Performance analysis of a non-beacon enabled IEEE 802.15.4 network with retransmission and ACK mode

The aim of our work is to evaluate the performance of non-beacon IEEE 802.15.4 networks with acknowledgement (ACK) mode and retransmission limits in a finer time unit. Moreover, we predict network performance parameters using backpropagation artificial neural networks (BP-ANNs) with respect to a given quality of service for real-world applications. Therefore, our proposed methods can assist the deployment of a star network with its performance specified in a more practical way. First, the discrete time Markov chain model and M/M/1/k queue are used to describe the full unslotted carrier sense multiple access with collision avoidance (CSMA/CA) algorithm in a non-beacon network. Considering MAC buffer size, unsaturated traffic, and saturated traffic, we build three analytical models to derive eight important performance metrics, e.g., throughput, delay, and reliability. In addition, extensive simulation results show the accuracy of the analytical models in throughput and reliability. Finally, we use the analytical data to train the BP-ANNs models to predict the key parameters such as node number and delay. All results from the simulation data used to test the BP-ANNs show the accuracy these models. Thus, these methods and results can be used to deploy star networks in application environments.

[1]  K.N. Veena,et al.  Convergecast in Wireless Sensor Networks: A Neural Network approach , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.

[2]  H. T. Mouftah,et al.  MAC finite buffer impact on the performance of cluster-tree based WSNs , 2013, 2013 IEEE International Conference on Communications (ICC).

[3]  Carlo Fischione,et al.  Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[4]  Yu Cheng,et al.  A Renewal Theory Based Analytical Model for the Contention Access Period of IEEE 802.15.4 MAC , 2008, IEEE Transactions on Wireless Communications.

[5]  Hamid Aghvami,et al.  A timed Petri Net model for the IEEE 802.15.4 CSMA-CA process , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[6]  Ranjith Liyanapathirana,et al.  Throughput analysis of non-beacon enabled IEEE 802.15.4 networks with unsaturated traffic , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).

[7]  Jay Cheng,et al.  The indoor positioning technique based on neural networks , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[8]  Tony T. Lee,et al.  Performance analysis of markov modulated IEEE 802.15.4 beacon-enable mode , 2013, Wirel. Networks.

[9]  T. Burchfield,et al.  Maximizing Throughput in ZigBee Wireless Networks through Analysis , Simulations and Implementations * , 2007 .

[10]  Eduardo Feo Dalle An analytical model for IEEE 802 . 15 . 4 non-beacon enabled CSMA / CA in multihop wireless sensor networks , 2011 .

[11]  Ranjith Liyanapathirana,et al.  Throughput analysis of IEEE 802.15.4 beacon-enabled MAC protocol in the presence of hidden nodes , 2014, Wirel. Networks.

[12]  Jin Soo Park,et al.  Performance analysis of IEEE 802.15.4 non-beacon mode with the unslotted CSMA/CA , 2008, IEEE Communications Letters.

[13]  Carlo Fischione,et al.  A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4 , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[14]  Chang Yong Jung,et al.  Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE 802.15.4 Under Unsaturated Traffic Conditions , 2009, IEEE Transactions on Vehicular Technology.

[15]  Yoonmee Doh,et al.  Performance modeling and analysis of IEEE 802.15.4 slotted CSMA/CA protocol with ACK mode , 2011 .

[16]  Alastair R. Allen,et al.  Adaptive Sampling for WSAN Control Applications Using Artificial Neural Networks , 2012, J. Sens. Actuator Networks.

[17]  Yuping Zhao,et al.  Analysis and Compare of Slotted and Unslotted CSMA in IEEE 802.15.4 , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[18]  George Hassapis,et al.  A Flexible Analytical Markov Model for the IEEE 802.15.4 Unslotted Mechanism in Single-Hop Hierarchical Wireless Networks with Hidden Nodes , 2013, Wirel. Pers. Commun..

[19]  L.E. Parker,et al.  Intruder detection using a wireless sensor network with an intelligent mobile robot response , 2008, IEEE SoutheastCon 2008.

[20]  Feng Shu,et al.  A new analytical model for the IEEE 802.15.4 CSMA-CA protocol , 2011, Comput. Networks.

[21]  Jang-Ping Sheu,et al.  Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits , 2008, PE-WASUN '08.

[22]  Carlo Fischione,et al.  Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications , 2013, IEEE Transactions on Parallel and Distributed Systems.

[23]  Shen Min,et al.  An improved handover algorithm of Wireless Sensor Networks in high-speed mobile environment , 2010, The 2nd International Conference on Information Science and Engineering.

[24]  Jin-Shyan Lee,et al.  An experiment on performance study of IEEE 802.15.4 wireless networks , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[25]  Jianping Zhu,et al.  Delay Analysis for IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Traffic , 2011, 2011 Third International Conference on Measuring Technology and Mechatronics Automation.

[26]  José A. Afonso,et al.  Evaluation of the Impact of the Topology and Hidden Nodes in the Performance of a ZigBee Network , 2009, S-CUBE.