Next Article in Journal
The Dual Carrier ABSK System Based on a FIR Bandpass Filter
Previous Article in Journal
Development of an Electrochemical Sensing Technique for Rapid Genotyping of Hepatitis B Virus
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4

1
Vestel Electronics, 45030, Manisa, Turkey
2
Institute of Electronics, Computer and Telecommunication Engineering (IEIIT), National Research Council (CNR), 40126, Bologna, Italy
3
Electrical, Electronic, and Information Engineering (DEI), University of Bologna, 40126, Bologna, Italy
*
Author to whom correspondence should be addressed.
Sensors 2014, 14(3), 5622-5643; https://doi.org/10.3390/s140305622
Submission received: 4 November 2013 / Revised: 12 March 2014 / Accepted: 14 March 2014 / Published: 20 March 2014
(This article belongs to the Section Sensor Networks)

Abstract

: Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

Graphical Abstract

1. Introduction

Among the possible medium access control (MAC) techniques for wireless communication systems, the simplicity of random access schemes (i.e., ALOHA, carrier sense multiple access (CSMA)) make them suited to be implemented in several standards for short range applications [1,2]. Even though mitigation methods can be introduced in random access MAC (i.e., carrier sense multiple access with collision avoidance (CSMA-CA)), collisions are not completely avoidable. Nevertheless, some receivers have the ability to correctly receive a signal despite a significant level of co-channel interference, and collisions do not always lead to a total loss of the collided packets. This co-channel interference tolerance is called capture effect [3]. In the presence of concurrent transmissions at the same carrier frequency (collisions), packet capture may happen even for low values of the signal-to-interference ratio (SIR).

The first papers in the literature about the capture effect mostly consider Frequency Modulation (FM) demodulators [35]. Later, the capture effect has been also studied in a variety of transceivers and MAC schemes, including ALOHA networks [68], IEEE 802.11 devices [911], Bluetooth radios [12] and cellular systems [13]. Focusing on IEEE802.15.4, several papers describing experimental results can be found in the literature [1422]. To give some examples, in [14], the packet capture probability of a Chipcom CC1000 transceiver [15] is measured with the aim of exploiting the capture effect for collision detection and recovery. Another study [16], carried out again with CC1000 transceivers, which work in the sub-1 GHz band, obtained a threshold for the capture probability for the case of one interferer, but unstable results for the multiple interferers. This early work seems to suggest that the number of interferers might have an important effect on the capture probability with CC1000 devices. However, in contrast to the previous CC1000 measurements, successive studies, carried out with Chipcon CC2420 transceivers [17], which operate in the 2.4 GHz industrial, scientific and medical (ISM) band, show that the capture effect depends on the total interfering power, but it is independent of the number of interferers [18,21]; therefore, in our mathematical analysis, we assume that the performance is independent of the number of interferers for the 2.4 GHz physical layer (PHY) of IEEE 802.15.4, and as a result, we use only one interfering signal for the mathematical evaluation. A behavior on the packet capture similar to that reported in [16,18] is also observed in [20] with Freescale MC1224 transceivers [22], which, again, operate in 2.4 GHz. The experiments conducted in interferer power-dominant (with respect to the noise) environments in [16,1820] show a couple of common behaviors: (i) the receiver starts capturing the useful packet when signal-to-interference-plus-noise ratio (SINR) goes beyond 0 dB; (ii) packet reception rate (PRR) reaches one for values of SINR larger than 4 dB (please see in [16], Figure 5 and Figure 16, for CC1000 and CC2420, respectively; in [18], Figure 4 for CC2420; in [19], Figure 7c for CC2420; and in [20], Figure 3 for MC13192).

Although the experimental results in [16,1820] agree with each other, there is no theoretical model, purely based on mathematical analysis, which can be applied to the 2.4 GHz PHY of IEEE 802.15.4 to explain such characteristics. Motivated by this consideration, we propose an analytical framework to investigate the behavior of the IEEE 802.15.4 2.4 GHz PHY layer. A review of low-rate wireless personal area network (LR-WPAN) solutions, including IEEE 802.15.4, can be found in [23].

The impact of interference in wireless sensor networks plays a very important role and can severely degrade the overall performance of the network and the efficiency of the upper layers. In our opinion, this aspect has not been sufficiently addressed in past years. In a dense sensor network deployment, where many nodes are periodically sending data to the sink, concurrent transmissions are highly probable. However, the probability of having a collision because of more than two concurrent transmissions is relatively low [18,20], thanks to CSMA-CA. In such conditions, the performance of the receiver depends on the overall amount of interferer signal energy and does not change with the number of interferers [18,21]. Hence, solely the impact of one interferer on the capture probability will be considered in the mathematical analysis.

On the other hand, we believe this study can also contribute to the identification of signal reception models for network simulators. In particular, as shown in Table 1, most common network simulators use signal-to-noise ratio threshold (SNRT)- or bit error rate (BER)-based models in order to decide the correct reception of a packet.

In SNRT-based models, the packet is correctly received if the signal-to-noise ratio (SNR) is larger than a given threshold, whereas, in BER-based models, the packet reception decision is based on the BER, which is determined probabilistically depending on the value of the SNR. These models are rather simple, but have some drawbacks. In particular, SNR-based models do not take into account the impact of interference. This latter effect can be considered, in principle, by BER-based models, but the impact of the waveform of the interferer signals should be carefully considered, as it plays a significant role. Typically, conventional interference models are based on the assumption that the disturbance can be modeled as a Gaussian random variable; unfortunately, this is not the case of IEEE 802.15.4 systems, where only a limited number of strong interferers is present. To counteract this problem, we mathematically analyze the impact of the waveform of the interferer on packet reception and obtain curves that are organized as specific look-up tables. Figures, such as those derived in Figures 4 and 6, can be used to provide accurate PHY models for network simulators. In that case, the conventional on-off behavior of SNRT-based models can be replaced by a probabilistic model, where the actual value of SIR leads to a given probability of packet loss. In other words, we provide a SIR-based signal reception model for the interference-dominant environments, where noise is not the serious cause of packet loss (i.e., enough transmit power is used or nodes are using the best links to reach the destinations in a dense sensor network deployment). Furthermore, Figure 7 shows that, in the case of non-coherent detection in an interferer-dominant environment, an on-off model can be also applied. In any case, behavior changes when thermal noise cannot be neglected. As a conclusion, the results of this paper on chip error rate (CER) and PRR (see Figures 6 and 7) can be used within network simulators in terms of look-up tables. That allows a fast characterization of the behavior of the PHY layer.

The computational complexity of the model for the coherent detection is O(1) (in big O notation). This makes it usable without intensive computational effort. For the non-coherent case, we show that the performance curve has a step-like behavior with the threshold at 0 dB. This simple model can capture the behavior of the non-coherent case without any computational effort.

The rest of the paper is organized as follows: Section 2 describes CSMA-CA and the 2.4 GHz PHY of the IEEE 802.15.4 Standard. Sections 3 and 4 evaluate CER for coherent and non-coherent offset quadrature phase shift keying (O-QPSK), respectively. Section 5, obtains PRR in concurrent transmission by finding an upper bound, which transforms CER to data symbol error rate (DSER).

2. System Description

Two different approaches are foreseen in IEEE 802.15.4 to coordinate the data traffic: beacon-enabled mode and non-beacon-enabled mode [2]. In the former, periodic beacons are sent by the coordinator to synchronize the channel access, while in the latter, no synchronization is required. CSMA-CA is used in both modes, but in a slightly different way. In the beacon-enabled mode, every node synchronizes itself to the backoff slots determined by the coordinator; for this reason it is named slotted CSMA-CA. In non-beacon-enabled mode, every node has its own backoff slot timing, so that it is called unslotted CSMA-CA. Default values of the parameters and the number of sensing phases before assessing the channel idle are different in slotted and unslotted versions as a result of synchronization (i.e., two backoff slots in slotted, one backoff slot in unslotted). In both modes, each node waits for a random number of backoff slots, then channel sensing is performed. If the channel is found to be free, the node immediately starts the transmission. If the channel is found to be busy, the node turns back to the backoff state again. There is a maximum number of attempts a node can try to sense the channel. When this maximum is reached, the algorithm ends with a failure. Even though CSMA-CA avoids collisions by sensing the channel before transmitting a packet, a hidden terminal effect or sensing the channel as idle exactly at the same time by more than one node can cause a collision. As discussed in the previous Section, a collision does not always lead to a total loss. One of the packets, most probably the one with the better signal strength, can be successfully received.

IEEE 802.15.4 PHY uses direct sequence spread spectrum (DSSS), and it operates over different ISM bands: the 868 MHz (EU) ISM band, the 915 MHz (US) ISM band and the 2.4 GHz global ISM band. Because of the global availability of the higher frequency band, currently transceiver manufacturers mostly have products working in this band (i.e., Chipcon CC2420, Freescale MC13224, etc.). In the paper, we focus on the 2.4-GHz frequency band, which utilizes half-sine shaped O-QPSK modulation. In the PHY layer of the 2.4 GHz band, the signal is first modulated by forming a data symbol of four bits, and then, this symbol is mapped to 32-chip long sequences, obtaining 16 data symbols. The data symbol set modulated at the carrier frequency, fc, and carrier phase, ϕC, can be written as:

s C i ( t ) = I i ( t ) cos ( 2 π f c t + ϕ C ) Q i ( t ) sin ( 2 π f c t + ϕ C ) i = 0 , 1 , , 15

For each chip sequence, even-indexed chips are modulated to the in-phase (I) carrier, and odd-indexed chips are modulated to the quadrature-phase (Q) carrier of O-QPSK. The offset between the I-phase and Q-phase is formed by delaying the Q-phase symbols one chip duration with respect to the I-phase. I(t) and Q(t) for each data symbol can be written as in [25]:

I i ( t ) = n = 0 15 c 2 n i h ( t 2 n T c )
Q i ( t ) = n = 0 15 c 2 n + 1 i h ( t ( 2 n + 1 ) T c )
where c k i is ±1 with respect to the chip value and i is the index of the data symbols. The function, h(t), is half-sine shaped and can be expressed as:
h ( t ) = { cos ( π t 2 T c ) if T c t < T c 0 otherwise
Finally, the complex baseband signal is given as:
s ˜ C i ( t ) = I i ( t ) + j Q i ( t ) ;
the corresponding data symbol set in time domain will be expressed by using the complex envelope as:
s C i ( t ) = [ s ˜ C i ( t ) exp ( j ( 2 π f c t + ϕ C ) ) ]
where ℜ[·] is the real part of the complex expression.

3. Probability of Chip Error in Coherent O-QPSK

In this section, we consider coherent communication and evaluate the chip error probability when there is one interferer with an unknown carrier phase and symbol timing. As the experiments in [16,1820] suggest, we assume that the signal of the interferer is additive, and the probability of error is independent of the number of interferers. As a consequence, we will consider one interfering signal. Under such an assumption, the received O-QPSK modulated signal, in the time interval −Tct < Tc, can be written as:

r ( t ) = [ s ˜ C ( t ) exp ( j ( 2 π f c t + ϕ C ) ) ] + [ s ˜ I ( t ) exp ( j ( 2 π f c t + ϕ I ) ) ] T c t < T c
where C (t) and I (t) are the complex envelopes of the useful and interferer signals and ϕC and ϕI are the carrier phases of the useful and interferer signals, respectively. There is no phase difference between the useful transmitter and the receiver, since we are assuming coherent demodulation. Therefore ϕC = 0, but the carrier phase of the interferer, ϕi, is unknown. After some algebra, Equation (6) can be expressed as:
r ( t ) = [ r ˜ ( t ) exp ( j 2 π f c t ) ] T c t < T c
where the complex envelope is:
r ˜ ( t ) = s ˜ C ( t ) + s ˜ I ( t ) exp ( j ϕ I ) T c t < T c

In the case of coherent demodulation, the I and Q components should be sampled at the instance corresponding to the maximum signal amplitude; hence for a sequence of chips, the I-phase should be sampled at the instants tIn = 2nTc (see Equation (2)) and the Q-phase at the instants tQn = (2n + 1)Tc (see Equation (3)), where n = 0, 1, 2,…. This results in sampling the I and Q components of the useful signal at the indicated sampling instances in Figure 1a and Figure 3a. Due to the delayed sampling between the I and Q components, we will consider a Q-I constellation plane, where the Q component is delayed by Tc seconds with respect to the I component. We named the resulting constellation plane Qd-I to emphasize the delay. In the next two subsections, we derive the CER for the received signal in Equation (8), as a function of SIR, considering two cases: without and with pulse shaping. Thermal noise is neglected in the analysis, as we want to investigate solely the effect of interference on CER. The effect of noise will be considered in Section 5 to compare the analysis with the experimental results.

3.1. Without Pulse Shaping

When we take the case of no pulse shaping into account, the shaping function, h(t), is a non-return to zero (NRZ) rectangular pulse, whose expression is:

h ( t ) = { 1 T c t < T c 0 otherwise.

Accordingly, the complex envelope of the received signal in Equation (8) on the Qd-I constellation plane can be written as:

r ˜ ( t ) = ( ± C 2 ± j C 2 ) + ( ± I 2 ± j I 2 ) h ( t ) exp ( j ϕ I ) T c t < T c , 0 ϕ I < 2 π
where C and I represent the energies of the useful and interferer signals, respectively. ϕI is the carrier phase of the interferer. Since the demodulation is coherent, perfect knowledge of the carrier phase and symbol timing is assumed for the useful signal. These parameters are supposed to be uniformly distributed random variables for the interfering signal. The pulse shaping function is constant throughout a chip duration; thus, random symbol timing of the interferer, t, does not give any contribution to the performance. On the contrary, the presence of an interferer carrier phase has a significant impact on the received signal, because ϕI rotates the interfering signal on the Qd-I domain, as indicated in the second addend of Equation (10). The geometric representation of Equation (10) on the Qd-I constellation plane is depicted in Figure 1.

With respect to the transmitted symbol, the first addend in Equation (10) will be one of the constellation points on the Qd-I domain, as shown in Figure1b, while the second addend in Equation (10) represents the interfering signal, which can be any of the points shown in Figure 1d, but rotated according to the interferer carrier phase, ϕI. The final sum in the equation can be interpreted as in Figure 1e; the sampling point of the received signal is located in one of the quadrants in the Qd-I plane, in agreement with the transmitted useful symbol, but, due to the presence of the interferer, it is shifted to a random location over the circle with radius I and the center at ( ± C 2 , ± j C 2 ). The amplitude of the useful signal on the Qd-I plane is C, and the amplitude of the interferer signal is I. In the following parts, Pc and Ps will denote the probability of chip error and the probability of O-QPSK symbol error, respectively If we consider an ideal maximum likelihood demodulator [26], three distinct cases need to be investigated.

3.1.1. Case (a): I < C / 2

When I is smaller than C / 2, as shown in Figure 2a, the received signal never crosses other symbol regions. As a consequence, the demodulator will never make an error, and therefore:

P c = 0 P s = 0

3.1.2. Case (b): C / 2 I < C

When I is larger than (or equal to) C / 2, the demodulator will start deciding erroneously, because of the stronger signal energy of the interfering component, which forces the received signal to be sampled in one of the adjacent quadrants on the constellation plane, as shown in Figure 2b. In such a condition, the probability of symbol error will be given by:

P s = S 0 π = 2 2 α 2 π = 2 α π
where S0 is the arc of the circle shown in Figure 2b, the angle, α, in radians, is equal to S0/2, and α is:
α = arctan I ( C / 2 ) C / 2

The sampling point of the received signal can only pass to the adjacent quadrants, and the receiver makes a one chip error per each transmitted symbol; as a result, Pc will be the half of Ps:

P c = 4 α 4 π = α π

3.1.3. Case (c): C I

For increasing values of I, the circle will move to the other side of the origin (see Figure 2c). α can still be written as in Equation (11), but now:

S 0 = α S 1 = π / 2 α S 2 = 2 α π / 2

When the received signal is in S2, the receiver makes two chip errors per each transmitted symbol. On the other hand, when it is in S0 or in S1, the receiver makes one chip error per each transmitted symbol. Regarding the number of chip errors in the different quadrants, Ps and Pc can be written as:

P s = 2 ( S 0 + S 1 ) + S 2 2 π = α π + 1 4 P c = 2 ( S 0 + S 1 ) 2 π 1 2 + S 2 2 π = α π

The computational complexity of Ps and Pc is O(1) in big O notation, since C and I are constant values.

3.2. Half-Sine Pulse Shaping

Using the pulse shaping given by Equation (4), the received signal in Equation (8) can be written, on the Qd-I plane, as:

r ˜ ( t ) = ( ± C 2 ± j C 2 ) + ( ± I 2 ± j I 2 ) cos ( π t 2 T c + ϕ I ) T c t < T c , 0 ϕ I < 2 π
where the first addend represents the useful symbol and the second addend represents the interferer symbol. In the variable, t, in Equation (12), is the sampling instance for the interferer symbol, and ϕI is the carrier phase of the interferer, which shifts the pulse shaping function on the Qd-I domain.

When there is perfect knowledge of the useful carrier phase and symbol timing, there is no difference, from the demodulator point of view, between half-sine-shaped or not shaped useful symbols, since the sampling is done at the maximum amplitude instance. As a consequence, the first addends in Equation (10) and Equation (12) are equal; this can also be observed by comparing Figure 1b with Figure 3b. When the pulse shaping function, cos ( π t 2 T c + ϕ I ), of the interferer is included to the scenario, the interferer signal will be positioned on one of the diagonal lines shown in Figure 3d. As a consequence, the received signal plus interferer will be positioned over the dashed lines of Figure 3e. To obtain the error probability, we need to derive the probability distribution of the amplitude of the interferer at the sampling instance.

The random symbol sampling instance, t, and carrier phase, ϕI, of the interferer can be modeled as uniformly distributed random variables. To simplify the notation in a pulse shaping function, we substitute the random variables as X = π t 2 T c, Y = ϕI and Z = X + Y and denote the Probability Density Functions (PDFs) of X and Y as fX(x) and fY(y); then the PDF of Z, which is our interest, will be the convolution integral [27] given as:

f Z ( z ) = f X ( x ) f Y ( z x ) d x = { π + 2 z 4 π 2 π 2 z < π 2 1 2 π π 2 z < 3 π 2 5 π 2 z 4 π 2 , 3 π 2 z < 5 π 2 0 otherwise = 1 2 π 0 z < 2 π
where:
f X ( x ) = { 1 π , π 2 x < π 2 0 otherwise f Y ( y ) = { 1 2 π , 0 y < 2 π 0 otherwise

The solution of the convolution integral in Equation (13) indicates that Z is a uniformly-distributed random variable in the interval 0 ≤ z < 2π. Thus, the sampled point of the interferer signal is ( ± I 2 ± j I 2 ) cos ( z ), and it always stays over the dashed lines in Figure 3d. If the interferer is transmitting m3 or m0, the slope of the diagonal line is +1; on the other hand, if the interferer is transmitting m1 or m2 then the slope is − 1. The probability distribution of the positions of the interferer sampling point on the dashed lines are symmetric on the opposite sides of the origin, because of the cosine function. The amplitude in a quadrant is:

i = I cos ( z ) π / 2 z < π / 2

Using Equation (14), the PDF of the amplitude is written as:

f i ( i ) = 2 π 1 ( i / I ) 2 0 i I .
Then, we can also obtain the probability that the interferer amplitude lies in an interval (a, b] using Equation (15):
Prob ( a < i b ) = F i ( b ) F i ( a ) = a I b I f i ( i ) d i = 2 π ( sin 1 ( b I ) sin 1 ( a I ) )
where Fi(i) is the Cumulative Distribution Function (CDF) of i.

Without loss of generality, as we did in Section 3.1, it can be assumed that the transmitter is transmitting m3. Therefore, to obtain Pc and Ps, we should consider the following two cases: (a) I < C, and (b) I C

3.2.1. Case (a): I < C

When I is smaller than C, the demodulator never makes an error, since the received signal never crosses the other quadrants. Thus, Pc and Ps are equal to zero:

P s = 0 P c = 0

3.2.2. Case (b): I C

When i, which refers to the amplitude of the interferer signal at the sampling instance, is larger than or equal to C / 2, the receiver can decide for the wrong symbol with a probability of 3 4. Regarding Pc, a transition towards m2 or m1 will result in one chip error per symbol, while a transition towards m0 will result in two chip errors per symbol. Therefore, the error rates when i > C / 2 are:

P s = 3 4 P c = 1 4 1 2 + 1 4 1 2 + 1 4 = 1 2

In general, Ps and Pc can be written as a function of i as follows:

P s ( i ) = { 0 , i < C 3 4 , C i I P c ( i ) = { 0 , i < C 1 2 , C i I
Finally, we can derive the error probabilities when I is greater than C by evaluating the expected values of Ps(i) and Pc(i):
P s = E [ P s ( i ) ] = C I 3 4 f i ( i ) d i = 3 4 F i ( C < i I ) = 3 4 2 π ( π 2 sin 1 ( C I ) ) = 3 4 6 4 π sin 1 ( C I ) P c = E [ P c ( i ) ] = C I 1 2 f ( i ) d i = 1 2 F i ( C < i I ) = 1 2 2 π ( π 2 sin 1 ( C I ) ) = 1 2 1 π sin 1 ( C I )
where fi(i) is given in Equation (15) and Fi(i) is given in Equation (16).

The computational complexity of Ps and Pc are O(1) in big O notation, since C and I are constant values.

3.3. Validation of the Analytical Model through Simulations

The validity of our analytical framework has been tested using Monte-Carlo simulations. The simulation tool has been implemented in MATLAB (The MathWorks Inc., Natick, MA, USA) using the complex envelopes of the signals. Asynchronous symbols are obtained by shifting the complex envelope in the time axis, while the random carrier phase is obtained through rotating the complex envelope on the complex plane. SIR values with a step of 0.3 dB from −10 dB to 5 dB are simulated. At each specific SIR value, 10, 000 random O-QPSK symbols are generated for both the interferer and useful transmitter. The complex baseband representation of the O-QPSK symbol is generated by using 100 points; therefore, the resolution of the time for the asynchronous O-QPSK symbols was 10 ns. On the other hand, the resolution for the carrier phase was 2π/100. Random asynchronous interfering symbols with a random carrier phase are generated with uniformly-distributed parameters. The excellent agreement between simulation points and analytical curves is shown in Figure 4. Since the analysis in Sections 3.1 and 3.2 is exact (no approximation is used), we expect a perfect overlapping between simulations and the analytical model. Asymptotically, there is a 3-dB difference between the results of half-sine shaped and non-shaped symbols. In half-sine pulse shaping, Pc goes to zero at 0 dB, while the threshold is 3 dB in the absence of pulse shaping.

4. Probability of Chip Error in Non-Coherent O-QPSK

Normally, O-QPSK requires coherent detection [26]; however with the half-sine pulse shaping in 2.4 GHz PHY of IEEE 802.15.4, the information-bearing part of the signal is not only the carrier phase, but also the complex-envelope of the signal. Thus, without recovering the carrier phase, just observing the phase changes of the complex envelope, transmitted information can be extracted. In 2.4 GHz PHY of IEEE 802.15.4, the phase of the complex envelope increases or decreases by an amount of π/2 every Tc seconds. In this sense, the behavior of the modulation is similar to that of minimum shift keying (MSK). The main difference between the two modulations is that they use different symbol mappings. In particular, symbol mapping in IEEE 802.15.4 is shown in Figure 5.

Chip intervals in Figure 5a are marked as TC1,TC2, …. In each even chip interval, TC2,TC4,…, a symbol (m0, m1, m2, m3) is transmitted, and in the odd chip intervals, TC3,TC5, …, there are phase changes (t4, t5, t6, t7), which can be considered as the transitions between two sequential O-QPSK symbols. For instance, in Figure 5a, a sequence of phase changes are shown. At the beginning of the TC2 chip interval (i.e., ωt = 0), the phase of the signal is equal to the carrier phase, ϕC; then at the end of the same chip interval, the phase reaches ϕC + π/2, which is indicated in Figure 5b by the arc, m3. In the next chip interval, TC3, the phase reaches the ϕC + π value, which is represented by the arc, t5. The sequential chip intervals send the phase of the complex envelope, π/2, further or back with respect to the transmitted symbols. All possible phase transitions are shown in Figure 5b. This relationship between phase transition and transmitted symbol suggests the idea of constructing a non-coherent detector, which identifies the transmitted chip based on the phase transitions of the complex envelope. Using such a detector, Pc will refer to the probability of the erroneous detection of phase transitions during a chip interval. In the absence of interference, the complex envelope of the received chip through a chip duration in the Q-I plane can be expressed as:

R ( ω t ) = C e j ( ± ω t + ϕ C ) , ω t [ 0 , π / 2 ] , ϕ c [ 0 , 2 π ]
where C is the energy of the signal and ϕC is the uniformly distributed carrier phase. The definition domain of ωt is from zero to π/2, because the signal can only move π/2 further on the Q-I plane during a chip interval. The instantaneous phase of R(ωt) in Equation (17) is:
Θ R ( ω t ) = ± ω t + ϕ C
and the phase of the received signal at the beginning and at the end of the chip interval is:
Θ R ( 0 ) = ϕ C Θ R ( π / 2 ) = ± π / 2 + ϕ C .
Since the carrier phase can be eliminated by subtracting ΘR(π/2) and ΘR(0), the following discriminator demodulator can be applied [28]:
Θ R ( π / 2 ) j + j Θ R ( 0 )
where the decision is based on the comparison of the phases of the complex envelope of the received signal at the beginning and at the end of the chip interval. The demodulator decides for a positive phase change, +j, if the phase at the end of the chip interval is higher than the beginning; otherwise, it decides for a negative phase change, −j. Firstly, we will analyze the case where the symbols of the interferer are synchronous (according to the chip interval) with the useful symbols. This assumption is not realistic, but provides the mathematical basis for the framework that will be used for the more realistic case, where the interferer and useful symbols are asynchronous.

4.1. Interferer and Useful Symbols are Synchronous

When useful and interfering signals are synchronous, the received signal can be written as:

R ( ω t ) = C e j ( b C ω t + ϕ C ) + I e j ( b I ω t + ϕ I )
where ωt = [0, π/2], ϕC = [0, 2π] and ϕI = [0, 2π]. bC and bI represent the turning directions of the phase of the complex envelope of the useful and the interferer chips on the complex domain in Figure 5b: bC, bI = +1 means a clockwise direction, whereas bC, bI = −1 means the counter-clockwise direction. We denote Peq as the probability of erroneous detection when the phases of useful and interferer signals are turning to the same direction (bC = bI), while Pdif denotes the probability of erroneous detection when phase transitions are toward the different directions (bCbI). There are two cases; accordingly, Pc is:
P c = 1 2 P e q + 1 2 P d i f

Note that if the phase of the interferer signal turns toward the direction of the useful signal, the received signal in the Q-I plane will turn toward the direction of the useful signal, as well. As a consequence, Peq will always be zero. To obtain Pdif, we can consider the case where bC = +1 and bI = −1; in fact, this is mathematically identical to the case of bC = −1 and bI = +1. Motivated by this consideration, we can define the following success/error rule for the demodulator, based on the phase values at the beginning and at the end of the chip interval:

Θ R ( π / 2 ) e s Θ R ( 0 )
where s means success and e means error. When bC = +1 and bI = −1, the received signal is:
R ( ω t ) = C e j ( ω t + ϕ C ) + I e j ( ω t + ϕ I )
To obtain an analytical expression to ΘR(ωt), we assume that during a chip interval, R(ωt) always stays on the definition domain of arctan (i.e., [−π/2 π/2]). Starting from Equation (23), the instantaneous phase function can be written as:
Θ R ( ω t ) = arctan ( C sin ( ω t + ϕ C ) + I sin ( ω t + ϕ I ) C cos ( ω t + ϕ C ) + I cos ( ω t + ϕ I ) )

With no loss of generality, we can assume ϕc = 0. Now, after some trigonometric simplifications, the phases of the received signal at the beginning and at the end of the chip interval can be written as:

Θ R ( 0 ) = arctan ( I sin ( ϕ I ) C + I cos ( ϕ I ) ) Θ R ( π / 2 ) = arctan ( C ( I ) cos ( ϕ I ) I sin ( ϕ I ) )
After replacing ΘR(0) and ΘR(π/2) in Equation (22), the decision rule becomes:
arctan ( C I cos ( ϕ I ) I sin ( ϕ I ) ) e s arctan ( I sin ( ϕ I ) C + I cos ( ϕ I ) )
by recalling that arctan(·) is monotonically increasing in [−π/1 π/2], Equation (25) becomes:
C I cos ( ϕ I ) I sin ( ϕ I ) e s I sin ( ϕ I ) C + I cos ( ϕ I )
to keep the trajectory of R(ωt) in the definition domain of arctan, we can restrict the definition domain of ϕI as [0,π/2]. With this assumption, C + I cos ( ϕ I ) and I sin ( ϕ I ) will be always positive. After some algebra, Equation (26) becomes:
C I cos 2 ( ϕ I ) e s I sin 2 ( ϕ I )
which gives:
C e s I

It can be showed that (27) holds for the other possible domain definitions of R(ωt); therefore, Pdif is:

P d i f = 1 C < I
P d i f = 0 C > I
By replacing Equation (28) in Equation (21), the chip error probability becomes:
P c = 1 / 2 C < I P c = 0 C > I

4.2. Useful and Interfering Symbols are Asynchronous

The condition in which interfering symbols can be asynchronous with respect to useful symbols increases the number of possible cases to be considered for the evaluation of ΘR(ωt). In particular, the interferer signal can change its turning direction at a random instance, tt, and the corresponding random angle is ϕt = ωtt. Consequently, the received signal during a chip interval can be written as:

R ( ω t ) = { C e j ( b C ω t + ϕ C ) + I e j ( b I 1 ω t + ϕ I ) ω t = [ 0 , ϕ t ] C e j ( b C ω t + ϕ C ) + I e j ( b I 2 ω t + d ) ω t = ( ϕ t , π / 2 ]
where bC defines the turning direction of the useful chip, while bI1 and bI2 are the turning directions of the sequential chips of the interferer. In Equation (30), at the angle ϕt, the interferer starts transmitting another chip. We denote this asynchronous interferer case probability as Pmix. The occurrences of Peq, Pdif (which are given in Section 4.1) and Pmix for the different combinations of bC, bI1 and bI2 are shown in Table 2.

By considering these occurrences, the chip error probability can be evaluated as:

P c = 1 / 4 P e q + 1 / 4 P d i f + 1 / 2 P m i x

To obtain Pmix, we consider the case of bC = +1, bI1 = +1, bI2 = −1, and d = ϕI + 2ϕt, which is mathematically identical to the all other Pmix cases in Table 2. Following the same approach followed in Section 4.1, we can write the decision rule as:

C I cos ( ϕ I + 2 ϕ t ) I sin ( ϕ I + 2 ϕ t ) e s I sin ( ϕ I ) C + I cos ( ϕ I )
which can be simplified to:
C + C I ( cos ( ϕ I ) cos ( ϕ I + 2 ϕ t ) ) I cos ( 2 ϕ t ) e / s s / e 0
where the sign in the inequality depends on the sign of denominators in Equation (32). Equation (33) can be rearranged as:
C / I + C / I ( cos ( ϕ I ) cos ( ϕ I + 2 ϕ t ) ) cos ( 2 ϕ t ) e / s s / e 0

Pmix is obtained by using the test in Equation (34) considering the different signs of the denominators in Equation (32) and the definition domain of the arctan function.

4.3. Validation of the Analytical Model through Simulations

Simulation results for the cases of synchronous and asynchronous useful and interfering symbols are shown in Figure 6. Since the analysis in Section 4 is exact, we expect a perfect agreement between simulations and analytical model. The results of Figure 6 confirm this intuition.

5. Probability of Data Error in IEEE 802.15.4

The received path of the commercial 802.15.4 compatible transceivers, such as TICC2420 [29] and Freescale MC13224 [30], is composed of two main blocks: an O-QPSK demodulator and a de-spreader to obtain the data symbols from the received chips. In the previous section, we have obtained the chip error rate, Pc, by assuming both coherent and non-coherent detection; this error probability is used here to derive bounds for the symbol error probability, Pd, and for the corresponding packet reception rate, Pr.

5.1. Chip Error Rate to Data Symbol Error Rate

As discussed previously, in the 2.4 GHz PHY of IEEE 802.15.4, data symbols are mapped to the chips after the demodulation. Because of the symmetry in the data symbol set used by the 802.15.4 2.4 GHz PHY layer, the error probability of the data symbol, S0, is equal to the symbol error probability, Pd [31]:

P d = P ( e S 0 ) = P ( e S i ) for i = 1 , , 15
Hence, with no loss of generality to obtain an analytical expression for Pd, we can find the union upper bound of P(e|S0) expressed as:
P ( e S 0 ) i = 1 15 P ( S i S 0 )
where P(Si|S0) represents the probability of deciding for the symbol, Si, once symbol S0 has been transmitted. Each probability in the summation of Equation (36) can be formulated as a function of Hamming distance, hi, between S0 and Si, and the chip error rate, Pc, as:
P ( S i S 0 ) = P ( h i , P c ) = { 1 2 ( h i h i / 2 ) P c h i / 2 ( 1 P c ) h i / 2 + i = h i + 2 2 h i ( h i i ) P c i ( 1 P c ) h i / i if h i is even i = h i + 1 2 h i ( h i i ) P c i ( 1 P c ) h i i if h i is odd

By substituting Equation (37) in Equation (36), we obtain an upper bound that can be applied to any symmetric symbol set. The bound will be used in the next sub-sections to obtain expressions for the data symbol error probability of both coherent and non-coherent detection.

5.1.1. Coherent Detection

In the case of coherent detection, we can calculate the Hamming distance of each chip sequence. In particular, the recurrences of the Hamming distances of the data symbols is given in Table 3.

Using these recurrences, the symbol error probability can be bounded as follows:

P d i = 1 N r i P ( h i , P c ) = 2 P ( 12 , P c ) + 2 P ( 14 , P c ) + 3 P ( 16 , P c ) + 2 P ( 18 , P c ) + 6 P ( 20 , P c )
where P(hi, Pc) is taken from Equation (37) and hi and ri are given in Table 3. i is the index for columns, and N = 5 is the number of columns in the table.

Note that, for a fixed value of Pc, the computational complexity of the previous upper bound is O(1).

5.1.2. Non-Coherent Detection

In the non-coherent case, we can only identify the phase transitions during the chip intervals. For a 32-chip long sequence, there will be 31 phase transitions, as shown in Table 4.

Where + means a π/2 increase in the phase and − means a π/2 decrease in the phase. We can think of the phase transition sequence of a data symbol in Table 4 as a vector in Hamming space and calculate the Hamming distances between these vectors. The recurrences of Hamming distances from a data symbol to the other data symbols in the set are given in Table 5.

The union upper bound is obtained as:

P d i = 1 N r i P ( h i , P c ) = 2 P ( 13 , P c ) + 2 P ( 14 , P c ) + 3 P ( 15 , P c ) + 3 P ( 16 , P c ) + 2 P ( 17 , P c ) + 2 P ( 18 , P c ) + P ( 31 , P c )
where hi and ri are given in Table 5. i is the index for columns, and N = 7 is the number of columns in the table.

Again, the computational complexity of the upper bound is O(1).

5.2. Packet Reception Rate

In 802.15.4 2.4 GHz PHY, four data bits are mapped to a data symbol [2]. When a packet of b-bytes is transmitted, the probability of successfully receiving the packet, Pr, is calculated as:

P r = ( 1 P d ) 2 b

It is worth noting that the upper bounds on Pd in Equation (38) and Equation (39) will become lower bounds in Equation (40). Pr as a function of SIR is shown in Figure 7 for the coherent and non-coherent demodulation schemes considered in Sections 3 and 4. Comparison between analysis and simulations is also shown. Results for the case of no thermal noise (cross-points for coherent and filled circles for non-coherent) have been obtained for a PHY service data unit (PSDU) of 14 bytes. The figure shows that the agreement between analysis and simulations is very good.

Experimental results shown in Figure 7 of [19] suggest 7 dB for the threshold of SNR, where the performance of the system, in terms of PRR, completely switches from zero to one. In this sense, the interval from SNR = 7 dB to SNR = ∞ should be adequate for representing a great variety of different SNR operation conditions, where the noise is not dominant, but the performance of the system is mostly determined by the interferer. This interval results in a considerably narrow region of PRR (the shaded area in Figure 7), and the experiment results in [16,1820] fall into this region; therefore, it would not be wrong to conclude that the mathematical analysis presented here captures the essential features of the real-world performance, where the dominant factor of performance degradation is interference. Two different values of PSDU are considered in Figure 7: 14 bytes (experiments in [20]) and 127 bytes (the maximum allowable, which is used in experiments in [16,18,19]). Finally, It is also worth noting that 0 dB is the absolute minimum SIR necessary to successfully detect the useful packets in non-coherent demodulation.

6. Conclusion

The effect of concurrent transmission on the performance, in terms of chip, symbol and packet error probability, of IEEE 802.15.4 systems was investigated. To this aim, an analytical model, which starts from the PHY characterization of the IEEE 802.15.4 standard, was proposed, and the results were validated using simulations. Since the system performance does not depend on the number of interfering devices, but rather, on the overall amount of interfering power [18,20], the case of one single interferer was considered. Both non-coherent and coherent demodulation were analyzed in the absence of thermal noise. The joint effect of thermal noise and interference was taken into account by means of simulations. For the case of non-coherent demodulation, we found that 0 dB is the absolute minimum necessary value of SIR for the successful detection of the useful packets. We have also shown that the proposed analysis is in agreement with the measurement results of the literature [16,1820] under realistic working conditions. We conclude that the mathematical framework can be used to provide analytical explanations to the experimental results shown in [16,1820].

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Crow, B.; Widjaja, I.; Kim, L.; Sakai, P. IEEE 802.11 Wireless Local Area Networks. IEEE Commun. Mag. 1997, 35, 116–126. [Google Scholar]
  2. IEEE Std 802.15.4-2006 2006.
  3. Baghdady, E. FM Demodulator Time-Constant Requirements for Interference Rejection. Proc. IRE 1958, 46, 432–440. [Google Scholar]
  4. Baghdady, E. Theory of Stronger-Signal Capture in FM Reception. Proc. IRE 1958, 46, 728–738. [Google Scholar]
  5. Leentvaar, K.; Flint, J. The Capture Effect in FM Receivers. IEEE Trans. Commun. 1976, 24, 531–539. [Google Scholar]
  6. Roberts, L.G. ALOHA packet system with and without slots and capture. ACM SIGCOMM Comput. Commun. Rev. 1975, 5, 28–42. [Google Scholar]
  7. Namislo, C. Analysis of mobile radio slotted ALOHA networks. IEEE Trans. Veh. Technol. 1984, 33, 199–204. [Google Scholar]
  8. Onozato, Y.; Liu, J.; Noguchi, S. Stability of a slotted ALOHA system with capture effect. IEEE Trans. Veh. Technol 1989, 38, 31–36. [Google Scholar]
  9. Chhaya, H.S.; Gupta, S. Performance of asynchronous data transfer methods of IEEE 802.11 MAC protocol. IEEE Pers. Commun. 1996, 3, 8–15. [Google Scholar]
  10. Kim, J.H.; Lee, J.K. Capture effects of wireless CSMA/CA protocols in rayleigh and shadow fading channels. IEEE Trans. Veh. Technol. 1999, 48, 1277–1286. [Google Scholar]
  11. Nyandoro, A.; Libman, L.; Hassan, M. Service Differentiation Using the Capture Effect in 802.11 Wireless LANs. IEEE Trans. Wirel. Commun. 2007, 6, 2961–2971. [Google Scholar]
  12. De Morais Cordeiro, C.; Sadok, D.; Agrawal, D. Modeling and Evaluation of Bluetooth MAC Protocol. Proceedings of the Tenth International Conference on Computer Communications and Networks, Scottsdale, AZ, USA, 15–17 October 2001; pp. 518–522.
  13. Borgonovo, F.; Zorzi, M.; Fratta, L.; Trecordi, V.; Bianchi, G. Capture-division packet access for wireless personal communications. IEEE J. Sel. Areas Commun. 1999, 14, 609–622. [Google Scholar]
  14. Whitehouse, K.; Woo, A.; Jiang, F.; Polastre, J.; Culler, D. Exploiting the Capture Effect for Collision Detection and Recovery. Proceedings of the Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II, Sydney, Australia, 30–31 May 2005; pp. 45–52.
  15. Texas Instruments. Chipcon CC1000 Single Chip Very Low Power RF Transceiver Data Sheet. Available online: http://www.ti.com/lit/ds/symlink/cc1000.pdf (accessed on 18 March 2014).
  16. Son, D.; Krishnamachari, B.; Heidemann, J. Experimental Study of Concurrent Transmission in Wireless Sensor Networks. Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys 06), Boulder, CO, USA, 1–3 November 2006.
  17. Texas Instruments. CC2420: 2.4 GHz IEEE 802.15.4/ZigBee Ready RF Transciver. Available online: http://www.ti.com/lit/ds/symlink/cc2420.pdf (accessed on 17 March 2014).
  18. Maheshwari, R.; Jain, S.; Das, S.R. A Measurement Study of Interference Modeling and Scheduling in Low-Power Wireless Networks. Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems SenSys'08, Raleigh, NC, USA, 4–7 November 2008.
  19. Chen, Y.; Terzi, A. On the Mechanisms and Effect of Calibrating RSSI Measurements for 802.15.4 Radios. Lect. Notes Comput. Sci. 2010, 5970, 256–271. [Google Scholar]
  20. Gezer, C.; Buratti, C.; Verdone, R. Capture Effect in IEEE 802.15.4 Networks: Modelling and Experimentation; Symposium on Wireless Pervasive Computing. Proceedings of the 5th IEEE International Symposium on Wireless Pervasive Computing (ISWPC), Modena, Italy, 5–7 May 2010.
  21. Maheshwari, R.; Jain, S.; Das, S.R. On Estimating Joint Interference for Concurrent Packet Transmissions in Low Power Wireless Networks. Proceedings of the Third ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization WiNTECH'08, San Francisco, CA, USA, 14–19 September 2008.
  22. Freescale Semiconductor. MC1322x Datasheet. Available online: http://www.freescale.com/files/rf_if/doc/data_sheet/MC1322x.pdf (accessed on 17 March 2014).
  23. Rodenas-Herraiz, D.; Garcia-Sanchez, A.J.; Garcia-Sanchez, F.; Garcia-Haro, J. Current Trends in Wireless Mesh Sensor Networks: A Review of Competing Approaches. Sensors 2013, 13, 5958–5995. [Google Scholar]
  24. Takai, M.; Martin, J.; Bagrodia, R. Effects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks. Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking&Computing MobiHoc'01, Long Beach, CA, USA, 4–5 October 2001; pp. 87–94.
  25. Subbu, K.P.; Howitt, I. Empirical study of IEEE 802.15.4 Mutual Interference Issues. Proceedings of the IEEE SoutheastCon, Richmond, VA, USA, 22–25 March 2007.
  26. Haykin, S. Communication Systems, 4th ed.; John Wiley&Sons: Hoboken, NJ, USA, 2001. [Google Scholar]
  27. Papoulis, A.; Pillai, S.U. Probability, Random Variables and Stochastic Processes; McGraw-Hill: New York NY, USA, 2002. [Google Scholar]
  28. Masamura, T.; Samejima, S.; Morihiro, Y.; Fuketa, H. Differential Detection of MSK with Nonredundant Error Correction. IEEE Trans. Commun. 1979, 27, 912–918. [Google Scholar]
  29. Chipcon C2420 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver Data Sheet; Texas Instruments Norway AS: Oslo, Norway.
  30. Freescale Semiconductor Inc. Freescale MC1322X Reference Manual; Freescale Semiconductor, Inc.: Chandler, AZ, USA, 2009. [Google Scholar]
  31. Gupta, P.; Wilson, S.G. IEEE 802.15.4 PHY Analysis: Power Spectrum and Error Performance. Proceedings of the Annual IEEE India Conference, INDICON, Kanpur, India, 11–13 December 2008.
Figure 1. The impact of the interferer. (a) Useful signal; (b) Qd-I domain representation of useful signal; (c) Interferer signal; (d) Qd-I domain representation of interferer signal; (e) Qd-I domain representation of received signal.
Figure 1. The impact of the interferer. (a) Useful signal; (b) Qd-I domain representation of useful signal; (c) Interferer signal; (d) Qd-I domain representation of interferer signal; (e) Qd-I domain representation of received signal.
Sensors 14 05622f1 1024
Figure 2. Coherent Cases. (a) I < C / 2; (b) C / 2 I < C; (c) C I.
Figure 2. Coherent Cases. (a) I < C / 2; (b) C / 2 I < C; (c) C I.
Sensors 14 05622f2 1024
Figure 3. The impact of of the interferer: the asynchronous case. (a) Useful signal; (b) Qd-I domain representation of useful signal; (c) Interferer signal; (d) Qd-I domain representation of interferer signal; (e) Qd-I domain representation of received signal.
Figure 3. The impact of of the interferer: the asynchronous case. (a) Useful signal; (b) Qd-I domain representation of useful signal; (c) Interferer signal; (d) Qd-I domain representation of interferer signal; (e) Qd-I domain representation of received signal.
Sensors 14 05622f3 1024
Figure 4. Chip error rate: the case of coherent O-QPSK demodulation. CER, chip error rate; SIR, signal-to-interference ratio.
Figure 4. Chip error rate: the case of coherent O-QPSK demodulation. CER, chip error rate; SIR, signal-to-interference ratio.
Sensors 14 05622f4 1024
Figure 5. Phase transitions of the complex envelope. (a) Example phase transition sequence; (b) All possible phase transitions.
Figure 5. Phase transitions of the complex envelope. (a) Example phase transition sequence; (b) All possible phase transitions.
Sensors 14 05622f5 1024
Figure 6. Non-coherent chip error rate.
Figure 6. Non-coherent chip error rate.
Sensors 14 05622f6 1024
Figure 7. Packet reception rate (PRR).
Figure 7. Packet reception rate (PRR).
Sensors 14 05622f7 1024
Table 1. Signal reception models in network simulators [24]. SNRT, signal-to-noise ratio threshold; BER, bit error rate.
Table 1. Signal reception models in network simulators [24]. SNRT, signal-to-noise ratio threshold; BER, bit error rate.
SimulatorGloMoSimns-2OPNET
Signal ReceptionSNRT-based, BER-basedSNRT-basedBER-based
Table 2. Useful and Interferer Chip Phase Combinations.
Table 2. Useful and Interferer Chip Phase Combinations.
bCbI1bI2dProbability of Error
+1+1+1ϕIPeq = 0
+1+1−1ϕI + 2ϕtPmix
+1−1+1ϕI − 2ϕtPmix
+1−1−1ϕIPdif
−1+1+1ϕIPdif
−1+1−1ϕI + 2ϕtPmix
−1−1+1ϕI − 2ϕtPmix
−1−1−1ϕIPeq = 0
Table 3. Recurrences of unique Hamming distance values.
Table 3. Recurrences of unique Hamming distance values.
HI1214161820
Reoccurrence (RI)22326
Table 4. Phase transitions of chip sequences in 2450-MHz PHY of IEEE 802.15.4.
Table 4. Phase transitions of chip sequences in 2450-MHz PHY of IEEE 802.15.4.
Data SymbolData BitsPhase Transitions
S00000++------+++-++++-+-+++--++-++--
S11000+--+++------+++-++++-+-+++--++-
S20100++-++--+++------+++-++++-+-+++-
S31100++--++-++--+++------+++-++++-+-
S40010-+-+++--++-++--+++------+++-+++
S51010++++-+-+++--++-++--+++------+++
S60110+++-++++-+-+++--++-++--+++-----
S71110----+++-++++-+-+++--++-++--+++-
S80001--++++++---+----+-+---++--+--++
S91001-++---++++++---+----+-+---++--+
S100101--+--++---++++++---+----+-+---+
S111101--++--+--++---++++++---+----+-+
S120011+-+---++--+--++---++++++---+---
S131011----+-+---++--+--++---++++++---
S140111---+----+-+---++--+--++---+++++
S151111++++---+----+-+---++--+--++---+
Table 5. Recurrences of unique Hamming distance values.
Table 5. Recurrences of unique Hamming distance values.
hi13141516171831
reoccurrence (ri)2233221

Share and Cite

MDPI and ACS Style

Gezer, C.; Zanella, A.; Verdone, R. An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4. Sensors 2014, 14, 5622-5643. https://doi.org/10.3390/s140305622

AMA Style

Gezer C, Zanella A, Verdone R. An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4. Sensors. 2014; 14(3):5622-5643. https://doi.org/10.3390/s140305622

Chicago/Turabian Style

Gezer, Cengiz, Alberto Zanella, and Roberto Verdone. 2014. "An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4" Sensors 14, no. 3: 5622-5643. https://doi.org/10.3390/s140305622

Article Metrics

Back to TopTop