Next Article in Journal
Multiple Bacteria Identification in the Point-of-Care: an Old Method Serving a New Approach
Previous Article in Journal
Inkjet Printing of Plate Acoustic Wave Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Analytical Framework for the IEEE 802.15.4 MAC Layer Protocol under Periodic Traffic

1
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
2
Telecommunications Software & Systems Group (TSSG), Waterford Institute of Technology, X91 P20H Waterford, Ireland
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(12), 3350; https://doi.org/10.3390/s20123350
Submission received: 20 April 2020 / Revised: 7 June 2020 / Accepted: 10 June 2020 / Published: 12 June 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
As the reference communication standard of wireless sensor networks (WSNs), the IEEE 802.15.4 standard has been adopted in various WSN-based applications. In many of these applications, one of the most common traffic pattern types is a periodic traffic patterns, however, the majority of existing analytical models target either saturated or unsaturated network traffic patterns. Furthermore, few of them can be directly extended to the periodic traffic scenario, since periodic traffic brings unstable load status to sensor nodes. To better characterize the WSNs with periodic traffic, we propose an accurate and scalable analytical framework for the IEEE 802.15.4 MAC protocol. By formulating the relationship between clear channel assessment (CCA) and its successful probability from the perspective of channel state and node state, single node’s behavior and whole network’s performance under different network scales and traffic loads can be derived. Extensive simulations are conducted to validate the proposed framework in terms of both local statistics and overall statistics, and the results show that the model can represent the actual behavior and the real performance of both single node and whole network. Besides, as the simplified version of double CCAs mode (DS mode), single CCA mode (SS mode), is also analyzed with simple modifications on the proposed analytical framework. Combining the analytical framework with simulation results, the applicable network scenarios of two modes are also demonstrated respectively. Finally, an approximate distribution of one data packet’s backoff duration is proposed. With this approximate distribution, a conservative estimation of data packet’s average transmission latency in networks with given configurations can be easily carried out.

1. Introduction

Wireless sensor networks (WSNs) have penetrated various kinds of applications, ranging from habitat monitoring to industrial process control, for their advantages of low deployment costs, ease of installation, maintenance and reconfiguration, and the inherent intelligent-processing capability over traditional wired devices [1]. The IEEE 802.15.4 standard is the reference communication technology for WSNs. It specifies the protocols of the physical layer and medium access control (MAC) layer for WSN devices [2].
According to the standard, the MAC layer is responsible for scheduling nodes’ channel access operations, which greatly affects their data transmission probability. The MAC layer of IEEE 802.15.4 standard provides several channel access mechanisms to cope with different communication requirements. Among them, the slotted carrier sense multiple access with collision avoidance (slotted CSMA/CA) protocol is the most widely used one. To reduce the evaluation efforts of IEEE 802.15.4 based WSNs, many analytical models for slotted CSMA/CA protocol have been proposed. According to the assumed traffic pattern, the majority of them can be categorized as either saturated traffic pattern adapted model or unsaturated traffic pattern adapted model [3,4,5,6,7,8,9,10,11]. With saturated traffic pattern, nodes always have data packets to be transmitted. This case can be used to model the performance of WSNs in which several sensors want to send data at the same moment, e.g., when a critical event is detected. Whereas, in WSNs with unsaturated traffic pattern, nodes are always assumed to wait for a period of time before new data packets arrive, in real-life scenarios, many applications are required to send data periodically, resulting in the periodic traffic pattern. For example, in WSNs that support advanced metering infrastructure (AMI) applications, sensors are usually configured to periodically send application-specific data (such as electricity consumption) to a base station collector for system monitoring and analysis [12,13]. Another example is the transmission line monitoring applications. In the electricity distribution part of smart grids, sensor nodes are used to metering the current, voltage and temperature of transmission line periodically for the sake of a reliable power system [13]. It can be expected that each node’s load status will probably switch between saturated and unsaturated with periodic traffic. To accurately characterize the MAC behavior of nodes and the performance of WSNs with periodic traffic, we propose a competent analytical framework of the slotted CSMA/CA protocol. The framework is unfolded from two perspectives, channel state and node state. By formulating the relationship between the probability of performing clear channel assessment (CCA) and its successful probability from both perspectives, the performance statistics of single node and whole network under different scales and traffic loads are carried out. Our main contributions can be summarized as follows:
(1)
Different from assuming single CCA mode (SS mode) as previous works do, this paper proposes a Markov chain-based channel state model which supports the analysis of networks adopting double CCA mode (DS mode). In the proposed channel model, we pay more attention to the operation of the 1st CCA (CCA1). The relationship between the occurrence of CCA1 in a channel and its successful probability is formulated.
(2)
Contrary to approximating the distribution of backoff duration with continuous probability analysis, we consider the duration of backoff period as a discrete time signal and analyze it with signal processing approach. With the assistance of a discrete Fourier transform (DFT), the distribution of a single node’s backoff duration is obtained. Based on the distribution of a single node’s backoff duration, single node’s CCA1 performing probability and its successful probability are formulated. Besides, the statistics of single node’s load status are also determined.
(3)
Combining the analysis of channel state and node state, an analytical framework of IEEE 802.15.4 MAC layer protocol is proposed. With a given network scale, data packet’s inter-arrival time and channel access parameters, the performance statistics of a single node and the whole network can be estimated.
(4)
With simple modifications, the proposed analytical framework can be modified to be compatible with SS mode. By comparing DS mode and SS mode in different network scenarios, the paper demonstrates applicable network scenarios of the two modes, respectively.
(5)
By approximating the distribution of one data packet’s backoff duration as a normal distribution, we come up with a method of estimating data packet’s average transmission latency in networks with given configurations. Simulation results show that the proposed method provides a conservative and reliable estimation on network’s average transmission latency and can be used to judge whether or not a given network’s average transmission latency is bounded by packet inter-arrival time.
The remainder of the paper is organized as follows: Related work is given in Section 2. Section 3 briefly introduces theslotted CSMA/CA algorithm. Section 4 presents the analytical frameworks. In Section 5, critical issues concerning data transport performance and energy efficiency are proposed and analytically characterized. In Section 6, rational analysis and performance evaluation of the proposed analytical model and critical issues optimizations are presented. Section 7 provides our concluding remarks and discussions of the results.

2. Related Works

In recent years, the IEEE 802.15.4 MAC protocol has been thoroughly investigated. For more accurate network performance evaluation and more efficient network performance optimization, many researchers work on modeling the behavior of the MAC protocol. In general, the behavior of the IEEE 802.15.4 MAC protocol is usually modeled from two perspectives, i.e., node state and channel state. From both perspectives, the Markov chain-based model is often adopted.
Inspired by Bianchi’s work [14], a number of analytical models characterize the behavior of nodes with the Markov chain-based model [3,4,5,6,7]. They usually divide and categorize the behaviors of single node into different states. By obtaining the transition probability among different states, the behavior of single node can be presented. However, the majority of them assume the traffic pattern of nodes to be consistently saturated or unsaturated. The reason for this is that, with consistent load status, the steady-state probability of different node state is available. The model in [15] assumes a saturated traffic pattern at first and then is extended to accommodate an unsaturated periodic traffic pattern. Targeting unsaturated traffic scenarios, many existing Markov chain-based node state models assume that the traffic pattern of a single node follows either a Poisson distribution [8,9,11,16] or a uniform distribution [10], while with the periodic traffic pattern, the load status of a node cannot keep consistent and the steady state of the corresponding Markov chain based model is not available [17]. Hence, leveraging the Markov chain-based model to characterize the node’s behavior is no longer applicable under the periodic traffic pattern. The authors propose an adjacent slot-pair Markov chain model to analyze the transition behavior of the channel state. The proposed model is rather simple yet heuristic. Several analytical models and channel access optimization algorithms are inspired by it. However, although the authors in [18] claim the proposed channel state model is compatible with the nodes in DS mode, we will show in this paper that its applicability to DS mode still needs to be improved. The research in [19] characterizes the channel state change with the Markov chain-based model.
Periodic traffic brings unstable load status to sensor nodes, which causes the variation of MAC statistics over time. This is the reason that the majority of existing stationary Markov chain model-based node state analyses cannot be directly extended from either saturated or unsaturated traffic scenarios to the periodic traffic scenario. To our best knowledge, few analytical IEEE 802.15.4 MAC models have been proposed for the periodic traffic scenario.
The research in [19] addresses a kind of periodic traffic scenarios that each node has a packet to transmit at the beginning of any contention period. The number of nodes with different states and the variation of channel states are covered in a non-stationary 3-D Markov chain model. As an extension of [19,20], proposes a 4-D Markov chain-based model. However, both models assume nodes in SS mode instead of DS mode. The model proposed in [17] accounts for DS mode. The model focuses on the time-varying feature of the MAC statistics under periodic traffic, while, similar to [19], the model in [17] assumes that each node only has one data packet to be transmitted during each contention period. However, the time interval of monitoring results or measurement reports is mainly determined by the application requirement rather than the duration of the contention period.

3. The Slotted CSMA-CA Protocol

In this section, one of the IEEE 802.15.4 MAC protocols, the slotted CSMA-CA protocol targeting beacon-enabled WSNs is introduced. Besides, the considered network scenarios and model assumptions are also indicated. In the beacon-enabled WSNs, the network is composed of network coordinators and general sensor nodes. The network coordinator periodically sends beacon frames for network synchronization. The time interval between two consecutive beacon frames is called the beacon interval (BI). Every sensor node generates data packets and contends to send them after receiving beacon frames. Table 1 presents the notations and definitions of key MAC layer parameters, and lists the parameters defining the network scenario.
Figure 1 presents the structure of BI. In beacon-enabled WSNs, continuous time is divided into discrete time slots. The duration of each slot is fixed to 320 μs. The length of BI is decided by the value of the beacon order (BO), where 0 B O 14 . The period of the BI is composed of an active period and an inactive period. The active period is structured as a superframe for data packet transmission. The superframe duration (SD) is determined by the value of the superframe order (SO), where 0 S O B O 14 . Within one superframe, the first slot is allocated for the beacon frame and the rest of the time slots are divided into contention access period (CAP) and contention free period (CFP).
As is shown in Figure 2, according to slotted CSMA-CA, three parameters are initialized when data packets need to be transmitted, i.e., the number of backoff stages (NB), the contention window (CW), and the backoff exponent (BE). Every packet transmission only happens after the channel is identified as idle. The identification of the idle state is accomplished through two consecutive successful CCAs. We term the 1st CCA operation as CCA1 and the 2nd CCA operation as CCA2. Every time before performing CCA1, a sensor node should wait for several time slots. The number of slots is randomly selected from 0 to 2 B E 1 . If either CCA fails, then NB and BE are both increased by 1, and CW is reset to 2. The current packet transmission is identified as failed if the value of NB reaches its maximum value macMaxCSMABackoffs. If the value of BE reaches the maximum macMaxBE, then the sensor node keeps its value until a successful/failed packet transmission occurs.
In the remainder of this work, we consider a WSN working in the beacon-enabled mode with star topology. One network coordinator at the center and M sensor nodes randomly deployed around the network coordinator within the carrier sensing range. A star topology is the most common topology and it may also exist inside clusters in larger-scale 802.15.4 networks. According to the standard, nodes can’t start their channel access attempt until receiving the beacon frame. To eliminate the effect of beacon frame receiving and present the relationship between the arrival of data packets and the channel access attempt more explicit, we assume beacon frames are loss-free.
The delay of signal propagation and frame processing is assumed to be negligible, so that all the nodes can receive beacons and contend for channel access simultaneously. Sensor nodes are assumed to be homogeneous and their MAC protocols are configured with the same parameters. Sensor nodes are assumed to be homogeneous and their MAC protocols are configured with the same parameters. For each sensor node, the inter-arrival time of data packets is assumed to be T sequential time slots. Given that all sensor nodes are not synchronized, each sensor node is assumed to start its periodic reporting at a uniformly distributed random time between 0 and T. All data packets are of the same length, and the transmission of one data packet takes L time slots. ACK frames and the retransmission function are disabled, which means that collided packets will not be retransmitted. Since the slotted CSMA/CA mechanism is defined for channel access during CAP, we only consider the part of contention access period (CAP) in active period. Beacon period and contention-free period (CFP) in active period as well as inactive period are beyond the consideration.

4. Analytical Framework

4.1. Channel State Analysis

The existing Markov chain-based channel state model is shown in Figure 3 [18]. Busy channel state stands for the channel is occupied with packet transmission. Other operations in a channel can be summarized as idle channel state, which includes no operation, CCA1 operation and CCA2 operation. The symbol σ stands for the probability of a single node performing CCA operation in any slot, which includes both CCA1 and CCA2. For channels with nodes in double CCAs mode, the transition from Idle-Idle state to idle-busy state only happens after successful CCA2 operation, so the corresponding transition probability is not 1 ( 1 σ ) n . Besides, according to Figure 3, the channel stays in idle-idle state with probability ( 1 σ ) n , which doesn’t include the happening of any node performing CCA1 and CCA2 in successive slots.
In the proposed channel state model. We divide the channel status into four different states, busy state (Busy), successful CCA1 (SC1) state, successful CCA2 (SC2) state, and no operation (NOP) state. The busy state stands for a channel is occupied with data packet transmission. SC1 state stands for one or more successful CCA1 operations are happening in the current slot. Similarly, SC2 state stands for one or more successful CCA2 operations happening, while, if both successful CCA1 and successful CCA2 exist in one slot, the channel should be classified as SC2 state. NOP state represents no channel sense or packet transmission happen in current slot. These four channel states are mutually exclusive. Figure 4 shows the proposed adjacent-slot-pair-wise channel state model.
The symbol τ 1 represents the probability of CCA1 operation happens in a slot. According to the state transitions thus modeled, the stationary channel state probabilities are related as follows:
{ P N N + P N C 1 S + P C 1 S C 2 S + P C 2 S B + P B I + P B C 1 S + P B B = 1 P N N = ( 1 τ 1 ) P N N + ( 1 τ 1 ) P B N P N C 1 S = τ 1 P N N + τ 1 P B N P C 1 S C 2 S = P N C 1 S + P B C 1 S P C 2 S B = P C 1 S C 2 S P B N = ( 1 τ 1 ) ( L 1 ) P B B P B C 1 S i = τ 1 ( L 1 ) P B B P B B = P C 2 S B + ( L 2 ) ( L 1 ) P B B
Solving the above equations yields:
P N N = ( 1 τ 1 ) 2 1 + τ 1 ( 1 + L ) P N C 1 S = τ 1 ( 1 τ 1 ) 1 + τ 1 ( 1 + L ) P C 1 S C 2 S = τ 1 1 + τ 1 ( 1 + L ) P C 2 S B = τ 1 1 + τ 1 ( 1 + L ) P B N = τ 1 ( 1 τ 1 ) 1 + τ 1 ( 1 + L ) P B C 1 S = τ 1 2 1 + τ 1 ( 1 + L ) P B B = ( L 1 ) ( τ 1 ) 1 + τ 1 ( 1 + L )
As successful carrier sensing is possible only when a channel is not occupied, the probability of successful CCA1 operation P c c a 1 S can be expressed as:
P c c a 1 S = 1 P C 2 S B P B B = 1 + τ 1 1 + τ 1 ( 1 + L ) .
Accordingly, successful CCA2 only happens in neither previous slot nor current slot been occupied:
P c c a 2 S = P C 1 S C 2 S + P N N + P N C 1 S 1 P B N P B C I S P B B = 1 1 + τ 1 .
The probability of successful channel access for each node is:
P c c a S = P c c a 1 S P c c a 2 S = 1 1 + τ 1 ( 1 + L ) .

4.2. Node State Analysis

Although the probability of one node’s successful channel access is affected by other nodes’ channel access attempts, the attempt of channel sense is motivated by the need of self-data-packet’s transmission. For sensor nodes in beacon-enabled mode, the operations include backing off, channel sensing, packet transmission, and sleeping. Compared with channel sensing and packet transmission, the length of node’s backoff period may varies a lot. Hence, in this section we formulate the distribution of node’s backoff period firstly. Then, with the consideration of CCA operation and data packet transmission, the distribution of time that a node spends on one data packet is also derived.

4.2.1. The Distribution of Backoff Period

According to the slotted CSMA/CA protocol, the length of the backoff period ζ i in ith backoff stage is a random variable uniformly distributed in the closed interval 0 , 2 B E i 1 . The probability mass function (PMF) of ζ i is the natural-valued function of an integer variable given by:
g i ( n ) : = 1 2 B E i if n 2 B E i 1 0 if n > 2 B E i 1 .
If one data packet is transmitted or dropped after NB times of backoff, the total number of backoff slots for this data follows the distribution of a sum of NB independent uniform random variables with different ranges. The PMF of the sum i = 1 N B ζ i is given by the NB-fold linear integer convolution:
f N B ( n ) : = g 1 g 2 g N B n = k 1 + k 2 + + k N B = n j = 1 N B g j ( k j ) .
For the random variable ζ i , its PMF can be presented as a discrete sequence of taking each value’s probability:
g i n = 1 N i ,
where n [ 0 , N i 1 ] .
The N-point Discrete Fourier Transform (DFT) of sequence g i n can be expressed as an N-N matrix multiplication as:
G i k = g i n X i ,
where G i k is the DFT of sequence g i n . The transformation X i can be defined as a matrix of size N × N :
X i = 1 1 1 1 x i x i N i 1 1 x i N i 1 x i N i 1 N i 1 ,
where x i = e j 2 π / N i .
The corresponding Inverse Discrete Fourier Transform (IDFT) is:
g i n = 1 N i G i k X i 1 .
According to the property of DFT, the product of two sequences’ DFT output is the DFT of their circular convolution. With the addition of another random variable ζ j from g i n , this property can be expressed as:
g i n g j n = I D F T G i ( k ) G i ( k ) .
However, as is mentioned earlier, the PMF of the sum of ζ i and ζ j is equal to their liner integer convolution. To find out the linear convolution, we first create two new sequences by zero-padding the original sequences to a length of N 2 points:
g i ( n ) = g i ( n ) , n [ 0 , N i 1 ] 0 , n [ N i , N 2 1 ] ,
g j ( n ) = g j ( n ) , n [ 0 , N j 1 ] 0 , n [ N j , N 2 1 ] ,
According to the theory of discrete-time signal processing [21], the circular convolution of two sequences can be converted to a linear convolution with the help of zero-padding. For example, there are two sequences x1(n) and x2(n) of length N1 and N2, respectively. Their circular convolution can be converted to the linear convolution of their zero-padded sequences x1’(n) and x2’(n). And the lengths of both x1’(n) and x2’(n) are N1 + N2−1. Accordingly, the value of N 2 in function (13) and function (14) should be 2 B E i + 2 B E j 1 and the following equation holds:
g i ( n ) g j ( n ) = I D F T G i ( k ) G j ( k ) ,
where G i k and G j k are the DFT of sequence g i n and g j n , respectively. Hence, the PMF of ζ i + ζ j can be expressed as:
f 2 n = 1 N 2 G 2 k X 2 1 ,
where G 2 k = G i k G j k . And the term x 2 in matrix X 2 can be expressed as x 2 = e j 2 π / N 2 . By using a mathematical inductive method, the PMF of i = 1 N B ζ i can be derived:
f ( N B ) ( n ) = 1 N ( N B ) G ( N B ) k X ( N B ) 1 ,
where N ( N B ) = i = 1 N B 2 B E i , G ( N B ) k = i = 1 N B G i k and x ( N B ) = e j 2 π / N ( N B ) .
Considering the probability of successful channel access, we can obtain the distribution of time that a sensor node spends on backoff for one data packet as:
f ( n ) = i = 1 N B 1 P c c a S 1 P c c a S i 1 f ( i ) ( n ) + 1 P c c a S N B 1 f ( N B ) ( n ) ,
where n N ( N B ) 1 .
The cumulative distribution function (CDF) of backoff duration is:
F ( n ) = i = 0 n f ( i ) ,
For a given set of backoff parameters, the value of N ( N B ) and x ( N B ) are specified. Accordingly, the DFT sequence G ( N B ) ( k ) can be determined. Hence, the distribution of time for backoff operation is only related to the probability of successful channel access P c c a S :
f ( n ) = α n , P c c a S ,
Similarly, the CDF of backoff duration can be expressed as:
F ( n ) = β n , P c c a S ,

4.2.2. The Probability of Saturated Load Status

The load status of a sensor node at any slot is correlated with previously arrived data packets. If a previously arrived data packet has been either transmitted or dropped, the load status of sensor node at the current slot is unsaturated. Otherwise, the sensor node is in saturated load status. Considering the data packet inter-arrival time T, by excluding the expected time for CCA operation and transmission, the maximum number of slots for current data packet’s backoff operation without affecting next data packet’s transmission can be estimated as:
T b f = T ( i = 1 N B max 1 p c c a s i 1 Δ c c a + Δ L ) ,
where Δ c c a is the expected channel sense duration and Δ L is the estimated time of sending each data packet in average:
Δ c c a = 1 + P c c a 1 s = 1 + L P c c a s 1 + L ,
Δ L = 1 1 P c c a s N B max L ,
Hence, the probability of sensor node in unsaturated load status is:
P u n S A T = F ( x T b f ) ,
Similarly, the probability of sensor node in saturated load status can be expressed as:
P S A T = 1 F ( x T b f ) ,

4.2.3. The Analysis of Single Node’s CCA1 Operation

Considering the successful probability of CCA1 operation, the expected number of CCA1 operations for one data packet is i = 1 N B max 1 p c c a s i 1 . Whether a node is in saturated load status or not, the expected time for one data packet’s transmission attempt can be expressed as:
T p k t = k = 0 N N B 1 f ( k ) k + ( i = 1 N B max 1 p c c a s i 1 Δ c c a + Δ L ) ,
so the probability of sensor node performing CCA1 operation within each data packet’s transmission attempt period should be:
ω 1 = i = 1 N B max 1 p c c a s i 1 T p k t ,
It should be mentioned that if one sensor node finished current data packet’s transmission attempt and no other data packet need to be transmitted, the node will not perform a CCA operation until the next data packet comes.

4.3. Channel-Node Combined Analysis

4.3.1. The Probability of CCA1 Operation

With the combination of (5) and (28), the probability of CCA1 operation in channel in any given slot t is:
τ 1 ( t ) = 1 1 ω 1 M ( t ) ,
The term M t stands for the number of active sensor nodes at slot t, which can be estimated as:
M t = 2 T p k t T M ,
We can observe that the value of τ 1 t varies along time, as does to the value of P c c a S .
According to (12), (20) and (22), we can find that with certain values of N, T, L and backoff parameters, τ 1 t can be expressed as a function of P c c a S :
τ 1 = G ( p c c a s ) ,
With the combination of (5) and (31), both τ 1 t and P c c a S can be carried out. We can find that in any given network with specified values of N, T, L and backoff parameters, both τ 1 t and P c c a S can be estimated analytically.

4.3.2. The Probability of Collision

Collisions happens when more than one node successfully accesses the same channel simultaneously. Besides, channel capacity can be taken as a motivating factor of data packet collision. The maximum average number of data packets that one node can transmit within one contention period can be calculated as:
n K , L max = K 1 L + 2 M ,
If a sensor node successful accesses the channel more than n K , L max times, more data packets will suffer collisions. Another limitation of single node’s successful channel access is the number of data packet that arrives within one contention period. It is rational that the number of arrived data packet should no less than the number of successful channel access within a given period. By taking channel capacity and data packet arrival rate into consideration, we proposed a correction factor χ :
χ = min ( n K , L max , 1 T ) ω 1 P c c a S K 1 , ω 1 P c c a S K 1 > min ( n K , L max , 1 I ) 1 , ω 1 P c c a S K 1 < = min ( n K , L max , 1 I ) ,
The probability of data packet collision can be expressed as:
P c o l l i = 1 χ ( 1 ω 1 ) M 1 ,

5. Performance Metrics

5.1. Throughput Analysis

Packets are unsuccessfully received due to two reasons: channel access failure and packet collision. The probability of successful transmitting one data packet can be expressed as follows:
P S = ω 1 P c c a S ( 1 P c o l l i ) ,
For a channel shared by M sensor nodes, the number of data packets successfully transmitted within one contention period can be calculated as:
φ = M K ω 1 P c c a S ( 1 P c o l l i ) ,

5.2. Energy Consumption Analysis

Since the coordinator is always in receiving mode through the contention period, we shall only focus on sensor nodes’ energy consumption. Specifically, we study the average energy consumptions of single node in one slot. As mentioned before, a sensor node has four modes, hence, the energy consumption consists of four parts.
As is derived earlier, the expected number of slots that a single node spends on CCA1 and CCA2 operations in one contention period can be expressed as:
K C C A E = K ω 1 1 + P c c a 1 S ,
Hence, the energy that a single node consumes for channel sense in one contention period is:
E C C A E = K C C A E ε R X ,
where ε R X stands for the energy that one node needs for channel sensing in one slot.
Once a sensor node accesses the channel successfully, its transmission starts at the next slot and then lasts for L slots, so the expected number of slots that a single node spends for transmission in one contention period can be expressed as:
K T X E = K ω 1 P c c a S L ,
Accordingly, the energy that a single node consumes in one contention period for transmission is:
E T X E = K T X E ε T X ,
where ε T X stands for the energy that node needs for transmission in one slot.
Based on previous analysis, the expected time that one node spends for sleeping in one contention period can be expressed as:
K S L P E = n S X i d l e ,
With the energy that a node in sleep mode consumes in one slot, ε S L P , we can calculate the average energy that one node consumes for sleeping in one contention period as:
E S L P E = K S L P E ε S L P ,
The time that one node spends for backoff in one contention period can be expressed as:
K B F E = K K C C A E K T X E K S L P E ,
Its average energy consumption is:
E B F E = K B F E ε B F ,
Hence the average energy that one node consumes in one slot can be expressed as:
e = 1 K K C C A E ε C C A + K T X E ε T X + K S L P E ε S L P + K B F E ε B F ,

6. Simulation and Numerical Results

6.1. Simulation Setup

In the following experiments, we assume that all nodes are communicating with a maximum bit rate of 250 kbps. The value of BO and SO are equal to 6, which means only CAP exists in each BI and the number of slots K in each CAP is 1536. Unless specified, all the nodes’ parameter settings are with default values. Besides, each sensor node is assumed to generate data packets with a fixed period of T slots. All the data packets are of the same length L = 8 (in terms of slots). Since Cao et al. took Mica2 as their reference platform in [17], to present a straightforward comparison with previous researches, we also take Mica2 as reference in the following simulation. It should be noted that more recent reference platforms, such as MicaZ, TelosB and TelosB-clones are also compatible with the proposed model. All the simulation results we present are the mean values of 104 independent simulation runs for each parameter setting. Those results are presented in Table 2.

6.2. Model Validation

In this section, the network scale is fixed to 20 nodes. By changing the packet inter-arrival time from 50 slots to 500 slots, a wide range of traffic loads are simulated. In the following comparison, we take the OMNeT++ simulation programs proposed by Kirsche et al. in [22] as the real scenario reference. The simulation programs have been verified in their research have been referenced in several studies [22,23,24]. Besides, in order to present the different characteristics of periodic traffic from unsaturated traffic and saturated traffic, two more analytical models targeting unsaturated traffic [3] and saturated traffic [5] are also taken into comparison. The results of the comparison are presented and analyzed from two perspectives, local statistics and overall statistics.
Figure 5 presents the comparison of local statistics, which includes the performance of the MAC layer and the load status of a single node. As shown in Figure 5a, the prediction of SAT and UnSAT models are independent of time, since they pursue stationary statistics of the MAC performance. In contrast, our model accurately predicts the evolutions of ω 1 along time. As shown in Figure 5a, after the first backoff which expires with equal probabilities in the first eight slots, a node which experiences unsuccessful CCA(s) will perform another backoff, which expires with probabilities equally distributed in the future slots. Continuing in this way, we can predict that ω 1 first increases during the first eight slots. The peak value is reached at the 7th slot, from which a quick drop takes place. The reason is two-fold: the expiration probability of a newly performed backoff decreases as the backoff exponent increases; and the probability of a node turning to sleep increases since it may have already transmitted its packet. Basically, ω 1 will ultimately decrease to 0, providing that the contention period is sufficiently long.
Figure 5b,c show the occurrence and successful probability of CCA1 operation in the channel. The results presented in Figure 5b,c can be explained coherently. According to the channel access mechanism, the occurrences of CCA1 in the channel can only be caused by two reasons, the need for data packet transmission and the failure of the previous channel access attempt. For each node, when its packet inter-arrival time is short, more data packets cause more CCA1 operations. For the entire network, intensive channel access attempts reduce the successful probability of channel access, which further stimulates more CCA1 operations. On the contrary, longer packet inter-arrival time and higher successful channel access probability bring on less CCA1 operations. As shown in Figure 5b, according to the simulation result, the probability of CCA1 operation occurs in the channel decreases as the packet arrival interval increases. However, the successful probability of CCA1 operation keeps increasing as the packet arrival interval increases in Figure 5c. With the assumption of saturated load status, all nodes in the SAT model always have packets to be transmitted. Hence, despite the changes in the packet inter-arrival time, both the occurrence and successful probability of CCA1 operation keep constant in the SAT model. Since short packet inter-arrival time makes the load status approach to saturation, the performance difference between SAT model and simulation result becomes larger as packet inter-arrival time increases. In the network with larger packet inter-arrival time, the UnSAT model can obtain accurate channel access operation results. However, the simulation result of UnSAT model in the scenarios with short packet inter-arrival time is not accurate. This is because the UnSAT model assumes there always exists idle slots before new data packet comes. Owing to the consideration of both channel access duration and packet inter-arrival times, the proposed analytical model fits simulation results very well despite of the packet inter-arrival time.
Figure 5d presents the local performance in terms of the node’s load status. The probability of SAT is estimated by the probability that whether the packet queue of a sensor node is empty when a newly generated packet arrives. As indicated by the curve, we can find out that with large packet arrival interval, node’s load status tends to be unsaturated. Limited by assumptions, in the SAT model, the probability of SAT is always 1. Similarly, the probability of SAT in the UnSAT model is always 0. The proposed model can accurately estimate the load status of single node along with different packet inter-arrival time.
The overall statistics include the aggregate throughput of one contention period, packet collision probability, and average energy consumption per slot. According to the simulation result in Figure 6a, the throughput of the whole network increases at first and then starts to decrease as the packet inter-arrival time increases. The turning point occurs at around 150th slots. With the default values of channel access parameters, the number of slots that one sensor node spends on one data packet is 133. If the packet inter-arrival time is less than 133, sensor nodes still have the probability of continuous data packet transmission. Hence, shorter packet arrival interval brings more channel access failure and more packet collision, which finally decrease the aggregated network throughput. If the packet inter-arrival time is more than 150 slots, although less channel access failure and packet collision occur with long packet arrival intervals, the total number of generated data packets in a given period also decreases, which leads to a decrement of aggregate throughput. Taking the simulation results as a reference, the proposed analytical model can better predict the aggregate throughput under different packet inter-arrival time than SAT and UnSAT. The estimated throughput of the SAT model is constant and always higher than the simulation results. This is mainly because the assumption of there always have packet to be sent. Although the UnSAT model can characterize the variation of throughput, the estimated value is always higher than the simulation result. It is because UnSAT obtains lower packet collision probability, as is shown in Figure 6b.
As is shown in Figure 6b, the probability of packet collision in SAT model stands still along with packet inter-arrival time changes. The difference between the UnSAT model and the simulation result is consistently obvious. It is because the UnSAT model doesn’t take the limitation of channel capacity and data packet arrival rate into consideration. Compared with the SAT model and UnSAT model, the proposed analytical model fits simulation model very well with different packet arrival intervals, as a result of our comprehensive model design.
Figure 6c shows the average energy consumption of each node. Since the nodes in the SAT model always have packets to send, the energy consumption is constant and always higher than the OMNET++ result. As UnSAT assuming idle slots always exists in contention period, the energy consumption of UnSAT is always lower than OMNET++ result. The difference between UnSAT and OMNET++ simulation is larger with shorter packet arrival interval. Thus, the difference between the proposed model and OMNET++ simulation results is always the smallest.

6.3. Single CCA vs. Double CCA

In many analytical models and parameter tuning algorithms for IEEE 802.15.4 MAC layer, SS mode is usually assumed instead of DS mode. Accordingly, to learn about their characteristics, their performance has also been compared in some studies [5,17]. In a saturated traffic scenario, the study of [5] finds that DS mode can provide nodes with higher reliability than SS mode does on different network scales. However, the network throughput of DS mode is always about 10% lower than that of the SS mode. Besides, the average service time for one data packet of SS mode is always lower than the DS mode. The study of [17] compares the SS mode and the DS mode in a periodic traffic scenario. In the simulation of [17], ACK packet and retransmission are both enabled. According to the result, the DS mode outperforms the SS mode on all the considered network scenarios. It is mainly because the node with the SS mode is more easily to transmit packets and thus makes the packet collision probability higher. Apart from the common reason, [17] considers data packets may also collide with the ACK packets in the SS mode. Since an ACK packet is required to be sent with one slot’s gap after a successful transmission in the standard. Nodes with the SS mode may check the channel state in the gap and transmit their data packets right after the gap. This case will not happen with the node in the DS mode.
However, in standard beacon-enabled WSNs, retransmission mechanism and the ACK packet are disabled. Accordingly, the performance of SS mode and DS mode in standard beacon-enabled WSNs may be different. Hence, the following simulation is designed to compare the performance of SS mode and DS mode in standard beacon-enabled WSNs with periodic traffic.
With the following modifications, the proposed model can work in SS mode. Equation (3) should be taken as the function of successful channel access probability:
P c c a S = 1 + τ i 1 1 + τ i 1 ( 1 + L ) ,
Equation (37) should be rewritten as:
K C C A E = K ω 1 ,
The value of expected channel sense duration Δ c c a in (23) should be set to 1. In (32), the term of L + 2 should be replaced by L + 1.
In this section, the packet inter-arrival time is fixed to 150 slots. By changing the network scale from five nodes to 50 nodes, the performance of the DS mode and the SS mode are evaluated under different traffic loads.
Figure 7 presents the comparison result from the local perspective and overall perspective. As is shown in Figure 7a, the successful channel access probability P C A S in DS mode is always lower than SS mode. The difference between the two modes is getting more and more obvious as the number of node increases. To confirm the idle state of a channel, the DS mode requires two successive CCA operations, while the SS mode only needs one. Given the same simulation scenario, the SS mode is more likely to confirm the channel state to be idle. When the network scale is small, since the competition in a channel is not very intensive, nodes can easily find the channel in the idle state. Therefore, the difference between SS mode and DS mode in channel access is not obvious. In a large-scale network, with many nodes need to send data packet, the difference between SS mode and DS mode in channel access starts to turn up. Figure 7b presents the packet collision probability P c o l l i of two modes. We can observe that with fewer nodes in the network, the packet collision probability of two modes is close, which has similar reason as before. As the number of nodes increases, owning to longer channel sensing duration, DS mode can provide a lower packet collision probability than SS mode does. However, with the further increase of node number, a progressive convergence of packet collision probability appears. Limited by the channel capacity, further increase of transmission can bring a network with more frequent and more serve packet collision (e.g., three and more packets’ collision).
From the overall perspective, Figure 7c presents the average aggregate throughput S . We can observe that in a network with less than 10 nodes, the aggregate throughput of two modes is very close, which indicates the performances of SS mode and DS mode in terms of channel access and collision avoidance are very close. While as the scale of network increases, DS mode can maintain higher throughput than SS mode does. It is mainly because nodes in DS mode can prevent more packet collision from happening. If the number of nodes is greater than 25, the aggregate throughput of SS modes starts to overtake the DS mode. Since compared with DS mode, nodes in SS mode spend less time on CCA operations, which slightly decrease the average time spending on a data packet. Hence, the maximum number of data packets that one node can transmit within one contention period is improved. In small scale network, although the performance of packet transmission is close, nodes in DS mode will consume more energy on channel sensing attempt. As is shown in Figure 7d, when the number of nodes is less than 18, the average energy consumption of DS mode is slightly higher than SS mode. However, as the number of nodes increases, the average energy consumption of SS mode surpasses DS mode. Since nodes in SS mode spend much more energy on data packet transmission than DS mode does.

6.4. An Estimation of Average Transmission Latency

According to the studies reported in [25,26], the sum of independent non-identically distributed uniform random variables can reasonably be approximated to a normal distribution. Similarly, the distribution of backoff time for one data packet can also be approximated as a normal distribution N μ , σ and its mean and standard deviation can be calculated as follows:
μ = i = 1 N B max ( 2 B E i 1 ) 2 1 p c c a s i 1 ,
σ = i = 1 N B max ( 2 B E i 1 ) 2 12 1 p c c a s i 1 .
Hence, the value of average transmission delay can be approximated as:
T ~ p k t = μ + ( i = 1 N B max 1 p c c a s i 1 Δ c c a + Δ L ) .
According to whether the average packet transmission latency is lower than the packet inter-arrival time or not, we can classify networks into two kinds, i.e., delay-bounded networks and delay- unbounded networks. In delay-bounded networks, most data packets will be transmitted or dropped before the next data packet comes. On the contrary, most data packets in delay-unbounded networks have to wait a period of time before been serviced. It can be expected that in delay-unbounded network, the average transmission latency keeps increasing along time. With the estimation of average transmission delay T ~ p k t , we can confirm whether a network with given network load settings and specified channel access parameters is delay bounded or not.
In the following experiments, packet inter-arrival time T is fixed to 200 slots, i.e., 64 ms. The scale of the network ranges from 10 nodes to 80 nodes. Under each network scales, different values of macMinBE and macMaxCSMABackoffs are simulated. Figure 8 presents the simulation results with different macMinBE values under different network scales. The contours present the average transmission delay. In both figures, the contour interval is equal to 10 ms. The red curve stands for the boundary according to simulation results and the analytical boundary is presented as a blacked curve with black asterisks. Similarly, Figure 9 resets the simulation results with different macMaxCSMABackoffs values under different network scales.
Compared with Figure 9, the contour of average transmission latency in Figure 8 is denser, which indicates the average transmission latency has fluctuated greatly. Taking the network with 50 nodes as an example. According to Figure 8, the average transmission latency ranges from less than 40 ms to 140 ms. However, the maximum average transmission latency is less than 70 ms in Figure 9. It means macMinBE has more influence on transmission latency than macMaxCSMABackoffs. In any given network with fixed network scales, increasing the value of macMinBE can significantly increases the average packet transmission latency, which probably changes the network from delay- unbounded to delay-unbounded.
What’s more, both Figure 8 and Figure 9 also present the boundaries between delay-bounded networks and delay-unbounded networks. Based on the simulation results, we take the curve that average transmission latency equals to packet inter-arrival time T as the simulational boundary. The analytical boundary is obtained by comparing T ~ p k t with T. We can find out that the analytical boundary always lies above and right of the actual boundary, which means the estimated average transmission latency T p k t is always less than the actual average transmission latency T p k t . It is mainly because the estimated average backoff time μ is always less than the actual average backoff time. It is because the value of backoff is always larger than 0, while the value of the independent variable μ in the normal approximation is not. Hence, with this approximation, we can conduct a conservative estimation of whether a specified network’s average transmission latency is bounded by its packet inter-arrival time or not.

7. Conclusions

In this paper, we firstly proposed an adequate analytical framework to accurately characterize the MAC behavior of WSN nodes with periodic traffic patterns. The framework is unfolded from two perspectives, channel state and node state. From the perspective of channel state, the relationship between the occurrence of CCA1 in channel τ 1 and its successful probability p c c a s was formulated through a Markov chain-based channel state model. From the perspective of node state, the distribution of a single node’s backoff time was carried out with the help of discrete time signal processing analysis. Then, we deepened the analysis by translating the interaction among key parameters, the probability of a single node’s CCA1 operation in a slot ω 1 and successful channel access probability p c c a s into two parametric relationships. By solving these two relationships simultaneously, we can estimate the occurrences probability of CCA1 ( ω 1 and τ 1 ) and the channel access probability p c c a s with given network scale, data packet’s inter-arrival time and channel access parameters. Based on the analytical framework, key performance statistics of single node and whole network were also formulated. With extensive simulations, the proposed framework is validated to be accurate and scalable. Afterward, the performance of SS mode was analyzed and compared with the DS mode. According to the comparison result under different network scenarios, applicable network scenarios of two modes were demonstrated respectively. Finally, with the normal approximation of backoff distribution, a conservative estimation of data packet’s average transmission latency was carried out.

Author Contributions

Conceptualization, Y.W. and W.Y.; Methodology, Y.W. and W.Y.; Software, Y.W., R.H. and L.X.; Validation, Y.W., L.X. and H.Z.; Writing—original draft preparation, Y.W.; Writing—review and editing, R.H., W.Y. and H.Z.; funding acquisition, W.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of China under Grant (51874299) and the National Science & Technology Pillar Program of China (2013BAK06B03).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gungor, V.C.; Hancke, G.P. Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 2009, 56, 4258–4265. [Google Scholar] [CrossRef] [Green Version]
  2. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks. IEEE Stud. 802.15.4. 2006. Available online: http://www.ieee802.org/15/pub/TG4.html (accessed on 11 June 2020).
  3. Pollin, S.; Ergen, M.; Ergen, S.C.; Bougard, B.; Van der Perre, L.; Moerman, I.; Bahai, A.; Varaiya, P.; Catthoor, F. Performance analysis of slotted carrier sense IEEE 802.15. 4 medium access layer. IEEE Trans. Wirel. Commun. 2008, 7, 3359–3371. [Google Scholar] [CrossRef] [Green Version]
  4. He, J.; Tang, Z.; Chen, H.-H.; Zhang, Q. An accurate and scalable analytical model for IEEE 802.15. 4 slotted CSMA/CA networks. Trans. Wirel. Commun. 2009, 8, 440–448. [Google Scholar] [CrossRef]
  5. Ling, X.; Cheng, Y.; Mark, J.W.; Shen, X. A renewal theory based analytical model for the contention access period of IEEE 802.15. 4 MAC. IEEE Trans. Wirel. Commun. 2008, 7, 2340–2349. [Google Scholar] [CrossRef]
  6. Cheng, Y.; Ling, X.; Zhuang, W. A protocol-independent approach for analyzing the optimal operation point of CSMA/CA protocols. In Proceedings of the IEEE INFOCOM, Rio de Janeiro, Brazil, 20–25 April 2009; pp. 2070–2078. [Google Scholar]
  7. Cao, X.; Chen, J.; Sun, Y.; Shen, X. Maximum throughput of IEEE 802.15. 4 enabled wireless sensor networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM, Miami, FL, USA, 6–10 December 2010; pp. 1–5. [Google Scholar]
  8. Ramachandran, I.; Das, A.K.; Roy, S. Analysis of the contention access period of IEEE 802.15. 4 MAC. ACM Trans. Sens. Netw. 2007, 3, 4-es. [Google Scholar] [CrossRef] [Green Version]
  9. Jung, C.Y.; Hwang, H.Y.; Sung, D.K.; Hwang, G.U. Enhanced Markov chain model and throughput analysis of the slotted CSMA/CA for IEEE 802.15. 4 under unsaturated traffic conditions. IEEE Trans. Veh. Technol. 2008, 58, 473–478. [Google Scholar] [CrossRef] [Green Version]
  10. Park, P.; Di Marco, P.; Soldati, P.; Fischione, C.; Johansson, K.H. A generalized Markov chain model for effective analysis of slotted IEEE 802.15. 4. In Proceedings of the 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, China, 12–15 October 2009; pp. 130–139. [Google Scholar]
  11. Lu, K.; Wang, J.; Wu, D.; Fang, Y. Performance of a burst-frame-based CSMA/CA protocol: Analysis and enhancement. Wirel. Netw. 2009, 15, 87–98. [Google Scholar] [CrossRef]
  12. Kuzlu, M.; Pipattanasomporn, M.; Rahman, S. Communication network requirements for major smart grid applications in HAN, NAN and WAN. Comput. Netw. 2014, 67, 74–88. [Google Scholar] [CrossRef]
  13. Ingelrest, F.; Barrenetxea, G.; Schaefer, G.; Vetterli, M.; Couach, O.; Parlange, M.B. SensorScope: Application-specific sensor network for environmental monitoring. ACM Trans. Sens. Netw. 2010, 6, 17. [Google Scholar] [CrossRef]
  14. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Area Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  15. Shu, F.; Sakurai, T. A new analytical model for the IEEE 802.15. 4 CSMA-CA protocol. Comput. Netw. 2011, 55, 2576–2591. [Google Scholar] [CrossRef]
  16. Cao, X.; Cheng, P.; Chen, J.; Sun, Y. An online optimization approach for control and communication codesign in networked cyber-physical systems. IEEE Trans. Ind. Inf. 2012, 9, 439–450. [Google Scholar] [CrossRef]
  17. Cao, X.; Chen, J.; Cheng, Y.; Shen, X.S.; Sun, Y. An analytical MAC model for IEEE 802.15. 4 enabled wireless networks with periodic traffic. IEEE Trans. Wirel. Commun. 2015, 14, 5261–5273. [Google Scholar] [CrossRef]
  18. Ashrafuzzaman, K.; Kwak, K.S. On the performance analysis of the contention access period of IEEE 802.15. 4 MAC. IEEE Commun. Lett. 2011, 15, 986–988. [Google Scholar] [CrossRef]
  19. Shu, F.; Sakurai, T.; Zukerman, M.; Vu, H.L. Packet loss analysis of the IEEE 802.15. 4 MAC without acknowledgements. IEEE Commun. Lett. 2007, 11, 79–81. [Google Scholar] [CrossRef]
  20. Li, X.; Hunter, D.K. Four-dimensional Markov chain model of single-hop data aggregation with IEEE 802.15. 4 in wireless sensor networks. Wirel. Netw. 2012, 18, 469–479. [Google Scholar] [CrossRef] [Green Version]
  21. Oppenheim, A.V.; Baran, T.; Massachusetts Institute of Technology, Cambridge, MA, USA. Personal communication, 1999.
  22. Kirsche, M.; Schnurbusch, M. A New IEEE 802.15.4 Simulation Model for OMNeT++/INET. 2015. Available online: https://arxiv.org/pdf/1409.1177.pdf (accessed on 11 June 2020).
  23. Kauer, F.; Köstler, M.; Turau, V. openDSME: Reliable time-slotted multi-hop communication for IEEE 802.15. 4. In Recent Advances in Network Simulation; Springer: Berlin, Germany, 2019; pp. 451–467. [Google Scholar]
  24. Amin, Y.M.; Abdel-Hamid, A.T. A Simulation Model of IEEE 802.15. 4 GTS Mechanism and GTS Attacks in OMNeT++/MiXiM+ NETA. Comput Inf. Sci. 2018, 11, 78–89. [Google Scholar]
  25. Feller, W. An Introduction to Probability Theory and its Applications; John Wiley & Sons: Chichester, UK, 2008; Volume 2. [Google Scholar]
  26. Potuschak, H.; Müller, W.G. More on the distribution of the sum of uniform random variables. St. Pap. 2009, 50, 177–183. [Google Scholar] [CrossRef]
Figure 1. Beacon interval structure.
Figure 1. Beacon interval structure.
Sensors 20 03350 g001
Figure 2. Slotted CSMA/CA protocol.
Figure 2. Slotted CSMA/CA protocol.
Sensors 20 03350 g002
Figure 3. Adjacent-slot-pair-wise channel state model from [19].
Figure 3. Adjacent-slot-pair-wise channel state model from [19].
Sensors 20 03350 g003
Figure 4. The proposed adjacent-slot-pair-wise channel state model.
Figure 4. The proposed adjacent-slot-pair-wise channel state model.
Sensors 20 03350 g004
Figure 5. Local statistics comparison. (a) Probability of performing CCA1 ω 1 . (b) CCA1 occurrence probability τ 1 . (c) Successful CCA1 probability P c c a S . (d) Saturated load statues probability P S A T .
Figure 5. Local statistics comparison. (a) Probability of performing CCA1 ω 1 . (b) CCA1 occurrence probability τ 1 . (c) Successful CCA1 probability P c c a S . (d) Saturated load statues probability P S A T .
Sensors 20 03350 g005
Figure 6. Overall statistics comparisons. (a) Aggregate throughput S . (b) Packet collision probability P c o l l i .(c) Energy consumption e .
Figure 6. Overall statistics comparisons. (a) Aggregate throughput S . (b) Packet collision probability P c o l l i .(c) Energy consumption e .
Sensors 20 03350 g006
Figure 7. Comparisons between DS mode and SS mode. (a) Channel successful access probability P C A S . (b) Packet collision probability P c o l l i . (c) Aggregate throughput S . (d) Energy consumption e .
Figure 7. Comparisons between DS mode and SS mode. (a) Channel successful access probability P C A S . (b) Packet collision probability P c o l l i . (c) Aggregate throughput S . (d) Energy consumption e .
Sensors 20 03350 g007
Figure 8. Contour plot for average transmission latency versus network scale and macMinBE given PI = 200 slots.
Figure 8. Contour plot for average transmission latency versus network scale and macMinBE given PI = 200 slots.
Sensors 20 03350 g008
Figure 9. Contour plot for average transmission latency versus network scale and macMaxCSMABackoffs given PI = 200 slots.
Figure 9. Contour plot for average transmission latency versus network scale and macMaxCSMABackoffs given PI = 200 slots.
Sensors 20 03350 g009
Table 1. Basic notations.
Table 1. Basic notations.
NotationValuesDescription
MDefault: 2Number of sensor nodes in network
KDefault: 1536Number of slots in one contention period
TDefault: 250The inter-arrival time of data packet in slots
LDefault: 8The length of one data packet in slots
macMaxCSMABackoffsRange: 0–5 Default: 4Maximum number of backoff stages
macMaxBERange: 3–8 Default: 5Maximum backoff window exponent
macMinBERange: 0–7 Default: 3Minimum backoff window exponent permeability
NBRange: 0–macMaxCSMABackoffsNumber of backoff times
BERange: macMinBEmacMaxBEBackoff exponent
CWDefault: 2The length of Contention Window
Table 2. Power consumption of Mica2 in different states [17].
Table 2. Power consumption of Mica2 in different states [17].
ModesEnergy Consumption
Transmitting ε T X 24.6 mA
Receiving ε R X 17.2 mA
Idle ε B F 1.617 mA
Sleep ε S L P 0.297 mA

Share and Cite

MDPI and ACS Style

Wang, Y.; Yang, W.; Han, R.; Xu, L.; Zhao, H. An Analytical Framework for the IEEE 802.15.4 MAC Layer Protocol under Periodic Traffic. Sensors 2020, 20, 3350. https://doi.org/10.3390/s20123350

AMA Style

Wang Y, Yang W, Han R, Xu L, Zhao H. An Analytical Framework for the IEEE 802.15.4 MAC Layer Protocol under Periodic Traffic. Sensors. 2020; 20(12):3350. https://doi.org/10.3390/s20123350

Chicago/Turabian Style

Wang, Yipeng, Wei Yang, Ruisong Han, Linsen Xu, and Haojiang Zhao. 2020. "An Analytical Framework for the IEEE 802.15.4 MAC Layer Protocol under Periodic Traffic" Sensors 20, no. 12: 3350. https://doi.org/10.3390/s20123350

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop