You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/221637290

An enhanced collision-avoidance MAC protocol for IEEE 802.15.4

Conference Paper  in  Vehicular Technology Conference, 1988, IEEE 38th · September 2010


DOI: 10.1109/VETECF.2010.5594541 · Source: DBLP

CITATIONS READS
3 399

3 authors:

Feng Wang Dou Li


Centre for Aerospace Science and Technologies Peking University
10 PUBLICATIONS   111 CITATIONS    29 PUBLICATIONS   112 CITATIONS   

SEE PROFILE SEE PROFILE

Yuping Zhao
Peking University
92 PUBLICATIONS   1,393 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

wireless sensor networks View project

Cognitive Radio Networks View project

All content following this page was uploaded by Feng Wang on 05 November 2018.

The user has requested enhancement of the downloaded file.


An Enhanced Collision-Avoidance MAC Protocol
for IEEE 802.15.4
Feng Wang, Dou Li, and Yuping Zhao

Abstract—When an IEEE 802.15.4 network has many nodes 802.15.4 WSNs. Recently some researchers have proposed to
and is almost saturated, the probability of collision is large, and achieve better performance by modifying backoff mechanisms
the throughput is small. The main reasons are the adoption of [11] [12] [13].
slotted CSMA/CA and the mechanism that if a data transmission
cannot be completed before the end of contention access period To improve the capability of IEEE 802.15.4, this paper
(CAP), it has to wait until the start of the CAP in the next makes an in-depth analysis of the IEEE 802.15.4 MAC layer,
superframe. This paper proposes an enhanced collision-avoidance and proposes an enhanced collision-avoidance MAC protocol
MAC protocol for IEEE 802.15.4, and establishes a simulation for IEEE 802.15.4.
model to analyze and compare the enhanced collision-avoidance The rest of the paper is structured as follows. Section II
MAC and the IEEE 802.15.4 MAC. The proposed protocol, com-
patible with the IEEE 802.15.4 protocol, has less probability of carries out a theoretical analysis of slotted CSMA/CA and
collision (almost 0), higher probability of successful transmission the mechanism of data transmission at the start of the CAP.
(close to 1), and larger network throughput (more than two times Section III proposes the enhanced collision-avoidance MAC
of that of IEEE 802.15.4). protocol. In section IV, a simulation model is established to
analyze and compare the performance of the proposed protocol
I. I NTRODUCTION and that of IEEE 802.15.4. Conclusions are given in section
The IEEE 802.15.4 protocol has been proposed as a wireless IV.
communication standard for low-rate, short-range, low-power,
and low-cost wireless personal area networks (LR-WPANs) II. P ROTOCOL A NALYSIS
[1] [2]. There are two kinds of modes in the protocol: non It is well known that the maximum throughput of pure
beacon-enable mode and beacon-enable mode. The former ALOHA is 1/(2e), whereas the maximum throughput of
is suitable for wireless sensor networks (WSNs), and the slotted ALOHA is 1/e, twice of the former [14]. This result
latter with synchronization and contention free period (CFP) is obtained only when the basic time period (BT P ) in slotted
can provide services with different QoS. In IEEE 802.15.4, ALOHA is equal to the data transmission delay. However, the
CSMA/CA is used to access channels. There are two kinds relationship between slotted and unslotted CSMA is different
of CSMA/CA mechanisms, the slotted and the unslotted, from that of pure and slotted ALOHA. The former is more
working in the beacon-enable and non beacon-enable modes complicated because CSMA uses a clear channel assessment
respectively. Furthermore, the definition of CSMA/CA in the (CCA) mechanism and the BT P in slotted CSMA should be
IEEE 802.15.4 protocol is a kind of non-persistent CSMA. the maximum propagation delay [15].
IEEE 802.15.4 is being considered as a promising technol- To analyze the channel capacity of the CSMA mechanism,
ogy for WSNs, and a great deal of research has been carried we define the following important variables: S (throughput), G
out. In [3] and [4], the authors analyzed the slotted CSMA/CA (offered channel traffic rate), T (packet transmission delay), τ
mechanism of IEEE 802.15.4 using Markov chain models. (propagation delay), and α = τ /T (normalized propagation
Meanwhile, [5] paid attention to the throughput and the end- delay). Then the basic equation for the throughput S1 of
to-end delay of the IEEE 802.15.4 CSMA/CA mechanism, unslotted non-persistent CSMA is formulated by means of α
and [6] studied the guaranteed time slot (GTS) mechanism of and G as described in (1) [15], and the throughput S2 for the
the protocol, and [7] conducted a study on a beacon frame slotted CSMA is given by (2). Here the analysis of the basic
schedule of the ZigBee WSNs in the cluster tree topology. CSMA mechanism is used to explain the variation trend of the
By studying the performance of CSMA/CA in a star-network performance and can interpret the problem well. Other kinds
with hidden nodes, [8] pointed out that there exits an optimum of the CSMA strategies have the same tendency despite the
transmission power that minimizes the impact of hidden nodes. fact of that they may have different performances.
In [9], the authors proposed a simple and efficient grouping
Ge−αG
strategy to solve the IEEE 802.15.4 hidden-node problem S1 = (1)
without extra control overheads in data transmissions. More- G(1 + 2α) + e−αG
over, [10] comprehensively studied the performance of IEEE − BT P ∗
BT P
T Ge
T G α∗ Ge−α G
S2 = = (2)
Feng Wang, Dou Li, and Yuping Zhao are with the State Key Laboratory of
BT P BT P
+ (1 − e− T G ) α + (1 − e−α∗ G )

T
Advanced Optical Communication Systems & Networks, Peking University,
Beijing 100871, China (email: fengwangpku@gmail.com, lidou@pku.edu.cn, G
lim S1 = lim S2 = (3)
yuping.zhao@pku.edu.cn). α=α∗ →0 α→0 1+G

978-1-4244-3574-6/10/$25.00 ©2010 IEEE


Fig. 2. The composition of the superframe under IEEE Standard 802.15.4
(adopted from [1])

and retransmissions, sharp decline in throughput, and even


Fig. 1. Throughputs of nonpersistent CSMA
network congestion. As for unslotted CSMA/CA, a node
theoretically has infinite time points to send packets and can
start data transmission at any time. For that reason, if and
We can get (3) when the BT P in slotted CSMA is equal to only if more than one node transmits data during a τ period,
the maximum propagation delay τ (then α = α∗ ). From (3) the network will bear collision. Therefore we conclude that,
we can see that, when the parameter α = α∗ approaches to 0, in the IEEE 802.15.4 protocol, the collision probability of
the throughputs S1 and S2 are both close to the same value, unslotted CSMA/CA with less complexity is much smaller
and a throughput of 1 can theoretically be attained when G than that of slotted CSMA/CA.
equal to infinity. The maximum throughput of slotted CSMA is In [1], in a slotted CSMA system, if the number of backoff
much bigger than that of unslotted CSMA when α = α∗ = 1 periods is greater than the remaining number of backoff
(Fig. 1). When α = α∗ is becoming smaller, the differences of periods in the CAP, the MAC sublayer shall pause the backoff
throughputs are becoming slighter. When α = α∗ = 0.01 and countdown at the end of the CAP and resume it at the start of
α = α∗ = 0.00033, the throughputs of slotted and unslotted the CAP in the next superframe. If the number of backoff
CSMA are almost the same. periods is less than or equal to the remaining number of
IEEE 802.15.4 is one of the LR-WPAN protocols. Its backoff periods in the CAP, the MAC sublayer shall apply
transmission range is tens of meters. Assume that the largest its backoff delay and then evaluate whether it can proceed.
single-hop transmission distance is 100 m, transmission speed The MAC sublayer shall proceed if the remaining CSMA-
is 250 kbps, and data packet length is 256 bits, then, τ = CA algorithm steps (i.e. two CCA analyses), the frame trans-
3.3 × 10−7 s, T = 0.001 s, α = 0.00033. These parameters mission, and any acknowledgment can be completed before
satisfy the requirement that the normalized propagation delay the end of the CAP. If the MAC sublayer can proceed, it
is much less than 1. If α = 0.00033 and BT P = τ , shall request that the PHY perform the CCA in the current
the throughputs of slotted and unslotted CSMA are almost superframe. If the MAC sublayer cannot proceed, it shall
identical, as shown in Fig. 1. wait until the start of the CAP in the next superframe and
However, the BT P is 20 symbols = 80 bits in the slotted repeat the evaluation. Because of this, if the remaining of the
CSMA mechanism of IEEE 802.15.4 [2]. Under this condition, frame transmission cannot be completed in more than one
the BT P is about 937τ , and α∗ is equal to 937α in (2). node, they will be deferred to the start of the next CAP in
We can conclude that the performance of the unslotted with the next superframe and then be transmitted immediately. Of
α = 0.00033 is much better than that of the slotted with course, the collision will happen at that time unavoidably, and
α∗ = 973 × α = 0.3092 from (1), (2) and Fig. 1. In the will cause retransmissions, increase network load and decrease
IEEE 802.15.4 protocol, the inappropriate BT P , which is network throughput. Although [2] has changed the mechanism
much longer than the maximum propagation delay τ , greatly into a new mechanism that frame transmission shall wait until
decreases the number of time points for transmitting data the start of the CAP in the next superframe and apply a further
packets in the time axis, and increases the probability of random backoff delay before evaluating whether it can proceed
sending data packets at the same time point. again, this new mechanism has decreased the probability of
For instance, in the superframe structure collision at the beginning of the superframe, but collision is
shown in Fig. 2, if BO = SO = 0, then still unavoidable under given situations.
SD = aBaseSuperf rameDurarion = 48 × Additionally, the value of minimum backoff exponent
aU nitBackof f P eriod. That is to say, there are 48 (minBE) has a certain effect on the performance of the
time points in maximum to be used to send data. If more network. Small minBE implies short contention window,
than one node sends data at the same time, collision is little average transmission delay, and many collisions for heavy
inevitably to be caused. Therefore, if the network has many network load, and vice versa. Then dynamic value of minBE
nodes and large load, it will cause a mass of collision can achieve better capability of the network [11] [12] [13].
III. E NHANCED C OLLISION -AVOIDANCE P ROTOCOL
This paper proposes an improved MAC protocols for
IEEE 802.15.4. The proposed protocol, compatible with IEEE
802.15.4, solves t he problem of collisions and low throughput
mentioned in section II.
In beacon-enable mode of IEEE 802.15.4, the superframe Fig. 3. The composition of the superframe under the enhanced collision-
avoidance MAC for IEEE 802.15.4
consists of an active period and an inactive period; in the
active period, the slotted CSMA/CA mechanism is mandatory,
and the guaranteed time slot (GTS) mechanism is optional.
data bandwidth.
These characteristics will make the IEEE 802.15.4 network
3) The MAC sublayer shall proceed if the whole trans-
consume less energy, and provide services with different QoSs.
mission can be completed before the end of the CAP.
But the analysis in section II indicates that the performance
If the MAC sublayer can proceed, it shall request
of unslotted CSMA is better than that of slotted CSMA for
that the PHY perform the CCA in the current super-
BT P  τ , and is similar with that of slotted CSMA for
frame. If the MAC sublayer cannot proceed, it shall
BT P = τ , the best length of BT P . Then the selection of
wait until the start of the CAP in the next super-
unslotted CSMA is better for higher throughput, less collision
frame and apply a further random backoff delay be-
and lower complexity. In this paper, the unslotted CSMA/CA
fore evaluating whether it can proceed again. Here the
mechanism and the beacon-enable mode are integrated to get
Basic Time Period BT P =max(system clock period,
better performance through maintaining the primary advan-
maximum propagation delay), and contention win-
tages.
dow is a large number, whose default value is 1024.
Moreover, in the start of the CAP, if the frame to be
transmitted is deferred from the former superframe, another
backoff is needed, with a different contention window. The IV. S IMULATION A NALYSIS
function of this mechanism is to reduce the chance of collision
at the beginning of the superframe. We developed a simulation model to analyze and compare
The key points of the improved protocol have been men- the IEEE 802.15.4 protocol and the improved one using
tioned, and the details are listed as follows: network simulation tool.
1) The format of the superframe is defined by the coor-
dinator.The superframe is bounded by network beacons A. Simulation scenario
sent by the coordinator, and is divided into 16 equally Simulation model is a star topology network in a 100m ×
sized slots. Optionally, the superframe can have an active 100m rectangle, working at 2.4 GHz with a bandwidth of
and an inactive portion (Fig. 3). During the inactive 2 MHz, a physical-layer transmission rate of 250 kbps, and
portion, the coordinator may enter a low-power mode. physical-layer packet of 256 bits. The intervals of packet
The beacon frame is transmitted in the first slot of each generation are subject to an exponential distribution. Detailed
superframe. The beacons are used to synchronize the parameters of the simulation model are shown in Table I. By
attached devices, identify the PAN, and describe the changing normalized network load (N orL) and the number
structure of the superframes. Here the format of the of nodes, normalized sent-packets per second (N orSend),
superframe is the same as that of IEEE 802.15.4 to make collision probability (CP ), throughput (S), ratio of throughput
sure to be compatible and connectable with it. to N orL, and end-to-end delay (ET EDelay) of the network
2) Any device wishing to communicate during the are taken into account. Here N orL means the total quantity
contention access period (CAP) between two bea- of data generated by all the nodes per unit time which is nor-
cons competes with other devices using an unslot- malized to the physical-layer transmission rate. For instance,
ted CSMA-CA mechanism. All transactions are com- if in the unit time all the data generated by the network are
pleted by the time of the next network beacon. 500 kbits, then N orL = 2.
In the random backoff mechanism, minBE can be
For a network, it is always pursuing smaller ET EDelay,
0, 1, 2, and 3, while maxBE is 5 and backoff
bigger S and higher probability of successful transmission
time is aU nitBackof f P eriod × exp(BE), where
though they are interactive and contradictory in theory. In
aU nitBackof f P eriod = 20 symbols. The GTSs form
order to evaluate the performance of the network in a better
the contention-free period (CFP), which always appears
way, a new measure, P erf ormance P , is defined as (4).
at the end of the active superframe starting at a slot
By this measure, the whole capability of the network can be
boundary immediately following the CAP. The PAN
investigated to the specific extent.
coordinator may allocate up to seven of these GTSs,
and a GTS may occupy more than one slot period,
which is the same with that of IEEE 802.15.4 for low- S× S
× N orSend
S
P = N orL
(4)
latency applications or applications requiring specific ET EDelay
TABLE I
PARAMETER OF THE SIMULATION MODEL Throughput
0.6

Parameter Value
0.5

Maximum Throughput
Topology Star
0.4
Range 100m × 100m
0.3
Nodes 3, 10, 20, 50, 100
Bandwidth 2 MHz (2.4 GHz) 0.2

Data rate 250 kbps 0.1 Collision-Avoidance Protocol


Packet length 256 bits IEEE 802.15.4
0
Normalized network load 0-10 0 10 20 30 40 50 60
Number of nodes
70 80 90 100

minBE 3
BO = SO 0 Fig. 6. Maximum throughputs of networks
Buffer 256 Bytes

with 100 nodes, it is obvious that the enhanced collision-


avoidance MAC protocol significantly reduces collision, in-
B. Result analysis
creases the throughout, and upgrades the capability of the net-
Fig. 4 shows the simulation results of the IEEE 802.15.4 work. Other simulation results for the networks with different
network and the improved one with 100 nodes. It can be number of nodes support the above conclusion very well. Fig.
observed in Fig. 4(a) that N orSend in IEEE 802.15.4 has 5 plots the results under the situation of 3 nodes, and the
increased with the increase of N orL, and it is more than 1 maximum throughputs under varied situations with different
when N orL is large enough. This indicates there must be a nodes are plotted in Fig. 6, from which we can see that the
lot of collision in the network then. The CP in IEEE 802.15.4 more the number of nodes, the more prominent the upgrade
is also shown in Fig. 4(a), which increases with the increase of the throughput.
of N orL. For N orSend more than 2, the CP is almost 1, V. C ONCLUSIONS
which means that almost all the data transmission has failed
because of collision and the network has been congested. In It is known from the analysis that we cannot make a
contrast, the N orSend in the enhanced collision-avoidance good thing of the adoption of slotted CSMA in LR-WPAN.
MAC protocol is always less than 1. Although N orSend is Furthermore, a selection of BT P in slotted CSMA with-
smaller, the CP is always a value close to 0, so a higher out caution may cause many collisions to downgrade the
throughput can be ensured. As Fig. 4(b) shows that, with capability of the network with large number of nodes or a
the N orL increasing, the throughput of IEEE 802.15.4 first heavy load. Meanwhile, in IEEE 802.15.4, the mechanism
increases and then decreases, and reaches its peak, just around to deal with the data transmission which is deferred from
25%, when N orL is about 0.5. However, for the enhanced the previous superframe causes collisions at the start of the
collision-avoidance protocol, the throughput first increases, superframe. The enhanced collision-avoidance MAC protocol
then maintains a certain value which is more than twice of for IEEE 802.15.4 proposed in this paper solves these prob-
that in IEEE 802.15.4, reaching more than 65%. No matter lems satisfactorily, and the protocol is compatible with the
how heavy the load is, a part of data can be successfully original, and has less probability of collision, higher proba-
transmitted. Fig. 4(c) and Fig. 4(d) plot the ratio of successful bility of successful transmission and larger network through-
transmitted data to generated data in the network. We can see put. Moreover, considering ET EDelay, throughput, and
that the improved protocol can almost send all the data gener- probability of successf ul transmission, a new measure,
ated timely and successfully for N orL less than 0.5, while the P erf ormance, is defined to evaluate the whole capability of
IEEE 802.15.4 protocol can only send part of the data because the network. Finally, the simulation results show the upgrade
of collisions. From the comparison of ET EDelay in the two of the performance in the improved protocol.
networks in Fig. 4(e), we can know that both of them increase R EFERENCES
with the increase of N orL. In addition, when N orL is more [1] ”Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer
than 0.25, the ET EDelay of the enhanced collision-avoidance (PHY) Specifications for Low-Rate Wireless Personal Area Networks
protocol is bigger than that of the IEEE 802.15.4 protocol. The (LR-WPANs)”, IEEESA Standards Board.
[2] ”Part 15.4b: Wireless Medium Access Control (MAC) and Physical
main reason is that the throughput of the improved protocol Layer (PHY) Specifications for Low Rate Wireless Personal Area
is much higher at that time. For a comprehensive analysis, the Networks (WPANs) ”, IEEESA Standards Board.
parameter defined in this paper, P , is plotted in Fig. 4(f), which [3] S. Pollin, M. Ergen, S.C. Ergen, B. Bougard, F. Catthoor, A. Bahai, P.
Varaiya, ”Performance Analysis of Slotted Carrier Sense IEEE 802.15.4
shows us that the value in the improved protocol is bigger than Acknowledged Uplink Transmissions,” WCNC 2008. IEEE March 31
that in IEEE 802.15.4. It implies the improvements proposed 2008-April 3, 2008, Page(s):1559 - 1564.
by us have significantly upgraded the capability of the original [4] J.H. He, Z. Tang, H.H. Chen, Q. Zhang, ”An accurate and scalable ana-
lytical model for IEEE 802.15.4 slotted CSMA/CA networks,” Wireless
IEEE 802.15.4 protocol. Communications, IEEE Transactions on Volume 8, Issue 1, Jan. 2009
Through the analysis of the simulation results of the network Page(s):440 - 448.
7 0.7
NorSend in IEEE 802.15.4 IEEE 802.15.4
1
6 Collision Probability in IEEE 802.15.4 Collision-Avoidance Protocol
0.6
NorSend in Collision-Avoidance Protocol IEEE 802.14.5

Ratio of successful sent to generated


Collision Probability in Collision-Avoidance Protocol Collision-Avoidance Protocol
5 0.8
0.5

4
Ratio ofthroughputto NorL

Throughput
0.4
S (Troughput) 0.6
3
0.3
2 0.4

0.2
1
0.2
0.1
0

-1 0 0
0 2 4 6 8 10 12 0 2 4 6 8 10 12 0 2 4 6 8 10 12
(a) NorL (b) NorL (c) NorL
0.018 50
IEEE 802.15.4 IEEE 802.15.4 IEEE 802.15.4
1 45
Collision-Avoidance Protocol 0.016 Collision-Avoidance Protocol Collision-Avoidance Protocol
Ratio of successful sent to generated

40
0.014
0.8
35
0.012 ETEDelay 30

Performance
Perform ance

ETEDelay
0.6 Ratio ofthroughputto NorL
0.01 25

20
0.4 0.008
15
0.006
0.2 10
0.004
5

0 0.002 0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
(d) NorL (e) NorL (f) NorL

Fig. 4. NorSend, CP, S, Ratio of throughput to NorL, ETEDelay, and Performance of the networks with 100 nodes

0.45
IEEE 802.15.4
0.4
0.4 Collision-Avoidance Protocol
0.35 1
0.35
0.3

Ratio of throughput to NorL


0.3 0.8
0.25
S(Throughput)

NorSend in IEEE 802.15.4 Ratio ofthroughputto NorL


0.2 0.25
Collision Probabality in IEEE 802.15.4
0.6
0.15 NorSend in Collision-Avoidance Protocol
0.2
Collision Probability in Collision-Avoidance Protocol
0.1 Throughput
0.15 0.4
0.05
0.1
0 0.2
-0.05 0.05 IEEE 802.15.4
Collision-Avoidance Protocol
-0.1 0 0
0 0.5 1 1.5 2 2.5 3 3.5 0 0.5 1 1.5 2 2.5 3 3.5 0 0.5 1 1.5 2 2.5 3 3.5
(a) NorL (b) NorL 2 (c) NorL
0.018 10
IEEE 802.15.4 IEEE 802.15.4 IEEE 802.15.4
Collision-Avoidance Protocol Collision-Avoidance Protocol Collision-Avoidance Protocol
0.016
1
1
0.014 10
Ratio of throughput to NorL

0.8
0.012
Perform ance
Performance
ETEDelay

ETEDelay
0
0.6 0.01 10

0.008
0.4
-1
Ratio ofthroughputto NorL 0.006 10

0.2
0.004

-2
0 0.002 10
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.05 0.1 0.15 0.2 0.25 0.3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
(d) NorL (e) NorL (f) NorL

Fig. 5. NorSend, CP, S, Ratio of throughput to NorL, ETEDelay, and Performance of the networks with 3 nodes

[5] A. Koubaa, M. Alves, and E.Tovar, ”A Comprehensive Simulation [10] J. Zheng and M. J. Lee, ”A Comprehensive Performance Study of IEEE
Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Net- 802.15.4,” Sensor Network Operations, IEEE Press, Wiley InterScience,
works,” Workshop on Factory Communication Systems (WFCS’06), Chapter 4, pp. 218-237, 2006.
Torino (Italy), Jun. 2006. [11] B. H. Lee and H. K. Wu, ”A delayed backoff algorithm for IEEE
[6] Y.K. Huang; A.C. Pang; H.N. Hung, ”An Adaptive GTS Allocation 802.15.4 beacon-enabled LR-WPAN,” Information, Communications &
Scheme for IEEE 802.15.4,” Parallel and Distributed Systems, IEEE Signal Processing, 2007 6th International Conference on, 10-13 Dec.
Transactions on Volume 19, Issue 5, May 2008 Page(s): 641 - 651. 2007 Page(s):1 - 4.
[7] A. Koubaa, A. Cunha and M. ALVES, ”A Time Division Beacon [12] J.Y. Ha; T.H. Kim, H.S. Park; S. Choi and W.H. Kwon, ”An Enhanced
Scheduling Mechanism for IEEE 802.15.4/Zigbee Cluster-Tree Wireless CSMA-CA Algorithm for IEEE 802.15.4 LR-WPANs,” Communications
Sensor Networks,” to be presented in Euromicro Conference on Real- Letters, IEEE, Volume 11, Issue 5, May 2007 Page(s):461 - 463.
Time Systems (ECRTS 2007), Pisa (Italy), July 2007. [13] G. Bhatti, A. Mehta, Z. Sahinoglu, J. Zhang and R.Viswanathan,
[8] Harthikote-Matha, Manjukumar, Banka, Tarun, Jayasumana and Anura ”Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency,”
P, ”Performance Degradation of IEEE 802.15.4 slotted CSMA/CA due GLOBECOM 2008. IEEE, Nov. 30 2008-Dec. 4 2008 Page(s):1 - 5
to Hidden Nodes,” Local Computer Networks, 2007. LCN 2007. 32nd [14] FA TOBAGI, ”Multiaccess protocols in packet communication systems,”
IEEE Conference on, 15-18 Oct. 2007 Page(s):264 - 266. IEEE Transactions on Communications 28, 468-488, 4/1980.
[9] L.J. Hwang, S.T. Sheu, Y.Y. Shih and Y.C. Cheng, ”Grouping Strategy [15] L Kleinrock and F Tobagi, ”Packet Switching in Radio Channels- Part
for Solving Hidden Node Problem in IEEE 802.15.4 LR-WPAN,” I–Carrier Sense Multiple-Access Modes and Their Throughput-Delay
Wireless Internet, 2005. Proceedings. First International Conference on, Characteristics,” IEEE Transactions on Communications, [legacy, pre-
10-14 July 2005 Page(s):26 - 32. 1988], 1975.

View publication stats

You might also like