An Analytical MAC Model for IEEE 802.15.4 Enabled Wireless Networks With Periodic Traffic

The IEEE 802.15.4 standard, which supports low-cost communications, has been applied in a variety of wireless networks. Developing accurate analytical models for the IEEE 802.15.4 medium access control (MAC) protocol is critical for the design and performance evaluation of such networks. Periodic traffic is a common traffic pattern generated in many practical application scenarios, for which most existing analytical models assuming either saturated or random network traffic patterns become inapplicable. In this paper, we develop an accurate and scalable analytical model to analyze the IEEE 802.15.4 MAC protocol with the periodic traffic. Our model can accurately capture the protocol stochastic behavior in each period in scenarios such as with or without retransmissions and with single clear channel assessment (CCA) or double CCAs. Extensive simulations are conducted to validate the proposed model by both transient and aggregate performance evaluations, and the results show that the model captures MAC behavior with periodic traffic accurately. We also discuss about extending the proposed model to account for heterogeneous scenarios and the hidden node problem.

[1]  Mikael Johansson,et al.  Networked estimation under contention-based medium access , 2010 .

[2]  Aduwati Sali,et al.  Review of Energy Conservation Using Duty Cycling Schemes for IEEE 802.15.4 Wireless Sensor Network (WSN) , 2014, Wirel. Pers. Commun..

[3]  S. Carlsen,et al.  WirelessHART Versus ISA100.11a: The Format War Hits the Factory Floor , 2011, IEEE Industrial Electronics Magazine.

[4]  Fumin Zhang,et al.  Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems , 2008, 2008 Real-Time Systems Symposium.

[5]  Nei Kato,et al.  Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.

[6]  Pravin Varaiya,et al.  Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer , 2008, IEEE Trans. Wirel. Commun..

[7]  Chiara Buratti,et al.  Performance Analysis of IEEE 802.15.4 Beacon-Enabled Mode , 2010, IEEE Transactions on Vehicular Technology.

[8]  Yu Cheng,et al.  A Renewal Theory Based Analytical Model for the Contention Access Period of IEEE 802.15.4 MAC , 2008, IEEE Transactions on Wireless Communications.

[9]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[10]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[11]  David K. Hunter,et al.  Four-dimensional Markov chain model of single-hop data aggregation with IEEE 802.15.4 in wireless sensor networks , 2012, Wirel. Networks.

[12]  Sumit Roy,et al.  Analysis of the contention access period of IEEE 802.15.4 MAC , 2007, TOSN.

[13]  Jiming Chen,et al.  Design of a Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks , 2014, IEEE Internet of Things Journal.

[14]  Lin Guan,et al.  Neighbour Discovery for Transmit Power Adjustment in IEEE 802.15.4 Using RSSI , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[15]  Yu Cheng,et al.  A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols , 2009, IEEE INFOCOM 2009.

[16]  Jiming Chen,et al.  An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems , 2013, IEEE Transactions on Industrial Informatics.

[17]  François Ingelrest,et al.  SensorScope: Application-specific sensor network for environmental monitoring , 2010, TOSN.

[18]  Yuguang Fang,et al.  Performance of a burst-frame-based CSMA/CA protocol: Analysis and enhancement , 2009, Wirel. Networks.

[19]  Vijay Varadharajan,et al.  Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Jiming Chen,et al.  Maximum Throughput of IEEE 802.15.4 Enabled Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[21]  M. Murata,et al.  Modeling of IEEE 802.15.4 in a Cluster of Synchronized Sensor Nodes , 2005 .

[22]  Song Han,et al.  WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.

[23]  Tao Jin,et al.  WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access , 2011, 2011 Proceedings IEEE INFOCOM.

[24]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[25]  Yu Cheng,et al.  Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee , 2014, ArXiv.

[26]  Reinhard German,et al.  An Energy Model for Simulation Studies of Wireless Sensor Networks using OMNeT++ , 2009, Prax. Inf.verarb. Kommun..

[27]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.

[28]  Chang Yong Jung,et al.  Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE 802.15.4 Under Unsaturated Traffic Conditions , 2009, IEEE Transactions on Vehicular Technology.

[29]  Carlo Fischione,et al.  A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4 , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[30]  Feng Shu,et al.  Packet loss analysis of the IEEE 802.15.4 MAC without acknowledgements , 2007, IEEE Communications Letters.

[31]  Hsiao-Hwa Chen,et al.  An accurate and scalable analytical model for IEEE 802.15.4 slotted CSMA/CA networks , 2009, IEEE Trans. Wirel. Commun..