Transient Analysis of IEEE 802.15.4 Sensor Networks

We study the delay performance of a sensor network, whose nodes access the medium by using the unslotted MAC protocol specified by the IEEE 802.15.4 standard. Unlike previous works, which focus on the average throughput and delay analysis, we develop a detailed model that allows us to obtain the delivery delay distribution of messages sent by concurrently contending sensors toward a central controller. We carry out a transient analysis that is of particular interest when sensor networks are deployed to provide k-coverage for real-time applications, and we study both single- and multi-hop network topologies. We validate our analytical results against simulation results obtained through ns2.

[1]  Majid Bagheri,et al.  Randomized k-Coverage Algorithms For Dense Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[2]  Alexandre Proutiere,et al.  Evaluating delay and energy in sensor networks with sporadic and correlated traffic , 2007 .

[3]  P. Buchholz Exact and ordinary lumpability in finite Markov chains , 1994, Journal of Applied Probability.

[4]  Saburo Muroga,et al.  Binary Decision Diagrams , 2000, The VLSI Handbook.

[5]  Sang Hyuk Son,et al.  Performance Analysis of Group Based Detection for Sparse Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[6]  Feng Shu,et al.  Packet loss analysis of the IEEE 802.15.4 MAC without acknowledgements , 2007, IEEE Communications Letters.

[7]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[8]  Chiara Buratti,et al.  A Mathematical Model for Performance Analysis of IEEE 802.15.4 Non-Beacon Enabled Mode , 2008, EW.

[9]  Khaled Shuaib,et al.  Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results , 2007, J. Commun..

[10]  Brigitte Plateau,et al.  Stochastic Automata Network For Modeling Parallel Systems , 1991, IEEE Trans. Software Eng..

[11]  Yu Cheng,et al.  A General Analytical Model for the IEEE 802.15.4 Contention Access Period , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[12]  Jelena V. Misic,et al.  Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic , 2006, IEEE Transactions on Parallel and Distributed Systems.

[13]  Timo Hämäläinen,et al.  Performance analysis of IEEE 802.15.4 and ZigBee for large-scale wireless sensor network applications , 2006, PE-WASUN '06.

[14]  Marco Gribaudo,et al.  Analysis of IEEE 802.15.4 Sensor Networks for Event Detection , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[15]  Chuang Lin,et al.  An Analytical Model for Evaluating IEEE 802.15.4 CSMA/CA Protocol in Low-Rate Wireless Application , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[16]  Marcel F. Neuts,et al.  Matrix-Geometric Solutions in Stochastic Models , 1981 .

[17]  Patrick Thiran,et al.  Delay of intrusion detection in wireless sensor networks , 2006, MobiHoc '06.

[18]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[19]  Sumit Roy,et al.  Analysis of the contention access period of IEEE 802.15.4 MAC , 2007, TOSN.

[20]  Thomas A. Henzinger,et al.  The theory of hybrid automata , 1996, Proceedings 11th Annual IEEE Symposium on Logic in Computer Science.

[21]  Matteo Sereno,et al.  An efficient algorithm for the transient analysis of a class of deterministic stochastic Petri nets , 2004, International Conference on Dependable Systems and Networks, 2004.

[22]  Jang-Ping Sheu,et al.  Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits , 2008, PE-WASUN '08.

[23]  Chadi Assi,et al.  MAC layer misbehavior in wireless networks: challenges and solutions , 2008, IEEE Wireless Communications.

[24]  Francesca Cuomo,et al.  Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[25]  M. Martalo,et al.  Markov chain-based performance evaluation of IEEE 802.15.4 multihop wireless sensor networks , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[26]  Hongjoong Kim,et al.  ANALYTIC MODEL OF IEEE 802.15.4 Unslotted CSMA/CA , 2007 .

[27]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[28]  Terry Williams,et al.  Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .

[29]  Bruce H. Krogh,et al.  Lightweight detection and classification for wireless sensor networks in realistic environments , 2005, SenSys '05.

[30]  Ingrid Moerman,et al.  Throughput and Delay Analysis of Unslotted IEEE 802.15.4 , 2006, J. Networks.