference in our model from the non-persistent CSMA channel at the beginning of each time slot and if the channel
model is that in our case the transmission probability is found to be free of any transmissions, it transmits its packet
changes with a packet collision instead of a busy carrier with a probability p. If the channel is not free, the node
sense. Thus in our model, a node starts out with an attempts to transmits its packet in the next free time slot. If
initial transmission probability of p1 . The node senses more than one node transmits in the same time slot it results
the channel at the beginning of each time slot and if the in a collision.
channel is found to be free for two consecutive time slots, 2 We have written our own simulators in C for the IEEE 802.15.4 and
it transmits its packet with probability p1 . If the channel p-persistent CSMA MAC protocols. They are available for download at
is busy, the node tries to transmit the packet with the http://ceng.usc.edu/˜anrg/downloads.html.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
L=5 L=5
30
p−persistent CSMA 4
25 p−persistent CSMA
ΦCD(N) Kbps
IEEE 802.15.4
∆OSD(N) secs
3 IEEE 802.15.4
20
15 2
10
5 1
0 0
50 55 60 65 70 75 80 85 90 95 100 50 55 60 65 70 75 80 85 90 95 100
Number of Nodes (N) Number of Nodes (N)
8 120
ΣOSD(N) mJoules
p−persistent CSMA
ΣCD(N) mJoules
p−persistent CSMA
IEEE 802.15.4 100 IEEE 802.15.4
6
80
4 60
40
2
20
0 0
50 55 60 65 70 75 80 85 90 95 100 50 55 60 65 70 75 80 85 90 95 100
Number of Nodes (N) Number of Nodes (N)
Traditionally, system dynamics due to the p-persistent contending nodes – in Joules, for the epoch with n contending
CSMA protocol have been modeled using renewal theory nodes. Then
(example [8], [9], [5], [4]). The key assumption that makes
1
the use of renewal or regenerative models feasible is that ΦCD (N ) = · (80L) bps (1)
the system attains stationarity and that the models capture E[TN ]
the system behavior at the state. While this assumption is E[EN ]
still true for the CD scenario, it is not true for the one-shot ΣCD (N ) = Joules (2)
N
data scenario. Nevertheless, we observe the system at every N
X
successful packet transmission like in [9] and [5], for both ∆OSD (N ) = E[Tn ] seconds (3)
scenarios and derive expressions for throughput, delay and n=1
energy consumption. N
1 X
B. Model ΣOSD (N ) = E[En ] Joules (4)
N n=1
We observe the system at every successful packet transmis- where 80L in Equation 1 is the packet length in bits. Clearly,
sion. The time interval between two consecutive successful the above metrics are optimized when E[Tn ] and E[En ] are
transmissions is defined as an epoch. An epoch is made up of minimized. First we determine expressions for E[Tn ] and
idle time, in which the channel is free of any transmissions, E[En ].
collision time, in which more than one node is transmitting Proposition 1: For a constant packet length L, the expected
and a single successful transmission time which marks the epoch delay for n contending nodes is given by
end of the epoch, as illustrated in Figure 4.
L − (L − 1)(1 − p)n
E[Tn ] = ·δ (5)
np(1 − p)n−1
epoch
Proof:
As illustrated in Figure 4 the delay in an epoch is due
… … … … … … to idle time, collision time and successful transmission time.
Therefore, the expected delay in epoch n, is given by
: Idle Slot
: Collision Slot
E[Tn ] = E[TIdle,n ] + E[TCollision,n ] + E[TSuccess ] (6)
: Successful Slot
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
where E[TIdleP eriod,n ] is the expected number of idle time
slots between two consecutive packet transmissions (collision
or successful) and E[TCollisionP eriod,n ] is the expected num- E[ECollision,n ] = E[Ncoll,n ] · E[ECollisionP eriod,n ] (17)
ber of collision time slots at each collision. Owing to the The expected energy consumption in a CollisionP eriod,
constant probability of transmission p within an epoch, the E[ECollisionP eriod,n ], is equal to the sum of the expected
IdleP eriods between any two consecutive packet transmis- energy consumption by nodes involved in packet transmissions
sions are i.i.d random variables with the same mean value. and the expected energy consumption by nodes in idle state
Also, since the decision to transmit in a time slot after a free during the CollisionP eriod. Therefore,
channel sense is independent of the number of previous free
channel senses, the number of collisions is independent of the n
length of IdleP eriods. This holds true for CollisionP eriods X
E[ECollisionP eroid,n ] = LξT δ iP {T rans. = i|Collision}
also, thus justifying the above two equations. i=2
E[Ncoll,n ] and E[TIdleP eriod,n ] are given by [5]: n
X
+LξR δ (n − i)P {T rans. = i|Collision} (18)
n i=2
1 − (1 − p)
E[Ncoll,n ] = −1 (9)
np(1 − p)n−1 where P {T rans. = i|Collision} is the probability that i
(1 − p)n (≥ 2) nodes transmit their packets given that a collision has
E[TIdleP eriod,n ] = ·δ (10) occurred, and it is given by
1 − (1 − p)n
We use the above two equations to derive the expected
delay in the epoch n. Since the packet length is constant P {T rans. = i|Collision} = P {T rans. = i|T rans. ≥ 2}
¡n¢ i
E[TCollisionP eriod,n ] = Lδ. Therefore, n−i
i p (1 − p)
= (19)
1 − (1 − p) − np(1 − p)n−1
n
1−p
E[TIdle,n ] = ·δ (11) Substituting the above equation in Equation 18, we get
np
Lδ(1 − (1 − p)n − np(1 − p)n−1 )
E[TCollision,n ] = (12) L(ξT − ξR )δ · np(1 − (1 − p)n−1 )
np(1 − p)n−1 E[ECollisionP eriod,n ] =
1 − (1 − p)n − np(1 − p)n−1
Substituting the above equations in Equation 6, we get
+ nLξR δ (20)
Equation 5.
Proposition 2: For a constant packet length of L, the ex- Substituting the above equation in Equation 17, we get
pected epoch energy consumption for n contending nodes is
given by
L(ξT − ξR )δ · (1 − (1 − p)n−1 )
n−1 E[ECollision,n ] =
L − (L − 1)(1 − p) L (1 − p)n−1
E[En ] = ξR δ · + ξT δ ·
p(1 − p)n−2 (1 − p)n−1 LξR δ · (1 − (1 − p)n − np(1 − p)n−1 )
(13) + (21)
p(1 − p)n−1
Proof:
Similar to Equation 6, the energy consumption in the epoch And finally, the expected energy consumption during a
n is equal to the sum of the energy consumption in idle successful transmission is given by
time, the energy consumption in collision time and the energy
consumption in a successful transmission. E[ESuccess ] = ξT · Lδ + ξR · Lδ · (n − 1) (22)
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
L=5
Proof: The value of p that minimizes E[Tn ] is obtained 0.5
pT (n,L)
by equating its first derivative with respect to p to zero. 0.45
opt
pE (n,L), γ = 2
opt
pE (n,L), γ = 4
opt
0.4
pE (n,L), γ = 0.5
dE[Tn ]
opt
pE (n,L), γ = 0.25
0.35
=0 (25)
opt
dp
Optimal p
0.3
0.25
For L = 1, 0.2
0.15
δ
E[Tn ] = (26) 0.1
0
Taking the derivative and equating it to zero results in p =
100 90 80 70 60 50 40 30 20 10 0
Number of nodes in an epoch (n)
1
n Similarly, for L > 1, equating the derivative of E[Tn ] from
.
Fig. 5. The optimal probability of transmission.
Equation 5 to zero yields the following equation.
L
(1 − p)n = · (1 − np) (27) probability the average epoch delay is a constant equal
L−1
to Γ(L).
For np < 1, (1 − p)n can be approximated to 1 − np −
n(n−1) 2
p . Using this approximation and further simplification, p = pTopt (n, L) ⇒ E[Tn ] ≈ Γ(L) (29)
2
Equation 27 reduces to Equation 24 as an unique root to a Proof: For optimal transmission probability, substi-
2
quadratic equation. It can be verified that d E[T dp2
n]
> 0 for tuting Equation 27 into Equation 5 we get
T
p = popt (n, L), thus minimizing E[Tn ].
(L − 1)(1 − pTopt (n, L))
Proposition 4: For n > 1 and γ = ξξR T
the transmission E[Tn ] = (30)
probability that minimizes the expected epoch energy con- 1 − npTopt (n, L)
sumption E[En ] is given by n−1
For n large such that n ≈ 1, from Equation 24
p
E n2 + 2n(n − 1)(L − 1) + 4L(n − 1)(γ − 1) − n pTopt (n, L) ≈ 0 (31)
popt (n, L) ≈
n(n − 1)(L − 1) + 2L(n − 1)(γ − 1) √
(28) 2L − 1 − 1
npTopt (n, L) ≈ (32)
Proof: The proof is similar to that of the previous L−1
proposition, please refer to [18] for the details. Substituting the above equations into Equation 30 proves
Numerical calculations show that the approximations are the proposition.
very close to the actual values. For n = 1, the optimum Corollary 2: For optimal transmission probability and
transmission probability is equal 1, i.e., when there is a single for large number of nodes such that n−1 n ≈ 1 the
sensor node left, delay and energy are minimized when it trans- throughput of p-persistent CSMA MAC protocol is a
mits its packet with probability 1. Figure 5 plots pTopt (n, L) and constant independent of n and depends only the length
pEopt (n, L) as a function of the number of contending nodes of the packet.
from n = 100 to n = 2 for different values of γ. As the figure √
shows, for optimal performance the probability of transmission L − 2L − 1
OptimalThrougput ≈ packets/timeslot
should increase with decreasing number of nodes in an epoch (L − 1)2
(33)
in order to avoid excessive idle time slots. We can also see
Proof: Throughput is calculated as the inverse of
that the transmission probabilities are higher for lower values
the epoch delay. Equation 33 is a direct result from
of γ. This is because if the node spends more energy in the
Proposition 5.
Receive state than in the Transmit state, energy is saved if it √
L−√2L−1
transmits more than it receives. • Proposition 6: Let ΓR (L) = (L−1)( 2L−1−1)
. If L >
Corollary 1: If ξT = ξR , then pTopt (n, L) = pE 1 and n is large such that n−1 ≈ 1, then for optimal
opt (n, L), i.e., n
the delay and energy consumption are jointly optimized with transmission probability the ratio of average idle time in
a single probability of transmission for ξT = ξR . an epoch to the average epoch delay is a constant equal
Proof: For γ = 1 Equations 24 and 28 are equal, which to ΓR (L). Also, if the transmission probability is greater
proves the corollary. than optimal then the ratio is lower than ΓR (L) and vice
versa.
D. Optimality Criteria E[TIdle,n ]
p = pTopt (n, L) ⇒
≈ ΓR (L) (34)
Now, we discuss some interesting optimality criteria for the E[Tn ]
epoch delay and energy consumption. E[TIdle,n ]
2 p < (>)pTopt (n, L) ⇒ > (<)ΓR (L) (35)
• Proposition 5: Let Γ(L) = L−(L−1)
√ . If L > 1 and n E[Tn ]
2L−1
n−1
is large such that n ≈ 1 then for optimal transmission Proof: Using Equations 9, 5 and 27 for optimal p,
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
à ! In p-persistent CSMA, if the length of the packet
E[TIdle,n ] 1 1 is increased from L to L + l (l > 0), should the
= −1 (36)
E[Tn ] L−1 npTopt (n, L) value of transmission probability p be increased
or decreased to maintain the delay and energy
n−1
For n ≈ 1, using Equation 24 consumption constant?
√ Figure 7 shows us that the answer to the above question
T 2L − 1 − 1
npopt (n, L) ≈ (37) is that it depends on the value of p. If p < pTopt (n, L),
L−1
then for the same delay, p should be increased and if
Substituting the above equation into the previous equation p > pTopt (n, L) then p should be decreased. The same
the first part of the proposition is proved. answer holds true for energy if pTopt (n, L) is replaced
Similarly, for p < (>)pTopt (n, L) by pE opt (n, L). The figure also shows that the optimal
√
2L − 1 − 1 transmission probability values pTopt (n, L) and pE opt (n, L)
np < (>) (38) decrease with increasing L.
L−1
E[TIdle,n ] • Figure 8 plots ratios of consecutive epoch delays and
⇒ > (<)ΓR (L) (39) energy consumptions as functions of n. In this figure,
E[Tn ]
if the ratio is greater than 1 it implies that the delay
Hence the proposition is proved. or energy value increases with decreasing n and vice
Figure 6 illustrates Proposition 6 for L = 5. The ap- versa. Greater the difference from 1 higher the rate of
proximation of the ratio to ΓR (L) is primarily due the increase or decrease. The following observations can be
approximation in Equation 24. As the figure shows, for made from the figure:
low values of n the ratio deviates away from ΓR (L). – For p = pTopt (n, L), E[Tn ] is almost constant over
L=5
all n. For p > pTopt (n, L), E[Tn ] shoots up for higher
0.5
values of n due to higher number of collisions. For
0.45 p < pTopt (n, L), E[Tn ] shoots up for lower values of
pTopt(n,L) − 0.003
0.4 n due to higher number of idle time slots.
– For p = pE opt (n, L), E[En ] increases monotonically
]/E[T ]
n
0.35
0.3
0.25 pTopt(n,L)
0.2
collisions. For p < pE opt (n, L), E[En ] is higher than
the optimal energy consumption values for lower
0.15 T
popt(n,L) + 0.003 values of n due to higher number of idle time slots.
0.1
100 90 80 70 60 50 40 30 20 10 0
Number of nodes in an epoch (n)
L=5, ξR = 35 mW, ξT = 31 mW
1.6
Fig. 6. Ratio of expected idle time to expected epoch delay.
T
p = popt(n,L)
1.4
E[Tn−1]/E[Tn]
p = 0.35
1.2 p = 0.002
0.9
0.7
0.6
n = 50, ξR = 35 mW, ξT = 31 mW
4 0.5
L=5 0 10 20 30 40 50 60 70 80 90 100
n
E[Tn] msecs
3 L=4
L=3
2
L=2
Fig. 8. Ratio of expected delays and energy consumptions for consecutive
1 L=1
epochs.
0
0.005 0.01 0.015 0.02 0.025 0.03
p
7
L=5
For CD the implication of this criterion is that the delay
6
E[En] mJoules
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
Proof: Please refer to [18] for the proof. idle time as well as the delay between two consecutive suc-
cessful transmissions. These measurements can be construed
IV. C HARACTERIZATION OF IEEE 802.15.4
as feedback from the channel. Before we describe how this
Having determined the performance of optimal p-persistent feedback can be used, we review the related work in channel
CSMA, we characterize the performance of IEEE 802.15.4 feedback-based medium access control techniques.
MAC in this section.
Figure 9 plots the average transmission probabilities for the A. Related Work
IEEE 802.15.4 MAC (obtained using the p-persistent CSMA The idea of using feedback from the channel to control the
model) in comparison to the transmission probabilities for op- transmission probabilities of contending nodes has been used
timal p-persistent CSMA for both CD and OSD. The transmis- for a long time. Rivest in [17] has proposed a ternary feedback
sion probabilities shown for IEEE 802.15.4 are obtained using model in which each node has to monitor three channel
the default values specified in the standard including the two conditions - absence of transmissions, successful transmissions
required sensing slots, which is not required for the generic p- and, collisions. Rivest has shown that estimating the true
persistent CSMA MAC. For OSD, the transmission probability value for the number of nodes n and setting the transmission
1
for IEEE 802.15.4 quickly stabilizes at 16.5 = 0.0606 and for probability to n1 maximizes the throughput in slotted-Aloha
CD, close to that value. This behavior is in contrast to the trend type protocols (in which the packet length is equal to a single
shown by optimal probabilities. This implies that the back-off time slot). If the packet length is of multiple time slots, this
mechanism of IEEE 802.15.4 protocol can be modified for results does not hold true as we have shown in Proposition 3
optimal performance as follows: in Section III. In [4] a control mechanism has been presented
• The change of back-off window sizes should happen that uses the energy consumed by a tagged node in the network
at successful transmissions instead of at collisions or in the above three channel conditions between two successful
busy channel senses. Further, for OSD, successful packet packet transmissions. This mechanism is not applicable in the
transmissions are a better indicator for future congestion case of OSD because each node has a single successful packet
than collisions or busy channel senses. transmission. Similar strategies based on the estimation of
• For CD, the average transmission probability for IEEE the three channel conditions have been proposed ([11], [3],
802.15.4 MAC remains almost constant irrespective of [7]) all of which are more suitable for steady state conditions
the number of contending nodes, while for optimal p- (like in CD) in which the number of contending nodes remain
persistent CSMA it reduces with N . For optimal per- constant.
formance the window sizes should be reflective of the A good control mechanism should depend on the network
number of contending nodes. and traffic conditions as well as the application requirements.
• For OSD, the “back-off” window size should actually de- Our objective is to present a feed-back control mechanism
crease with every successful transmission as the optimal that is suitable for both CD and OSD scenarios. One major
transmission probability increases. challenge presented in OSD is to estimate the true system state
using channel conditions in the face of constantly changing
0.08
Transmission Probabilities, L = 5
state of the system (decreasing number of contending nodes).
CD
0.06 Nevertheless, the analysis presented in Section III presents us
0.04
IEEE 802.15.4
Optimal p−persistent CSMA
with unique opportunities to efficiently control the transmis-
0.02 sion probabilities in real time.
0
50 55 60 65 70 75 80
Number of Nodes (N)
85 90 95 100
B. Our Approach
0.4
IEEE 802.15.4
Optimal p−persistent CSMA
Our approach for channel feedback-based control of trans-
0.3
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
idle time to the delay is lower than ΓR (L) then it means that 3) Evaluation: Figure 11 shows the performance gains
the transmission probability would have been greater than the for the Enhanced IEEE 802.15.4 MAC in comparison to
optimal value. Therefore the transmission probability of the the original. The figure also shows the performance of the
next epoch should be lower than the current epoch’s to bring optimal p-persistent CSMA and enhanced p-persistent CSMA.
the delay closer to optimal. Similarly, if the ratio if higher than It should be noted that the performance of the enhanced
ΓR (L) the next epoch’s transmission probability should be IEEE 802.15.4 MAC matches that of the enhanced p-persistent
increased for optimal delay. Thus, the transmission probability CSMA MAC for CW = 0, i.e., if the nodes do not sense the
update rule is given by channel for two consecutive free slots but transmit their packet
once their chosen time slot occurs. Thus, for the enhancement
α
pnext = pcurrent · (41) we use, the performance of the enhanced p-persistent CSMA
ΓR (L) is an upper-bound on the performance of the enhanced IEEE
where α = Idle,current
T 802.15.4 MAC.
Tcurrent . In this update rule the increase or
decrease in the transmission probability is directly proportional An important observation from the figure is that the system
to the value of the ratio α. throughput reduces drastically with increasing number of
2) Enhanced IEEE 802.15.4: The IEEE 802.15.4 MAC contending nodes for the original IEEE 802.15.4 MAC. But
protocol uses different window sizes to control the trans- for the enhanced version, the system throughput is almost
mission of packets. In order to use the above optimality constant with the number of nodes. Implying that it is much
criterion the transmission probability update rule should be more scalable than the original. This holds for energy also.
converted into a window size update rule. For this we make These significant gains in performance are observed for both
use of the approximation we used in Section II to model CD and OSD scenarios.
the IEEE 802.15.4 MAC as a p-persistent CSMA MAC with 4) Discussion: In actual implementation the measurement
changing p. In this, if a uniform-random back-off window has of idle time and the delay between two consecutive successful
a size of W time slots then it can be closely modeled as packet transmissions can be achieved easily at each node by
a geometric-random choice of time slot with parameter p as observing ACKs from the sink. If all nodes in the network
long as p = W2+1 . Thus a transmission probability can be are in the radio range of each other then all nodes see the
converted into window size by using the inverse relationship, same idle time between two consecutive successful packet
i.e., W = 2−p transmissions. If on the other hand, all nodes are in the radio
p . Based on this and the transmission probability
update rule given above, the window update rule for the range of the sink but not in the radio range of each other then
Enhanced IEEE 802.15.4 MAC is: each node sees an idle time that is based on the number of
nodes in its neighborhood. Thus, the above update rule tries
(Wcurrent + 1)ΓR (L) − α to optimize the transmission probability for the number of
Wnext = (42) nodes in the neighborhood of each node and not for the entire
α
A key aspect of this update rule is that, all nodes in the network. However, the sink can measure the idle time for the
network should updated their windows at every successful entire network and piggy back this value in the ACKs to the
packet transmission. Figure 10 shows the flow chart for the sensor nodes. The sensor nodes measure the epoch delay as
Enhanced IEEE 802.15.4 MAC operation at a node. the interval between the ACKs. Thus, in this case, the channel
feedback is via the sink.
The performance difference in terms of degradation or
Start Change Window Size
p = rand(0, 0.05) YES
From Channel:
Is there a
improvement, if any, between the local feedback and global
Wnext = ((Wcurrent + 1)īR(L) – Į) / Į
W = (2-p)/p
successful
transmission?
feedback based mechanisms needs to be investigated. This will
Choose a new time slot
Choose a time slot be one of the directions for our future work.
Wait Don’t Change Window
An important aspect of the Enhanced IEEE 802.15.4 MAC
Time = chosen timeslot? Choose a new time slot protocol is that all nodes should change their window sizes
and choose a new time slot (or start a new counter) at every
YES successful packet transmission. Otherwise, only a few nodes
NO
optimize their window sizes and this could lead to unfairness
Sense Channel
Sense
Channel in
NO
NO YES
in the CD scenario.
YES
in this time slot.
Is it free?
next time slot. YES Transmit.
Success?
Another important aspect to consider is the effect of channel
Is it free?
errors. The current standard MAC assumes channel errors
based packet losses to be collisions and backs-off accord-
ingly, thus misconstruing channel errors as congestion. But
Fig. 10. Flow chart for Enhanced IEEE 802.15.4 operation at a node. the enhanced MAC protocol does not change any protocol
parameters due to channel errors based packet losses, as
It should be noted that all aspects of the original IEEE successful packet transmissions are taken as the only indicators
802.15.4 MAC have been preserved except for when the of channel congestion. Nevertheless, a thorough investigation
window is changed and how it is changed. of the effect of channel errors will be an important part of our
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.
L=5 L=5
150 4
IEEE 802.15.4
∆OSD(N) secs
ΦCD(N) Kbps
3 Optimal p−persistent CSMA
100 Enhanced p−persistent CSMA
Enhanced IEEE 802.15.4
2
50
1
0 0
50 55 60 65 70 75 80 85 90 95 100 50 55 60 65 70 75 80 85 90 95 100
Number of Nodes (N) Number of Nodes (N)
8 120
ΣOSD(N) mJoules
IEEE 802.15.4 IEEE 802.15.4
ΣCD(N) mJoules
Optimal p−persistent CSMA 100 Optimal p−persistent CSMA
6
Enhanced p−persistent CSMA 80 Enhanced p−persistent CSMA
Enhanced IEEE 802.15.4 Enhanced IEEE 802.15.4
4 60
40
2
20
0 0
50 55 60 65 70 75 80 85 90 95 100 50 55 60 65 70 75 80 85 90 95 100
Number of Nodes (N) Number of Nodes (N)
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on April 20,2023 at 08:18:18 UTC from IEEE Xplore. Restrictions apply.