Throughput-Delay Evaluation of a Hybrid-MAC Protocol for M2M Communications

This paper proposes a robust hybrid-MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: Contention Interval CI and Transmission Interval TI. The CI is based on p-persistent CSMA mechanism, which allows M2M devices to compete for the transmission slots with equal priorities. After contention, only those devices, which have won time-slots, are allowed to transmit data packets during TI. In the authors' proposed MAC scheme, the TI is basically a TDMA frame and each M2M device is 802.11 enabled. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome the limitations of TDMA mechanism. The simulation results demonstrate the effectiveness of the proposed hybrid-MAC protocol.

[1]  Rong Yu,et al.  Toward cloud-based vehicular networks with efficient resource management , 2013, IEEE Network.

[2]  T.-H. Hsu,et al.  Adaptive time division multiple access-based medium access control protocol for energy conserving and data transmission in wireless sensor networks , 2011, IET Commun..

[3]  Jianping Pan,et al.  A hybrid reservation/contention-based MAC for video streaming over wireless networks , 2010, IEEE Journal on Selected Areas in Communications.

[4]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[5]  Jing Wang,et al.  An adaptive medium access control mechanism for cellular based Machine to Machine (M2M) communication , 2010, 2010 IEEE International Conference on Wireless Information Technology and Systems.

[6]  Jiming Chen,et al.  Design of a Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks , 2014, IEEE Internet of Things Journal.

[7]  Shengli Xie,et al.  Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.

[8]  Cem Ersoy,et al.  MAC protocols for wireless sensor networks: a survey , 2006, IEEE Communications Magazine.

[9]  Kwang-Cheng Chen,et al.  Toward ubiquitous massive accesses in 3GPP machine-to-machine communications , 2011, IEEE Communications Magazine.

[10]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[11]  Y. Igarashi,et al.  Proposed Node and Network Models for an M2M Internet , 2012, 2012 World Telecommunications Congress.

[12]  Dusit Niyato,et al.  Random access for machine-to-machine communication in LTE-advanced networks: issues and approaches , 2013, IEEE Communications Magazine.

[13]  Jiming Chen,et al.  Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks , 2010, IEEE Transactions on Industrial Electronics.

[14]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..

[15]  Injong Rhee,et al.  Z-MAC: a hybrid MAC for wireless sensor networks , 2008, TNET.

[16]  Yan Zhang,et al.  Development of an integrated wireless sensor network micro-environmental monitoring system. , 2008, ISA transactions.

[17]  Rung-Hung Gau,et al.  Optimal Tree Pruning for Location Update in Machine-to-Machine Communications , 2013, IEEE Transactions on Wireless Communications.

[18]  Kwangjae Lim,et al.  Performance evaluation of random access for M2M communication on IEEE 802.16 network , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[19]  Anthony Ephremides,et al.  Analysis of a Hybrid Access Scheme for Buffered Users-Probabilistic Time Division , 1982, IEEE Transactions on Software Engineering.

[20]  Marco Conti,et al.  Optimal capacity of p-persistent CSMA protocols , 2003, IEEE Communications Letters.

[21]  Kwang-Cheng Chen,et al.  Cooperative Access Class Barring for Machine-to-Machine Communications , 2012, IEEE Transactions on Wireless Communications.