Next Article in Journal
Research on an SICM Scanning Image Resolution Enhancement Algorithm
Previous Article in Journal
Smart Biosensor for Breast Cancer Survival Prediction Based on Multi-View Multi-Way Graph Learning
Previous Article in Special Issue
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Performance Analysis of CSMA/NP under Finite Population Environments

by
Ariadna I. Rodriguez-Gomez
,
Mario E. Rivero-Angeles
,
Izlian Y. Orea-Flores
*,
Gina Gallegos-García
and
Juan Carlos Chimal-Eguia
Centro de Investigación en Computación, Instituto Politécnico Nacional, Mexico City 07738, Mexico
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(11), 3290; https://doi.org/10.3390/s24113290
Submission received: 19 April 2024 / Revised: 18 May 2024 / Accepted: 18 May 2024 / Published: 21 May 2024

Abstract

:
In this study, we analyze the CSMA Non-Persistent protocol with a finite number of nodes, providing more accurate results for applications like wireless sensor networks. The finite model addresses scenarios where the node count is moderate, capturing realistic system dynamics. Our analysis reveals a dependency on the node count, impacting system throughput. As the node count increases, throughput behavior aligns with Kleinrock’s infinite model. We derive a complex closed-form throughput expression for a finite quantity of nodes in the system, solved numerically, and offer an approximate expression for specific conditions. These insights advance understanding of low-contention network performance, especially in scenarios where the infinite model becomes inadequate.

1. Introduction

In modern communication systems, we encounter many possible scenarios where the number of nodes is relatively low compared, for example, to conventional cellular systems in a macro cell where the infinite population assumption is very accurate. For example, wireless sensor networks (WSNs) are systems composed of devices distributed within a defined area based on specific application requirements. In these systems, devices must support wireless communication, computation, and sensing capabilities [1,2,3]. There are many possible environments where WSNs are deployed, and, in some cases, the number of nodes contending to transmit in the shared channel may be relatively low. This occurs when nodes are sufficiently separated from each other (outdoor surveillance, for instance) or when a hierarchical system is used, for example, in clustered-based WSNs. In clustered-based WSNs, although hundreds of nodes might be present, the clustering scheme effectively reduces the number of nodes contending in each cluster, thereby simplifying the management of transmissions and potentially improving network efficiency. In these systems, nodes transmit data to a central base station using media access control protocols, among them, the Carrier Sense Multiple Access (CSMA) protocol [4].
The CSMA-Non-Persistent protocol (CSMA-NP) has been extensively studied in the literature [4,5,6,7,8], with a primary focus on scenarios involving an infinite population. However, there may be many circumstances where this is not the case. For instance, in the previously mentioned WSNs or even in 5G cellular systems, where carrier frequencies are in the region of gigahertz, producing very narrow areas of coverage. Additionally, this can occur in Internet of Things applications where only a couple of nodes are present. Therefore, there is a pressing need to analyze the CSMA-NP protocol within the context of a finite population assumption.
The analysis of a finite population within a communication network warrants careful consideration. Therefore, several authors, such as [4,5,6,7,8], have delved into this subject, exploring various scenarios that consider finite populations or retransmissions. The methodologies employed to assess network performance vary. These include the utilization of Markov chains, as seen in the work of [6]. Additionally, Monte Carlo simulations are employed, as demonstrated by [7]. Another approach is the application of the Exponential Backoff Scheduling algorithm, as demonstrated by [9]. The latter approach considers a system with multiple queues and a single server.
Despite the predominant focus on throughput when analyzing the performance of finite populations in the CSMA-NP protocol, much of the existing research has primarily focused on ad hoc networks. In contrast, the analysis presented in this paper considers a central base station. However, a significant gap remains in the current literature—much of the research on CSMA protocols, even when focused on finite node scenarios, is often based on protocol variants and not specifically on the CSMA-NP protocol itself. This oversight suggests a crucial need for dedicated studies that directly address the protocol in finite populations, offering insights that could be critical for the efficient design and management of modern network systems. Building on this, the main contributions of this work are as follows:
  • We provide clear insights into the dynamics of the CSMA/NP random access protocol when the number of interfering nodes is low, which the infinite population model fails to consider. Specifically, in the vulnerability period, the number of interfering nodes reduces as the number of transmissions increases, whilst in the infinite population model, the packet transmission probability remains constant.
  • We develop a closed-form expression to calculate the system throughput with N nodes. The vast majority of previous works consider an infinite population, which is accurate in WiFi, and cellular systems. However, in IoT applications, where only a few nodes interact directly (even if the network comprises hundreds of nodes, just the neighbor nodes interact due to the low transmission capabilities of the nodes in a WSN or due to the use of clustering schemes to provide energy savings, among others). We prove that our model is more accurate when the number of nodes is lower than 10, while the infinite population model provides adequate results for N > 10.
  • We propose an approximated solution to simplify the throughput calculation. Indeed, we provide an exact expression for the throughput for the finite population scenario, but it has to be numerically solved. As such, we provide an approximation that does not require the numerical solution, but it provides a direct result that is accurate in certain regions. Hence, this approximation can be used instead of the numerical solution for the appropriate system variables’ range.
The remaining sections of this paper are structured as follows: In Section 2, we study the conventional CSMA-NP protocol under the infinite population model. Then, in Section 3, we introduce a novel approach to analyze the CSMA-NP protocol with a finite population assumption. In Section 4 some relevant results are presented, where we examine the system throughput using both a closed-form equation that we solve numerically and the simplified expression. We also analyze the implications of our findings when comparing them to the protocol with an infinite population. Finally, Section 5 concludes this paper and outlines potential avenues for future research.

2. CSMA-NP under the Infinite Population Assumption

The CSMA-NP protocol [10] has as its main objective to avoid collisions by rescheduling the packets when the sender node senses the channel is occupied. Conversely, if the channel is free, the node is cleared to send its packet.
This work develops an analysis that assumes an infinite population where the arrival process is considered to be a Poisson process with a packet arrival rate of g packets/s and each node sends only one packet at a time. Each of the packets is assumed to have a constant length of T seconds. When a collision occurs, the packets that collide turn into destructive interference and they cannot be decoded successfully. Also, a propagation delay of τ seconds is considered, which represents the time it takes a packet to be received by all contending nodes in the system. As such, after an idle period, when the transmitting node senses the channel, it will assume that it is free and start its transmission; if a second node attempts to transmit, it also senses the channel, but if this occurs before the first packet arrives, i.e., before τ seconds of the first transmission, this second node also senses the channel as idle and transmits its packet, generating a collision. If the second node senses the channel after τ seconds, then it senses the channel as occupied and alters its transmission, avoiding any collision. Hence, τ is usually referred to as the vulnerability period.
Thus, the throughput is the successful transmission rate U ¯ over the cycle of observation, which involves the expected duration of the channel in idle mode I ¯ and the expected duration of the channel in a busy period, whether a successful or packet collision occurs, B ¯ occurs. The analysis developed in [10] derives the following expression for the throughput (see (1) for further details):
S = U ¯ I ¯ + B ¯ = e τ g 1 g + T ( 1 + τ + τ ( 1 e g τ ) g ) .
However, this analysis assumes a constant arrival rate to the system (since an infinite population is considered), which is not accurate if the number of nodes is low. Indeed, as some nodes are allowed to transmit in the vulnerability period because they sensed the channel idle, the arrival rate drastically diminishes during the rest of that period, rendering a different system throughput. However, if the number of nodes is relatively high, the arrival rate remains almost constant irrespective of the number of previous transmissions. As such, the infinite population model renders accurate results for high values of g. Hence, we now study the system for a finite number of nodes in the following section.

3. CSMA-NP under the Finite Population Assumption

The finite population model (FP) assumes the same considerations as in the standardized protocol. Namely, that each node only transmits one package at a time and the packets take T seconds to be transmitted. However, the main difference falls in the arrival rate. As the number of nodes transmitting a packet increases, the remaining nodes that can transmit diminish, as opposed to the infinite population model where the arrival rate remains constant. To this end, consider that each node transmits a packet with rate α ; then, the total arrival rate to the system is given by g = α N , where α represents the rate of arrival for each node, and N represents the nodes over the network.
In Figure 1, a network scenario with three nodes is depicted. From a top-down perspective, the third node attempts its initial packet transmission, highlighted in orange. Since the channel is unoccupied, the node begins to send the packet after a propagation delay of τ seconds, with the transmission taking T seconds. Meanwhile, the first and second nodes, upon sensing the channel, detect that it is occupied and consequently do not initiate transmission. Subsequently, after the third node has completed its transmission, the first node attempts to send a packet.
However, in a third scenario depicted, all three nodes attempt to send packets simultaneously. Each node, finding the channel idle after their respective vulnerability periods, initiates the transmission. These close transmissions lead to a collision. The duration of this collision spans from the first attempt to transmit to the point where the last node sends its packet. A transmission is deemed successful if it encompasses only the period from the intent to transmit to the conclusion of the transmission.
Building on this, the average time that the shared channel is useful can be obtained by observing that in case the packet is successful, it consumes T seconds of the channel, while it is 0 otherwise, i.e., no transmissions or packet collisions. Also, once a packet has been transmitted after an idle period, the probability that such a packet is successful, P s u c c , is given by the probability that none of the remaining nodes, N 1 , transmit in the vulnerability period, τ . Hence,
P s u c c = P r o b { None of the remaining N 1 nodes transmit in the vulnerability period } P s u c c = e α ( N 1 ) τ
From this, the average time that the system transmits useful information is given by
U ¯ = T P s u c c = T e α ( N 1 ) τ
To calculate the average time that the system is idle, we first calculate its cumulative distribution function (CDF), F I ( t ) = P r o b ( I t ) .
F I ( t ) = P r o b ( The first node transmits before τ ) + P r o b ( The second node transmits before τ ) + P r o b ( The N th node transmits before τ ) + = P r o b ( at least one of the N nodes transmit before τ ) = 1 [ e α t e α t . . . e α t ] = 1 e N α t ,
which is an exponential random variable with parameter N α . Hence,
I ¯ = 1 N α
Finally, to calculate the average time that the system is busy, either by a successful packet transmission or packet collision, B ¯ , can be calculated as follows: Whenever a packet transmission begins after an idle period, the system will remain busy for at least T seconds, which corresponds to the duration of the packet plus the propagation time, τ , plus the time after this first transmission and the last interfering packet that is transmitted before the vulnerability period, τ , ends. Let us call this time from the first transmission to the last interfering packet, Y. Then,
B ¯ = T + τ + E [ Y ]
Since T and τ are constant values, we now concentrate on finding the mean value of Y. To this end, we first derive an expression for the CDF of the random variable Y, F Y ( y ) . We can see that the probability that Y y is equivalent to the probability that there are no more arrivals in the vulnerability period after y seconds succeeding the first arrival, then F Y ( y ) = P r o b ( Y y ) = P r o b ( N ( τ y ) = 0 ) .
Where the function N ( t ) represents the number of arrivals in the period (0,t). Note that interfering nodes transmit before y; then, the non-interfering nodes have to transmit after τ , since they no longer collide with the rest of the packets. In this sense, this probability highly depends on the number of interfering nodes, N I , because as the number of interfering nodes increases, the number of nodes that do not interfere decreases. This is the main issue in the finite population model that the finite population model cannot consider. As such, if there is only one interfering node, N I = 1 , and considering that the first node that transmits is not an interfering node, then
P r o b ( N ( τ y ) = 0 | n I = 1 ) = e ( N 2 ) α ( τ y )
For the case of 2 interfering nodes:
P r o b ( N ( τ y ) = 0 | n I = 2 ) = e ( N 3 ) α ( τ y )
And in general, for i interfering nodes:
P r o b ( N ( τ y ) = 0 | n I = i ) = e ( N i 1 ) α ( τ y )
As such, we find that:
P r o b ( Y y ) = i = 1 N 1 N 1 i 1 e α y i e N 1 i α τ y
From this, we find the expected value of Y ^ as:
Y ^ = 0 τ ( 1 F Y ( y ) ) d y = 0 τ 1 i = 1 N 1 N 1 i 1 e α y i e N 1 i α τ y d y = 0 τ d y 0 τ 1 e α y + e α τ y N 1 d y 0 τ e α τ y N 1 d y = τ 0 τ 1 e α y + e α τ y N 1 d y e α ( N 1 ) τ α ( n 1 ) .
Thus, by substituting (11) in the expression of B ¯ , we get:
B ¯ = T + 2 τ 0 τ 1 e α y + e α τ y N 1 d y e α ( N 1 ) τ α ( n 1 ) .
And finally, we derived the throughput equation presented in Equation (13). This equation is solved with a closed-form solution, which renders exact results but with high computational complexity that rapidly increases as the number of nodes in the system N increases. As such, we propose an approximated solution as we now describe.
S ¯ ( N ) = T e α ( N 1 ) τ 1 N α + T + 2 τ 0 τ 1 e α y + e α τ y N 1 d y 1 α ( N 1 ) e α ( N 1 ) τ

Approximated Solution

As we mentioned above, we obtained the system throughput for the FP model by a closed-form solution. However, for values of N higher than 10, it requires high computational resources to solve it. Hence, we derive an approximated method to solve this integral which results in a closed expression with very low complexity for any value of N, which allows us to easily evaluate the system throughput in any condition. To this end, the integral presented in (13) can be written as (14):
0 τ 1 e α y + e α τ y N 1 d y = 0 τ 1 e α y + e α τ e α y N 1 d y .
Let x = α y and a = e α τ ; then, d x = α d y d y = 1 α d x , substituting x and a, we get:
0 α τ 1 e x + a e x N 1 1 α d x = 1 α 0 α τ 1 e x + a e x N 1 d x .
By considering e x = 1 + x + x 2 2 ! + x 3 3 ! + x 4 4 ! + . . . , Equation (15) can be expressed as:
1 α 0 α τ 1 1 x + x 2 2 ! x 3 3 ! + x 4 4 ! θ ( x 5 ) + a 1 + x + x 2 2 ! + x 3 3 ! + x 4 4 ! + θ ( x 5 ) N 1 d x = 1 α 0 α τ x x 2 2 ! + x 3 3 ! x 4 4 ! + θ ( x 5 ) + a + a x + a x 2 2 ! + a x 3 3 ! + a x 4 4 ! + a θ x 5 N 1 d x .
Reorganizing the terms, we obtain:
1 α 0 α τ a + x ( a + 1 ) + x 2 2 ( a 1 ) + x 3 3 ( a + 1 ) + θ ( X 4 ) N 1 d x .
Let us consider a function such that:
f ( x ) = ( a + x ( a + 1 ) + x 2 2 ( a 1 ) + x 3 3 ( a + 1 ) + θ 4 ) N 1
And performing an expansion of Equation (18) around 0, we obtain:
f ( x ) = f ( 0 ) + f ( 0 ) ( x a ) + f ( 0 ) ( x a ) 2 2 + f ( 0 ) ( x a ) 3 3 ! + . . . N 1
Note that:
f ( 0 ) = a N 1
f ( 0 ) = ( N 1 ) a N 2 ( a + 1 )
f ( 0 ) = a N 3 ( N 1 ) ( a 2 ( N 1 ) + a ( 2 N 3 ) + ( N 2 ) )
And by considering Equation (19), a Taylor series can be constructed by substituting with (20), (21) and (22):
f ( x ) = a N 1 + ( N 1 ) a N 2 ( a + 1 ) x + a N 3 ( N 1 ) a 2 ( N 1 ) + a ( 2 N 3 ) + ( N 2 ) x 2 2 + . . .
And by substituting in (17) and organizing the terms, we obtain:
1 α τ 0 τ ( a N 1 + ( N 1 ) a N 2 ( a + 1 ) x + a N 3 ( ( N 1 ) ( a 2 ( N 1 ) + a ( 2 N 3 ) + ( N 2 ) ) x 2 2 + θ ( x 3 ) x 3 3 . . . ) d x = η
η = 1 α [ a N 1 x + ( N 1 ) a N 2 ( a + 1 ) x 2 2 + 1 2 a N 3 ( N 1 ) ( a 2 ( N 1 ) + a ( 2 N 3 ) + ( N 2 ) ) x 3 3 + θ ( x 4 ) ] | 0 α τ
Then, we consider the original values of x = α y and a = e α τ , and after some algebraic manipulation, we find:
η = e α τ ( N 1 ) α τ + ( N 1 ) e α τ ( N 2 ) ( e α τ + 1 ) ( α τ ) 2 2 + 1 6 e α τ ( N 3 ) ( N 1 ) ( e ( α τ ) 2 ( N 1 ) + e α τ ( 2 N 3 ) + ( N 2 ) ) ( α τ ) 3 + θ ( τ 4 )
0 α τ 1 e α y + e α ( τ y ) N 1 d y = e α τ ( N 1 ) α τ + ( N 1 ) e α τ ( N 2 ) ( e α τ + 1 ) ( α τ ) 2 2 + 1 6 e α τ ( N 3 ) ( N 1 ) ( e 2 α τ ( N 1 ) + e α τ ( 2 N 3 ) + ( N 2 ) ) ( α τ ) 3 + θ ( τ 4 )
Finally, let e α τ be a, and by substituting (27) in (13), we obtain (28).
S ¯ ( N ) = U ¯ ( N ) I ¯ ( N ) + B ¯ ( N ) = T a ( N 1 ) 1 N α + T + 2 τ α τ ( a ( N 1 ) + ( N 1 ) a ( N 2 ) ( a + 1 ) α τ 2 + 1 6 a ( N 3 ) ( N 1 ) ( a 2 ( N 1 ) + a ( 2 N 3 ) + ( N 2 ) ) ( α τ ) 3 a ( N 1 ) α ( N 1 )
To evaluate the performance of the proposed closed-form and the approximated solution, we develop a system simulation presented in the pseudocode Algorithm 1:
Algorithm 1: Simulation System
Sensors 24 03290 i001
The system simulation is summarized in Algorithm 1, which operates based on the discrete event paradigm. Given the input variables g , τ , T , N , and assuming that α = g / N , the algorithm initiates by generating a first attempt to send a packet for each network node. Subsequently, these packet arrival events are sorted in chronological order. The simulation then proceeds iteratively; the first element of the sorted list is processed based on the system’s current state.
The algorithm evaluates the impact of each new event on the current state of the system. Possible events include arrivals, end of transmission, and end of the vulnerability period. The variables that accumulate the time intervals for different system modes are:
  • U a c c u m u l a t e d : The increments are T + τ for each successful transmission.
  • I a c c u m u l a t e d : Records the time intervals from the last end of transmission until a new arrival; the increments are not standardized.
  • B a c c u m u l a t e d : Updates with the time interval from the first arrival until the last arrival has completed its packet transmission. Note that the last arrival to send a packet occurs between the first arrival and the end of the vulnerability period of the first arrival, so the increment should be within T + τ and T + 2 τ .
For example, if the channel is occupied with a single transmission and a new event is an arrival, it will not be taken into account. The cycle then continues to the next event on the list without making any changes. At the end of the current transmission, the variables U a c c u m u l a t e d and B a c c u m u l a t e d are increased by T + τ , as the channel has been busy and a successful transmission occurred.
Conversely, if an attempt to transmit information occurs before the vulnerability period has finished and the new event is an arrival, the new arrival causes a collision. In this case, B a c c u m u l a t e d is updated with the time interval from the first arrival until the last arrival has sent its complete packet, representing the time during which the channel has been busy. The I a c c u m u l a t e d variable records the time lapses from the last end of transmission until the first arrival, indicating that the channel has been in idle mode.
Finally, the output should be the result of U a c c u m u l a t e d I a c c u m u l a t e d + B a c c u m u l a t e d , which corresponds to the throughput equation in Equation (1). The algorithm should ensure that the iterative process is repeated sufficiently to achieve steady-state results. In this particular case, we performed 100,000 iterations, which was a value founded based on empirical observations and testing by running the algorithm with the same variables several times.
We developed our simulator in Python due to its versatility and extensive library support. Our simulator is based on the methods mentioned above and was implemented without the use of additional simulation packages. Python’s robust libraries and tools enabled us to efficiently manage the complex calculations and event-driven processes required for our simulation.

4. Numerical Results

In this section, we present the most relevant results derived from this work. In addition to the analysis developed above, we performed multiple system simulations to validate the analytical results, for both the exact and approximated throughput expressions. We first obtain the system throughput using Equation (13) and compare it to the results under the infinite population model; this infinite model considers that the packet arrival rate remains constant. Conversely, in our proposed model, the rate of packet transmissions decreases according to the number of packets previously transmitted, which renders different, more accurate results for low values of N. In Figure 2, we show the throughput for different values of N for the finite population model, varying the arrival rate (g) from 1 × 10 7 to 1 × 10 6 packets per second (pps) and the vulnerability time ( τ ) from 3.3 × 10 8 , taking the speed of light in a vacuum and considering a distance between the sender and receiver of 10 m, to 3.3 × 10 7 [seconds] (100 m), the T value is fixed to 0.001 . We can see that the FP model differs greatly from the infinite population model when N is low and when the packet arrival rate is low, i.e., for low values of g and τ . Note that the infinite population model provides a very good approximation to the system dynamics when the traffic load remains relatively constant during the vulnerability period. This occurs for high values of g and τ , but for many IoT applications where packet transmissions are scarce, our proposed model better captures the behavior of the system.
Then, we validate our analysis by comparing the results of the closed-form (red surface) of the throughput under the finite population model to the system simulations (black surface), as depicted in Figure 3. We can see a very good match between these results and a very slight difference when a single node is in the system producing almost no packet transmissions.
We now evaluate the accuracy of the proposed approximation (blue surface) to the closed-form expression of the system throughput under the finite population model. We can see in Figure 4 that, in general, the proposed approximation presents a very good match compared to the closed expression of the throughput (red surface) and the system simulation (black surface). Although some points present a higher discrepancy, we believe that it still accurately captures the system behavior with the great advantage that it provides results for any value of N with low computational complexity, while the closed exact expression requires numerically solving the integral, adding some inconvenient complexity. To assess the precision of the approximation, we calculate the relative error, R E = For all i ( x i x ^ i ) x i , where x i represents the values obtained through the simulation and it acts as the reference and x ^ i are the values obtained through the approximation solution. It is crucial to note that the optimal application scenario for this approximation occurs when g, defined as α N , exceeds three times 1 / τ .
The relative error between the closed expression and the proposed approximation is 0.4874. It can be observed that the regions where there are the most discrepancies are when the traffic offered is below fifty percent. The rationale behind this is that the terms of the Taylor series that are ignored have an important impact on the calculation of the arrival of the interfering packets Y. We believe that including additional terms to this approximation may result in a better match but with an increased complexity. For practical effects, the proposed approximation renders a good match in most of the system parameters and we leave the study of a better approximation to future work since we believe that it lies outside the scope of this paper.
The main advantage of the proposed finite population model is that it provides more accurate results when the number of interfering nodes is reduced. Specifically, when the nodes in the transmission range are low, when some nodes have previously transmitted their packet, the remaining nodes that can transmit are reduced accordingly, which is not considered in an infinite population model. This model would render more accurate results in the context of WSN and IoT applications, where, even if the number of nodes is high, due to the low transmission capabilities of the nodes (usually 10 to 50 m compared to hundreds of meters in a cellular system), only a handful of them can interfere, or even in cases where clustering and ON/OFF schemes are used, drastically reducing the number of interfering nodes in the surroundings. We believe that our model can be used in energy consumption calculation or cyber-attack detection using more accurate results than the infinite population model. However, this analysis renders a complex equation with an integral that can only be numerically solved. As such, we provide an approximation that does not require the numerical solution of the integral, but this method is only adequate when it meets the previously mentioned relationship g > 3 / τ .

5. Conclusions

In this work, we studied, analyzed, and evaluated the CSMA-NP protocol for environments where the number of nodes is low or the packet arrival rate depends on the number of active transmissions. Such environments include many modern communication systems that the infinite population model cannot capture accurately. We derive a closed expression of the system throughput but it includes an integral that has to be numerically solved. Hence, we also propose an approximation that presents a good fit in most cases and with low computational complexity. We validated our results with system simulations.
As expected, the infinite population model renders very different throughput results when there are a few nodes in the network and the packet arrival rate is low. This would generate important discrepancies in practical environments in terms of packet delay and energy consumption if the infinite population model is used in certain system conditions. Conversely, when the number of nodes is high, greater than N = 10 , the infinite population model accurately captures the system performance since the packet arrival rate in the vulnerability period does not greatly vary anymore.
Overall, this study highlights the importance of considering finite populations in the analysis of the CSMA-NP protocol and provides valuable insights into how the system behaves as the number of nodes varies and offers a proposed equation that, while generally accurate, may require adjustments for specific scenarios. These findings contribute to a deeper understanding of network performance and open the door to future research directions for refining the proposed equation and extending the analysis to different network configurations and scenarios.

Funding

This work is partially funded by IPN SIP project 20240671, IPN SIP project 20240675, and IPN SIP project 20241113.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The author wishes to express sincere gratitude to Luis Israel Ramos Perez for their invaluable assistance in rewriting the equations in LaTeX format, which enhanced the manuscript’s clarity and presentation.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ukhurebor, K.E.; Odesanya, I.; Tyokighir, S.S.; Kerry, R.G.; Olayinka, A.S.; Bobadoye, A.O. Wireless Sensor Networks: Applications and Challenges; IntechOpen eBooks: Rijeka, Croatia, 2021. [Google Scholar] [CrossRef]
  2. Stankovic, J.A. Wireless Sensor Networks. Sensors 2008, 41, 92–95. [Google Scholar] [CrossRef]
  3. Abdirahman, M.J. Communication Protocols for Wireless Sensor Networks. ResearchGate, February 2022. Available online: https://www.researchgate.net/publication/358594142 (accessed on 17 January 2024).
  4. Huang, W.; Lin, J.; Chen, C.H.; Chang, Y.-S.; Chen, Y.Y. Accurate Analysis of IEEE 802.15.4 Slotted CSMA/CA over a Real-Time Wireless Sensor Network; Springer eBooks: Berlin/Heidelberg, Germany, 2010; pp. 98–110. [Google Scholar] [CrossRef]
  5. Coyle, E.; Liu, B. Finite Population CSMA/CD Networks. IEEE Commun. Lett. 1983, 31, 1247–1251. [Google Scholar] [CrossRef]
  6. Wu, J.-L.C.; Wu, J.; Lee, T.-C. Performance Analysis of Interconnected CSMA/CD Networks with Finite Population. In Proceedings of the IEEE INFOCOM’88, Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies, New Orleans, LA, USA, 27–31 March 1988. [Google Scholar] [CrossRef]
  7. Wan, T.; Sheikh, A.U.H. Performance Analysis of Buffered CSMA/CD Systems. Wirel. Pers. Commun. 2001, 18, 45–65. [Google Scholar] [CrossRef]
  8. Gkelias, A.; Dohler, M.; Friderikos, V.; Aghvami, A.H. Average Packet Delay of CSMA/CA with Finite User Population. IEEE Commun. Lett. 2005, 9, 273–275. [Google Scholar] [CrossRef]
  9. Wong, P.K.; Yin, D.; Lee, T.T. Analysis of Non-Persistent CSMA Protocols with Exponential Backoff Scheduling. IEEE Trans. Commun. 2011, 59, 2206–2214. [Google Scholar] [CrossRef]
  10. Kleinrock, L.; Tobagi, F. Packet Switching in Radio Channels: Part I-Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics. IEEE Trans. Commun. 1975, 23, 1400–1416. [Google Scholar] [CrossRef]
Figure 1. Non-persistent CSMA, Successful transmission and collision events.
Figure 1. Non-persistent CSMA, Successful transmission and collision events.
Sensors 24 03290 g001
Figure 2. Throughput simulation of the system with 3, 10, 5, 100 and an infinite number of nodes.
Figure 2. Throughput simulation of the system with 3, 10, 5, 100 and an infinite number of nodes.
Sensors 24 03290 g002
Figure 3. Comparison between the simulation of the system, and the closed-form solution for an FP with τ = ( 3.33 ) × 10 8 and T = 0.001 .
Figure 3. Comparison between the simulation of the system, and the closed-form solution for an FP with τ = ( 3.33 ) × 10 8 and T = 0.001 .
Sensors 24 03290 g003
Figure 4. Comparison between the simulation of the system, the closed-form solution, and the numerical method for an FP with τ = 0.1 and T = 1 .
Figure 4. Comparison between the simulation of the system, the closed-form solution, and the numerical method for an FP with τ = 0.1 and T = 1 .
Sensors 24 03290 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rodriguez-Gomez, A.I.; Rivero-Angeles, M.E.; Orea-Flores, I.Y.; Gallegos-García, G.; Chimal-Eguia, J.C. Performance Analysis of CSMA/NP under Finite Population Environments. Sensors 2024, 24, 3290. https://doi.org/10.3390/s24113290

AMA Style

Rodriguez-Gomez AI, Rivero-Angeles ME, Orea-Flores IY, Gallegos-García G, Chimal-Eguia JC. Performance Analysis of CSMA/NP under Finite Population Environments. Sensors. 2024; 24(11):3290. https://doi.org/10.3390/s24113290

Chicago/Turabian Style

Rodriguez-Gomez, Ariadna I., Mario E. Rivero-Angeles, Izlian Y. Orea-Flores, Gina Gallegos-García, and Juan Carlos Chimal-Eguia. 2024. "Performance Analysis of CSMA/NP under Finite Population Environments" Sensors 24, no. 11: 3290. https://doi.org/10.3390/s24113290

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop