scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Performance analysis of IEEE 802.15.4 MAC layer: Prospect for multi-hop networks

TL;DR: A 3D Markov chain based model is developed for analysing the performance of proposed MAC framework under different configurations of network and shows that the model captures behaviour of the sensor node most accurately with 95% confidence level.
Abstract: In this paper, we propose and model an enhanced IEEE 802.15.4 MAC for sensor nodes operating in multi-hop scenarios. Existing IEEE 802.15.4 MAC, when adapted to multi-hop networks may not perform efficiently due to lack of knowledge about the instantaneous state of local gateway. We therefore ameliorate the channel access mechanism by introducing a new Active-Tx state, which aids in identifying the state of local gateway along with traditionally existing Sleep and CSMA/CA states. A 3D Markov chain based model is developed for analysing the performance of proposed MAC framework under different configurations of network. Upon considering reliability, energy and delay as the key performance metrics the analysis shows that the model captures behaviour of the sensor node most accurately with 95% confidence level. In addition performance is also analysed using real time deployment and found to be in good accordance with analytical and simulation outcomes.
Citations
More filters
Journal Article
TL;DR: In this article, Stann et al. present RMST (Reliable Multi-Segment Transport), a new transport layer for Directed Diffusion, which provides guaranteed delivery and fragmentation/reassembly for applications that require them.
Abstract: Appearing in 1st IEEE International Workshop on Sensor Net Protocols and Applications (SNPA). Anchorage, Alaska, USA. May 11, 2003. RMST: Reliable Data Transport in Sensor Networks Fred Stann, John Heidemann Abstract – Reliable data transport in wireless sensor networks is a multifaceted problem influenced by the physical, MAC, network, and transport layers. Because sensor networks are subject to strict resource constraints and are deployed by single organizations, they encourage revisiting traditional layering and are less bound by standardized placement of services such as reliability. This paper presents analysis and experiments resulting in specific recommendations for implementing reliable data transport in sensor nets. To explore reliability at the transport layer, we present RMST (Reliable Multi- Segment Transport), a new transport layer for Directed Diffusion. RMST provides guaranteed delivery and fragmentation/reassembly for applications that require them. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. Second, these energy constraints, plus relatively low wireless bandwidths, make in-network processing both feasible and desirable [3]. Third, because nodes in sensor networks are usually collaborating towards a common task, rather than representing independent users, optimization of the shared network focuses on throughput rather than fairness. Finally, because sensor networks are often deployed by a single organization with inexpensive hardware, there is less need for interoperability with existing standards. For all of these reasons, sensor networks provide an environment that encourages rethinking the structure of traditional communications protocols. The main contribution is an evaluation of the placement of reliability for data transport at different levels of the protocol stack. We consider implementing reliability in the MAC, transport layer, application, and combinations of these. We conclude that reliability is important at the MAC layer and the transport layer. MAC-level reliability is important not just to provide hop-by-hop error recovery for the transport layer, but also because it is needed for route discovery and maintenance. (This conclusion differs from previous studies in reliability for sensor nets that did not simulate routing. [4]) Second, we have developed RMST (Reliable Multi-Segment Transport), a new transport layer, in order to understand the role of in- network processing for reliable data transfer. RMST benefits from diffusion routing, adding minimal additional control traffic. RMST guarantees delivery, even when multiple hops exhibit very high error rates. 1 Introduction Wireless sensor networks provide an economical, fully distributed, sensing and computing solution for environments where conventional networks are impractical. This paper explores the design decisions related to providing reliable data transport in sensor nets. The reliable data transport problem in sensor nets is multi-faceted. The emphasis on energy conservation in sensor nets implies that poor paths should not be artificially bolstered via mechanisms such as MAC layer ARQ during route discovery and path selection [1]. Path maintenance, on the other hand, benefits from well- engineered recovery either at the MAC layer or the transport layer, or both. Recovery should not be costly however, since many applications in sensor nets are impervious to occasional packet loss, relying on the regular delivery of coarse-grained event descriptions. Other applications require loss detection and repair. These aspects of reliable data transport include the provision of guaranteed delivery and fragmentation/ reassembly of data entities larger than the network MTU. Sensor networks have different constraints than traditional wired nets. First, energy constraints are paramount in sensor networks since nodes can often not be recharged, so any wasted energy shortens their useful lifetime [2]. This work was supported by DARPA under grant DABT63-99-1-0011 as part of the SCAADS project, and was also made possible in part due to support from Intel Corporation and Xerox Corporation. Fred Stann and John Heidemann are with USC/Information Sciences Institute, 4676 Admiralty Way, Marina Del Rey, CA, USA E-mail: fstann@usc.edu, johnh@isi.edu. 2 Architectural Choices There are a number of key areas to consider when engineering reliability for sensor nets. Many current sensor networks exhibit high loss rates compared to wired networks (2% to 30% to immediate neighbors)[1,5,6]. While error detection and correction at the physical layer are important, approaches at the MAC layer and higher adapt well to the very wide range of loss rates seen in sensor networks and are the focus of this paper. MAC layer protocols can ameliorate PHY layer unreliability, and transport layers can guarantee delivery. An important question for this paper is the trade off between implementation of reliability at the MAC layer (i.e. hop to hop) vs. the Transport layer, which has traditionally been concerned with end-to-end reliability. Because sensor net applications are distributed, we also considered implementing reliability at the application layer. Our goal is to minimize the cost of repair in terms of transmission.

650 citations

Journal ArticleDOI
15 Apr 2021
TL;DR: In this paper, the authors proposed an analytical Markov chain model of the modified slotted CSMA/CA IEEE 802.15.4 medium access control (MAC) protocol, which efficiently utilizes the Guaranteed Time Slots (GTSs) under saturated traffic conditions.
Abstract: In the present work, we have proposed an analytical Markov-chain model of the modified slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) IEEE 802.15.4 Medium Access Control (MAC) protocol, which efficiently utilizes the Guaranteed Time Slots (GTSs) under saturated traffic conditions. The five dimensional Markov chain model based analysis is performed for variable Contention Access Period (CAP). Two constraints are introduced i.e. Global Utilization Factor (GUF) and Local Utilization Factor (LUF), to adjust the duration of CAP in each cycle. The work mainly focuses on utilization of GTS under saturated traffic condition for high traffic load applications. To evaluate the performance of our proposed model, we have compared the performance with Misic’s model of standard IEEE 802.15.4 MAC protocol. In addition, the analysis is carried out for practical networks where the data traffic is bursty in nature. The results reflect that our proposed algorithm improves the throughput of the IEEE 802.15.4 MAC protocol in energy-efficient manner at high traffic load applications.

2 citations

Proceedings ArticleDOI
08 Dec 2017
TL;DR: The hardware MAC accelerator is proposed as a bridge between the processor and the baseband-RF circuit, which fetches and recognizes receiving frame from base band circuit, sends transmitting frame to baseband circuit.
Abstract: WIA-PA, which is the new Chinese industrial wireless communication standard for process automation, has become one of the three mainstream industrial wireless network standards. It can meet the requirements of process automation for reliability, real time, security with more mobility and less cabling and installation costs. This paper proposed the hardware MAC accelerator as a bridge between the processor and the baseband-RF circuit, which fetches and recognizes receiving frame from baseband circuit, sends transmitting frame to baseband circuit. There is a self-designed communication control state machine embedded in the MAC accelerator responsible for turning on and off RF circuits to implement TSCH communication mechanism with more deterministic and reduced processor workload.

1 citations


Cites background from "Performance analysis of IEEE 802.15..."

  • ...Many studies consider and add the interference factors in the real environment into analytical model, such as the lognormal shadowing, interference, hidden terminal and modulation type[5], the instantaneous state of local gateway[6] and heterogeneous traffic and hidden terminals[7]....

    [...]

Journal Article
TL;DR: In this paper, a trabajo se analizan tres tecnologias actualmente utilizadas for Internet of las cosas: NB-IoT, LoRa and IEEE 802.15-4.
Abstract: En este trabajo se analizan tres tecnologias actualmente utilizadas para Internet de las Cosas (IoT): NB-IoT, LoRa y IEEE 802.15-4. Particularmente se analiza como estas tecnologias cumplen con los requisitos para el trafico de IoT, teniendo en cuenta tres criterios: cobertura, capacidad de dispositivos, confiabilidad, retardo y consumo energetico; caracteristicas clave a la hora de evaluar una solucion para este tipo de trafico. Se comparan capacidades y se muestran compromisos entre los distintos parametros a analizar, concluyendo sobre la aplicabilidad de las mismas de acuerdo a los requerimientos de las aplicaciones de IoT. Para aquellas que requieran alta confiabilidad y buena cobertura sin requerimientos fuertes en tasa de datos y retardo, NB-IoT resulta ser la mejor opcion para un operador que tiene infraestructura LTE ya desplegada.

Cites background from "Performance analysis of IEEE 802.15..."

  • ...ISSN 1729-3804 inferior a las de un sólo salto en el resto de los parámetros a analizar, debido en parte al aumento del uso de los recursos ocasionado por los múltiples saltos [15]....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: In this paper, a simple but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions, is presented.
Abstract: The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol.

8,072 citations

01 Jan 2006
TL;DR: It is demonstrated through implementation and evaluation in a wireless sensor testbed that X-MAC's shortened preamble approach significantly reduces energy usage at both the transmitter and receiver, reduces per-hop latency, and offers additional advantages such as flexible adaptation to both bursty and periodic sensor data sources.
Abstract: In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as BMAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening” approach is simple, asynchronous, and energy-efficient, the long preamble introduces excess latency at each hop, is suboptimal in terms of energy consumption, and suffers from excess energy consumption at nontarget receivers. X-MAC proposes solutions to each of these problems by employing a shortened preamble approach that retains the advantages of low power listening, namely low power communication, simplicity and a decoupling of transmitter and receiver sleep schedules. We demonstrate through implementation and evaluation in a wireless sensor testbed that X-MAC’s shortened preamble approach significantly reduces energy usage at both the transmitter and receiver, reduces per-hop latency, and offers additional advantages such as flexible adaptation to both bursty and periodic sensor data sources.

1,786 citations

Proceedings ArticleDOI
31 Oct 2006
TL;DR: X-MAC as mentioned in this paper employs a shortened preamble approach that retains the advantages of low power listening, namely low power communication, simplicity and a decoupling of transmitter and receiver sleep schedules.
Abstract: In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as BMAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this "low power listening" approach is simple, asynchronous, and energy-efficient, the long preamble introduces excess latency at each hop, is suboptimal in terms of energy consumption, and suffers from excess energy consumption at nontarget receivers. X-MAC proposes solutions to each of these problems by employing a shortened preamble approach that retains the advantages of low power listening, namely low power communication, simplicity and a decoupling of transmitter and receiver sleep schedules. We demonstrate through implementation and evaluation in a wireless sensor testbed that X-MAC's shortened preamble approach significantly reduces energy usage at both the transmitter and receiver, reduces per-hop latency, and offers additional advantages such as flexible adaptation to both bursty and periodic sensor data sources.

1,654 citations

Journal ArticleDOI
31 May 2005
TL;DR: Key issues coming up in wireless fieldbus and wireless industrial communication systems are discussed: fundamental problems like achieving timely and reliable transmission despite channel errors; the usage of existing wireless technologies for this specific field of applications; and the creation of hybrid systems in which wireless stations are incorporated into existing wired systems.
Abstract: With the success of wireless technologies in consumer electronics, standard wireless technologies are envisioned for the deployment in industrial environments as well. Industrial applications involving mobile subsystems or just the desire to save cabling make wireless technologies attractive. Nevertheless, these applications often have stringent requirements on reliability and timing. In wired environments, timing and reliability are well catered for by fieldbus systems (which are a mature technology designed to enable communication between digital controllers and the sensors and actuators interfacing to a physical process). When wireless links are included, reliability and timing requirements are significantly more difficult to meet, due to the adverse properties of the radio channels. In this paper, we thus discuss some key issues coming up in wireless fieldbus and wireless industrial communication systems: 1) fundamental problems like achieving timely and reliable transmission despite channel errors; 2) the usage of existing wireless technologies for this specific field of applications; and 3) the creation of hybrid systems in which wireless stations are incorporated into existing wired systems.

693 citations


"Performance analysis of IEEE 802.15..." refers background in this paper

  • ...4 is a proven technology for low power and minimal data rate applications, which has already drawn a significant attention from industry, control, home automation and health care applications [1]–[3]....

    [...]

Journal Article
TL;DR: In this article, Stann et al. present RMST (Reliable Multi-Segment Transport), a new transport layer for Directed Diffusion, which provides guaranteed delivery and fragmentation/reassembly for applications that require them.
Abstract: Appearing in 1st IEEE International Workshop on Sensor Net Protocols and Applications (SNPA). Anchorage, Alaska, USA. May 11, 2003. RMST: Reliable Data Transport in Sensor Networks Fred Stann, John Heidemann Abstract – Reliable data transport in wireless sensor networks is a multifaceted problem influenced by the physical, MAC, network, and transport layers. Because sensor networks are subject to strict resource constraints and are deployed by single organizations, they encourage revisiting traditional layering and are less bound by standardized placement of services such as reliability. This paper presents analysis and experiments resulting in specific recommendations for implementing reliable data transport in sensor nets. To explore reliability at the transport layer, we present RMST (Reliable Multi- Segment Transport), a new transport layer for Directed Diffusion. RMST provides guaranteed delivery and fragmentation/reassembly for applications that require them. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. Second, these energy constraints, plus relatively low wireless bandwidths, make in-network processing both feasible and desirable [3]. Third, because nodes in sensor networks are usually collaborating towards a common task, rather than representing independent users, optimization of the shared network focuses on throughput rather than fairness. Finally, because sensor networks are often deployed by a single organization with inexpensive hardware, there is less need for interoperability with existing standards. For all of these reasons, sensor networks provide an environment that encourages rethinking the structure of traditional communications protocols. The main contribution is an evaluation of the placement of reliability for data transport at different levels of the protocol stack. We consider implementing reliability in the MAC, transport layer, application, and combinations of these. We conclude that reliability is important at the MAC layer and the transport layer. MAC-level reliability is important not just to provide hop-by-hop error recovery for the transport layer, but also because it is needed for route discovery and maintenance. (This conclusion differs from previous studies in reliability for sensor nets that did not simulate routing. [4]) Second, we have developed RMST (Reliable Multi-Segment Transport), a new transport layer, in order to understand the role of in- network processing for reliable data transfer. RMST benefits from diffusion routing, adding minimal additional control traffic. RMST guarantees delivery, even when multiple hops exhibit very high error rates. 1 Introduction Wireless sensor networks provide an economical, fully distributed, sensing and computing solution for environments where conventional networks are impractical. This paper explores the design decisions related to providing reliable data transport in sensor nets. The reliable data transport problem in sensor nets is multi-faceted. The emphasis on energy conservation in sensor nets implies that poor paths should not be artificially bolstered via mechanisms such as MAC layer ARQ during route discovery and path selection [1]. Path maintenance, on the other hand, benefits from well- engineered recovery either at the MAC layer or the transport layer, or both. Recovery should not be costly however, since many applications in sensor nets are impervious to occasional packet loss, relying on the regular delivery of coarse-grained event descriptions. Other applications require loss detection and repair. These aspects of reliable data transport include the provision of guaranteed delivery and fragmentation/ reassembly of data entities larger than the network MTU. Sensor networks have different constraints than traditional wired nets. First, energy constraints are paramount in sensor networks since nodes can often not be recharged, so any wasted energy shortens their useful lifetime [2]. This work was supported by DARPA under grant DABT63-99-1-0011 as part of the SCAADS project, and was also made possible in part due to support from Intel Corporation and Xerox Corporation. Fred Stann and John Heidemann are with USC/Information Sciences Institute, 4676 Admiralty Way, Marina Del Rey, CA, USA E-mail: fstann@usc.edu, johnh@isi.edu. 2 Architectural Choices There are a number of key areas to consider when engineering reliability for sensor nets. Many current sensor networks exhibit high loss rates compared to wired networks (2% to 30% to immediate neighbors)[1,5,6]. While error detection and correction at the physical layer are important, approaches at the MAC layer and higher adapt well to the very wide range of loss rates seen in sensor networks and are the focus of this paper. MAC layer protocols can ameliorate PHY layer unreliability, and transport layers can guarantee delivery. An important question for this paper is the trade off between implementation of reliability at the MAC layer (i.e. hop to hop) vs. the Transport layer, which has traditionally been concerned with end-to-end reliability. Because sensor net applications are distributed, we also considered implementing reliability at the application layer. Our goal is to minimize the cost of repair in terms of transmission.

650 citations