Professional Documents
Culture Documents
Wang 2010
Wang 2010
net/publication/221637290
CITATIONS READS
3 399
3 authors:
Yuping Zhao
Peking University
92 PUBLICATIONS 1,393 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Feng Wang on 05 November 2018.
Abstract—When an IEEE 802.15.4 network has many nodes 802.15.4 WSNs. Recently some researchers have proposed to
and is almost saturated, the probability of collision is large, and achieve better performance by modifying backoff mechanisms
the throughput is small. The main reasons are the adoption of [11] [12] [13].
slotted CSMA/CA and the mechanism that if a data transmission
cannot be completed before the end of contention access period To improve the capability of IEEE 802.15.4, this paper
(CAP), it has to wait until the start of the CAP in the next makes an in-depth analysis of the IEEE 802.15.4 MAC layer,
superframe. This paper proposes an enhanced collision-avoidance and proposes an enhanced collision-avoidance MAC protocol
MAC protocol for IEEE 802.15.4, and establishes a simulation for IEEE 802.15.4.
model to analyze and compare the enhanced collision-avoidance The rest of the paper is structured as follows. Section II
MAC and the IEEE 802.15.4 MAC. The proposed protocol, com-
patible with the IEEE 802.15.4 protocol, has less probability of carries out a theoretical analysis of slotted CSMA/CA and
collision (almost 0), higher probability of successful transmission the mechanism of data transmission at the start of the CAP.
(close to 1), and larger network throughput (more than two times Section III proposes the enhanced collision-avoidance MAC
of that of IEEE 802.15.4). protocol. In section IV, a simulation model is established to
analyze and compare the performance of the proposed protocol
I. I NTRODUCTION and that of IEEE 802.15.4. Conclusions are given in section
The IEEE 802.15.4 protocol has been proposed as a wireless IV.
communication standard for low-rate, short-range, low-power,
and low-cost wireless personal area networks (LR-WPANs) II. P ROTOCOL A NALYSIS
[1] [2]. There are two kinds of modes in the protocol: non It is well known that the maximum throughput of pure
beacon-enable mode and beacon-enable mode. The former ALOHA is 1/(2e), whereas the maximum throughput of
is suitable for wireless sensor networks (WSNs), and the slotted ALOHA is 1/e, twice of the former [14]. This result
latter with synchronization and contention free period (CFP) is obtained only when the basic time period (BT P ) in slotted
can provide services with different QoS. In IEEE 802.15.4, ALOHA is equal to the data transmission delay. However, the
CSMA/CA is used to access channels. There are two kinds relationship between slotted and unslotted CSMA is different
of CSMA/CA mechanisms, the slotted and the unslotted, from that of pure and slotted ALOHA. The former is more
working in the beacon-enable and non beacon-enable modes complicated because CSMA uses a clear channel assessment
respectively. Furthermore, the definition of CSMA/CA in the (CCA) mechanism and the BT P in slotted CSMA should be
IEEE 802.15.4 protocol is a kind of non-persistent CSMA. the maximum propagation delay [15].
IEEE 802.15.4 is being considered as a promising technol- To analyze the channel capacity of the CSMA mechanism,
ogy for WSNs, and a great deal of research has been carried we define the following important variables: S (throughput), G
out. In [3] and [4], the authors analyzed the slotted CSMA/CA (offered channel traffic rate), T (packet transmission delay), τ
mechanism of IEEE 802.15.4 using Markov chain models. (propagation delay), and α = τ /T (normalized propagation
Meanwhile, [5] paid attention to the throughput and the end- delay). Then the basic equation for the throughput S1 of
to-end delay of the IEEE 802.15.4 CSMA/CA mechanism, unslotted non-persistent CSMA is formulated by means of α
and [6] studied the guaranteed time slot (GTS) mechanism of and G as described in (1) [15], and the throughput S2 for the
the protocol, and [7] conducted a study on a beacon frame slotted CSMA is given by (2). Here the analysis of the basic
schedule of the ZigBee WSNs in the cluster tree topology. CSMA mechanism is used to explain the variation trend of the
By studying the performance of CSMA/CA in a star-network performance and can interpret the problem well. Other kinds
with hidden nodes, [8] pointed out that there exits an optimum of the CSMA strategies have the same tendency despite the
transmission power that minimizes the impact of hidden nodes. fact of that they may have different performances.
In [9], the authors proposed a simple and efficient grouping
Ge−αG
strategy to solve the IEEE 802.15.4 hidden-node problem S1 = (1)
without extra control overheads in data transmissions. More- G(1 + 2α) + e−αG
over, [10] comprehensively studied the performance of IEEE − BT P ∗
BT P
T Ge
T G α∗ Ge−α G
S2 = = (2)
Feng Wang, Dou Li, and Yuping Zhao are with the State Key Laboratory of
BT P BT P
+ (1 − e− T G ) α + (1 − e−α∗ G )
∗
T
Advanced Optical Communication Systems & Networks, Peking University,
Beijing 100871, China (email: fengwangpku@gmail.com, lidou@pku.edu.cn, G
lim S1 = lim S2 = (3)
yuping.zhao@pku.edu.cn). α=α∗ →0 α→0 1+G
Parameter Value
0.5
Maximum Throughput
Topology Star
0.4
Range 100m × 100m
0.3
Nodes 3, 10, 20, 50, 100
Bandwidth 2 MHz (2.4 GHz) 0.2
minBE 3
BO = SO 0 Fig. 6. Maximum throughputs of networks
Buffer 256 Bytes
4
Ratio ofthroughputto NorL
Throughput
0.4
S (Troughput) 0.6
3
0.3
2 0.4
0.2
1
0.2
0.1
0
-1 0 0
0 2 4 6 8 10 12 0 2 4 6 8 10 12 0 2 4 6 8 10 12
(a) NorL (b) NorL (c) NorL
0.018 50
IEEE 802.15.4 IEEE 802.15.4 IEEE 802.15.4
1 45
Collision-Avoidance Protocol 0.016 Collision-Avoidance Protocol Collision-Avoidance Protocol
Ratio of successful sent to generated
40
0.014
0.8
35
0.012 ETEDelay 30
Performance
Perform ance
ETEDelay
0.6 Ratio ofthroughputto NorL
0.01 25
20
0.4 0.008
15
0.006
0.2 10
0.004
5
0 0.002 0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
(d) NorL (e) NorL (f) NorL
Fig. 4. NorSend, CP, S, Ratio of throughput to NorL, ETEDelay, and Performance of the networks with 100 nodes
0.45
IEEE 802.15.4
0.4
0.4 Collision-Avoidance Protocol
0.35 1
0.35
0.3
0.8
0.012
Perform ance
Performance
ETEDelay
ETEDelay
0
0.6 0.01 10
0.008
0.4
-1
Ratio ofthroughputto NorL 0.006 10
0.2
0.004
-2
0 0.002 10
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.05 0.1 0.15 0.2 0.25 0.3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
(d) NorL (e) NorL (f) NorL
Fig. 5. NorSend, CP, S, Ratio of throughput to NorL, ETEDelay, and Performance of the networks with 3 nodes
[5] A. Koubaa, M. Alves, and E.Tovar, ”A Comprehensive Simulation [10] J. Zheng and M. J. Lee, ”A Comprehensive Performance Study of IEEE
Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Net- 802.15.4,” Sensor Network Operations, IEEE Press, Wiley InterScience,
works,” Workshop on Factory Communication Systems (WFCS’06), Chapter 4, pp. 218-237, 2006.
Torino (Italy), Jun. 2006. [11] B. H. Lee and H. K. Wu, ”A delayed backoff algorithm for IEEE
[6] Y.K. Huang; A.C. Pang; H.N. Hung, ”An Adaptive GTS Allocation 802.15.4 beacon-enabled LR-WPAN,” Information, Communications &
Scheme for IEEE 802.15.4,” Parallel and Distributed Systems, IEEE Signal Processing, 2007 6th International Conference on, 10-13 Dec.
Transactions on Volume 19, Issue 5, May 2008 Page(s): 641 - 651. 2007 Page(s):1 - 4.
[7] A. Koubaa, A. Cunha and M. ALVES, ”A Time Division Beacon [12] J.Y. Ha; T.H. Kim, H.S. Park; S. Choi and W.H. Kwon, ”An Enhanced
Scheduling Mechanism for IEEE 802.15.4/Zigbee Cluster-Tree Wireless CSMA-CA Algorithm for IEEE 802.15.4 LR-WPANs,” Communications
Sensor Networks,” to be presented in Euromicro Conference on Real- Letters, IEEE, Volume 11, Issue 5, May 2007 Page(s):461 - 463.
Time Systems (ECRTS 2007), Pisa (Italy), July 2007. [13] G. Bhatti, A. Mehta, Z. Sahinoglu, J. Zhang and R.Viswanathan,
[8] Harthikote-Matha, Manjukumar, Banka, Tarun, Jayasumana and Anura ”Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency,”
P, ”Performance Degradation of IEEE 802.15.4 slotted CSMA/CA due GLOBECOM 2008. IEEE, Nov. 30 2008-Dec. 4 2008 Page(s):1 - 5
to Hidden Nodes,” Local Computer Networks, 2007. LCN 2007. 32nd [14] FA TOBAGI, ”Multiaccess protocols in packet communication systems,”
IEEE Conference on, 15-18 Oct. 2007 Page(s):264 - 266. IEEE Transactions on Communications 28, 468-488, 4/1980.
[9] L.J. Hwang, S.T. Sheu, Y.Y. Shih and Y.C. Cheng, ”Grouping Strategy [15] L Kleinrock and F Tobagi, ”Packet Switching in Radio Channels- Part
for Solving Hidden Node Problem in IEEE 802.15.4 LR-WPAN,” I–Carrier Sense Multiple-Access Modes and Their Throughput-Delay
Wireless Internet, 2005. Proceedings. First International Conference on, Characteristics,” IEEE Transactions on Communications, [legacy, pre-
10-14 July 2005 Page(s):26 - 32. 1988], 1975.