skip to main content
10.1145/1454609.1454624acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits

Published:27 October 2008Publication History

ABSTRACT

In this paper, an analytical model for the beacon-enabled slotted CSMA-CA mechanism of IEEE 802.15.4 wireless sensor network is designed. The current mechanism of IEEE 802.15.4 CSMA-CA is extended to include the retransmission limit of the nodes with packet collision probability. A three-dimensional discrete time Markov chain model for the uplink traffic of wireless sensor network is designed to analyze the energy consumption and throughput of the nodes under unsaturated traffic conditions. The energy consumption and throughput are analyzed for different node numbers and data rates to estimate the possible number of nodes for the better performance in terms of throughput.

References

  1. EEE 802.15.4, "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)", Oct, 2003.Google ScholarGoogle Scholar
  2. G. Lu, B. Krishnamachari, and C. S. Raghavendra, "Performance Evaluation of the IEEE 802.15.4 MAC for Low-Rate Low-Power Wireless Networks", in Proc. IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN), 2004.Google ScholarGoogle Scholar
  3. J. Misic, S. Shafi, and V. B. Misic, "Admission control in 802.15.4 beacon enabled clusters", in Proc. International Conference on Communications and Mobile Computing (IWCMC), July, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Misic and V. B. Misic, "Duty Cycle Management in Sensor Networks Based on 802.15.4 Beacon Enabled MAC", Journal of Ad Hoc and Sensor Wireless Networks, vol. 1, pp. 207--233, Mar, 2005.Google ScholarGoogle Scholar
  5. J. Misic, V. B. Misic, and S. Shafi, "Performance of IEEE 802.15.4 Beacon Enabled PAN with Uplink Transmission in Non-Saturation Mode - Access Delay for Finite Buffers", in Proc. 1st IEEE International Conference on Broadband Networks, pp. 416--425, Oct, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Shafi, "Performance of a Beacon Enabled IEEE 802.15.4 Cluster with Downlink and Uplink Traffic", IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 4, pp. 361--376, Apr, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Petrova, J. Riihijarvi, P. Mahonen, and S. Labella, "Performance Study of IEEE 802.15.4 Using Measurements and Simulations", in Proc. IEEE Wireless Communications and Networking Conference (WCNC), vol. 1, pp. 487--492, April, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  8. G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function", IEEE Journal on Selected Areas in Communications, vol. 18, Mar, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Pollin, M. Ergen, S. C. Ergen, B. Bougard, L. V. der Perre, F. Catthoor, I. Moerman, A. Bahai, and P. Varaiya, "Performance Analysis of Slotted IEEE 802.15.4 Medium Access Layer", http://www.soe.ucsc.edu/research/ccrg/DAWN/papers/ZigBee MACvPV.pdfGoogle ScholarGoogle Scholar
  10. A. Koubâa, M. Alves, and E. Tovar, "A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks", in Proc. 6th IEEE International Workshop on Factory Communication Systems (WFCS), Jun, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  11. T. R. Park, T. H. Kim, J. Y. Choi, S. Choi, and W. H. Kwon, "Throughput and Energy Consumption Analysis of IEEE 802.15.4 Slotted CSMA-CA", IEE Electronics Letters, vol. 41, issue 18, Sep, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. C. K. Singh and A. Kumar, "Performance Evaluation of an IEEE 802.15.4 Sensor Network with a Star Topology" ece.iisc.ernet.in/ anurag/papers/anurag/singh-kumar05submitted-detailed.pdf.gzGoogle ScholarGoogle Scholar

Index Terms

  1. Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        PE-WASUN '08: Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
        October 2008
        110 pages
        ISBN:9781605582368
        DOI:10.1145/1454609

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        PE-WASUN '08 Paper Acceptance Rate16of42submissions,38%Overall Acceptance Rate70of240submissions,29%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader