adaptive mac protocols for data-intensive wireless sensor ......medium access control protocol that...
TRANSCRIPT
![Page 1: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/1.jpg)
Adaptive MAC Protocols ForData-intensive Wireless Sensor Networks
This thesis is
presented to the
School of Computer Science & Software Engineering
for the degree of
Doctor of Philosophy
of
The University of Western Australia
By
Alvaro Enrique Monsalve Ballester
April 2016
![Page 2: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/2.jpg)
![Page 3: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/3.jpg)
c⃝ Copyright 2015
by
Alvaro Enrique Monsalve Ballester
iii
![Page 4: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/4.jpg)
iv
![Page 5: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/5.jpg)
Abstract
This thesis presents PRIMAC, which is a medium access control protocol that
provides quality of service for data-intensive wireless sensor networks through
service differentiation. Data-intensive wireless sensor networks comprise nodes that
generate high volumes of data during an event, for instance, images, audio, video or
seismic monitoring. Data-intensive applications introduce new research challenges
due to the high volume of data to be transmitted over unreliable channels, and the
bursty nature of their transmission profiles.
PRIMAC is based on a channel contention CSMA mechanism with non-uniform
contention window. It achieves higher access priority for selected data-intensive
nodes without deteriorating the network channel utilization. Experimental results
demonstrate that PRIMAC provides better network performance than the widely
adopted IEEE 802.15.4 standard, in terms of normalised channel throughput and
packet delivery ratio.
We also introduce wireless sensor network designs that could achieve optimal through-
put for nodes with homogeneous data-intensive traffic conditions. The sensor nodes
operate using the contention access method of IEEE 802.15.4 MAC protocol with
optimised setting of the standard protocol parameters. An analytical model of the
carrier sense multiple access with collision avoidance (CSMA-CA) algorithm is pro-
posed and equations are derived to obtain the appropriate CSMA-CA parameters.
We present PRIMAC-Uniform for homogeneous data-intensive WSNs, which is an
enhanced carrier sense multiple access with collision avoidance scheme of IEEE
v
![Page 6: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/6.jpg)
802.15.4 with uniform contention window for that guarantees near optimal nor-
malised channel throughput. We evaluate the performance of our protocol and
compare it with the standard CSMA-CA algorithm of IEEE 802.15.4 by using an
experimental testbed in an indoor environment. We find that PRIMAC-Uniform
doubles the packet delivery ratio for any network size whilst keeping high levels of
throughput.
In summary, this thesis focuses on the design of medium access protocols and op-
timal network architecture for a newer generation of wireless sensor networks that
have high data transmission requirements. The results demonstrate that data-
intensive WSNs could be realised through the implementation of optimal strategies
in the nodes in order to successfully contend for a shared medium.
vi
![Page 7: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/7.jpg)
Preface
This thesis is the result of my research work at the School of Computer Science
and Software Engineering, The University of Western Australia. The thesis
consist of seven chapters. Two chapters contain papers that were accepted for
international publications. The research content of chapter 3 was carried out at the
Faculty of Information and Communication Technologies, Swinburne University of
Technology.
Chapter 4 covers the analytical study of optimal WSNs using the IEEE 802.15.4
medium access control protocol that was presented in [64]. Chapter 5 proposes en-
hancements to the recommended carrier sense multiple access with collision avoid-
ance of IEEE 802.15.4 to enable data-intensive applications that was published in
[63]. Chapter 6 introduces a new MAC protocol for generic data-intensive wireless
sensor networks.
Publications (Fully Refereed)
1. “Optimal designs for IEEE 802.15.4 wireless sensor networks”. A.
Monsalve, H. Vu and Q. Vo. Wireless Communications and Mobile Comput-
ing. Volume 13. Issue 18. Pages 1681-1692. 2011. [Chapter 4]
2. “Empirical evaluation of adapting IEEE 802.15.4 contention win-
dows for maximum performance”. A. Monsalve, R. Cardell-Oliver, A.
Datta and C. Huebner. IEEE International Symposium on Personal, Indoor
vii
![Page 8: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/8.jpg)
and Mobile Radio Communications . Pages 260-265. 2012. [Chapter 5]
viii
![Page 9: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/9.jpg)
Contribution of the Candidate to
Publications
My contribution in all publications was 85%. I developed and implemented the
protocols, performed the simulations and experiments, and wrote the papers. My
supervisors, Associate Professor Rachel Cardell-Oliver and Associate Professor Ami-
tava Datta, reviewed all the papers and provided useful feedback to improve the
quality and readability. Professor Hai Vu and Associate Professor Bao Quoc Vo
provided feedback on the paper “Optimal designs for IEEE 802.15.4 wireless sen-
sor networks” [64]. Professor Christof Huebner provided feedback to improve the
quality of the paper “Empirical evaluation of adapting IEEE 802.15.4 contention
windows for maximum performance” [63].
Alvaro Enrique Monsalve Ballester (Candidate) Date
Rachel Cardell-Oliver (Supervisor) Date
ix
![Page 10: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/10.jpg)
x
![Page 11: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/11.jpg)
Acknowledgements
Iwould like to especially thank my supervisors Associate Professor Rachel Cardell-
Oliver and Professor Amitava Datta. My gratitude also goes to Professor Christof
Huebner, Professor Le Hai Vu and Associate Professor Bao Quoc Vo. To my friends
and colleagues at the University of Western Australia and family.
xi
![Page 12: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/12.jpg)
xii
![Page 13: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/13.jpg)
xiii
![Page 14: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/14.jpg)
Abbreviations
AEA Adaptive Election Algorithm
B-MAC Configurable MAC Protocol
BNC Bayonet Neil-Concelman Connector
BPSK Binary Phase Shift Keying
CAP Contention Access Period
CC Channel Capacity
CCA Clear Channel Assessment
CFP Contention Free Period
CSL Conflit Slot List
CSMA/p* Non-persistent Carrier Sense Multiple Access
CSMA-CA Carrier Sense Multiple Access with Collision Avoidance
CW Contention Window
DI Data Intensive
DRAND Distributed Slot Assignment Protocol
DSSS Direct Spread Spectrum Spreading
EAP1 Exclusive Access Phase 1
EAP2 Exclusive Access Phase 2
ED Energy Detection
EDD Earliest Due Date
FCS Frame Check Sequence
FlexiTP Flexible-Schedule-Based TDMA Protocol
FTS Fault-tolerant Listing Slot
G Data Traffic Load
xiv
![Page 15: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/15.jpg)
GHS Global Highest Slot
GTS / GTSs Guaranteed Time Slot / Guaranteed Time Slots
HBC Human Body Communications
IEEE Institute of Electrical and Electronics Engineers
IoT Internet of Things
ISM Industrial, Scientific and Medical
L Length of Packet in slots
LEACH Low Energy Adaptive Clustering Hierarchy
LQI Link Quality Indication
M2M Machine-to-machine
MAC Medium Access Control
MAP Managed Access Phase
MFS Multifunction Slot
MMSN Multifrequency MAC Protocol.
MPDU MAC Protocol Data Unit
N Node
NAM Network Animator
NAMA Node-Activation Multiple Access
NB Narrowband
NCR Neighbourdood-aware Contention Resolution
NP Neighbour Protocol
ns-2 Network Simulator 2
ODA On-demand Aggregation
OPNET Optimized Network Engineering Tools
OQPSK Orthogonal Quadrature Phase Shift Keying
OSI Open Systems Interconnection
OST On-demand TDMA Slot Transfer
OTCL Object-oriented Tool Command Language
Ps Packet Delivery Ratio
PAN Personal Area Network
PHR Physical Layer Header
xv
![Page 16: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/16.jpg)
PHY Physical Layer
PRIMAC Priority Medium Access Control Protocol
PRIMAC-Uniform PRIMAC with Uniform CSMA-CA Scheme
PSDU Physical Service Data Unit
PTS Possible Transmitter Set
QoS Quality of Service
RAP Another Managed Access Phases
RAP1 Random Access Phase 1
RAP2 Random Access Phase 2
RSL Receive Slot List
RSSI Received Signal Strength Indication
S Normalised Channel Throughput
SEP Schedule Exchange Protocol
SHR Synchronization Header
SMACS Self-Organizing Medium Access Control for Sensor Networks
STE Shortest Time To Extinsion
TTS Toggle Snopping Period
TTT Toggle Transmission Period
TDMA Time Division Multiple Access
TEA-15.4 Traffic and Energy Aware IEEE 802.15.4
TMCP Tree-based Multichannel Protocol
TRAMA Traffic-adaptive Medium Access Protocol
TSL Transmit Slot List
UP User Priority
UWB Ultra-wideband
WBA Wireless Body Area
WoT Web of Things
WPAN Wireless Personal Area Network
WSN / WSNs Wireless Sensor Network / Wireless Sensor Networks
Z-MAC Zebra Medium Access Control
xvi
![Page 17: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/17.jpg)
Contents
Abstract v
Preface vii
Contribution of the Candidate to Publications ix
Acknowledgements xi
Abbreviations xiv
1 Introduction 1
1.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.1 Network Description . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Research Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.1 Enable Data-intensive Applications . . . . . . . . . . . . . . 8
1.2.2 Provide Predefined Levels Of Quality Of Service . . . . . . . 9
1.2.3 Develop A Medium Access Protocol For Data-intensive WSNs 9
1.3 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.3.1 Adaptive CSMA-CA For Homogeneous Conditions . . . . . 11
1.3.2 PRIMAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
xvii
![Page 18: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/18.jpg)
1.4 Thesis Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.5 Thesis Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2 Literature Review 15
2.1 Multiple Access Control . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.1 Contention-based Protocols . . . . . . . . . . . . . . . . . . 16
2.1.2 Scheduled-based Protocols . . . . . . . . . . . . . . . . . . . 21
2.1.3 Multichannel Protocols . . . . . . . . . . . . . . . . . . . . . 25
2.1.4 Cross-Layer Design . . . . . . . . . . . . . . . . . . . . . . . 29
2.1.5 Hybrid Protocols . . . . . . . . . . . . . . . . . . . . . . . . 30
3 Methodology 37
3.1 Evaluation Assumptions . . . . . . . . . . . . . . . . . . . . . . . . 37
3.2 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.3 Evaluation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.3.1 Analytical Modelling . . . . . . . . . . . . . . . . . . . . . . 40
3.3.2 Network Simulator 2 (ns-2) . . . . . . . . . . . . . . . . . . 41
3.3.3 Experimental Sensor Nodes . . . . . . . . . . . . . . . . . . 47
4 Data-Intensive Networks with Optimal IEEE 802.15.4 49
4.1 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.2 The IEEE 802.15.4 Protocol . . . . . . . . . . . . . . . . . . . . . . 52
4.3 Analytical Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.3.1 Sensing Rate for Unsaturated Case . . . . . . . . . . . . . . 55
4.3.2 Sensing Rate for Saturated Case . . . . . . . . . . . . . . . . 56
4.3.3 Sensing Failure Probability . . . . . . . . . . . . . . . . . . . 56
xviii
![Page 19: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/19.jpg)
4.3.4 Throughput Analysis . . . . . . . . . . . . . . . . . . . . . . 58
4.3.5 Network Lifetime . . . . . . . . . . . . . . . . . . . . . . . . 58
4.4 Model Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.5 Performance Optimization . . . . . . . . . . . . . . . . . . . . . . . 61
4.6 Optimal Normalised Channel Throughput . . . . . . . . . . . . . . 63
4.6.1 Design 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.6.2 Design 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.6.3 Design 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.7 Evaluation Of Optimal Networks . . . . . . . . . . . . . . . . . . . 72
4.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
5 Enhanced CSMA-CA For Homogeneous Conditions 79
5.1 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.2 Performance Experiments . . . . . . . . . . . . . . . . . . . . . . . 82
5.2.1 System Design . . . . . . . . . . . . . . . . . . . . . . . . . 82
5.2.2 Measurement Setup . . . . . . . . . . . . . . . . . . . . . . . 85
5.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.3.1 Saturated Trial . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.3.2 Unsaturated Trial . . . . . . . . . . . . . . . . . . . . . . . . 88
5.4 PRIMAC-Uniform: Uniform CSMA-CA Scheme . . . . . . . . . . . 90
5.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
6 A Priority MAC Protocol for Data-Intensive Networks 97
6.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
6.2 PRIMAC Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
xix
![Page 20: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/20.jpg)
6.3 Differentiated and Non-Uniform Medium Access Strategy . . . . . . 102
6.3.1 Collision Minimizing . . . . . . . . . . . . . . . . . . . . . . 102
6.3.2 Best Contention Window for PRIMAC . . . . . . . . . . . . 104
6.3.3 Node-Independent Attempt Distribution . . . . . . . . . . . 109
6.3.4 Node-dependent Distribution for High Priorities DI Nodes . 110
6.4 A comparison: PRIMAC and IEEE 802.15.4 . . . . . . . . . . . . . 113
6.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
7 Conclusions 121
7.1 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . . 121
7.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Bibliography 127
xx
![Page 21: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/21.jpg)
List of Tables
1 Chipcon CC2420 Transceiver [17] . . . . . . . . . . . . . . . . . . . 59
2 Optimal Designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
xxi
![Page 22: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/22.jpg)
List of Figures
1 Architecture Of A Homogeneous Data-Intensive WSN . . . . . . . . 5
2 Architecture Of A Heterogeneous Data-Intensive WSN . . . . . . . 6
3 IEEE 802.15.4 (a) Peer-to-Peer Topology, (b) Star Topology . . . . 17
4 Superframe Structure Of IEEE 802.15.4 . . . . . . . . . . . . . . . . 17
5 Superframe Structure Of IEEE 802.15.6 In Beacon Mode . . . . . . 19
6 LEACH Structure And Operation . . . . . . . . . . . . . . . . . . . 22
7 SMACS Link Between Two Sensor Nodes . . . . . . . . . . . . . . 23
8 Self Organised Network (SMACS) Of 18 Sensor Nodes . . . . . . . 24
9 Conceptual System Design Of TMCP . . . . . . . . . . . . . . . . . 25
10 Toggle Transmission In MMSN . . . . . . . . . . . . . . . . . . . . 26
11 WirelessHART System Architecture . . . . . . . . . . . . . . . . . . 28
12 Frame Structure Of TRAMA Including Detailed Slot Format . . . . 30
13 Frame Structure Of Z-MAC Including Detailed Slot Format . . . . 32
14 FlexiTP Slot’s Assignation . . . . . . . . . . . . . . . . . . . . . . . 33
15 (a) Four slot-requestors In The Network: B, F ,G, and H Need To
Find a Slot-supplier. (b) B, F, and H Manage To Get Extra Slots
From C, E, and K Respectively. H Uses Multiple Paths To The Base
Station Whilst C, E and K Stop Their Schedule Temporarily. . . . . 34
xxii
![Page 23: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/23.jpg)
16 Basic Architecture Of ns-2 . . . . . . . . . . . . . . . . . . . . . . . 42
17 Architecture Of A ns-2 Node . . . . . . . . . . . . . . . . . . . . . . 44
18 WPAN Device Architecture . . . . . . . . . . . . . . . . . . . . . . 45
19 Packet Transmission Of A Node In An Unsaturated Network . . . . 54
20 S for Different Packet Arrival Rates And N=20 . . . . . . . . . . . 60
21 S for Different Packet Arrival Rates and N=30 . . . . . . . . . . . . 60
22 S For Different M . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
23 S For Different BEmax . . . . . . . . . . . . . . . . . . . . . . . . 62
24 S For Different BEmin . . . . . . . . . . . . . . . . . . . . . . . . . 63
25 Sopt For Different Length Of Packet L . . . . . . . . . . . . . . . . . 65
26 Sopt And S(λ=λSAT ) For L And N . . . . . . . . . . . . . . . . . . . 65
27 λopt And λSAT For Different M . . . . . . . . . . . . . . . . . . . . 67
28 λopt And λSAT For Different BEmin . . . . . . . . . . . . . . . . . 67
29 Comparison Between Sopt And Sbest . . . . . . . . . . . . . . . . . . 70
30 Sopt For Different L And N . . . . . . . . . . . . . . . . . . . . . . 72
31 Nbest For Different L And λ . . . . . . . . . . . . . . . . . . . . . . 73
32 Sbest For Different L And λ . . . . . . . . . . . . . . . . . . . . . . . 73
33 Sopt For An Optimal Saturated Network . . . . . . . . . . . . . . . 74
34 Tnet For Optimal Designs 1 and 2, And Saturated Networks . . . . . 75
35 Tnet For Optimal Design 3, And Saturated Networks . . . . . . . . . 76
36 Wireless Sensor Node Hardware . . . . . . . . . . . . . . . . . . . . 83
37 PHY And MAC Packet Structure . . . . . . . . . . . . . . . . . . . 84
38 Network Setup Deployment . . . . . . . . . . . . . . . . . . . . . . 85
39 S For Saturated Trial . . . . . . . . . . . . . . . . . . . . . . . . . . 87
xxiii
![Page 24: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/24.jpg)
40 Ps For Saturated Trial . . . . . . . . . . . . . . . . . . . . . . . . . 88
41 S For Unsaturated Trial . . . . . . . . . . . . . . . . . . . . . . . . 89
42 Ps For Various Parameters In N=10,L=12 . . . . . . . . . . . . . . 90
43 S For Various Parameters In N=10,L=12 . . . . . . . . . . . . . . . 91
44 Analytical S/SoptRatio . . . . . . . . . . . . . . . . . . . . . . . . . 93
45 S For PRIMAC-Uniform And IEEE 802.15.4 with Default Parameters 93
46 Ps For PRIMAC-Uniform And IEEE 802.15.4 with Default Parameters 94
47 Normalised Channel Throughput S Of PRIMAC - Homogeneous
L=12 For Different Network Sizes And Contention Windows . . . . 103
48 Packet Delivery Ratio Ps Of PRIMAC - Homogeneous L=12 For
Different Network Sizes And Contention Windows . . . . . . . . . . 103
49 Inter-Successful-Packet Time Of PRIMAC - Homogeneous L=12 For
Different Network Sizes And Contention Windows . . . . . . . . . . 104
50 Analytical Normalised Channel Throughput S Of PRIMAC - Ho-
mogeneous L=2 Slots For Different Network Sizes And Contention
Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
51 Analytical Inter-Successful-Packet Time Of PRIMAC - Homogeneous
L=02 Slots For Different Network Sizes And Contention Windows . 106
52 Normalised Channel Throughput S Of PRIMAC - Homogeneous L=2
Slots For Different Network Sizes And Contention Windows . . . . 107
53 Inter-Successful-Packet Time of PRIMAC - Homogeneous L=2 Slots
For Different Network Sizes And Contention Windows . . . . . . . . 107
54 Normalised Channel Throughput S Of PRIMAC - Homogeneous
L=30 Slots For Different Network Sizes And Contention Windows . 108
55 Inter-Successful-Packet Time Of PRIMAC - Homogeneous L=30 Slots
For Different Network Sizes And Contention Windows . . . . . . . . 108
xxiv
![Page 25: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/25.jpg)
56 Attempt Probability Distribution For Networks Of 3 And 20 Nodes
And Average Curve . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
57 S For CW = 10 And Two Optimal Slot Attempt Probability Distri-
butions: Exact and Average Curve . . . . . . . . . . . . . . . . . . 110
58 Inter-Succesful-Packet Time For CW = 10 And Two Optimal Slot
Attempt Probability Distributions: Exact and Average Curve . . . 111
59 Attempt Probability Distribution For Heterogeneous Network . . . 112
60 S - One High Priority DI Node . . . . . . . . . . . . . . . . . . . . 113
61 Inter-Successful-Packet Time Per Node - One High Priority DI Node 114
62 Ps per Node - One High Priority DI Node . . . . . . . . . . . . . . 114
63 S - Three High Priority DI Node . . . . . . . . . . . . . . . . . . . 115
64 Inter-Successful-Packet Time Per Node - Three High Priority DI Node115
65 Ps Per Node - Three High Priority DI Node . . . . . . . . . . . . . 116
66 Normalised Channel Throughput S For Acknowledged And Unac-
knowledged IEEE 802.15.4 With Default Parameters Under Satu-
rated Conditions, And Also The Optimal Channel Throughput Achiev-
able In Networks Using IEEE 802.15.4 . . . . . . . . . . . . . . . . 117
67 Optimal Normalised Channel Throughput Sopt Achievable Under Un-
saturated Conditions And Using IEEE 802.15.4 Default Parameters 117
68 Packet Delivery Ratio Ps For Acknowledged And Unacknowledged
IEEE 802.15.4 With Default Parameters Under Saturated Condi-
tions, And Also The Corresponding Optimal Packet Delivery Ratio
Achievable In Networks Using IEEE 802.15.4 . . . . . . . . . . . . . 118
xxv
![Page 26: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/26.jpg)
Chapter 1
Introduction
Wireless sensor networks (WSNs) are a growing technology that is trans-
forming the existing means of communication for sensing devices. The
research and development of WSNs has primarily been focused on architectures
in which every sensor node has the same physical capabilities and can only inter-
act with neighbouring nodes. The first generation of sensor nodes are stringently
limited in terms of energy supply, processing power, memory and physical size.
Consequently, the state-of-the-art algorithms and protocols are tailored for these
requirements and find their applicability on low data systems such as monitoring
of temperature, pressure, humidity, or object location. However, there is a recent
demand for sensor nodes with higher data transmission requirements that can col-
lect more meaningful information from the environment, for example, multimedia
content such as still image, audio and video, health monitoring of elderly people,
and also industrial telemetry such as the output of a spectral density or chemical
composition analyser [49]. In the following, we will refer to this new type of sensor
nodes as Data-Intensive Wireless Sensor Networks.
Data-intensive WSNs enable applications that generates high volumes of data. If
the application contains video, audio streams and still images we can also refer to
1
![Page 27: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/27.jpg)
2 CHAPTER 1. INTRODUCTION
this data-intensive system as Wireless Multimedia Sensor Networks [2]. Neverthe-
less, data-intensive WSNs are not only limited to multimedia content. They also
include mission-critical applications [87] such a medical patient monitoring [79],
car-park management [13] or seismic monitoring where bursty data needs to be
transmitted to the master sensor node of the network, i.e. sink, in a reliable fash-
ion. Additionally, we consider that data-intensive WSNs represent a step towards
the deployment of richer applications for the Internet of Things (IoT), machine-
to-machine (M2M) scenarios and Web of Things (WoT), which are at the moment
limited by resource-constrained devices [10].
Research challenges on the communication infrastructure of WSNs exist within ev-
ery of the seven layers of the Open Systems Interconnection (OSI) stack [88]. The
OSI protocol stack consists of the physical layer, data link layer, network layer,
transport layer, session layer, presentation layer and application layer. A com-
prehensive survey with theoretical proposals, experimental designs and industrial
standards for each layer can be found in [3]. In this thesis, we will provide solu-
tions for the data link layer that are tailored for the requirements of data-intensive
WSNs.
Amongst the challenges of data-intensive WSNs, the enhancement of the medium
access techniques is continuously at the centre of the technology. Wireless trans-
mission is characterised by poor reliability as a consequence smart communication
protocols are required in order to guarantee effective system operation. Communi-
cation between network nodes could be coordinated by a master controller to avoid
transmission collisions or, alternatively, use an uncoordinated communication mode
where contentions are possible in time and/or frequency. Optimal usage of the wire-
less medium is fundamental in an uncoordinated network that requires high data
transmission. In data-intensive applications, the information collected by sensor
nodes is of bursty nature and therefore it also defines a bursty transmission profile.
Medium access control (MAC) protocols based on contention to access a common
medium, such as Aloha [45], have traditionally proven to offer the best performance
![Page 28: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/28.jpg)
3
for this bursty scenarios. They are capable of achieving timely and reliable packet
delivery without network coordination. On top of that, these protocols also allow
the implementation of energy saving management strategies on WSNs. However,
it is still of paramount importance to enhance the contention-based mechanism of
protocols such as Aloha or carrier sense multiple access (CSMA) [55] before they
can be applied to data-intensive WSNs.
Sensor nodes are compact electronic devices that are generally powered by limited
energy supply sources, for instance, one or two standard 1.5 volts AA batteries of
2000 mAh. Consequently initial research efforts have focused on protocol develop-
ment with the solid purpose of extending the network lifetime. In particular, it has
been found that the radio transmission module is the main contributor in energy
consumption and therefore numerous saving strategies were devised to minimize ra-
dio usage at the MAC sublayer. The need of innovative solutions for data-intensive
applications is causing an evolution in the wireless sensor networks paradigm. Now,
the focus is to design WSNs that could effectively deliver high volumes of data with
predefined levels of quality of service (QoS) [59], and for which energy saving comes
as a requirement of second order.
The Institute of Electrical and Electronics Engineers (IEEE) have released standard
specifications for the physical layer of WSNs [93, 94, 95, 96]. The modulation scheme
have been designed to support low battery power, short to medium range coverage
range (tens of meters) and maximum data rates around 40-250 Kbps. The IEEE
802.15.4 [93] standard recommends the use of the carrier sense multiple access with
collision avoidance (CSMA-CA) mechanism for the uplink transmission of data from
sensor nodes to the sink node during the contention access period of its superframe
structure. We will prove in the following chapters that CSMA-CA of IEEE 802.15.4
requires an automatic adapting mechanism of its transmission parameters in order
to maximize the use of the common wireless channel and thus enable data-intensive
WSNs. This adapting mechanism can be incorporated into the standard. We will
demonstrate with experiments that our proposal is feasible if knowledge of the
![Page 29: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/29.jpg)
4 CHAPTER 1. INTRODUCTION
network characteristics, mainly the number of active nodes, and their data load is
available during the design. Lastly, we will propose a protocol that can reach an
equivalent level of optimal channel utilization without knowledge of the network
and load.
In this dissertation, data-intensive WSNs adhere to strict performance metrics that
predefine a level of quality of service. Specifically, this level of QoS achieved by
the sensor nodes will be determined in terms of normalised channel throughput,
packet delivery ratio and data transmission delay. We refer to normalised channel
throughput as the fraction of time that the wireless medium is occupied by successful
transmissions over the total active time. Experiments conducted on IEEE 802.15.4
[25] have found that the maximum achievable channel throughput lies around 32
Kbps in a network with star topology whose sensor nodes present permanent full
data buffers and their radio modules are capable of transmitting at 250 Kbps.
This performance is equivalent to a normalised channel throughput of 0.12. In
our own experiments with the recommended parameters of IEEE 802.15.4 in a
similar scenario we also found that packet delivery ratio is around a low 50 percent.
Additionally, these inefficient levels of normalised channel throughput and packet
delivery ratio cause longer transmission delays too. In comparison, our new MAC
protocol will be tested against those three metrics and demonstrate to be adequate
for data-intensive WSNs.
1.1 Objectives
This research project proposes an enhanced communication solution for the trans-
mission of data over a common wireless medium from multiple sensor nodes to a
single sink. The objective of this solution is to provide reliable packet delivery for
data-intensive WSN applications through the implementation of a weighted fair ac-
cess protocol. The study focuses on a network with star topology where all nodes
are in range of communication. The sensor nodes send data packets to a sink in
![Page 30: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/30.jpg)
1.1. OBJECTIVES 5
Figure 1: Architecture Of A Homogeneous Data-Intensive WSN
an uncoordinated fashion where access to the common medium is obtained through
contention. The wireless radio capability of the sensor nodes is bounded by a given
data transmission bandwidth which closely approaches to the application demanded
load.
Two possible cases for Data-Intensive WSNs can be identified. First, consider an
architecture where all sensor nodes generate the same of volume of data. In every
node, the data is saved into packets of predetermined maximum size which are then
inserted into a queue for immediate transmission to the sink. The sensor nodes
demand a fair data transmission access, this is an equitable throughput and latency
performance. These conditions define a network where each node demands the
same level of QoS, which we will refer as Homogeneous Data-intensive WSNs. This
architecture is depicted in figure 1.
In the second case, sensor nodes generate dissimilar volumes of data. We will
classify nodes based on their type of data into scalar and critical nodes. Scalar
nodes produce packets of small size which are generated periodically and have high
tolerance to delivery delays. Critical nodes generates big volumes of bursty data
and their packets are of maximum size and delay-intolerant. In this case, the
differentiated levels of QoS originates Heterogeneous Data-intensive WSNs. This
architecture is depicted in figure 2.
In both scenarios, each sensing device will be equipped with the same radio module
![Page 31: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/31.jpg)
6 CHAPTER 1. INTRODUCTION
Figure 2: Architecture Of A Heterogeneous Data-Intensive WSN
in order to enable communication between the entire group of sensor nodes that
compose the network, however, other physical capabilities, such as the memory,
processing power or battery capacity, can vary from device to device.
The use of sensor nodes with heterogeneous levels of quality of service, some with
real-time and high data demand, and others with conventional scalar data and
delay-tolerant, could facilitate the development of the new data-intensive WSNs
giving that the nodes are still limited in their capabilities. This is a vision which
is shared in a survey on Wireless Multimedia Sensor Networks [2]. Finally, notice
that this thesis will refer to network designs as the optimal selection of network
topologies and medium access protocols for WSNs.
1.1.1 Network Description
The characteristics of the data-intensive WSNs that are within the scope of this
project are the following:
1. Packet Generation. Scalar nodes transmit data periodically or event-driven,
and critical nodes present event-driven high data that could be of streaming
![Page 32: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/32.jpg)
1.1. OBJECTIVES 7
or non-streaming nature. Streaming and non-interactive multimedia data re-
quires real-time delivery; however, it is loss-tolerant, for instance, the video/audio
recording of an event where the streams could play with a certain level of dis-
tortion and initial delay. On the other hand, non-streaming data does not
have real-time delivery constraints.
2. Weighted Fair Access. The objective is to obtain a fair medium access accord-
ing to the type of sensor node. Medium access is equitable amongst sensor
nodes of the same type, this is, scalar nodes or critical nodes are expected to
achieve the same level of QoS while contending only with nodes of their same
type. In comparison, medium access is prioritised or accelerated for critical
nodes with respect to scalar nodes due to its data importance.
3. Network Scale. Sensor nodes are arranged in a single star topology and are
always in range of communication. The scope of this project does not include
monitoring areas larger than the radio range of individual nodes. The latest
scenario is an open research study that could be addressed by having the sink
node of a first network acting as a critical node and relying the cumulative
data a second sink.
4. Lifetime Expectancy. Each type of sensor nodes has their respective lifetime
requirement. The expectancy should be larger for nodes that transmit only
scalar data and the lifetime could be reduced if a data-intensive flow is trig-
gered. For example, in a volcano application scalar sensors could operate in
saving mode for long periods of time while data-intensive nodes could stay in
dormant state until an event occurs. On doing so, we can guarantee a long
network lifetime before the event and afterwards we only require a lifetime in
the orders of days or hours
![Page 33: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/33.jpg)
8 CHAPTER 1. INTRODUCTION
1.2 Research Challenges
In the following, we describe in detail the sub-problems to be addressed in this
project:
1.2.1 Enable Data-intensive Applications
The first generation of wireless sensor networks have been mostly developed for
monitoring applications with low data collection and transmission. The main char-
acteristics of such generation of WSNs were outlined in the surveys [1, 2, 3, 4, 12,
21, 23, 24, 29, 36, 43, 84, 85, 87, 100, 105]. Those characteristics have determined a
series of general design factors. The tolerance to failures, scalability of the network
and use of wireless medium for transmission are some of the factors, however, the
most important consideration has always been the use of energy saving techniques
to extend network lifetime. For these reasons, sensor devices have been equipped
with energy-saver radio modules that work with data rates in the 10-250 Kbps range
in order to conserve energy. Moreover, the vast majority of existing protocols for
the medium access layer have been designed to extend the network lifetime longer,
by implementing duty cycling strategies in which sensor nodes are sent to inactive
state for long periods of time between the inter-transmission of two consecutive
packets.
The medium access protocols designed for the first generation of WSNs do not sat-
isfy the requirements of data-intensive applications. Firstly, the amount of collected
data expected in a data-intensive application is higher, for example, multimedia con-
tent like still images or audio. Secondly, the newer generation requires a better use
of resources like channel capacity in order to fulfil the predefined levels of QoS. Up
to now scalar nodes under-use the communication medium by transmitting very few
packets. Lastly, the network lifetime expectancy of a data-intensive scenario could
be shorter since we only need to capture data for a period of hours or days rather
than years, for example, the video monitoring of an erupting volcano. For all of
![Page 34: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/34.jpg)
1.2. RESEARCH CHALLENGES 9
these reasons, it is necessary to design a medium access mechanism that addresses
the requirements of the new generation of WSNs.
1.2.2 Provide Predefined Levels Of Quality Of Service
To develop WSNs with predefined levels of quality of service is a big challenge since
sensor devices are still constrained in terms of battery, memory, and data rate, while
the reliable delivery of data-intensive flows may be a resource-demanding task. In
this project we will ensure that the medium access layer is capable of satisfying
these QoS requirements by proposing a innovative MAC protocol. In particular,
we need to find mechanisms to increase the normalised channel throughput and
reduce packet transmission delay with minimal coordination between sensor nodes.
In contrast to traditional research on scalar and energy saving WSNs, we intend to
utilize the radio resources up to the maximum in order to guarantee the stringent
QoS requirements of data-intensive WSNs.
1.2.3 Develop AMedium Access Protocol For Data-intensive
WSNs
The type of medium access control needed by a data-intensive WSN depends on
the considered scenario. For the case of homogeneous WSNs, the objective of
this project is to find optimal designs that can guarantee the correct operation
of a network. Therefore, we propose to enhance the medium access scheme of the
contention-based MAC protocol defined for IEEE 802.15.4 in order to provide the
high levels of normalised channel throughput and packet delivery ratio. In particu-
lar, we intend to find appropriate CSMA-CA MAC parameters for different network
setting (network sizes and data load). On doing so, we can provide the same level
of QoS to each sensor node.
For the case of heterogeneous WSNs, we will require to design a new medium access
![Page 35: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/35.jpg)
10 CHAPTER 1. INTRODUCTION
mechanism that could guarantee the QoS requirements of both scalar sensors and
critical nodes. As mentioned before, in recent years numerous MAC protocols have
been proposed in the literature for the first generation of WSNs. In general, all
the proposals are characterized by minimizing the energy consumption of nodes at
the expense of reducing the communication tasks. In the context of data-intensive
WSNs, the energy saving paradigm has to be re-thought in view of the need for a
mechanism to achieve predefined level of QoS. In respect to this, we will need to
develop a protocol that could maximize the channel utilization and node-to-sink
delay, and at the same time guarantee higher levels of packet delivery ratio in a
single-hop and star topology.
1.3 Solutions
In the first phase of the project, we studied the current state-of-the-art MAC pro-
tocols recommended for WSNs; in particular, we evaluated the performance of the
IEEE 802.15.4 MAC in WSNs with single-hop topology and data-intensive traf-
fic. In the literature review, we consider the suitability of numerous protocols for
data-intensive WSNs. Specifically, we analyse scheduled-based protocols such as
Low Energy Adaptive Clustering Hierarchy (LEACH) [33, 32] and Self-Organizing
Medium Access Control for Sensor Networks (SMACS) [83, 82]. Hybrid Protocols
covered TRAMA [97, 98], Z-MAC [73, 74] and FlexiTP [52, 53], and we considered
multichannel proposals such as TMCP [103] and MMSN [107]. Contention-based
protocols included TEA-15.4 [86], IEEE 802.15.6 [96], and Saxena [78]. In general,
there are multiple reasons why these proposals are not appropriate for data-intensive
applications, which are explained in details in chapter 2. Still from this list of pro-
tocols, we found that the IEEE 802.15.4 standard could be adapted such that its
CSMA-CA mode of operation could become suitable for burst, critical and high
data traffic.
In the second phase, we proposed a smart adapting mechanism for the IEEE
![Page 36: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/36.jpg)
1.3. SOLUTIONS 11
802.15.4 contention-based MAC protocol in order to find optimal network designs
for WSNs that could satisfy the data requirements of homogeneous conditions. In
the final phase, we proposed PRIMAC, which is a new MAC protocol for data-
intensive WSNs of homogeneous and heterogeneous traffic conditions.
1.3.1 Adaptive CSMA-CA For Homogeneous Conditions
In chapter 4 and 5, we investigate possible enhancements for the IEEE 802.15.4
MAC protocol in order to achieve high resource utilization. In particular, the ob-
jective is to maximize the normalised channel throughput in a network whose sensor
nodes use a single channel for communication and half-duplex radio transceivers.
To do so, we develop an analytical model to characterize the performance of a
single-hop wireless sensor network which uses the carrier sense multiple access with
collision avoidance (CSMA-CA) medium access mechanism of IEEE 802.15.4 MAC
protocol. The analytical model can be used in order to propose optimal network
designs for the data-intensive applications by choosing appropriate MAC parame-
ters. The analytical model and optimal proposals are validated by using a network
simulation environment, i.e. ns-2, which is a highly accepted simulator in indus-
try and academics for wireless networks. Moreover, we present a testbed of sensor
nodes that was created to evaluate the performance of the CSMA-CA algorithm and
corroborate the feasibility of the optimal network designs. The findings of this in-
vestigation allow us to propose a smart adapting mechanism that can be integrated
into IEEE 802.15.4 to realize homogeneous data-intensive WSNs.
The proposed adaptive IEEE 802.15.4 mechanism generates WSNs that are char-
acterised by:
1. High Normalised Channel Throughput. High resource utilisation is possible
with recommended CSMA-CA parameter if we design a network with the right
combination of number of nodes, data packet size and data packet arrival.
Also the model allow us to achieve optimality in networks where the number
![Page 37: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/37.jpg)
12 CHAPTER 1. INTRODUCTION
of node is not known by adapting the contention window length.
2. Fair Channel Access. Nodes are homogeneous in their traffic generation and
hence they equitably share the common medium.
3. Standard Support. The proposed mechanism represents an extension feature
that can be complement the IEEE 802.15.4 specification. Therefore, industrial
use of our optimal designs could become a seamless adoption.
1.3.2 PRIMAC
We propose a Priority MAC (PRIMAC) in chapter 6, which is a novel medium access
protocol that satisfies the requirements of data-intensive applications in WSNs with
both homogeneous and heterogeneous levels of QoS. In contrast to the optimal
designs for homogeneous conditions of the previous phase, notice that the predefined
levels of quality of service vary depending on the type of sensor node. Consequently,
new techniques need to be developed in order to guarantee the QoS of the different
nodes under the restriction of limited communication capability given by the limited
data bandwidth (100-250 Kbps) of the radio module of such sensor nodes.
In principle, we aim to focus on three of the four pillars of quality of service [45].
The first pillar is high resource utilization, the second pillar is packet classification,
and the third pillar includes scheduling and policing. PRIMAC needs a medium ac-
cess scheme that could achieve higher channel utilization, and provide weighted or
differentiated access for nodes. To do so, we propose to have a MAC protocol based
on the CSMA protocol since it is very suitable for burst and event-driven traffic
scenarios, in which the information about what nodes are active and when they
transmit is unknown. Additionally, we maximize the normalised channel through-
put by adopting an improved non-uniform backoff scheme on CSMA that will reduce
the idle time and minimize the occurrences of collisions.
WSNs that uses PRIMAC as their access protocol present the following character-
istics:
![Page 38: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/38.jpg)
1.4. THESIS CONTRIBUTIONS 13
1. High Normalised Channel Throughput. Our proposal uses a non-uniform
medium access method that guarantees near-optimality in the worst cases,
for networks where the number of nodes is not known a priori.
2. Weighted Channel Access. PRIMAC can prioritise the medium access for
node of critical importance such as the one described as heterogeneous data-
intensive WSNs. This weighted access scheme is achieved through adjustable
contention windows and different non-uniform probability of medium attempt
for every class of node.
3. Maximize Packet Delivery. Contention-based protocol are known for having
high packet loss behaviour . PRIMAC is part of the contention family of pro-
tocol but its packet delivery ratio exceeds the performance of IEEE 802.15.4
CSMA-CA.
1.4 Thesis Contributions
The core contribution of this work will be the provision of data communication
guarantees for nodes with burst, critical and high data in wireless sensor networks.
The guarantees will be accomplished through optimal network topologies and en-
hanced medium contention with weighted fair access. Specifically, this work present
the following contributions:
1. Demonstrate analytically and with experimental results that homogeneous
data-intensive WSNs are possible and practical by choosing optimal IEEE
802.15.4 CSMA parameters.
2. PRIMAC achieves optimal normalised channel throughput without knowledge
of the network size and load.
3. The novel use of non-uniform access probability distribution combine with
adaptive contention window sizes in order to achieved weighted access to a
![Page 39: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/39.jpg)
14 CHAPTER 1. INTRODUCTION
common channel.
4. Combine non-uniform access probability distribution with adaptive contention
window sizes in order to improve the QoS of critical nodes in a data-intensive
WSN.
5. Enable data-intensive WSNs with radio transceiver of low-power and low-to-
medium data transmission rate which is achieved by using resources optimally.
1.5 Thesis Overview
This thesis is organized in seven chapters. Chapter 2 presents a review of the wire-
less sensor network technologies and applications that preceded our study. Firstly,
we present a classification of the existing MAC protocols for wireless networks and
secondly we describe the relevant proposals and industrial standards that constitute
the first generation of WSNs. Chapter 3 describes the methodological approach we
use to address the requirements of data-intensive WSNs. In chapter 4, we will
study how to build homogeneous data-intensive WSNs by introducing an adaptive
mechanism on top of the standard IEEE 802.15.4 CSMA-CA MAC protocol. Chap-
ter 5 corroborates with experimental testbeds that the implementation of a smart
adapting transmission parameter mechanism on the IEEE 802.15.4 is feasible and
practical. In chapter 6, we will consider sensor nodes with heterogeneous levels of
quality of service, some with real-time and high data demands, and others with
conventional scalar data and delay-tolerant. This architecture represents a promis-
ing approach that could facilitate the development of the new data-intensive WSNs
giving that the devices are still limited in their capabilities, in particular, in terms
of maximum data transmission rate. The final chapter present the conclusions of
this dissertation.
![Page 40: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/40.jpg)
Chapter 2
Literature Review
In this chapter we present the relevant medium access control schemes for WSNs
that have preceded this thesis dissertation. The following industrial technologies
and academic proposals have served as background for our PRIMAC protocol and
research studies.
2.1 Multiple Access Control
Wireless broadcast radio transmission is the most suitable communication method
for most sensor networks including our data-intensive WSNs, primarily, because it
provides flexibility in terms of physical node placing, network configuration and
deployment. In a wireless network, a MAC scheme is necessary to orchestrate the
transmission from the various nodes, and thus prevent or minimize communication
interference. In general, there exist two broad categories of medium access tech-
niques [54]. In the first category we found a channel partitioning scheme where
nodes are assigned dedicated and collision-free radio channels for their steady data
transmissions. In the second category nodes share a common medium through the
utilization of a dynamic medium access protocol. Amongst these two categories the
dynamic scheme offers the best choice for WSN due to their adaptability to bursty
15
![Page 41: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/41.jpg)
16 CHAPTER 2. LITERATURE REVIEW
data traffic conditions, and low processing power and bandwidth requirements.
Depending on the dynamic channel access strategy, MAC protocols can be di-
vided into three categories: scheduled-based, contention-based and hybrid proto-
cols. Scheduled-based protocols use a time division or a multiple channels scheme
to assign every node a dedicated medium to communicate at any moment. These
protocols find their applicability in a network whose nodes have a periodic or pre-
dictable data traffic pattern. In a contention-based protocol, uncoordinated sensor
nodes share a unique channel and evaluate the idleness of this medium before at-
tempting a transmission. The medium sensing feature of contention-based protocols
allows proper handling of bursty and unpredictable data transmission. The protocol
PRIMAC that we present in this dissertation is part of the contention-based family.
Hybrid utilizes a combination of both methods depending on intensity of the traffic
or the decision of the coordinator of the network.
One of the drawbacks of contention-based protocols is that packet delivery becomes
unreliable as the data transmission load of nodes increases. Additionally the nor-
malised channel throughput becomes inefficient even though the channel capacity
CC is still less that the data traffic load G. A direct approach to solve this problem
is by implementing a flexible TDMA protocol with weighted fair access in order to
accommodate the exchange of packets. Against this problem, there have been nu-
merous hybrid solutions, for instance, FlexiTP [53]. However, this protocols require
time to adapt to the network traffic demands and consume time to reach a stable
transmission schedule.
2.1.1 Contention-based Protocols
IEEE 802.15.4
The release of IEEE 802.15.4 specification [93, 94, 95] standardized a MAC protocol
for low data rate wireless sensor networks which is based on a combination of
![Page 42: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/42.jpg)
2.1. MULTIPLE ACCESS CONTROL 17
(a) Peer-to-Peer (b) Star
Full Function Device Reduced Function Device WPAN Coordinator
Figure 3: IEEE 802.15.4 (a) Peer-to-Peer Topology, (b) Star Topology
GTS GTS Inactive Part
CFPCAPBeacon
Beacon Interval
Beacon
Transmission Slots
Figure 4: Superframe Structure Of IEEE 802.15.4
contention and scheduled access. The specification defines two topologies: peer-to-
peer topology and star topology. In the peer-to-peer topology seen in Fig. 3 (a),
any sensor node can communicate with any other node if they are in communication
range of each other and there is a coordinator node that takes care of managing and
identifying the Wireless Personal Area Network (WPAN). Additionally, there are
full function devices that can create connections amongst themselves and reduced
function devices that are limited to contact coordinators. In the star topology seen
in Fig. 3 (b), all communication exchanges go through the WPAN coordinator.
IEEE 802.15.4 incorporated power saving mechanisms in its two modalities of oper-
ation: beaconless and beacon-enabled mode. In the case of beaconless, every node
accesses the medium using an unslotted Carrier Sense Multiple Access with collision
avoidance (CSMA-CA) scheme. For beacon-enabled the coordinator establishes a
duty cycle period that allows sensors to enter in shutdown state, and hence save
![Page 43: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/43.jpg)
18 CHAPTER 2. LITERATURE REVIEW
energy. A superframe structure specifies the parts that delimit the duty cycle pe-
riod as shown in Fig. 4. The active part of the cycle is divided in a contention
free period (CFP) and a contention access period (CAP). In CFP node follows a
scheduled access with the use of guaranteed communication time slots and in CAP
a CSMA-CA scheme is employed. A sensor node can request a guaranteed time slot
(GTS) in the CAP. The coordinator can allocate up to a maximum of seven GTSs.
Time sychronization in both CAP and CFP is achieved by diving time into trans-
mission slots of fixed size. A slot duration is predetermined by the IEEE 802.15.4
specification and note that a GTS extends through numerous slots.
Data-intensive WSNs are foreseen to present heterogeneous data traffic require-
ments [2]. To address this consideration, it recently appeared some proposals that
aim at providing service differentiation by enhancing existing MAC protocols or by
developing new solutions. The authors of [67] proposed to provide traffic prioriti-
zation support in IEEE 802.15.4 MAC by defining two traffic classes. The traffic
prioritization is implemented by adjusting the parameter settings of the CSMA-CA
scheme during the CAP. A mathematically analysis is presented to evaluate the
performance of this service differentiation. However, the authors did not extended
the analysis for cases when more than two traffic classes exist and neither found the
optimal parameter settings in terms of normalised channel throughput or delay.
TEA-15.4
TEA-15.4 in [86] proposes an enhancement of the standard IEEE 802.15.4 for sup-
porting multimedia content. The idea is to improve throughput by using an adaptive
CAP in correspondence to the level of traffic. With this enhancement, the number
of still images collected in a period of 100 seconds raises from 6 to 51 files. However,
this strategy is very limited because an extended access period does not necessarily
leads to an efficient use of the channel. Additionally, TEA-15.4 does not consider
heterogeneous traffic requirements.
IEEE 802.15.6
The authors of IEEE 802.15.6 [96] developed a communication standard for short-
![Page 44: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/44.jpg)
2.1. MULTIPLE ACCESS CONTROL 19
B UP7
CSMA-CA
EAP1
All UPs
CSMA-CA
RAP1
Polling/Posting
Mechanism
MAP
UP7
CSMA-CA
EAP2
All UPs
CSMA-CA
RAP2
Polling/Posting
Mechanism
MAP
B2 All UPs
CSMA-CA
CAP
B UP7
CSMA-CA
EAP1
Beacon Period (superframe) Next superframe
Figure 5: Superframe Structure Of IEEE 802.15.6 In Beacon Mode
range and low power devices which operates in and around the human body area.
A wireless body area (WBA) network is composed of one coordinator and numer-
ous sensor nodes in the range between 1 and 64. The physical layer defines three
radio communication modes: Narrowband (NB), Ultra-wideband (UWB) and Hu-
man Body Communications (HBC). The MAC sublayer incorporates four access
mechanisms, these are: random access, improvised and unscheduled access, sched-
uled access and variants and medical implant communications service band access.
IEEE 802.15.6 defines a superframe structure of fixed length which can be bounded
by periodic network beacons. The superframe contains nine access phases, which
are: beacon Exclusive Access Phase 1 (EAP1), Random Access Phase 1 (RAP1),
Managed Access Phase (MAP), Exclusive Access Phase 2 (EAP2), Random Access
Phase 2 (RAP2), Another Managed Access Phases (RAP) and the Contention Ac-
cess Phase (CAP). EAP, RAP and CAP are the phases within the superframe in
which the medium access is achieved via a contention protocol, whether CSMA-CA
or slotted aloha 5. In the CSMA-CA mode, a sensor node with data to transmit
use a backoff counter and a contention window in order to win a transmission slot.
The user priority (UP) values can be chosen according to the traffic designation.
The standard specifies a relation between user priorities and contention window
boundaries.
The authors of [18] developed an analytical model to evaluate the performance of the
CSMA-CA protocol in a load saturated network composed by one coordinator and
three sensor nodes. The average payload size is 100 Bytes, the data rate is 971.4
Kbps and three different user priorities (emergency, medical data and controlled
load) are set. They found that the CSMA-CA protocol utilizes the common medium
![Page 45: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/45.jpg)
20 CHAPTER 2. LITERATURE REVIEW
poorly under saturated conditions and the highest user priority (emergency traffic)
nodes transmit more often than other sensor nodes. Still the maximum achieved
normalised channel throughput does not exceed 0.00186 which is an unsatisfactory
result for high data demand applications.
Saxena
In [78] we can find a new MAC protocol that guarantees quality of service in terms of
end-to-end delay and data rate requirements by implementing service differentiation
and increasing the throughput of a contention-based scheme. They propose to
adaptively adjust the contention access strategy in a CSMA-CA scheme based on
historical statistics of the network and adapt the duration of the duty cycle periods
in correspondence to the traffic class. Although, this proposal is promising, the
solution is limited to single-hop case and the medium access strategy depends on
historical information. The solution represents a closed-loop control system that
needs time to reach an optimal point, if such a point exists and is reached with the
proposed method.
Slotted CSMA-CA has been widely used as the preferable contention-based protocol
for applications with event-driven traffic because of its effective mechanism to share
a common wireless channel among uncoordinated devices. However, the reliability
of the communication is compromised by the interference caused by the competing
sensor nodes. In the context of data-intensive applications where high normalised
channel throughput is indispensable, interference escalates this problem to a higher
degree.
SIFT and CSMA/p*
The authors of [90] proposed a protocol, named CSMA/p*, which has a non-
persistent carrier sense multiple access scheme with a carefully chosen non-uniform
probability distribution p* that nodes use to randomly select contention slots. They
showed that CSMA/p* is optimal in the sense that p* is the unique probability dis-
tribution that minimises collisions between contending nodes in a network where the
number of active nodes N is known. It could also achieves suboptimal performance
![Page 46: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/46.jpg)
2.1. MULTIPLE ACCESS CONTROL 21
when N is unknown. An assumption of CSMA/p* is that nodes have always packets
awaiting to be transmitted. This assumption resembles the data requirements of
critical data intensive nodes.
SIFT [40] was designed for event-driven applications and they assume that only the
first R of N potential reports are the critical information that needs to be sensed
and transmitted to the sink. Low latency is achieved through the use of fixed-size
contention window and a carefully chosen non-uniform probability distribution of
transmitting in each slot within the window. If no node starts to transmit in the
first time slot in the window then each node exponentially increases its transmission
probability for the next slot.
We found that the proposals of CSMA/p* and SIFT with their non-uniform prob-
ability of attempt could contribute in the development of data-intensive because
they present low transmission delay and minimises the probability of collisions in
a CSMA-based access method. However, both protocols are not adequate for het-
erogeneous data-intensive WSNs because they do not provide mechanisms for given
priority access to critical nodes.
2.1.2 Scheduled-based Protocols
This section contains the most notable TDMA-based proposals for data-intensive
WSNs.
Low-Energy Adaptive Clustering Hierarchy (LEACH)
LEACH is a popular self-organising protocol that creates clusters within a large
WSN. It utilises randomized rotation of local cluster base stations (local sinks) to
evenly distribute the energy load among the sensors in the network. The operation
of LEACH is divided into rounds. In the cluster setup phase, each node invokes
an algorithm to decide whether or not it wants to serve as a cluster head. A node
that opts to be cluster head announces its decision to other nodes which are in
range of communication, otherwise a node must join any other cluster that would
![Page 47: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/47.jpg)
22 CHAPTER 2. LITERATURE REVIEW
Time
Frame
Figure 6: LEACH Structure And Operation
be controlled by other head node. In the steady-state phase, the nodes can transmit
their backlogged data to the cluster heads using a reserved slot, as seen in Fig. 6.
The received data is aggregated in the cluster head before it gets transmitted to
the sink. After a period of time, the network finishes the steady-state round and
goes back to the setup phase to select another cluster.
This protocol assumes that all nodes can transmit with enough power to reach
the main sink node, which is one of the premises for data-intensive WSNs. On
the other hand, LEACH was designed for large networks, for instance 100 nodes
as tested in [32], where clusters’ rotation could potentially generates a saving in
terms of energy consumption. In comparison, data-intensive networks are more
likely to be composed by few tens of nodes. Remember that sensor nodes are still
limited by radio transceiver of low-to-moderate data rate. Moreover, LEACH was
developed for periodical data collection which makes the protocol unsuitable for
event generated data of burst nature [24].
Self-Organising Medium Access Control for Sensor Networks (SMACS)
SMACS is a TDMA protocol that allows nodes to discover their neighbours and
establish communication schedules without the control of any master or sink node.
SMACS combines the neighbouring discover and channel assignment phases, and
data transmission is possible before a full network discovery is reached. A link
![Page 48: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/48.jpg)
2.1. MULTIPLE ACCESS CONTROL 23
Figure 7: SMACS Link Between Two Sensor Nodes
between two nodes consists of two time slots, one for each node to transmit, that
are a randomly chosen and allocated to a given frequency as depicted in Fig. 7.
In this protocol, time is synchronised between two communicating nodes. As a
consequence, no centralised schedule or time synchronisation is required.
One of the advantages of SMACS includes its capacity to form a connected network
rapidly, which is a desired feature in data-intensive WSNs, and also this protocol
uses multiple frequencies (multichannels) to rely data from node to node. The use
of multiple channels is one of the most viable ways for improving throughput. The
drawbacks that we found in this proposal is that the communication schedule was
designed with the primary purpose of saving energy and not increasing throughput.
Data aggregation might not be possible in some applications, such as the trans-
mission of video. Finally, multiple hops communication, as shown in Fig. 8, could
cause bottlenecks and congestion through some routes, especially if there is not
central sink who could determine the best paths.
Shortest Time to Extinction (STE) and Earliest Due Date (EDD)
STE [77] and EDD [19] are two similar TDMA protocols that are designed for
real-time streaming video applications. In both protocols, packets are sent in the
increasing order of their respective delay tolerance. In EDD, the TDMA structure
is fixed with constant frame and slot duration. The quality of service of the mul-
timedia stream defines a flexible TDMA structure in STE that takes into account
the packet dropping rate, arrival rate, and the delay tolerance. The best TDMA
![Page 49: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/49.jpg)
24 CHAPTER 2. LITERATURE REVIEW
0
3
4
6
10
11
13
5
2
1
8
14
17
16
15
12
9
7
Figure 8: Self Organised Network (SMACS) Of 18 Sensor Nodes
schemes are chosen during the design phase of the network and it requires knowl-
edge of the expected data traffic load, the number of nodes and the maximum delay
tolerance. STE derives multiple TDMA schemes, allows to identify the performance
limiting factors associated with the suboptimal schemes, determine the magnitude
of their (negative) impact and to point to performance improving modifications
which should be pursued to the extent permitted by technological constraints.
Data-intensive WSNs are not limited to real-time streaming applications where
deadlines could be set on a packet’s lifetime. In contrast, we consider that reliable
packet delivery is of paramount importance in data-intensive applications. For
this reason the schemes proposed in STE and EDD could not always satisfy the
requirements of our considered scenario. In subsection 2.1.5 we will consider other
protocols with adaptive TDMA schedule which could be more suitable for data-
intensive WSNs.
![Page 50: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/50.jpg)
2.1. MULTIPLE ACCESS CONTROL 25
Frequency 1
Sink
Frequency 2
Frequency 3
Figure 9: Conceptual System Design Of TMCP
2.1.3 Multichannel Protocols
In this section we present protocols that aims at eliminating interference by using
multiple channels of different frequencies.
TMCP
TMCP [103] is a multi-frequency protocol for a data collection sensor network with
tree-based topology that partitions the whole network into multiple sub-trees, al-
locates different channels to each subtree, and then forwards each data flow along
its corresponding subtree, as depicted in Fig. 9. The objective of this protocol
is to create an optimal network topology that guarantees collision-free communi-
cation and reduce channel interference. It proposes an algorithm that determines
how to partition a given network into subtrees such that inter-tree interference is
eliminated, this is the interference amongst different trees. On the other hand, the
intra-tree interference, which is the potential interference amongst nodes within a
tree, cannot be avoided completely and the TMCP protocol could only attend to
reduce its impact on the general performance.
![Page 51: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/51.jpg)
26 CHAPTER 2. LITERATURE REVIEW
Transmission with fdest Transmission with fself
Preamble
PHY Protocol Data Unit
Figure 10: Toggle Transmission In MMSN
Although, TMCP could potentially increases throughput and therefore it could be
considered as a candidate for data-intensive applications, the improvement is not
guaranteed since intra-tree interference could still happen. Additionally, TMCP
does not consider the traffic distribution, this is, some subtrees could be overloaded
in their channel capacity. Finally, the proposal assumes that the base station (sink
node) is equipped with multiple radio transceivers, all tune in on different channels
simultaneously. In general, devices with multiple transceivers are not practical
solutions due to complexity, cost and high energy consumption.
MMSN
MMSN [107] is a multi-frequency media access control protocol for WSNs with mesh
topology and multi-hop communication that assigns each node a different receiv-
ing channel within two communication hops, posses a common broadcast channel
and uses a non-uniform backoff algorithm for contention. MMSN is node-based
multi-channel protocol because its scheme consists of having each node learn the
neighbouring node’s channel choices and use this knowledge in order to select a
channel which is not in used by any other node within two hops range. The pro-
tocol introduces the toggle snooping and toggle transmission features to enable
communication between two nodes that employs different channels. Before sending
a data packet, a node should first listen to its own channel (fself )for incoming data
and then assess the idleness of the destination channel (fdest) prior to transmis-
sion. After successfully assessing the idleness of both channel, the node transmits a
preamble on fself and fdest, alternatively as seen in Fig. 10. The toggle transmission
![Page 52: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/52.jpg)
2.1. MULTIPLE ACCESS CONTROL 27
prevents other nodes from sending data to the transmitting node and allows other
nodes to avoid collisions on the destination channel. Detection of the preamble is
ensured by using a toggle snooping period (TTS)two times longer than the toggle
transmission period (TTT ).
The proposal could minimize the interference between nodes at the expense of high
complexity and high resource demands for sensor nodes. Nevertheless, we find
that the throughput of MMSN could be below the requirements of a data-intensive
application because this proposal finds its greater improvement on a large network
where multiple channels are available and whose topology is a data collection system
in which the data flows from numerous nodes to a sink. A final consideration is
that the toggle scheme could cost high energy consumption not only in the sink,
but also in the critical and scalar nodes.
Load Balance
Another approach for data-intensive WSNs with mesh topology was adopted in [48].
The idea is balance the traffic load by grouping nodes that communicates frequently
in a cluster. Then, communication interference is avoided by assigning a different
channel to each group. The proposal guarantees that an optimal number of sensor
nodes are grouped in each cluster; however it did not propose an improved medium
access scheme. Consequently, we found that the proposal is insufficient to enable
data-intensive applications if the MAC protocol and radio transceiver capacity do
not satisfy the demand of high data transmission.
WirelessHART
The WirelessHART [26] specification is the first open wireless communication stan-
dard for measurement and control in the process industries. It uses wireless mesh
networking between field devices to provide secure, reliable communications that
can meet the requirements of industrial applications. A WirelessHART network
[20, 36, 87] is composed of the following devices: the network and security man-
ager, the gateways and the field devices, as shown in Fig. 11. The network manager
![Page 53: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/53.jpg)
28 CHAPTER 2. LITERATURE REVIEW
Host System
WirelessHART
Gateway
WirelessHART
Network Manager
WirelessHART
Security Manager
WirelessHART
Access PointWirelessHART
Access Point
WHD
1
WHD
3
WHD
2
WHD
4
WHD
4
WirelessHART
Field Device (WHD)
WHD
Data Base
Figure 11: WirelessHART System Architecture
administrate the network configuration, establish the communication schedules be-
tween devices, and monitor the system health. The gateway is a powerful device
that relays data between the field devices, the network manager and the control
station. The MAC scheme of WirelessHART combines TDMA with frequency hop-
ping for channel access. It utilises the physical layer specified for IEEE 802.15.4 on
the 2.4 GHz ISM band where a range of 11-25 different channels are available.
The communication between two field devices is driven by a predetermined fre-
quency hopping schedule that guarantees collision-free transfers and end-to-end
delays. The protocol executes a slotted hopping scheme that determines the chan-
nel to use in each slot. The advantages of this protocol includes an interference
avoidance feature that allows the blacklisting of channels with poor performance,
also field devices can create a mesh network with multiple data paths to destination,
and the use of retransmissions to improve the packet delivery ratio.
![Page 54: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/54.jpg)
2.1. MULTIPLE ACCESS CONTROL 29
The disadvantages of WirelessHART is that the communication performance of its
network depends on the decisions made by the network manager in terms of trans-
mission schedules and data routing. Therefore, the optimality or not of the network
relies on a single centralized component which must meet the requirements of load
balancing, maximum end-to-end delays, reliable routes. Although WirelessHART
provides end-to-end delays guarantees in packet delivery, we found this protocol
inadequate for data-intensive applications because it was primarily designed for the
transmission of scalar data, such as valves, motor relays, pumps, amongst other
control devices in a factory environment where scan rates can be configured to 1,
2, 4, 8, 16, 32, 64+ seconds. Nevertheless, it is still open for research an evalua-
tion of the maximum capacity that this protocol could possibly reach in terms of
normalised channel throughput.
2.1.4 Cross-Layer Design
We can find a work in [59] that proposes a cross-layer approach to reliable and
flexibly deliver QoS to applications in heterogeneous wireless multimedia sensor
networks. The idea is to design a radio transceiver to enable high data rate within
tens of meters. The design requires an integration of the physical, data and network
layers since different traffic classes and communication reliability levels, which are
inherent characteristics of higher layers, are implemented by using different cod-
ing schemes in the physical layers. The biggest obstacles of this proposal are the
complexity of the sensor devices and the short range of the radio modules, in the
order of 10 meters. Therefore, it is more feasible to develop data-intensive WSNs
with sensor nodes whose functionalities are well defined at each layer and present
higher transmission range. On top of that, the high energy consumption expected
for the proposed radio module is still prohibited for most sensor networks applica-
tions. Moreover, the sensors with scalar requirements will underuse the resources
provided by the radio module. Finally, there exist data-intensive applications that
could operate with the capacity of existing radio transceivers, for instance in [86],
![Page 55: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/55.jpg)
30 CHAPTER 2. LITERATURE REVIEW
Figure 12: Frame Structure Of TRAMA Including Detailed Slot Format
we can find an image capture application where one sensor node in a network of
few nodes uses a standard IEEE 802.15.4 radio transceiver of 250Kbps to transmit
images of typical 320x240 pixels size at a rate of 64 files every 100 seconds.
2.1.5 Hybrid Protocols
Scheduled protocols where Time division multiple access (TDMA) is used are char-
acterised by low channel utilization. To overcome this drawback a numerous of
proposals have opted for combining TDMA with contention-based protocols such
as CSMA-CA.
TRAMA
TRAMA [97, 98] is a protocol for multi-hop networks with varying data load condi-
tions. The protocol attends to increase throughput by allocating slots only to nodes
that requires data to transmit. In TRAMA, the time is divided in transmission slots
and a group of consecutive slots delimits a frame, as depicted in Fig. 12. A frame
consists of a random access period where sensor nodes can access the medium using
CSMA, followed by a scheduled access period where TDMA is utilized. During
the contention period, the sensor nodes perform a CSMA-style communication for
sending control messages. During the scheduled period, the sensor nodes transmit,
receive and relay data packets.
![Page 56: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/56.jpg)
2.1. MULTIPLE ACCESS CONTROL 31
TRAMA adopts the Neighbourhood-aware Contention Resolution (NCR) algorithm
of NAMA [11] in order to determine the ownership of a slot which determines a
node’s priority to transmit at given time slot t. For any particular slot, the node
with the highest priority within the two-hop communication neighbourhood wins
the slot. TRAMA uses an Adaptive Election Algorithm (AEA) to reuse slots that
are discarded by their owners. When a winner of a slot does not have data to send,
it scans its one-hop network using the Neighbour Protocol (NP) and the Schedule
Exchange Protocol (SEP). If one-hop neighbours has the highest priority among
its own two-hop neighbours, then the one-hop neighbour is added in the Possible
Transmitter Set (PTS). The node with the highest priority in the PTS wins the
data slot.
TRAMA is not a viable solution for data-intensive WSNs because the protocol can-
not guarantee collision-free transmission since the nodes have no entire knowledge
of the two-hop neighbourhood. Secondly, the scheme generates considerable con-
trol overhead at the expense of delay which also impacts in the normalised channel
throughput. TRAMA does not implement a mechanism to prioritise the transmis-
sion of critical nodes. When the topology changes, sensor nodes waste normalised
channel throughput due to incorrect schedules and this state can degrade the overall
performance of the network.
Z-MAC and DRAND
Zebra MAC (Z-MAC) [73, 74] is built on B-MAC [69] and aims to improve through-
put and latency in multi-hop networks under different data load conditions. The
underlying MAC scheme used by Z-MAC is CSMA, and it adopts TDMA during
high contention periods. Z-MAC assigns sensor nodes a time transmission slot, but
it also allows sensor nodes to reuse slots they do not own through a contention
method which is based in CSMA with prioritised backoff times. This backoff time
acquire a random value in a range that depends on whether or not the sensor node
owns the slot. During the network creation phase, a distributed slot assignment pro-
tocol (DRAND) [75] defines a slot allocation schedule for the transmission of each
![Page 57: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/57.jpg)
32 CHAPTER 2. LITERATURE REVIEW
Figure 13: Frame Structure Of Z-MAC Including Detailed Slot Format
sensor nodes. The schedule guarantees that two-hop distant neighbours do not get
assigned the same slot number. In general, it has been found that DRAND protocol
causes a large overhead during the network formation, however it intends to com-
pensate this with reduced communication and therefore lower energy consumption
during the network’s lifetime.
Z-MAC divides times in slots and each slot consists of a small contention window,
followed by data transmission time, as depicted in Fig 13. During the contention
window of a slot, the sensor nodes assess the idleness of the medium to determine
whether or not their neighbours are sending a message in a particular slot. The
slot owner has a higher priority to send message, if any, than non-owners. When
the slot owner has no data to send, it allows other nodes to use its slot. The owner
of the current slot selects a random backoff time of up to To. On the contrary,
sensor nodes that do not own the current slot select a backoff time between To and
Tno, where Tno > To. Afterwards, the sender performs CSMA and if the channel
is clear, it proceeds to transmit its packet. The dynamic allocation of slot in Z-
MAC exposes the protocol to collisions during high contention periods mostly due
to hidden terminal phenomenon. In this case, Z-MAC uses congestion notification
![Page 58: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/58.jpg)
2.1. MULTIPLE ACCESS CONTROL 33
Figure 14: FlexiTP Slot’s Assignation
(ECN) messages to prevent neighbouring nodes to contend for the same slots which
causes more overhead and reduces even further the normalised channel throughput
in a state where more data requires to be transmitted.
The main advantage of Z-MAC is that allows sensor nodes to handle low and high
data load requirements in a multi-hop network. However, it incurs in considerable
overhead both during the network creation phase and when the data load changes
from low to high. In the optimal case, Z-MAC could provide equal access amongst
all nodes whereas in data-intensive applications we strive to providing higher access
priority to critical nodes. Additionally, the contention windows of every trans-
mission slot leads to lower normalised channel throughput and latency under high
contention conditions.
FlexiTP, OST and ODA
FlexiTP [52, 53] is designed to provide end-to-end guarantees on packet delivery in a
multi-hop data gathering network, while respecting the severe energy and memory
constraints of first generation of WSNs. FlexiTP implements a TDMA schedule
in which sensor nodes only transmit and receive packets in their own time slots.
FlexiTP generates a lookup table in each sensor node during the initial global
setup phase, nodes use this table to claim or remove a slot without exchanging
![Page 59: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/59.jpg)
34 CHAPTER 2. LITERATURE REVIEW
Figure 15: (a) Four slot-requestors In The Network: B, F ,G, and H Need To Finda Slot-supplier. (b) B, F, and H Manage To Get Extra Slots From C, E, and KRespectively. H Uses Multiple Paths To The Base Station Whilst C, E and K StopTheir Schedule Temporarily.
information with other nodes. A node’s schedule structure is composed of non-
contiguous slots and represents a list of slots when a node should be active. The
groups of slots include: the Fault-Tolerant Listening Slot (FTS), the Receive Slot list
(RSL), Transmit Slot List (TSL), Multifunction Slot (MFS), Conflit Slot List (CSL)
and Global Highest Slot (GHS). Fig. 14 depicts an example of slot’s assignation.
An on-demand TDMA slot transfer (OST) [51] algorithm allows time slots from
one part of the network to be transferred to another part. The FTS slot can be
used to allow nodes to request extra slots from their neighbouring nodes and so
they can transfer their data at higher rates. The requesting node can specify the
number of extra slots required in a data gathering cycle and specify or change
how long these extra slots will be required. OST includes local and central slot
request modes. In local OST, a sensor node can try to get extra slots from nodes
in its neighbourhood, a slot-supplier can lend its data gathering slot if available,
as shown in Fig. 15. In a centralised OST, the base station performs sensor data
analysis, processing and TDMA slot re-allocation. The main advantage of the latter
![Page 60: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/60.jpg)
2.1. MULTIPLE ACCESS CONTROL 35
algorithm is the introduction of energy saving strategies through the adaptation of
the length of the data gathering cycle.
An on-demand aggregation (ODA) [51] algorithm enables nodes to perform slot
aggregations based on current network conditions and capacity constraints. ODA
allows sensor nodes to reserve some of their slots according to a desired data aggre-
gation compression ratio. Nodes may have different priorities of data, for example,
abnormal or fast changing data are more important that slow changing data. In
this case, it is desirable to let nodes with low priority packets to aggregate their
packets in order to send their data to the base station. The aggregation ratio is de-
cided in the central base station using downstream queries to nodes. Additionally,
the protocol assumes that mathematical operators as SUM, AVG, MAX, MIN or
MEDIAN could be applied to the data.
FlexiTP TDMA schedule are designed for application with scalar data in which
an event can trigger an increase in the sensed scalar data. However, the data
generation rate is slower than the application we consider for data-intensive WSNs.
The OST algorithm could effectively help to handle those localized data generation
increases in many circumstance, however, the availability of slots highly depends
in the network topology and energy conditions of the sensor nodes. Finally, the
ODA algorithm is a initial approach for weighted fair access amongst node, but
it differs considerably from our protocol PRIMAC because ODA requires central
coordination.
![Page 61: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/61.jpg)
36 CHAPTER 2. LITERATURE REVIEW
![Page 62: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/62.jpg)
Chapter 3
Methodology
In this chapter we present the methods used in this research project to simulate
and validate the performance of the adaptive 802.15.4 MAC scheme for homoge-
neous conditions and PRIMAC. Specifically, we discuss the assumptions and met-
rics employed in the evaluation of a network. We describe the adopted analytical
modelling method, the components of the ns-2 network simulator which is used a
validation method and finally the experimental method that employs real wireless
sensor nodes.
3.1 Evaluation Assumptions
To evaluate the performance of our proposals we utilise the following network as-
sumptions:
1. Static Nodes. PRIMAC and adaptive IEEE 802.15.4 are designed for networks
with star topology whose sensor nodes are immovable.
2. Location-Independent Nodes. Scalar and data-intensive nodes are assumed to
be in half duplex range of communication with each other. As a consequence,
the location of each node in space is not relevant for performance evaluation.
37
![Page 63: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/63.jpg)
38 CHAPTER 3. METHODOLOGY
3. Network Size. PRIMAC is designed to operate near-optimally in networks
where the number of nodes is unknown providing that the network size is
within certain range. For this reason, we assume that the network size could
vary during the lifetime of a WSN. For adaptive IEEE 802.15.4, the network
size is calculated for optimal channel utilisation.
4. Generic Application. The proposals of this dissertation are evaluated using
analytical modelling, ns-2 simulator and an experimental sensor nodes testbed
where a packet generation is simulated using constant bit stream, event-driven
streams and Poisson distributed packet arriving forms. In all cases, the con-
tent of packets are filled with data that emulates data-intensive scenarios but
are not related to any specific industrial, commercial or scientific application.
5. Wireless Communication Channel Problems. In the star topology network
considered in this project, the negative effects of wireless phenomenons like
hidden terminal and exposed terminals problems [45, 65, 88] are not present
since all nodes are in range of communication. Any other system in the
vicinity of our WSN should be assumed that it does not interfere with the
communication channel.
6. Radio Signal Propagation. The chosen evaluation methods, ns-2 simulator
and experimental hardware, incorporate the effects of transmission losses in
the propagation of radio signals over the space.
3.2 Evaluation Metrics
In order to meet the requirements of data-intensive WSNs we will evaluate the MAC
protocols against the following metrics:
1. Normalised Channel Throughput, denoted as S. It is defined as the fraction
of time that the wireless medium is occupied by successful transmissions over
![Page 64: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/64.jpg)
3.2. EVALUATION METRICS 39
the total active time of the network.
S =SuccessfulPacketTransmissionT ime
TotalNetworkActivetime. (1)
The target in data-intensive application is a protocol that reaches maximum
normalised channel throughput even at the expense of high energy consump-
tion.
2. Packet Delivery Ratio Ps. It is defined as the fraction of packet successfully
received in the destination node over the total number of transmitted packets.
Ps =NumberofPacketsSuccessfullyReceived
TotalNumberofTransmittedPackets. (2)
The objective in a data-intensive application is to guarantee high levels of
packet delivery for both scalar and critical nodes. Reliable packet delivery is
a challenge in every contention protocol based on Aloha and CSMA, there-
fore, we require smart and adapting mechanism to maximize this performance
metric.
3. Inter-Successful-Packet Time. It is defined as the elapsed time between two
successful packet transmissions from same or different nodes. This metric
evaluates the delay in the packet transmissions. In this thesis, we use slot as
the unit of time. A slot is a parameter of MAC protocols that is equivalent
to a configurable number of seconds
Inter − Successful − PacketT ime = Packeti+1 − Packeti. (3)
A data-intensive protocol should guarantee low transmission delay in the up-
link data flow from sensor nodes to the sink. This requirement is of signifi-
cant importance in networks whose critical nodes carry streaming/multimedia
data.
![Page 65: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/65.jpg)
40 CHAPTER 3. METHODOLOGY
3.3 Evaluation Methods
In this thesis, we will use three different methods to evaluate the performance of
WSNs. These are:
1. Analytical Models
2. Network Simulations
3. Experimental testbeds
The use of different methods will guarantee the validity of the proposed designs.
3.3.1 Analytical Modelling
The main tool that we use throughout this thesis to evaluate the performance of
MAC protocols is the formulation of a mathematical model to mimic the functional
behaviour of a protocol under defined conditions and finite number of inputs. In
literature, we can find two prominent types of analytical models: Markov-based
[14, 15, 22, 28, 42] and mean-field analysis [46, 56, 76, 99]. Markov-based analysis
is a widely used technique for modelling wireless networks which use CSMA for
medium access since the seminal work of Professor Bianchi [16]. In this technique
a Markovian model of the system is developed and its state transition probabilities
need to be found. The state space of the model increases with both the complexity of
the protocol and the number of users in the system. Pollin [70] and Misic [60, 61, 62]
presented Markovian models for the MAC protocol of IEEE 802.15.4. Pollin et al.
found a solution for saturated traffic conditions in which sensor nodes have always
backlogged packets to transmit and the buffer is considered to be of infinite size.
Misic et al. presented another solution for saturation; however, simulation results
show a deviation from their own model.
Alternatively, we will adopt a mean-field approach, also known mean-value or re-
newal process, for our analytical models of the IEEE 802.15.4 and PRIMAC since
![Page 66: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/66.jpg)
3.3. EVALUATION METHODS 41
it has proven to be a successful technique for evaluating CSMA-CA MAC proto-
cols. In this technique, the analysis consists in finding the average duration of
the contention period of an individual node and the probability of success at the
end of each contention period. Mean-field approach can be used for saturated and
unsaturated traffic conditions with packet generation driven by constant, periodic
or Poison-based profile. Although, sensor nodes have limited buffering capabilities
[41, 101] in reality, it is very common to assume initially that the buffer of nodes
is infinite in order to facilitate the analysis of networks under saturated traffic con-
ditions. Ultimately, the minimum buffer size of a node could be estimated from
the initial derivations. Mean-field could also be used to find optimal network de-
signs for sensor nodes with homogeneous and heterogeneous data-intensive traffic
requirements. The outputs of this type of model include the optimal MAC param-
eter values (network size, data load, etc.) of the considered protocol. In our study,
we found that mean-field approach is very tractable and produces very accurate
results. The accuracy could be confirmed by the study of many scientist, including
[56].
3.3.2 Network Simulator 2 (ns-2)
The other main tool that we utilise in this project to evaluate the performance of
IEEE 802.15.4 and PRIMAC is ns-2 version 2.33 [66]. The network simulator version
2 [38, 71] is an event-driven and object oriented simulation tool that is widely used in
the scientific community to study the dynamic nature of communication networks.
NS-2 provides users with a way of specifying network protocols and simulating
their corresponding behaviour. It was developed under the VINT project as a
collaboration between UC Berkeley, USC/ISI, LBL, and Xerox PARC.
NS-2 is written in two languages: C++ for back-end and Object-oriented Tool
Command Language (OTcl) for the front-end, as shown in Fig. 16. C++ defines the
internal mechanism of the simulation objects whilst OTcl assembles and configures
objects, and schedule the discrete events that sets up a simulation. ns-2 uses a fast
![Page 67: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/67.jpg)
42 CHAPTER 3. METHODOLOGY
ns-2 Shell Executable Command (ns)
Simulation
Objects
Simulation
Objects
C++ OTcl
Tcl
Simulation
Script
Simulation
Trace
File
NAM
(Animation)
Xgraph
Matlab
Figure 16: Basic Architecture Of ns-2
run-time speed language, C++, to implement the network protocols and algorithms
because it can efficiently manipulate bytes, packets and large data sets. On the other
hand, OTcl is the best choice for the configuration of a simulation scenarios because
it gives low turn-around time for tasks such as finding bugs, change network model,
recompile, and run scripts. The configuration of a simulation scenario runs only
one, so total simulation is not affected. C++ and OTcl components are linked
together using the TclCL interface.
Variables in the OTcl domain, known as handles, are mapped to a C++ object. A
handle (e.g., n as node handle) is a string (e.g., o10) in the OTcl domain, and its
functionality (e.g. receiving a packet) is defined in the C++ object (e.g. of class
Connector). In the OTcl domain, a handle acts as a front-end which interacts with
users and other OTcl objects. ns-2 provides a large number of built-in C++ objects
that covers an extensive list of network protocols. For PRIMAC, we created our
own C++ objects and use a OTcl configuration to put together those objects.
To run ns-2, a user inputs arguments in a command shell or generally enters a
simulation scripting file written in Tcl, see Fig. 16. The scripting file contains the
description of the network scenario and protocols to be loaded into a simulation
run. The ns-2 output can be given in the form of log files and/or animations. The
two standard log files are:
![Page 68: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/68.jpg)
3.3. EVALUATION METHODS 43
1. Trace File. This file records the time that events occurred during a simu-
lation run. Specifically, it contains the details of a node activities, packet
transmission and receptions through the layers of a node, type of packet,
packet collisions and buffer drops, etc. Using this information, we can pro-
duce performance graphs.
2. Network Animator Trace File. The NAM trace file is used by the network
animator tool to depict the network topology, location of nodes, communica-
tion links and packet transfer. Similarly, the content of this file can be used
for custom analysis and plots.
Simulation Process
In general, the key steps to define a simulation scenario are:
1. Design. In this step, the user must the determine the simulation purpose,
the network configuration and protocols, the input traffic and assumptions,
whether or not new C++ and OTcl objects are required, and finally the
performance metrics.
2. Configuration. The TCL script with the simulation scenario is created. The
content of the Tcl script can be divided in two sections. First, the user add
the network components (e.g., nodes, WPAN, propagation model, trace files)
and configure them according to the simulation design (e.g., communication
links between nodes) . Second, the user scheduled time triggers for data
transmission.
3. Post Processing. At the end of the execution of a Tcl script, the user can use
the trace files to analyses the results.
![Page 69: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/69.jpg)
44 CHAPTER 3. METHODOLOGY
Network Layer
Propagation
Model
Data Layer
Physical Layer
Queue
Type
Antenna
Type
Wireless Channel
NODE
Upper Layers
Figure 17: Architecture Of A ns-2 Node
Simulation Framework
In ns-2, a node is basic network component that forwards packets to other nodes
through a connecting link and delivers a received packet to the attached transport
layer. A node encapsulates the functionalities of the network layer, data layer, and
physical layer, and also includes the type of queue, antenna, channel and radio
signal propagation method, as seen in Fig. 17.
In our simulations, we configured nodes to use a drop-tail queue and the network
layer uses a simple agent witch forwards packets to destination nodes without cal-
culating special routes. Each node utilises an omnidirectional antenna to access
the common wireless channel. The wireless channel is an object that works as an
interface between the physical layer of the nodes and its function is to signal when
![Page 70: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/70.jpg)
3.3. EVALUATION METHODS 45
MAC
PHY
Physical Medium
Upper Layers
SSCS
802.2 LLC
Figure 18: WPAN Device Architecture
a node is sending or receiving packets. The physical layer is powered by the wire-
lessPhy module which is an interface between the MAC sublayer and the wireless
channel. It also links to the propagation model in order to calculate the received
signal power in each node.
In the case of PRIMAC, we developed a new MAC module that introduces the
necessary features to achieve non-uniform contention and weighted access priority
for the data-intensive sensor nodes. This MAC modules sits directly on top of the
standard ns-2 wirelessPhy and below the network layer.
Wireless Personal Area Network (WPAN) MAC Module
In the case of IEEE 802.15.4 scenarios, the nodes are configured to use the WPAN
![Page 71: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/71.jpg)
46 CHAPTER 3. METHODOLOGY
module developed by Zheng and Lee for Samsung/CUNY [106] which defines the
functionalities of the MAC sublayer, adds extra features to the standard wirelessPhy
module and implements the service specific convergence sublayer of IEEE 802.15.4,
as depicted in Fig. 18.
The MAC sublayer features of WPAN includes:
1. Carrier sense and multiple access with collision avoidance (CSMA-CA) access
method,
2. Beacon transmission and time synchronisation,
3. Association and Disassociation of nodes,
4. Tree topology formation,
5. Direct and indirect transmission,
6. Packet filtering and error modelling,
7. Enhance Nam animations.
The IEEE 802.15.4 physical features in WPAN are:
1. Energy detection (ED) within the current channel,
2. Clear channel assessment for CSMA-CA,
3. Link quality indication (LQI) for received packets,
4. Multiple channel operation.
Radio Signal Propagation Method
The propagation model to be adopted in all simulation scenarios is the two-ray
ground-reflection model, which allows to predict the power loss of a signal at the
receiving node. This method has been proved to be very suitable for the simulation
of WSNs [51]. The two-ray ground-reflection method considers not only the losses
![Page 72: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/72.jpg)
3.3. EVALUATION METHODS 47
due to direct path transmission in a direct path (free space model) but also the
reflections due the existing a ground surface giving more accurate results at a long
distance [72]. Another advantage of the two-ray ground-reflection model is that the
received power is deterministic for the same inputs allowing a direct comparison
between MAC protocols. Then, the received power by a node is calculated in ns-2
as
PRX(d) =PTXGTXGRXhTX
2hRX2
d4L, (4)
where
d is the distance between the transmitting and receiving node,
PRX(d) is the signal power in the receiving node at a distant d,
PTX is the generated power in the transmitting node,
GTX is the antenna gain of the transmitting node,
GRX is the antenna gain of the receiving node,
hTX is the antenna height of the transmitting node,
hTX is the antenna height of the receiving node,
L is the power loss due to system.
In our simulation scenarios for IEEE 802.15.4 and PRIMAC, we assume that the
sensor nodes have omnidirectional antennas of gain equal to unity, GRX = GTX = 1,
height equals to 1.5 meters, hRX = hTX = 1.5, transmission power equals to 0.2818,
PTX = 0.2818 and no system loss, L = 1. These assumptions allow us to model
generic radio characteristics where no special gain is added to any specific node or
transmission path. The assumptions are equivalent to similar studies on wireless
sensor networks [51].
3.3.3 Experimental Sensor Nodes
We developed experimental testbeds of sensor nodes in order to corroborate the per-
formance of data-intensive WSNs over a real wireless environment. A node is formed
![Page 73: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/73.jpg)
48 CHAPTER 3. METHODOLOGY
with small microcontroller devices which are equipped with a radio transceiver that
operates in the 900 MHz band. We implemented the specific optimal protocols at
the MAC level, and we also developed specific application layer programs that could
test the maximum performance of the network.
An experimental tesbed is an important validation method because it allow us to
evaluate some of the assumptions of the analytical models and ns-2 simulations.
The considered assumptions include
1. Nodes in the entire network are in range of communication,
2. Wireless links are asymmetric and time-independent,
3. In unsaturated conditions, periodical packet generation process follows a poi-
son distribution,
4. Time-synchronization among nodes and precise clear channel assessment are
feasible,
5. Optimal normalised channel throughput is achievable.
![Page 74: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/74.jpg)
Chapter 4
Data-Intensive Networks with
Optimal IEEE 802.15.4
The IEEE 802.15.4 standard specifies the medium access protocol (MAC) and
physical layer radio that is recommended for first generation of WSNs. This
first generation was devised for WSNs with low data rate and low power applica-
tions, however we will demonstrate in this chapter that the IEEE 802.15.4 medium
access mechanism can be enhanced by choosing appropriate MAC parameters to
a degree where data-intensive scenarios are achievable. We consider that optimal
network designs and protocol enhancements in IEEE 802.15.4 could facilitate a
seamless migration from low data rate to more demanding cases in scientific and
industrial applications.
In IEEE 802.15.4, the contention access period of the MAC protocol is based on a
carrier sense multiple access with collision avoidance algorithm that enables sensor
nodes to access a common shared wireless medium. Although the recommended
MAC protocol is primarily designed to save energy, its default parameters are not
necessarily optimized in terms of normalised channel throughput.
With this consideration in mind, we analyse in this chapter how the CSMA-CA al-
gorithm of IEEE 802.15.4 can be optimized in order to achieve maximum normalised
49
![Page 75: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/75.jpg)
50CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
channel throughput for WSNs under unsaturated and saturated data traffic con-
ditions. By saturation we mean that a node in the network always has packet
awaiting to be sent as it occurs with data-intensive nodes. We show in this chap-
ter that maximizing throughput can further enhance energy saving and improve
network lifetime expectancy compared to saturated network settings that use the
default MAC parameters of IEEE 802.15.4. We will aim to find in this chapter the
optimal MAC parameters that yield optimal normalised channel throughput.
The contributions of this chapter are:
1. Introduce a mean-field approach to model the IEEE 802.15.4 CSMA-CA algo-
rithm under saturated and unsaturated traffic conditions. This model allow us
to obtain fundamental network metrics such as normalised channel through-
put, packet delivery ratio and packet transmission delay, and evaluate the
network for a variety of packet arrival rates, network size and packet lengths.
2. Derive a simple expression for optimal throughput received at the sink in
a network with star topology. This mathematical expression provides the
maximum achievable normalised channel throughput in a WSN, and therefore
it represents a considerable contribution to the knowledge of IEEE 802.15.4
CSMA-CA algorithm.
3. Design networks with optimal throughput by choosing appropriate MAC pa-
rameters. Specifically, we present how to realise WSNs with homogeneous
conditions where packet generation and arrival in nodes is intensive for all
transmitting nodes.
The rest of the chapter is organized as follows. In Section 4.1, we review the exist-
ing approaches for analyzing the IEEE 802.15.4 standard. In Section 4.2, the IEEE
802.15.4 CSMA-CA algorithm is described. In Section 4.3, we present our analytical
model for unsaturated conditions and revisit the literature for saturated conditions.
Section 4.4 corroborates the validity of the model by comparing analytical and ns-2
![Page 76: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/76.jpg)
4.1. RELATED WORK 51
simulations. Section 4.5, we study the impact of different MAC layer parameters
on normalised channel throughput. Section 4.6 derives the expression for optimal
normalised channel throughput and present the proposals for the design of optimal
WSNs. In the next section ( Section 4.7) we use ns-2 simulations to verify the nor-
malised channel throughput of the optimal designs and evaluate their performance.
Finally, Section 6.5 concludes the chapter with some remarks.
4.1 Related Work
There exist a number of analytical models in the literature studying the performance
of the IEEE 802.15.4 MAC protocol. Misic et al. [60, 61, 62] proposed several
models based on discrete time Markov Chains and M/G/1/K queues to evaluate
the impact of MAC parameters in networks with saturated and unsaturated uplink
and downlink traffic. The authors made various simplifications to their models
in order to reduce the complexity of the analysis, i.e., unlimited retransmissions
of unacknowledged packets. Although these proposals are promising, the main
common disadvantage is the considerable discrepancy between their simulation and
analytical results, as shown in their paper figures. We show later in this chapter
that our analytical model is more tractable and at the same time improves on the
accuracy of the results.
He et al. [30, 31] presented a model based on two two-dimensional Markov chains
for networks under saturated conditions. The objective of this study is to pre-
dict the performance with the highest attainable accuracy. Consequently, it does
not analyse the maximum achievable normalised channel throughput nor consider
networks under unsaturated conditions, where this maximum is reached.
Pollin et al. [70] extended the Markov-based analysis of the well-known IEEE 802.11
protocol in [16] to capture the different behaviour in the IEEE 802.15.4 MAC proto-
col for saturated and periodic traffic conditions. Shu et al. [80] proposed a simplified
Markov model to evaluate the protocol performance under similar saturated and
![Page 77: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/77.jpg)
52CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
periodic traffic conditions.
Tao et al. [89] also extended the Markovian analysis presented in [16], but only for
network under saturated traffic conditions. In addition, the study provided recom-
mendations for throughput improvements by adjusting the CSMA-CA parameters,
however, these enhancements target specific network settings under saturated traf-
fic conditions, while we provide a generic derivation for the maximum normalised
channel throughput for both saturated and unsaturated networks..
In a different approach, Ling et al. [57] utilized a method based on a renewal
theorem first introduced in [44] to analyse the saturated network performance. The
authors also suggested an extension of their model for unsaturated networks. This
extension, however, is not straight forward as it requires adjusting the definition
of the renewal cycle to the actual service time of a MAC frame in an unsaturated
network. In this chapter we present our simple mean-field model that accurately
predicts the protocol performance under unsaturated conditions.
4.2 The IEEE 802.15.4 Protocol
The IEEE 802.15.4 standard in [93] defines the physical layer (PHY) and medium
access control sublayer (MAC) for wireless sensor networks that require low-power
consumption, low-rate and low-cost. The definition of upper layers is still open for
design and optimization. Nevertheless, up to now, the ZigBee specification [108]
has become the most adopted implementation atop the IEEE 802.15.4 MAC.
The physical layer is based on the Direct Sequence Spread Spectrum (DSSS) spread-
ing technique and provides a total of 27 operational frequencies: 16 channels in 2.4
GHz, 10 channels 915 MHz and 1 channel 868 MHz. The modulation and nominal
data rate of each band are 250 Kbps using Orthogonal Quadrature Phase Shift
Keying (OQPSK) at 2.4GHz, 40 Kbps using Binary Phase Shift Keying (BPSK) at
915 MHz, and 20 Kbps using also BPSK at 868MHz.
![Page 78: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/78.jpg)
4.2. THE IEEE 802.15.4 PROTOCOL 53
The MAC sublayer provides two different channel access methods: a beacon-enabled
mode and a nonbeacon-enabled mode. In a beacon-enabled mode, the coordinator
defines a superframe structure that is bounded for network beacon packets and is
divided into 16 equally sized slots. The active portion of the superframe is composed
of three parts: a beacon, a contention access period (CAP) and a contention-free
period (CFP). The coordinator transmit the beacon at the starting edge of the su-
perframe, and the CAP shall commence immediately after the beacon transmission.
The CFP is an optional period, if present, follows immediately after the CAP and
extends to the end of the active portion of the superframe. Guaranteed time slots
for dedicated communication could only be allocated within CFP.
The specification incorporates a mechanism to access the medium within the con-
tention access period (CAP), in which nodes transmit uplink data to a coordinator
using the Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) algo-
rithm. Time is divided into backoff slots of fixed duration and the nodes synchronize
with the coordinator upon the reception of a beacon.
A node with a pending packet to transmit starts with a random backoff period,
denoted as b, picked uniformly in the range of [0, CW ], where CW=2BE-1 is the
contention window and BE is the backoff exponent used in the generation of the
contention window for each transmission attempt. For the first attempt BE is made
equal to a system parameter macMinBE (by default 3) that sets the minimum
contention window for backoff.
At the end of the backoff, the node performs a clear channel assessment (CCA) by
sensing the idleness of the medium. If the channel is idle for two consecutive slots
(i.e. two successive CCAs without failure), the node proceeds with the transmission
of the packet and concludes the backoff cycle for that packet. Otherwise, if the
channel in any of the two slots assessed is found to be busy, the node initiates a
new backoff before performing a retransmission attempt until reaching the system
maximum allowable number of attempts M=macMaxCSMABackoffs+1 (by default
M=5). The algorithm terminates with a channel access failure status and the packet
![Page 79: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/79.jpg)
54CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
R1
T1 T2 T3 Ti TK
R2 R3 RK...
...
Arrival of
Packet 1
Time
Arrival of
Packet 2
Arrival of
Packet 3
Arrival of
Packet iArrival of
Packet K
Ri
b0 Att0 bj Attj bM-1 AttM-1Ri = total number of attempts for packet i
bj= Backoff stage j for packet i......
Figure 19: Packet Transmission Of A Node In An Unsaturated Network
is discarded after the maximum number of attempts is reached. The contention
window might be increased in each subsequent attempt to achieve higher probability
of success. To do so, BE is set as the minimum min(BE+1,macMaxBE) where
macMaxBE is another system parameter (by default 5) that limits the maximum
contention window.
According to the IEEE 802.15.4 standard, the use of acknowledgement packets is
optional and it must be explicitly requested by the transmitting node. Especially
for wireless sensor networks with high throughput demands, which is the scenario
of our study, ACK is usually disabled in order to gain throughput in applications
with redundant information (e.g. the same information can be obtained from the
different nodes within a close proximity).
4.3 Analytical Model
Consider a single-hop star topology network consisting of N homogeneous nodes,
each reporting uplink data to a sink. Assume there is no data acknowledgements,
nor contention free period (CFP). The length of the CAP is assumed to be large
enough so that a node can utilize all the allowable transmission attempts if neces-
sary. The wireless medium is assumed to be error-free and all nodes are in range
of communication. As a consequence, the hidden terminal and exposed node prob-
lems are not present in this framework. Note that in contrast to the legacy IEEE
802.11 networks that use MAC packets of up to 2346 bytes (including header and
![Page 80: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/80.jpg)
4.3. ANALYTICAL MODEL 55
cyclic redundancy check) [37], the maximum MAC packet size of 802.15.4 is just
127 bytes, and hence, the likelihood of having a lost packet due to hidden collisions
is much reduced.
4.3.1 Sensing Rate for Unsaturated Case
For unsaturated networks we assume that packets arrive at each node according to
a Poisson process with rate λ (packets/slot) such that a node has a period of time
when its queue is empty, i.e. a node has no packet to send. Furthermore, assume
that the buffer is big enough, so packets drop due to overflow cannot occur.
Let Ri be a random variable (r.v.) that represents the number of sensing attempts
(CCA) for a packet i and let Ti be the inter-arrival time between packets i and
i + 1. Then, the probability that a tagged node senses the channel in a given slot
(i.e. sensing rate) ϕ is given by
ϕ =R1 +R2 + ...+RK
T1 + T2 + ...+ TK
, (5)
where K is the number of packets arriving at the tagged node over a sufficiently
long period of time. This is an exact expression for ϕ on unsaturated networks and
can be re-written using the mean-field value as
ϕ =KE[R]
K( 1λ)
= λE[R], (6)
where E[R] is the average number of sensing attempts per packet by a node. Note
that the denominator in (6) is based on the fact that the arrival of packets forms a
Poisson process with average inter-arrival time 1/λ between packets. The concept
for the calculation of the sensing rate is illustrated in Fig. 19.
Let γ be the probability of failing a sensing attempt by finding a busy channel
while performing the two CCAs (i.e. finding the channel is busy in either the first
or second CCA). For tractability, assume γ to be constant and independent of the
past attempts, then E[R] can be computed as
E[R] =M−1∑i=0
γi =1− γM
1− γ. (7)
![Page 81: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/81.jpg)
56CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
From (6) and (7), we obtain the sensing rate for unsaturated conditions as
ϕ = λ(1− γM
1− γ). (8)
4.3.2 Sensing Rate for Saturated Case
As opposed to the unsaturated case, the sensing rate ϕ in saturated networks can be
calculated as E[R]/E[X] according to [57] where X is defined as a r.v. representing
the packet service time and E[X] is the expectation of X.
E[X] is calculated by averaging over different sensing attempts. A node will be
in the ith attempt with a probability γi and have an average backoff duration of
bi =2BE−1
2. The service time also includes the sensing duration of 2 slots if successful
and of δ = 1 + (1 − α) = 2 − α otherwise where α is the probability of finding a
busy channel for the first CCA, and a packet transmission time of L slots after a
successful attempt. Thus E[X] is given by [57]
E[X] =M−1∑i=0
biγi + (L+ 2)(1− γM) + δ
M∑i=1
γi, (9)
Finally, the sensing rate in saturated network is given as
ϕ =
∑M−1i=0 γi∑M−1
i=0 biγi + (L+ 2)(1− γM) + δ∑M
i=1 γi. (10)
4.3.3 Sensing Failure Probability
Denote β as the probability of finding a busy channel for the second channel sam-
pling CCA. The sensing failure γ occurs when the tagged node finds the medium
busy in either first or second channel sampling, i.e.
γ = α + (1− α)β. (11)
The derivations of α and β have been presented in [70, 27, 102]. The tagged node
finds the medium busy in the first CCA when other nodes are already transmitting
in that slot. This happens when at least one of the other N-1 nodes starts sensing
![Page 82: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/82.jpg)
4.3. ANALYTICAL MODEL 57
in a previous slot, which occurs with probability (1−(1−ϕ)N−1), and given that the
other nodes do not fail their first and second CCAs, which occurs with probability
(1− α) and (1− β), respectively. Then, the medium is elapsed for L slots, i.e.
α = L(1− (1− ϕ)N−1)(1− α)(1− β). (12)
The tagged node finds the medium busy in the second CCA when at least one of
the other N-1 nodes commences to transmit in that slot. β can be derived as the
probability of having at least one of the other N-1 nodes start sensing in a slot
previous to tagged node’s first CCA slot, which occurs with probability (1 − (1 −
ϕ)N−1), and given that the other nodes succeed in their second CCA, this is (1−β).
Then, we have
β = (1− (1− ϕ)N−1)(1− β). (13)
Substitute (12) and (13) into (11) to obtain the sensing failure probability as
γ =(L+ 1)(1− (1− ϕ)N−1)
(L+ 1)(1− (1− ϕ)N−1) + 1. (14)
In summary, equations (8) and (14) establish a fixed-point formulation from which
ϕ and γ for unsaturated conditions can be obtained using numerical techniques.
For saturated conditions, the fixed-point equations are (10) and (14).
Let λSAT be the arrival rate at which a node becomes saturated. In this setting
the tagged node can be modelled as an M/G/1 queue with the packet service time
equals to 1/λSAT which implies zero probability that the node is idle. Note that
the network transition to saturation when
λSAT = 1/E[X]. (15)
where E[X] can be obtained from (9) and using the fixed-point solution for equa-
tions (10) and (14).
![Page 83: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/83.jpg)
58CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
4.3.4 Throughput Analysis
Given that the tagged node is transmitting a packet, the conditional probability
(refer to as η) that the transmission is successful is that none of the other N-1
nodes attempts channel sensing in the same slot, η = (1− ϕ)N−1. This probability
is conditioned on the fact that the tagged node has made a sensing attempt in
that slot, then successfully performed two CCAs and found the channel idle in both
previous two slots just before its transmission, this is ϕ(1 − γ). Therefore, the
probability of successful transmission in a slot is
Psslot = ϕ(1− γ)(1− ϕ)N−1. (16)
As there are N homogeneous nodes, the average normalised channel throughput S
at the MAC layer is the portion of time the channel has been used for successful
transmissions and is expressed as
S = LNϕ(1− γ)(1− ϕ)N−1. (17)
4.3.5 Network Lifetime
The tagged node is an electronic device equipped with a radio transceiver, i.e.
Chipcon CC2420 [91], that has four states of operation: shutdown, idle, transmit
and receive. Assume that tagged node is in shutdown state when its buffer is empty,
in idle state when performing backoff before a transmission attempt, in receive state
when sensing the medium (CCAs), and in transmit state when sending a packet.
Moreover, assume that the energy consumption in shutdown state is negligible, since
shutdown power is at least a factor 5000 lower than any other state according to [17].
Then, the average energy consumption per packet transmission in a tagged node
(refer to as Epacket) can be calculated by summing the products of the average period
of time a node spends in each state for a packet transmission and its corresponding
power consumption
Epacket = PidleTidle + PtxTtx + PrxTrx. (18)
![Page 84: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/84.jpg)
4.4. MODEL EVALUATION 59
Table 1: Chipcon CC2420 Transceiver [17]
Parameter Description ValuePidle Power in idle state 712 µWPrx Power in receive state 35.28 mWPtx Power in transmit state 30.67 mW
where Pidle, Ptx and Prx are known from the radio specifications and presented
in Table 1. The average idle time is given by the sum of the average backoff
periods Tidle =∑M−1
i=0 biγi. The average transmit time is given by the product of
the length of a packet and its corresponding probability of success in M attempts,
Ttx = (1 − γM)L. The average receive time accounts for the number of CCA slots
sensed in a packet transmission Trx = δ∑M
i=1 γM + 2(1− γM).
Let Tnet be the network lifetime that represents the average time a network operates
until a node dies out and let Ebat be the stored energy in tagged node. In a
homogeneous network all nodes should live on average the same amount of time.
Then, the network lifetime is given by
Tnet =Ebat
λEpacket
. (19)
4.4 Model Evaluation
To verify the accuracy of the proposed unsaturated model, we compare the an-
alytical results with simulations. The simulations were performed using the ns-2
simulator (version 2.33). We simulate a beacon-enabled, star-topology sensor net-
work where we choose the MAC and physical layer parameters consistently with the
default values specified in [93]. In particular, the minimum and maximum back-
off exponents are macMinBE=3 and macMaxBE=5, respectively. The maximum
backoff stage is set to M=5 (macMaxCSMABackoffs=4). The length of a packet (in
backoff slots) is L=8 representing a 640 bits packet in a network, since the backoff
slot is 320µsecs and the data transmission rate is 250Kbps.
In Fig. 20 and Fig. 21 we show the normalised channel throughput obtained from
![Page 85: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/85.jpg)
60CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
0 0.005 0.01 0.015 0.02 0.0250
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L TH
RO
UG
HP
UT
S
AnaSimAna [60]Ana [70]Ana [80]
Figure 20: S for Different Packet Arrival Rates And N=20
0 0.005 0.01 0.015 0.02 0.0250
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L TH
RO
UG
HP
UT
S
AnaSimAna [60]Ana [70]Ana [80]
Figure 21: S for Different Packet Arrival Rates and N=30
![Page 86: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/86.jpg)
4.5. PERFORMANCE OPTIMIZATION 61
the analytical models and simulation results as a function of the packet arrival rate
using two different network sizes N=20 and N=30, respectively. The analytical
results depicted in the figures are obtained by using the fixed-point formulations
(8) and (14) or (10) and (14) depending on whether λ is less than λSAT or not,
respectively.
Observe that the analytical results closely match with the simulation compared to
the saturated models presented in [70] and [80], and the unsaturated model in [60].
The latest is the most similar unsaturated study of IEEE 802.15.4 we could found
in the literature. The model is characterized by Poisson arrivals but differs from
our scenario due to the use of unlimited retransmissions until a packet is positively
acknowledged, and it is also limited to small packet arrival rates. In contrast, our
proposal extends the arrival range analysis and as expected, each network saturates
at a given arrival value and after that the normalised channel throughput remains
constant. Moreover, notice that the optimal throughput is around 0.56 for both
cases and is reached under unsaturated conditions.
4.5 Performance Optimization
The normalised channel throughput of a network depends on the MAC layer param-
eters M, BEmin and BEmax. In Fig. 22 and Fig.23 we can see the impact of each
parameter on a network of N=20 and L=8. Note from Fig. 22 that a higher number
of attempts improves the performance under light packet arrival rate (λ < 0.005
pkts/slot) because less packets are discarded. In contrast, the combination of high
values of λ and M causes more collisions and then a degradation of throughput.
Fig. 23 and 24 show that higher values of macMinBE and macMaxBE can increase
the normalised channel throughput under saturated conditions since longer backoff
duration bi reduces the probability of collisions. However, these changes also reduce
the value of λSAT , which in turn limits the maximum number of packets these
network optimizations can handle. Therefore, in the next section we extend the
![Page 87: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/87.jpg)
62CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
0 0.005 0.01 0.015 0.02 0.0250
0.1
0.2
0.3
0.4
0.5
0.6
0.7
PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L T
HR
OU
GH
PU
T S
Ana M=1,BEmin=3,BEmax=5
Ana M=5,BEmin=3,BEmax=5
Ana M=9,BEmin=3,BEmax=5
Figure 22: S For Different M
0 0.005 0.01 0.015 0.02 0.0250
0.1
0.2
0.3
0.4
0.5
0.6
0.7
PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L T
HR
OU
GH
PU
T S
Ana BEmax=3,M=1,BEmin=3
Ana BEmax=5,M=1,BEmin=3
Ana BEmax=7,M=1,BEmin=3
Figure 23: S For Different BEmax
![Page 88: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/88.jpg)
4.6. OPTIMAL NORMALISED CHANNEL THROUGHPUT 63
0 0.005 0.01 0.015 0.02 0.0250
0.1
0.2
0.3
0.4
0.5
0.6
0.7
PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L T
HR
OU
GH
PU
T S
Ana BEmin=1,M=1,BEmax=5
Ana BEmin=3,M=1,BEmax=5
Ana BEmin=5,M=1,BEmax=5
Figure 24: S For Different BEmin
analysis to find the optimal normalised channel throughput when λ, L and N are
also considered.
4.6 Optimal Normalised Channel Throughput
In this section, we derive the optimal normalised channel throughput received at
the sink given in (17). By substituting (14) into (17) we can have
S = LN
[1
ϕ
(L+ 2
(1− ϕ)N−1− (L+ 1)
)]−1
. (20)
To maximize the normalised channel throughput the following minimization is re-
quired
min
[1
ϕ
(L+ 2
(1− ϕ)N−1− (L+ 1)
)]. (21)
Taking the derivative of (21) with respect to ϕ and making this equals to zero, we
can obtain the corresponding optimal sensing rate ϕopt which is the solution of the
following equation
(L+ 1)(1− ϕopt)N +N(L+ 2)ϕopt − (L+ 2) = 0, (22)
![Page 89: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/89.jpg)
64CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
For ϕopt ≪ 1 and N > 1, the following approximation can be used to obtain an
explicit expression for ϕopt
(1− ϕopt)N ≈ 1−Nϕopt +
N(N − 1)
2ϕ2opt, (23)
N(N − 1) ≈ N2,
which gives
ϕopt ≈√2L+ 3− 1
(N − 1)(L+ 1). (24)
Let γ be the corresponding sensing failure probability that a tagged node experi-
ences providing that the normalised channel throughput is maximized. This can be
obtained from (14) as
γ =(L+ 1)(1− (1− ϕopt)
N−1)
(L+ 1)(1− (1− ϕopt)N−1) + 1. (25)
Based on the same approximation ϕopt ≪ 1 as in (23) we have that
γ ≈(√2L+ 3− 1)
[1− (N−2)(
√2L+3−1)
2(N−1)(L+1)
](√2L+ 3− 1)
[1− (N−2)(
√2L+3−1)
2(N−1)(L+1)
]+ 1
. (26)
Notice that we can approximate (N−2)N−1
≈ 1 when N ≫ 1 and it can be seen that
γ is then constant and independent of N . Finally, the optimal normalised channel
throughput (refer to as Sopt) can be obtained from (17), (24) and (26) as
Sopt =(
NN−1
) (L
L+1
) (√2L+ 3− 1
)x(1− ϕopt)
N−1(1− γ).(27)
Figure 25 shows Sopt as a function of length of packet for different network sizes
(N=10,N=20,N=30). In general, the optimal channel throughput increases with
respect to Lmainly because the medium is occupied longer time for larger successful
packets. Although these big packets generate higher sensing failure probability γ,
the probability of having a collision reduces due to a lower optimal sensing rate.
A comparison between the optimal normalised channel throughput and the nor-
malised channel throughput under saturated conditions for different L and N is
![Page 90: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/90.jpg)
4.6. OPTIMAL NORMALISED CHANNEL THROUGHPUT 65
2 4 6 8 10 120.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7
LENGTH OF PACKET L (Slots)
OP
TIM
AL C
HA
NN
EL T
HR
OU
GH
PU
T
So
pt
Ana N=10
Ana N=20
Ana N=30
Figure 25: Sopt For Different Length Of Packet L
05
1015
1020
3040
500
0.1
0.2
0.3
0.4
0.5
0.6
0.7
LENGHT OF PACKET L (slots)NETWORK SIZE (Nodes)
CH
AN
NE
L T
HR
OU
GH
PU
T
Sopt
S(ʎ=ʎSAT)
Figure 26: Sopt And S(λ=λSAT ) For L And N
![Page 91: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/91.jpg)
66CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
depicted in Fig. 26. The optimal normalised channel throughput corresponds to
the upper surface, while the normalised channel throughput under saturated con-
ditions (λ = λSAT ) corresponds to the lower surface. Observe that Sopt presents a
better performance for the different values of L and N . Therefore, in the follow-
ing, we consider different network designs to achieve optimal normalised channel
throughput.
4.6.1 Design 1
In this scenario, for a given L and N , we aim to find the optimal packet arrival
rate (λ) so that channel is maximally utilized. In practice the packet arrival rate
is in close relation to how frequent a node will sample the environment. In this
section, we assume that the network is unsaturated and discuss the saturated case
in a latter design.
Denote λopt as the optimal packet arrival rate for an unsaturated network of N
nodes and packets of length L. From (24) and (8), we can obtain λopt as
λopt =
[ √2L+ 3− 1
(N − 1)(L+ 1)
] [1− γ
1− (γ)M
], (28)
where γ is given by (26). Equation (28) gives us the optimal packet arrival rate,
however, we still need to confirm that the network operates under unsaturated
conditions with such λopt. Note that λSAT is the arrival rate at which a node
becomes saturated, and therefore λopt should satisfy
λSAT > λopt, (29)
Figure 27 shows λopt and λSAT for different sensor network configurations (M=1
and M=5 ) and packets of length L = 8. Observe that for a small number of nodes,
the condition λSAT > λopt is not fulfilled. In those cases, the optimization should
be conducted based on design 3 and using the resulting λopt as the packet arrival
rate (λ) for the new design.
![Page 92: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/92.jpg)
4.6. OPTIMAL NORMALISED CHANNEL THROUGHPUT 67
0 5 10 150
100
200
300
400
500
NETWORK SIZE N (Nodes)
PA
CK
ET
AR
RIV
AL R
AT
E λ
(pkts
/secs)
λopt
M=1
λopt
M=5
λSAT
M=1,BEmin=3,BEmax=5
λSAT
M=5,BEmin=3,BEmax=5
Figure 27: λopt And λSAT For Different M
0 2 4 6 8 100
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
0.09
0.1
NODES N
PA
CK
ET
AR
RIV
AL R
AT
E λ
λopt
M=5
λSAT
M=5,BEmin=3,BEmax=5
λSAT
M=5,BEmin=1,BEmax=5
Figure 28: λopt And λSAT For Different BEmin
![Page 93: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/93.jpg)
68CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
Notice in Fig. 27 that λopt and λSAT decrease as the number of nodes in the
network increases. It is because when the number of nodes increases the contention
in the network is expected to be higher and thus a node becomes saturated with
smaller packet arrival rate. However, an interesting case can be observed whenM=1
because higher packet arrival rate is required to saturate larger networks when the
number of attempts per packet is limited to 1.
The explanation for this is that an increase in the number of nodes results in more
contention and higher failure probability. As a consequence, the probability of dis-
carding packets without transmission (which is the same as the failure attempt
probability γ when M=1 ) is increasing, leading to higher packet arrival rate to
saturate. This can also be shown via the analytical model. Furthermore, in Figure
28 shows the impact of the backoff window parameters on the feasibility of opti-
mal unsaturated network. Observe that a small value of BEmin enable optimal
throughput on unsaturated network of fewer nodes.
4.6.2 Design 2
In this design, we aim to find the optimal network size (N) so that the normalised
channel throughput is maximized. The packet length (L) and packet arrival rate
(λ) are given in this scenario as opposed to the previous design. The network in
this design is still assumed to be unsaturated, so λ is less than λSAT . Knowing the
value (λ), optimal N can be found by solving (28) and the result must be an integer
value.
The search for such optimal N is described in Alg. 1, which is based on a bisection
method. Let Nbest be the outcome of the bisection method, for which the corre-
sponding normalised channel throughput (refer to Sbest) is very close to the optimal
value.
Depending on the particular application the range in which the bisection method
is applied could be different. For the solution of this design to be feasible, the
![Page 94: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/94.jpg)
4.6. OPTIMAL NORMALISED CHANNEL THROUGHPUT 69
Algorithm 1 Algorithm for finding Nbest given λ and L
Require: λopt(NL) ≥ λ ≥ λopt(NH)while NH −NL ≤ 1 doN = 1
2(NL +NH) //Middle point for bisection
Calculate λopt(N) according to (28)if λopt(N) == λ thenbreak while loop
else if λopt(N) > λ thenNL ⇐ N //Set new low border for bisection
else if λopt(N) < λ thenNH ⇐ N //Set new high border for bisection
end ifend whileNbest = round[N ] //Solution Found
following condition is required λopt(NL) ≥ λ ≥ λopt(NH) where λopt is defined in
(28). Note it can be seen that λopt is a monotonic decreasing function with respect
to N .
Fig. 29 compares the deviation between Sbest and the optimal normalised channel
throughput for two different length of packets. Sbest and Sopt were calculated for an
extensive range λopt(NH) < λ < λSAT and using the corresponding Nbest, where we
set the minimum and maximum network size to be NL = 2 and NH = 200 nodes,
respectively. In particular, the boxes in Fig. 29 shows the median, the upper
quartile (75th percentile q3) and lower quartile (25th percentile q1) of the deviation
D = Sopt − Sbest for the range of λ. The crosses represent outliers: that is values
larger than q3+1.5(q3−q1) or smaller than q1−1.5(q3−q1). The dotted whisker lines
show the extent of non-outlier values which corresponds to over 99% of the data set.
Observe that the solution Sbest given by Alg. 1 reaches very close to the optimal
normalised channel throughput for the different L. Note that the upper outliers,
which correspond to low values of Nbest, slightly increase with L due to two reasons.
First, a round-up of N in Alg. 1 causes more collisions due to higher number
of contenders. Second, a round-down of N prevents the successful transmission
of some packets which in turn reduces the channel utilization. Nevertheless, the
deviation is still very small for the different L.
![Page 95: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/95.jpg)
70CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
0
2
4
6
8
x 10−3
2 8
LENGTH OF PACKET L
VA
RIA
TIO
N I
N
S op
t−S
be
st
Figure 29: Comparison Between Sopt And Sbest
4.6.3 Design 3
In this design, we maximize the normalised channel throughput for a given N , λ and
L. In contrast to the previous designs, there are more constraints as both N and
λ are predefined. Knowing N and L, we obtain λSAT and λopt using (15) and (28),
respectively, for a particular set of values BEmin and M . The relation between λ
and λSAT will dictate whether the optimal network can be designed for unsaturated
or saturated conditions. The possible scenarios are listed below:
1. λ < λopt ≤ λSAT
2. λopt < λ ≤ λSAT or λ ≤ λSAT < λopt or
λSAT < λ
For the first scenario, we can have an optimal unsaturated network by adjusting
M . In particular, observe that λopt is a monotonic decreasing function in M and
thus λopt can be adjusted downward by increasing M . In other words, it is possible
to find an M such that λopt is very close to the given λ, which then results in an
optimal unsaturated network.
![Page 96: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/96.jpg)
4.6. OPTIMAL NORMALISED CHANNEL THROUGHPUT 71
Table 2: Optimal Designs
Design Input Parameters Output Parameters1 L,N λ2 L,λ N
3 L,N ,λ b
For the second scenario, although λ can be less than λSAT , an optimal unsaturated
network is not feasible. It is because the network is already saturated (λSAT < λopt),
which is the case mentioned in design 1, or is not possible to find M so that the
throughput is maximized under unsaturated conditions when λ > λopt. In this
scenario, we propose to design a network that saturates at λopt by adjusting M .
Then, the optimal throughput is restrained for any given λ.
In order to find M , the saturated sensing rate ϕ given by (10) should be equal to
ϕopt in (24). As a result we have that
M−1∑i=0
biγi =
[1− γM
1− γ
] [ϕ−1opt + (L+ 2)(1− γ)− δγ
]. (30)
The maximum number of attempts (M) is then a solution of the equality in (30).
However, (30) cannot be easily solved and even if the solution exists it is not nec-
essary an integer value. The same objective can be met in this case if we vary the
initial backoff window instead of adjusting M . To this end, we propose to keep the
same backoff window in every attempt, which implies minimum change to the IEEE
802.15.4 protocol. Then equation (30) reduces to
b = ⌈ϕ−1opt + (L+ 2)(1− γ)− δγ⌉. (31)
Note that b guarantees optimal normalised channel throughput regardless of M .
As summary, see table 2 with the different input and output parameters for each
design.
![Page 97: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/97.jpg)
72CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
010
2030
0.010.03
0.050
0.2
0.4
0.6
0.8
1
NETWORK SIZE N (nodes)PACKET ARRIVAL RATE λopt (pkts/slot)
CH
AN
NE
L TH
RO
UG
HP
UT
Sop
tAna L=2,M=5Ana L=8,M=5Sim L=2,M=5Sim L=8,M=5
Figure 30: Sopt For Different L And N
4.7 Evaluation Of Optimal Networks
The three designs of optimal WSNs were verified using the ns-2 simulator. For
the first design, we calculate λopt for different N using (28). The analytical values
(N, λopt) were used as inputs for the simulation. A comparison between analytical
and simulation optimal normalised channel throughput for networks of two different
L are presented in Fig. 30. The results prove the validity and accuracy of the
performance optimization.
For the second design, we evaluate the validity of the algorithm proposed in sec.
4.6.2. Figure 31 shows Nbest obtained for a range of packet arrival rates (λ) and
a default network (M=5), where we set the minimum and maximum network size
to be NL = 2 and NH = 200 nodes, respectively. We use the calculated analytical
pairs (Nbest, λ) as inputs for the simulation. A comparison between analytical and
simulation results are presented in Fig. 32 where we can observe that normalised
channel throughput is very close to the optimal.
![Page 98: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/98.jpg)
4.7. EVALUATION OF OPTIMAL NETWORKS 73
0 0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.0450
10
20
30
40
50
60
70
80
90
100
PACKET ARRIVAL RATE λ (pkts/slot)
NE
TWO
RK
SIZ
E N
best
(Nod
es)
Ana L=2,M=5Ana L=8,M=5Sat Point L=2,M=5,BEmin=3,BEmax=5Sat Point L=8,M=5,BEmin=3,BEmax=5
Figure 31: Nbest For Different L And λ
050
100150
200
00.01
0.020.03
0.040.05
0
0.2
0.4
0.6
0.8
1
NETWORK SIZE Nbest (Nodes)PACKET ARRIVAL RATE λ (pkts/slot)
CH
AN
NE
L TH
RO
UG
HP
UT
Sbe
st
Ana L=2,M=5Ana L=8,M=5Sim L=2,M=5,BEmin=3,BEmax=5Sim L=8,M=5,BEmin=3,BEmax=5
Figure 32: Sbest For Different L And λ
![Page 99: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/99.jpg)
74CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
0 2 4 6 8 100
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
NUMBER OF ATTEMPTS M
CH
AN
NE
L TH
RO
UG
HP
UT
Sop
t
Ana L=2,N=20,λ=0.02Ana L=8,N=20,λ=0.02Sim L=2,N=20,λ=0.02Sim L=8,N=20,λ=0.02
Figure 33: Sopt For An Optimal Saturated Network
Notice that the small deviations in Fig. 30 and Fig. 32 correspond to small net-
work sizes (less than 10 nodes), and is due to the assumption made in subsec.
4.3.1 that claims γ to be constant and independent in every attempt. This mod-
elling hypothesis is not precise for unsaturated networks of few nodes [35] because
simulation-based studies have showed that the sensing failure probability tends to
be lower in the first attempt, especially as the length of packet increases. The sens-
ing failure probability in the first attempt is lower because of the few number of
contending nodes and, in addition, larger packet transmissions occupy the channel
for longer time increasing the sensing failure in subsequent attempts. However, the
small deviation between analytical and simulation demonstrates that is still a good
approximation.
For the third design, we consider a network of N = 20 nodes and packet arrival
rate λ = 0.02 (λ > λopt for all M). We can estimate the optimal backoff duration
b for L = 2 and L = 8 using (31), the result are b = 35 and b = 53 backoff slots,
respectively. The analytical and simulation results are presented in Fig. 33 for
different number of attempts (M) where we can observe that the saturated network
is optimal with any M . Figure 34 compares the network lifetime of optimal designs
![Page 100: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/100.jpg)
4.7. EVALUATION OF OPTIMAL NETWORKS 75
24
68
1012
10
20
30
40
500
100
200
300
400
NETWORK SIZE (Nodes)
NETW
OR
KLIF
ETIM
E(d
ays)
Ana Sopt
Ana S(ʎ=ʎSAT)
LENGTH OF PACKET L (slots)
Figure 34: Tnet For Optimal Designs 1 and 2, And Saturated Networks
that use the standard IEEE 802.15.4 CSMA-CA backoff scheme (design 1 and 2)
with the network lifetime of settings under saturated conditions for different N
and L, and where we assume that Ebat is 28 Kjoules (2 AA batteries, each of
2.5Ah). The upper surface depicts the behaviour of the optimal design 1 and
2, while the lower surface corresponds to a networks under saturated conditions
(λ = λSAT ) and whose MAC layer parameters are macMinBE=3, macMaxBE=5,
and macMaxCSMABackoffs=4. Recall from Fig. 29 that the approximation made
for design 2 has a negligible deviation Sopt−Sbest and the same is still valid here for
network lifetime. Observe that the proposed designs always achieve larger lifetime
in days because the relation λopt < λSAT holds for all cases, and therefore the
sensor nodes corresponding to the optimal designs are less busy. Additionally, the
expectancy is raised when the network size increases since the traffic load is now
shared amongst a higher number of nodes.
Similarly, figure 35 compares the network lifetime of optimal design 3 with the
network lifetime of settings under saturated conditions for different N and L, and
where we assume again that Ebat is 28 Kjoules. In this case, the network lifetime
of design 3 is higher because the optimal backoff window b, obtained from (31), is
![Page 101: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/101.jpg)
76CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
24
68
1012
10
20
30
40
500
50
100
150
200
250
300
NETWORK SIZE (Nodes)
NETW
OR
K L
IFETIM
E (days)
Ana S
Ana S(ʎ=ʎSAT)
opt
LENGTH OF PACKET L (slots)
Figure 35: Tnet For Optimal Design 3, And Saturated Networks
usually larger than the different backoff windows bi of the IEEE 802.15.4 CSMA-
CA standard, and hence the sensor nodes spend longer time in idle state, a state
of lower power consumption. In summary, the results for the normalised channel
throughput of the optimal designs represent a notable improvement compared to
the default IEEE 802.15.4, and also show that the optimal designs guarantee longer
network lifetime, especially when a big number of nodes is used to cover the sensing
area.
4.8 Conclusion
In this chapter, we developed a simple analytical model for the IEEE 802.15.4
MAC protocol under unsaturated conditions. We also investigated the transition
from unsaturation to saturation in these networks. The closed-form expressions for
normalised channel throughput in a single-hop infrastructure network are derived
under both unsaturated and saturated conditions. We then proposed several designs
to optimize the normalised channel throughput given the packet arrival rate at the
![Page 102: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/102.jpg)
4.8. CONCLUSION 77
node, the number of nodes in the network or both. We found that optimal networks
are feasible for both unsaturated and saturated conditions and discussed the impact
of various MAC parameters in each of the designs.
The obtained results were validated against simulations and showed that the nor-
malised channel throughput can be optimized with an arbitrary packet arrival rate
and/or number of nodes in the network. Moreover, we showed that the network
lifetime of the optimal designs is considerably higher than the lifetime of network
settings that use the default MAC parameters of IEEE 802.15.4. Finally, we can
mention that these optimal designs could potentially be used for data-intensive ap-
plications such as seismic monitoring where an event could cause the rapid need to
transmit critical data, image or audio, to the master sensor node. Other potential
data-intensive applications are presented in chapter 1.
![Page 103: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/103.jpg)
78CHAPTER 4. DATA-INTENSIVE NETWORKSWITHOPTIMAL IEEE 802.15.4
![Page 104: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/104.jpg)
Chapter 5
Enhanced CSMA-CA For
Homogeneous Conditions
In the previous chapter we found that the carrier sense multiple access with col-
lision avoidance algorithm that was designed for IEEE 802.15.4 networks can be
optimised by choosing non-standard parameters. The optimization make possible
data-intensive wireless sensor network with homogeneous saturated traffic condi-
tions. To do this, the network designer requires complete knowledge of the packet
length L, arrival rate λ, and the number of sensor nodes N in order to create
a network that operates at the best performance point. However, this complete
knowledge is not always available during the design phase, and in particular the
number of active nodes when an unexpected sensing event occurs.
With this consideration in mind, we address here the following question: whether or
not it is possible to achieve a permanent optimal performance in terms of normalised
channel throughput with an enhanced CSMA-CA algorithm when the number of
active nodes are not known a priori, for instance, imagine a building monitoring
application where a maximum number of nodes NTotal are deployed, but only NActive
become active in an event, where NActive < NTotal.
To answer the above question, we firstly conduct an experimental analysis of the
79
![Page 105: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/105.jpg)
80CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
IEEE 802.15.4 CSMA-CA algorithm for wireless sensor networks operating in a
single-hop star topology mode to corroborate the accuracy of the model and opti-
mal network designs proposed in previous chapter. In particular, we measure the
channel utilization and communication reliability of the network given by the met-
rics: normalised channel throughput and packet delivery ratio. To do this, several
experimental trials are set up using a testbed of sensor nodes in an indoor envi-
ronment. Then, we analytically demonstrate that the CSMA-CA algorithm can be
enhanced for homogeneous data-intensive scenarios. We show that packet delivery
ratio and throughput could be improved if the sensor nodes use an uniform con-
tention window in every backoff attempt. The final validation is presented with a
testbed that uses the enhanced CSMA-CA scheme and compare the results with
standard IEEE 802.15.4 experimental trials.
The rest of the chapter is organized as follows: in Section 5.1, we present the
related work. In section 5.2, we explained the developed hardware and software,
and the measurement setup for the experimental trials. Section 5.3 present the
results for the saturated and unsaturated by comparing experimental values and
analytical predictions. In section 5.4, we formally introduce a new priority medium
access protocol for homogeneous data-intensive WSNs that is based on an uniform
CSMA-CA scheme (PRIMAC-Uniform). Finally, section 5.5 concludes the chapter
with some remarks.
5.1 Related Work
In the literature, we can find several analytical studies of the IEEE 802.15.4 CSMA-
CA algorithm. In general, all of these models require a number of simplifications and
conventional assumptions, especially regarding the transmission over the wireless
channel. These assumptions could generally be considered of hard nature for real
implementations, i.e. an error-free wireless medium, full range of communication
between all nodes, absence of the hidden and exposed node problems. Among those
![Page 106: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/106.jpg)
5.1. RELATED WORK 81
models, we could include our own study in [64] where we find the channel utilization
for single-hop star WSNs under saturated and unsaturated conditions. In the model,
the saturated condition refers to a situation where each node has always backlogged
packets awaiting for transmission, whilst in unsaturated condition, packets arrive
at each node according to a Poisson process such that a node has a period of time
when its queue is empty. For the experimental trials, we consider again saturated
and unsaturated conditions.
Despite of the extensive industry acceptance of the IEEE 802.15.4 standard, there
exist a limited number of experimental trials in the literature searching for its max-
imum performance limits. Lee made a preliminary evaluation of the IEEE 802.15.4
MAC protocol in [50] by measuring the throughput, packet delivery ratio and re-
ceived signal strength indication (RSSI) in a single-hop star topology network. The
findings showed that the highest achievable normalised channel throughput is 62%
when there is only one active node and also that delivery ratio degrades rapidly by
increasing the network size. These experiments consisted of a maximum number of
4 nodes and the analysis did not include enhancement recommendations. Ferrari
et al. [25] compared the empirical performance of IEEE 802.15.4 MAC protocol
with a proprietary Z-Wave protocol for WSNs in indoor scenarios. The results were
obtained in terms of throughput, RSSI and delay. They found that the experimen-
tal values are in good agreement with simulations in Opnet [68]. Moreover, the
maximum achievable throughput in a single-hop link was only 32 Kbps out of 250
Kbps in the presence of maximum offered load, this is, saturated conditions.
Hengstler [34] deployed a wireless image sensor network for distributed surveillance
using a compliant IEEE 802.15.4 radio module, the Texas Instrument CC420 [92].
Initially, the testbed could achieve up to a maximum of 89.6 Kbps in indoor single-
hop star scenarios. Due to these low rates, the authors proposed enhancements for
the MAC protocol such as the use of reduced number of acknowledgement packets.
However, they do not consider the optimization of the CSMA-CA algorithm by
![Page 107: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/107.jpg)
82CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
choosing different parameter settings that could reduce latency for the multime-
dia packets whilst keeping the same level of delivery ratio and normalised channel
throughput.
Anastasi et al. [6] introduced the concept of MAC unreliability to describe a prob-
lem that arises in IEEE 802.15.4 WSNs with periodic traffic and active power man-
agement that causes very low packet delivery ratio. They proposed to increase the
reliability, by setting the maximum recommended values given by the specification
[93] for every CSMA-CA parameter, at the expense of high latency and thus low
throughput. In contrast to Anastasi et al., the effect of active power management
is not considered in our experiments, however, we could still show that better reli-
ability could be achieved for WSNs under saturated conditions.
5.2 Performance Experiments
In this section, we describe the experimental trials that we carried out to evalu-
ate the performance of the IEEE 802.15.4 CSMA-CA algorithm in beacon-enabled
WSNs. In particular, we aim at measuring normalised channel throughput and
packet delivery ratio for networks with a number of 8 to 14 nodes under saturated
and unsaturated conditions. Beacon-enabled mode is adopted instead of nonbeacon-
enabled mode because the first could provide better performance for the metrics
of interest. This is due to the reduced probability of collision in a slotted protocol
where nodes transmit in a synchronize fashion.[54].
5.2.1 System Design
Our wireless sensor nodes are formed with an ATMEL ATZB-900-BO ZigBitR 900
MHz Wireless Module. The ATZB module is composed by an ATmega1281V mi-
crocontroller and an AT86RF212 RF transceiver, which complies with physical and
![Page 108: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/108.jpg)
5.2. PERFORMANCE EXPERIMENTS 83
AVR Dragon
Programmer
Power Supply
PC Serial
Interface
Node
Figure 36: Wireless Sensor Node Hardware
medium access control specifications of the IEEE 802.15.4 standard, and addition-
ally offers the capability for developing customized MAC protocols. We designed a
board for mounting the ATZB module as shown in Fig. 36. This board provides
a port for programming, a BNC port for connecting a monopole antenna and 20
pins for powering and accessing the I/O of the microcontroller. In the following we
will refer to the board-mounted ATZB module as the node. The most important
wireless features of our nodes include adjustable output transmission power up to
10 dBm, high receive sensitivity of -110 dBm, over 6 km of outdoor line-of-sight
range and operation in the 868/915 MHz band.
For the software framework, we used the IEEE 802.15.4 MAC C library offered by
ATMEL in [8] in order to implement the IEEE 802.15.4 CSMA-CA algorithm and
the application layer routines needed for controlling the nodes. The library provides
a basic set of resources that enables the re-programming of all protocols atop the
physical layer allowing the design of tailored applications and optimization of the
algorithms. The compiled code was downloaded onto the nodes through a AVR
Dragon programmer [7], as seen in Fig. 36.
![Page 109: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/109.jpg)
84CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
PHY Protocol Data Unit (PPDU)
Preamble Sequence SFDFrame
LengthPHY Payload
5 octets
Synchronization Header (SHR)
1 octet
(PHR)
max. 127 octets PHY Payload
PHY Service Data Unit (PSDU) = MAC Protocol Data Unit (MPDU)
Frame
Control
2 octets
(FCF)
Sequence
Number
1 octet
Destination
PAN ID
2 octets
Destination
Address
2 octets
Source
Address
2 octets
MAC Payload
max. 116 octets
FCS
2 octets
CRC-16
Figure 37: PHY And MAC Packet Structure
Using the IEEE 802.15.4 standard as a basis, we developed two different types of
devices: a Personal Area Network (PAN) coordinator and a node. The features
available in the PAN coordinator includes creation of a network, association of sen-
sor nodes, beacon broadcast, and it could also adjust the CSMA-CA parameters
of nodes, provide clock synchronization and relay the received data to a gateway,
in this case, a computer connected via serial port. To do so, we developed a serial
interface board around a MAX3232 transceiver [58], see in Fig 36. The nodes are
capable of joining a network administrated by a PAN coordinator, synchronizing
their clocks and setting new CSMA-CA parameters upon the reception of a bea-
con, and operating according to the IEEE CSMA-CA algorithm for beacon-enabled
WSNs in order to transmit data packets to the coordinator.
The structure of the physical layer packet consists of a synchronization header
(SHR), a PHY header (PHR) and PHY service data unit (PSDU), as seen in Fig.
37. The PHR field denotes the length of the PSDU, which is between 1 and 127
octets. The PSDU contains the MAC protocol Data unit (MPDU), which in turns
consists of several MAC header fields, a payload and a frame Check Sequence (FCS).
Since we adopt short addressing, the MAC payload length could go from 1 to 116
octets. According to IEEE 802.15.4 standard, the physical layer is based on the
Direct Sequence Spread Spectrum (DSSS) spreading technique and provides a total
of 27 operational frequencies: 16 channels in 2.4 GHz, 10 channels 915 MHz and
![Page 110: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/110.jpg)
5.2. PERFORMANCE EXPERIMENTS 85
Nodes
Coordinator
Figure 38: Network Setup Deployment
1 channel 868 MHz. The modulation and nominal data rate of each band are 250
Kbps using Orthogonal Quadrature Phase Shift Keying (OQPSK) at 2.4GHz, 40
Kbps using Binary Phase Shift Keying (BPSK) at 915 MHz, and 20 Kbps using
also BPSK at 868MHz. The range of communication was original intended for
tens of meters which corresponds to a limited personal operating space, however,
commercial 802.15.4 radio modules reach up to few kilometers [9].
5.2.2 Measurement Setup
We arranged a single-hop network with star topology consisting of N nodes and
one coordinator in an indoor environment. The nodes are placed at 1 meter from
the coordinator, and within 0.2 to 1.8 meters from each other, see Fig. 38. Due
to the close proximity between the nodes, the output transmission power is set to
minimum, this is -11 dBm. The measurement setup guarantees that all nodes are
within range of communication, and therefore, it allows us to evaluate the maximum
performance of the MAC protocol. The wireless communication is established on
the 915 MHz band using a Binary Phase-Shift Keying (BPSK) modulation scheme of
maximum 40 Kbps data transmission rate and a backoff slot duration of 2 (ms/slot).
This backoff duration value was chosen in order to accommodate ten octets per
![Page 111: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/111.jpg)
86CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
backoff slot as defined by the IEEE 802.15.4 MAC specification for the higher 2.4
GHz band. The superframe order and beacon order was set to 6, disabling the duty
cycle mechanism, but at the same time, allowing frequent time synchronization of
nodes. Acknowledgement packets are not requested to avoid over congestion and
higher transmission delays.
We performed two set of experiments with IEEE 802.15.4 in our testbed. In the first
experiment, i.e. saturation trial, each node attempts the continuous transmission of
1000 packets of a fixed length L upon the reception of a beacon from the coordinator,
where L denotes a physical packet length, this is, PHY PPDU. The nodes use the
default values of the IEEE 802.15.4 CSMA-CA parameters, as defined in [93], and
the experiment is repeated for several packet sizes. In the second experiment, refer
to as unsaturated trial, the packets are periodically generated in each node with a
constant time interval of rate λ (pkts/s). An important objective of this trial is to
contrast the performance of a network under periodic traffic with the corresponding
analytical predictions of our study [64] that models Poisson traffic in an equivalent
single-hop star scenario. Similarly to previous trial, each node attempts to transmit
1000 packets of fixed length L whilst using the default values of IEEE 802.15.4
CSMA-CA parameters.
5.3 Experimental Results
In this section, we present the results of the two experimental trials. In particular,
we will measure the normalised channel throughput S and the packet delivery ratio
Ps. Note that normalised channel throughput S at the MAC layer is the portion
of time that the channel has been used for successful transmissions and can be
measured as
S =ApktsL
Tend − Tstart
(32)
whereApkts denotes the number of received packets in the coordinator, and Tstart and
Tend are the starting and ending time of the trial, respectively. The packet delivery
![Page 112: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/112.jpg)
5.3. EXPERIMENTAL RESULTS 87
0 2 4 6 8 10 12 140.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
CH
AN
NE
L TH
RO
UG
HP
UT
S
LENGTH OF PACKET L (SLOTS)
Ana N=10Exp N=10
Figure 39: S For Saturated Trial
ratio, referred as Ps, is also a metric of interest that represents the probability that
the coordinator receives a packet successfully, and is given by
Ps =Apkts
Gpkts
, (33)
where Gpkts accounts for the total number of packets generated by the nodes.
5.3.1 Saturated Trial
In this trial we create a network size of 10 nodes that are configured to use the
default IEEE 802.15.4 parameters: macMinBE=3, macMaxBE=5 and M=5. The
performance metrics are measured for packet lengths in the range of 2 to 12 slots.
The average and maximum absolute deviation values of S and Ps are calculated over
10 independent replicas. Then, a comparison between the experimental normalised
channel throughput and packet delivery ratio, and the corresponding analytical
metrics is shown in Fig. 39 and Fig. 40, respectively. The analytical values,
denoted as Ana in the figures, are obtained from the fixed-point solution established
by equations (17), (16), (14) and (10) proposed in [64] and presented in the previous
chapter.
![Page 113: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/113.jpg)
88CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
0 2 4 6 8 10 12 140.1
0.2
0.3
0.4
0.5
0.6P
AC
KE
T D
ELI
VE
RY
RA
TIO
P s
LENGTH OF PACKET L (SLOTS)
Ana N=10Exp N=10
Figure 40: Ps For Saturated Trial
Fig. 39 shows that the experimental normalised channel throughput of an indoor
network matches very closely to the theoretical expected values. Therefore, we
can confirm that the adopted modeling assumptions that consider an error-free
wireless channel and neglect the negative effects of hidden terminal and exposed
terminal for indoor networks with nodes in close proximity are suitable. Fig. 40
also corroborates that the experimental packet delivery ratio follows the theoretical
expectation with a negligible deviation of only 0.04. Finally, notice that the default
parameter values of the IEEE 802.15.4 specification limits the utilization of the radio
capacity, specifically, up to 57 percent in this network setting. As a consequence,
it is not recommendable to design a network that operates with default parameters
due to poor channel utilization and packet delivery ratio.
5.3.2 Unsaturated Trial
This trial considers a network size of 10 nodes under unsaturated conditions with
packets arriving periodically, the test range is from 0.5 to 13 (pkts/s), and we set
macMinBE=3, macMaxBE=5, M=5, and L = 12 slots, or equivalently LLoad =
![Page 114: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/114.jpg)
5.3. EXPERIMENTAL RESULTS 89
0 2 4 6 8 10 12 140
0.1
0.2
0.3
0.4
0.5
0.6
0.7
CH
AN
NE
L T
HR
OU
GH
PU
T S
PACKET ARRIVAL RATE λ (pkts/s)
Ana N=10,L=12
Exp N=10,L=12
Sopt
Figure 41: S For Unsaturated Trial
824bits. For each packet arrival rate, we performed 10 independent replicas over
which we calculate the average value and the maximum absolute deviation of the
metric. The experimental S and Ps ratio are compared with the analytical counter-
parts extracted from equations (17), (16), (14) and (8), however, the latter metrics
correspond to networks where packets arrive at each nodes according to a Poisson
process of rate λ rather than periodic traffic as implemented in these experiments.
Nevertheless, Fig. 41 shows a very accurate match between Poisson analytical pre-
dictions and experimental results for indoor WSNs with nodes in close proximity,
confirming that the modelling of Poisson traffic approximates to the realistic peri-
odic traffic in this experiment.
In addition, we can observe in Fig. 41 that the optimal normalised channel through-
put, denoted as Sopt, is reached at an given arrival rate (5.25 pkts/s when N=10)
and then decreases as the arrival rate increases. This situation occurs because the
traffic demand surpasses the radio capacity. Given that the maximum data trans-
mission rate is 40 Kbps. In a network of 10 nodes, we have that the maximum
data rate possible for each node is 40Kbps10nodes
= 4Kbps when equally distributed. Since
each packet has a MAC load of 824 bits and an overhead of 136 bits, then it is not
![Page 115: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/115.jpg)
90CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
0 2 4 6 8 10 12 140
0.2
0.4
0.6
0.8
1D
ATA
DE
LIV
ER
Y R
ATI
O P s
PACKET ARRIVAL RATE λ (pkts/s)
Exp macMinBE=3,macMaxBE=5,M=5Exp macMinBE=3,macMaxBE=3,M=5Exp macMinBE=8,macMaxBE=8,M=5
Figure 42: Ps For Various Parameters In N=10,L=12
possible to accommodate packet arrival rates that exceed more than 4000bps960bits
= 4.16
pkts without deteriorating the normalised channel throughput and without buffer-
ing. For the IEEE 802.15.4 CSMA algorithm, the maximum normalised channel
throughput is reached near 5.25 pkts/s instead of 4.16 pkts because many packets
get discarded after M attempts.
5.4 PRIMAC-Uniform: Uniform CSMA-CA Scheme
In this section, we consider the performance of two different CSMA-CA schemes un-
der saturated conditions. The first one uses the binary exponential backoff scheme
of the IEEE 802.15.4 standard with the default parameter values, in which the con-
tention window is increased by a factor of 2 after every failed transmission attempt.
For the second type of setting, we propose to employ an uniform backoff access
method, in this case, CW is a constant and fixed value for all the M transmission
attempts, and thus the average backoff period becomes b=CW/2 in each attempt.
This proposal is a medium access protocol for homogeneous data-intensive that we
will refer in the following as priority MAC uniform (PRIMAC-Uniform).
![Page 116: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/116.jpg)
5.4. PRIMAC-UNIFORM: UNIFORM CSMA-CA SCHEME 91
0 2 4 6 8 10 12 140
0.1
0.2
0.3
0.4
0.5
0.6
0.7
CH
AN
NE
L TH
RO
UG
HP
UT
S
PACKET ARRIVAL RATE λ (pkts/s)
Exp macMinBE=3,macMaxBE=5,M=5Exp macMinBE=3,macMaxBE=3,M=5Exp macMinBE=8,macMaxBE=8,M=5
Figure 43: S For Various Parameters In N=10,L=12
Traditionally, it is well-known that long contention windows in CSMA-based MAC
protocols improves the reliability of the network in terms of Ps, as seen in Fig. 42
for the setting (macMinBE=macMaxBE=8). However, this improvement comes at
the cost of lower channel utilization, as seen in Fig. 43. Now, remember from the
unsaturated trial in subsection 5.3.2 that Sopt is reached near a λ=5 (pkts/s) when
N=10, and after that point, S and Ps decrease. Since, this point determines the
maximum transmission capacity, we propose to find a general uniform backoff period
b such that network saturates at around 5 (pkts/s). By doing this, we guarantee
the best achievable performance of the CSMA-CA mechanism for a network that
inevitably operates under saturated conditions.
We found an exact solution for b in equation (30) of subsection 4.6.3. If we replace
equ. (24) into equ. (30), the following expression is obtained
b = ⌈(N − 1)(L+ 1)√2L+ 3− 1
+ (L+ 2)(1− γ)− δγ⌉, (34)
where the sensing failure γ and average number of CCA per attempt δ are given by
γ ≈(√2L+ 3− 1)
[1− (N−2)(
√2L+3−1)
2(N−1)(L+1)
](√2L+ 3− 1)
[1− (N−2)(
√2L+3−1)
2(N−1)(L+1)
]+ 1
, (35)
![Page 117: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/117.jpg)
92CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
δ = 1 + (1− γ)
2− (1−
√2L+ 3− 1
(N − 1)(L+ 1)
)N−1 . (36)
Although, equation (34) can guarantee the optimal normalised channel throughput
Sopt, its implementation potential is limited since it requires full knowledge of N
and L. Therefore, we propose in this chapter to use a suboptimal approach for
PRIMAC-Uniform, which consists in choosing a fixed backoff period, bN , for a
range of network sizes [NL, NH ], as described in Alg. 2.
Algorithm 2 Find bN given L and range [NL, NH ]
Require: NH > NL
Require: SubOptbest = 0for N = NL;N ≤ NH ;N ++ doCalculate b according to (34)Calculate saturated throughput for NL and NH using CSMA-CA of fixedCW=2b and M=5. Denote results as Suni(NL) and Suni(NH)
Calculate SubOptite =Suni(NL)Sopt(NL)
+ Suni(NH)Sopt(NH)
if SubOptite > SubOptbest thenbN = bSubOptbest = SubOptite
end ifend forCalculate saturated throughput for NL and NH using CSMA-CA with IEEE802.15.4 default parameters. Denote results as Sieee(NL) and Sieee(NH)
Ensure: Suni(NL)Sopt(NL)
> Sieee(NL)Sopt(NL)
and Suni(NH)Sopt(NH)
> Sieee(NH)Sopt(NH)
Note in Fig. 44 that the use of uniform backoff periods (bN=8,bN=10 and bN=12)
significantly improve the relation S/Sopt for saturated networks. To evaluate this,
we conducted experiments with several networks sizes, L=12, and bN=10, which was
obtained from Alg. 2. Fig.45 and Fig. 46 show a comparison between the proposed
uniform scheme, IEEE 802.15.4 specification with default parameters and the opti-
mal point of operation of the CSMA-CA mechanism. Notice that PRIMAC-Uniform
outperforms the standard in terms of S and Ps. In contrast to the optimal designs
in previous chapter, the adaptive scheme approaches to the optimal behaviour of
CSMA-CA though N is unknown.
![Page 118: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/118.jpg)
5.4. PRIMAC-UNIFORM: UNIFORM CSMA-CA SCHEME 93
6 8 10 12 14 16 18 200.5
0.6
0.7
0.8
0.9
1
NETWORK SIZE N (NODES)
S/S
opt
IEEE 802.15.4b
N=8
bN=10
bN=12
Figure 44: Analytical S/SoptRatio
NETWORK SIZE N (NODES)6 8 10 12 14
CH
AN
NE
L TH
RO
UG
HP
UT
S
0.5
0.55
0.6
0.65
0.7
0.75
Ana Sopt
Exp Ssat
PRIMAC-Uniform bN=10
Exp Ssat
IEEE 802.15.4
Figure 45: S For PRIMAC-Uniform And IEEE 802.15.4 with Default Parameters
![Page 119: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/119.jpg)
94CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
6 7 8 9 10 11 12 13 140.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
NETWORK SIZE N (NODES)
PA
CK
ET
DE
LIV
ER
Y R
ATI
O P s
Ana Ps optExp Ps PRIMAC−Uniform bN=10Exp Ps IEEE 802.15.4
Figure 46: Ps For PRIMAC-Uniform And IEEE 802.15.4 with Default Parameters
5.5 Conclusion
The most important contribution of this chapter is PRIMAC-Uniform, which is a
medium access protocol for homogeneous data-intensive WSNs. PRIMAC-uniform
is based on an enhanced CSMA-CA scheme that manages to improve the packet
delivery ratio whilst keeping high levels of throughput for data-intensive WSNs un-
der saturated conditions by opting for a constant and fixed contention window in
the M transmission attempts of a packet. Additionally, we developed a testbed of
wireless sensor network to evaluate the performance of the CSMA-CA algorithm
that is defined for the IEEE 802.15.4 MAC protocol. We consider two type of traf-
fic conditions: saturated and unsaturated. We found an excellent correspondence
between an analytical model of the IEEE 802.15.4 CSMA-CA algorithm and exper-
imental results in an indoor scenario where nodes operate in close proximity using
a Binary Phase-Shift Keying (BPSK) modulation on the 915 MHz band. Moreover,
we showed that packet arrivals based on a Poisson process approximates to periodic
traffic in the considered WSN settings under unsaturated conditions. In particular,
![Page 120: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/120.jpg)
5.5. CONCLUSION 95
we found that the channel utilization and communication reliability are not opti-
mal for networks with both saturated and unsaturated conditions when the default
parameters of the CSMA-CA algorithm are used.
![Page 121: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/121.jpg)
96CHAPTER 5. ENHANCED CSMA-CA FOR HOMOGENEOUS CONDITIONS
![Page 122: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/122.jpg)
Chapter 6
A Priority MAC Protocol for
Data-Intensive Networks
We have found in the previous chapters that data-intensive applications with
unpredictable and event-based traffic are feasible using sensor nodes of lim-
ited resources in terms of processing power and wireless data transfer rates. We have
shown that the use of an optimal IEEE 802.15.4 CSMA-CA scheme is a step closer
to achieve the next generation of wireless sensor networks that have homogeneous
data traffic conditions. However, the proposed solutions do not provide means for
prioritising the access of special sensor nodes in heterogeneous data-intensive WSNs.
With this consideration in mind, we define a new contention-based medium access
control protocol in this chapter that could achieve service differentiation between
scalar and data-intensive nodes, and guarantees near-optimal normalised channel
throughput.
The characteristics that we require in our new priority MAC (PRIMAC) protocol
are:
1. Low Delay Access. Sensor nodes require rapid access to their sink, and there-
fore an un-scheduled CSMA is the preferable access method.
2. Differentiated QoS. Different levels of quality of service for sensor nodes could
97
![Page 123: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/123.jpg)
98CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
be achieved using different access attempt profile in the nodes.
3. Node Type Selection. The priority nodes can be assigned during design or
actively selected by the network coordinator. The selected data-intensive
nodes have potentially higher resources in terms of battery and processor
capacity.
4. Maximum Resource Use. To implement an optimal medium access strategy
is still fundamental since the radio transmission capacity is still limited.
The rest of the chapter is organized as follows: section 6.1 presents the motiva-
tion of our work including a review of existing QoS-aware MAC protocols. Section
6.2 introduces the PRIMAC protocol. In section 6.3, we describe the differenti-
ated access strategy of scalar and data-intensive nodes. In subsection 6.3.3, we
evaluate the performance of the PRIMAC protocol under saturated conditions in
terms of throughput, packet delivery ratio and delay. Subsection 6.3.4 presents the
differentiated access strategy for high priority nodes. Section 6.4 compares the re-
sults obtained for PRIMAC with the widely adopted IEEE 802.15.4 MAC protocol.
Finally, Section 6.5 concludes the chapter with some remarks.
6.1 Motivation
CSMA-CA has demonstrated to be an effective mechanism to distributively share
a common wireless channel amongst uncoordinated devices. However, CSMA re-
quires mutually exclusive transmissions. The mutual transmission is achieved by
distributively coordinating the transmissions of different sensors mainly by means
of two mechanisms. First, the random access mechanism contributes to distribute
the medium access attempts of sensors to different time instances, while carrier
sense mechanisms helps to reduce the probability of collisions. Collisions are fur-
ther reduced by having time synchronization with respect to the coordinator and
the introduction of slotted communication where every node could only start the
![Page 124: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/124.jpg)
6.2. PRIMAC PROTOCOL 99
transmission of a packet at the beginning of a slot. Moreover, the use of transmis-
sion opportunities windows could reduce even more the probability of collision, and
hence, can accommodate more packets in the channel. This makes the communica-
tion achieve higher levels of throughput and reduces the packet latency.
To obtain a better understanding why the requirements of data-intensive WSNs
could not be satisfied by the existing protocols, we evaluated the performance limits
of the IEEE 802.15.4 standard for WSNs in the previous chapters. A comparison
between the optimal IEEE 802.15.4 protocol and PRIMAC is presented in section
6.4 where we show that our new PRIMAC protocol outperforms the recommended
standard.
6.2 PRIMAC Protocol
In this section, we introduce the features of the Priority MAC protocol. PRIMAC
provides service differentiation per node for single-hop networks. Depending on the
traffic priority, a network can be classified in two type of nodes: data-intensive and
scalar nodes. Data-intensive nodes, referred to in the following as DI nodes, carry
higher priority traffic that need to be transmitted with low delay, and demands
high normalised channel throughput. The scalar nodes transmit regular packets of
smaller size that do not require rapid end-to-end delivery. The protocol is based on
a time slotted contention access mechanism with an adaptive contention window
size and non-uniform probability distribution of transmitting in each slot within
the window.
The objective of our protocol is to guarantee the delivery of data packets with
reduced access delay. To do so, we adopt a non-uniform probability distribution of
transmitting in each slot within the contention window that works independent of
the number of nodes in the network. Specifically, we find the contention window
size that satisfies minimal collision probability between the nodes of the network
and also ensures low access delay. In general, we have found that a large window
![Page 125: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/125.jpg)
100CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
size reduces the collision probability, however at the expense of normalised channel
throughput and delay in the successful reception of packets.
A node with a pending packet picks a slot to attempt transmission, denoted as
Slot(CWw) where |Slot(CWw)| < |CW |, according to a non-uniform probability
distribution chosen to reduce the likelihood of packet collisions. Before transmission,
the node senses for any ongoing transmission in any slot previous to Slot(CWw). If
the assessment finds a busy medium, the node cancels the attempt and restarts the
transmission process by choosing a new Slot(CWw). The new contention window
begins after the end of the last interfering packet transmission plus the size of fixed
acknowledgement packet and one more slot considered for processing turn-around-
time. This re-attempt process is carried out until the packet is finally transmit-
ted. If the assessment finds a clear medium, the node starts sending the packet in
Slot(CWw). Upon completion, the node waits up to one slot for the reception of an
acknowledgement from the receiver. If the acknowledgement packet is not received,
the nodes could re initiate the transmission process for the same packet up to a
maximum of three attempts (max retransmission = 3).
In the following subsection, we revisit a collision minimizing method proposed in
[90]. Using the solution found by the authors, we evaluate the impact of the con-
tention window size on the normalised channel throughput and packet access delay
of a single-hop network with all nodes in range of communication. Based on Tay’s
method [90], we propose a network-independent probability distribution that opti-
mize our two metrics of interest while keeping a minimum level of collision prob-
ability. Our proposal is different from the suboptimal minimizing proposal of Tay
because we suggest a generic distribution that could slightly outperform the mini-
mizing method when it is applied to sensor network with data-intensive data. Then,
we propose the use of a steeper attempt probability distribution for high priority
nodes. We will demonstrate that this modification provides low access delay for DI
nodes with no impact on the collision probability, and thus network packet delivery
ratio.
![Page 126: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/126.jpg)
6.2. PRIMAC PROTOCOL 101
Algorithm 3 PRIMAC Functional Description
Require: Att=1 //Set Initial Packet Attempt Counter1: Sense channel idleness during current Slot(c)2: if Slot(c) = Busy then3: wait(Busy) and increment(Slot(c)) accordingly
// Wait until channel becomes idle4: wait(ACK+TurnT ime) and increment(Slot(c)) accordingly
// Wait for acknowledgement Packet5: end if6: Slot(CW1)=Slot(c) + 1 //Set next slot as first slot of CW7: Calculate Slot(CWw) according to [90]8: Sense channel idleness during period:
cc=[Slot(CW1), Slot(CWw − 1)]// cc denotes clear channel
9: wait(cc)10: if cc = Busy then11: retry(Return to step 1)12: end if13: Start Transmitting Packet in Slot(CWw)14: wait(ACK+TurnT ime) for ACK15: if ACK = Received then16: end(Packet Successfully Transmitted)17: else if Att ≤ max retransmission then18: Att=Att+ 1 //Increment attempt counter19: retry(Return to step 1)20: else if Attempt > max retransmission then21: end(Packet Dropped)22: end if
![Page 127: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/127.jpg)
102CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
6.3 Differentiated and Non-Uniform Medium Ac-
cess Strategy
6.3.1 Collision Minimizing
The active nodes of a network contend to transmit their packets within a window of
CW slots. The two possible outcomes of this attempt are: a successful transmission
or a collision between two or more nodes. In order to reduce collisions, the prob-
ability of attempting a packet transmission in each slot is progressively calculated
based on the current estimation of the number of active nodes. The mechanism
assigns a low probability for the first slot since it believes that the number of active
nodes could be large, and then the probability is increased in subsequent slots since
such belief is adjusted to a more accurate network size. A transmission attempt
is guaranteed in the last slot of CW if no other node previously attempt to trans-
mit. The authors of [90, 107] found a minimizing condition for this mechanism that
requires knowledge about the exact number of active nodes, a fixed CW size and
synchronization between nodes at the beginning of the contention window.
We incorporate the collision minimizing mechanism in our proposed algorithm 3.
Then, we evaluate the performance under saturated conditions, i.e. nodes have
always packets awaiting to be transmitted, in terms of normalised channel through-
put, packet delivery ratio and inter-successful packet transmission. The results are
presented in Fig. 47, Fig. 48 and Fig. 49, respectively. Notice from Fig. 48 that
packet delivery is practically guaranteed to 100%. This is not only achieved by the
collision minimizing strategy, but also by using retransmissions of unacknowledged
packets as described in our protocol. Fig. 47 and Fig. 49 show a direct relation
between S and Inter−Successful−PacketT ime. Moreover, the graphs show that
the best performance is determined by the size of the contention window and is
almost independent of the number of nodes N.
![Page 128: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/128.jpg)
6.3. DIFFERENTIATED ANDNON-UNIFORMMEDIUMACCESS STRATEGY103
3025
[ns-2 Simulation] PRIMAC Homogeneous L=12
20
CW (slots)
151050
10
0.6
0.45
0.5
0.65
0.55
20
N
S
Figure 47: Normalised Channel Throughput S Of PRIMAC - Homogeneous L=12For Different Network Sizes And Contention Windows
3025
CW (slots)
[ns-2 Simulation] PRIMAC Homogeneous L=12
2015
1050
10
N
0.995
0.99
0.985
0.98
1
20
Ps
Figure 48: Packet Delivery Ratio Ps Of PRIMAC - Homogeneous L=12 For Differ-ent Network Sizes And Contention Windows
![Page 129: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/129.jpg)
104CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
3025
CW (slots)
[ns-2 Simulation] PRIMAC Homogeneous L=12
2015
1050
510
N
15
6
8
10
4
14
12
20Inte
r-S
ucce
sful
-Pac
ket T
ime
(slo
ts)
Figure 49: Inter-Successful-Packet Time Of PRIMAC - Homogeneous L=12 ForDifferent Network Sizes And Contention Windows
6.3.2 Best Contention Window for PRIMAC
In this subsection, we aim to find a relation between CW and the maximum per-
formance of our new protocol for different network and packet lengths. Consider a
homogeneous network of N nodes where the packets are of a fixed length L slots
and each node has always packets in the buffer awaiting to be transmitted. All
nodes are in range of communication, preventing the adverse effects of the hidden
and exposed terminal. The medium access mechanism is driven by Alg. 3 and uses
the collision minimizing strategy derived in [90] and revisited in [107]. Moreover,
all the nodes are time synchronized and could only attempt transmission at the
starting edge of a slot.
Denote p(t) as the probability that a node attempts to grab slot t. Then, the
probability that there is only one node that grabs the earliest slot, refer to as
Probability of no collision Pnc, was given in [90] as:
Pnc =CW−1∑i=1
NP(i)
CW∑t=i+1
P(t)
N−1
, (37)
![Page 130: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/130.jpg)
6.3. DIFFERENTIATED ANDNON-UNIFORMMEDIUMACCESS STRATEGY105
In saturated networks, every packet transmission attempt describes a renewal cycle
Y . The cycle starts with the first slot t=0 of an attempt ends after an acknowl-
edgement packet is received or its corresponding timer is expired. Y includes an
average backoff period, denoted as AB, and the transmission of packet. Then, it
can be expressed as
Y = L+ ACK + AB, (38)
where AB is the average number of slots that passes since t=0 until any node
transmits its packet, this is
AB =CW−1∑i=1
j∏i=1
(1− P(t=i))N
. (39)
Within a cycle, the portion of time the nodes utilize for successful transmissions is
PncL. Therefore, a ratio between this portion of time and cycle Y results into the
normalised channel throughput of the network, i.e.
S =PncL
L+ ACK +∑CW−1
i=1
[∏ji=1(1− P(t=i))N
] . (40)
Giving Y , we can also find the average time spent between 2 successful packet
transmission from same or different network nodes, which we refer in the following
as Inter Successful PacketT ime, this is
Inter Successful PacketT ime =Y
Pnc
− L. (41)
To validate our model, we implemented the PRIMAC protocol on ns-2 version
2.33. Initially, we consider L = 2 and L = 12 slots since they are the minimum
and maximum packet lengths that are adopted by the IEEE 802.15.4. L = 2 and
L = 12 are equivalent to 20 and 120 bytes respectively. We also evaluated higher
packet lengths of L = 30, or 300 bytes, that we recommend to be used in DI nodes
for rapidly clearing buffered data. Fig 50 and Fig. 51 show the analytical results
obtained from the above equations for the case L=12 while Fig. 52 and Fig. 53 are
the corresponding simulation outputs. Notice that there is high accuracy between
both analytical and simulation results with small discrepancy when network size
![Page 131: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/131.jpg)
106CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
3025
CW (slots)
20
[Analytical] PRIMAC Homogeneous L=02
1510
505
10
N
15
0.35
0.3
0.25
0.2
0.15
0.120
S
Figure 50: Analytical Normalised Channel Throughput S Of PRIMAC - Homoge-neous L=2 Slots For Different Network Sizes And Contention Windows
3025
CW (slots)
20
[Analytical] PRIMAC Homogeneous L=02
1510
505
10
N
15
0
10
15
5
20Inte
r-S
ucce
sful
-Pac
ket T
ime
(slo
ts)
Figure 51: Analytical Inter-Successful-Packet Time Of PRIMAC - HomogeneousL=02 Slots For Different Network Sizes And Contention Windows
![Page 132: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/132.jpg)
6.3. DIFFERENTIATED ANDNON-UNIFORMMEDIUMACCESS STRATEGY107
3025
[ns-2 Simulation] PRIMAC Homogeneous L=02
20
CW (slots)
151050
10N
0.1
0.4
0.3
0.2
20
S
Figure 52: Normalised Channel Throughput S Of PRIMAC - Homogeneous L=2Slots For Different Network Sizes And Contention Windows
3025
CW (slots)
[ns-2 Simulation] PRIMAC Homogeneous L=02
2015
1050
510
N
15
6
4
8
14
12
10
20Inte
r-S
ucce
sful
-Pac
ket T
ime
(slo
ts)
Figure 53: Inter-Successful-Packet Time of PRIMAC - Homogeneous L=2 Slots ForDifferent Network Sizes And Contention Windows
![Page 133: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/133.jpg)
108CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
3025
CW (slots)
[ns-2 Simulation] PRIMAC Homogeneous L=30
2015
1050
510
N
15
0.65
0.7
0.75
0.8
20
S
Figure 54: Normalised Channel Throughput S Of PRIMAC - Homogeneous L=30Slots For Different Network Sizes And Contention Windows
3025
CW (slots)
[ns-2 Simulation] PRIMAC Homogeneous L=30
2015
1050
510
N
15
10
8
16
14
12
20Inte
r-S
ucce
sful
-Pac
ket T
ime
(slo
ts)
Figure 55: Inter-Successful-Packet Time Of PRIMAC - Homogeneous L=30 SlotsFor Different Network Sizes And Contention Windows
![Page 134: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/134.jpg)
6.3. DIFFERENTIATED ANDNON-UNIFORMMEDIUMACCESS STRATEGY109
1 2 3 4 5 6 7 8 9 100
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
CW (slots)
PA
TT
Slot Attempt Probability Distribution
Optimal 3 NodesOptimal 20 NodesAvg between 3 and 20 Nodes
Figure 56: Attempt Probability Distribution For Networks Of 3 And 20 Nodes AndAverage Curve
is small. Although, we only show the figures for L=2, the analytical results also
extend for different values of L.
From Fig. 47, Fig. 52, and Fig. 54, we can observe that CW=10 slots is the best
choice for networks in the range of 2 to 20 nodes in single hop communication and
different packet lengths, L=2, 12 and 30 slots, since it maximizes the normalised
channel throughput and therefore minimizes the inter-successful packet time, as
seen in Fig. 53, Fig. 49 and Fig. 55
6.3.3 Node-Independent Attempt Distribution
We first propose to use a node-independent attempt probability distribution for all
networks where we set CW=10 slots. We suggest to use the average between the
exact PATT between 3 and 20 nodes, as seen in Fig. 56. The choice of such distri-
bution allows to reach a better normalised channel throughput for small network
sizes independently of the packet size, as seen in Fig. 57, and it is approximately
![Page 135: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/135.jpg)
110CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
Network Size2 4 6 8 10 12 14 16 18 20
S
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8[Analytical] PRIMAC Slot Attempt Probability Distributions
Exact L=20Exact L=120Exact L=300Approx L=20Approx L=120Approx L=300
Figure 57: S For CW = 10 And Two Optimal Slot Attempt Probability Distribu-tions: Exact and Average Curve
equal to the values of the exact solution.
Suboptimal probability distributions were also proposed in [90] and [107] for the
case where the number of active nodes is unknown. However, they are not suitable
for our scenario because they were intended for a higher number of nodes, in the
range of thousand of nodes, and a contention window of 32 slots. In contrast,
we found that higher performance is achieved when CW is around 10 slots and
therefore, we propose an alternative probability distribution which addresses the
specific requirements of data-intensive applications.
6.3.4 Node-dependent Distribution for High Priorities DI
Nodes
Consider a heterogeneous network of N nodes where nodes are divided in two levels
of QoS: DI nodes with high access priority and nodes with regular access priority.
High priority implies that the node must be provided with advantaged access to
![Page 136: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/136.jpg)
6.3. DIFFERENTIATED ANDNON-UNIFORMMEDIUMACCESS STRATEGY111
Network Size2 4 6 8 10 12 14 16 18 20
Net
wor
k A
vera
ge In
ter-
Suc
cesf
ul-P
acke
t Tim
e (s
lots
)
4
6
8
10
12
14
16
18[Analytical] PRIMAC Slot Attempt Probability Distributions
Exact L=20Exact L=120Exact L=300Approx L=20Approx L=120Approx L=300
Figure 58: Inter-Succesful-Packet Time For CW = 10 And Two Optimal SlotAttempt Probability Distributions: Exact and Average Curve
the common wireless medium, however it does not guarantee that every contention
attempt of a high priority node will be successful. The selection of the high priority
nodes is determined by the coordinator of the network which could permanently
assign the role to a specific node or rotate the privilege between the different nodes
of the network. The node selection should be published by the sink of the network
using a periodic beacon.
In a novel approach, PRIMAC introduces the use of node-dependent attempt distri-
butions combined with differentiated contention window lengths in order to obtain
the differentiated node access strategies. First, PRIMAC attains to provide rapid
access for the high DI nodes with the use of shorter contention windows. A node
with a contention window smaller that the network CW will normally attempt to
access the medium sooner than the rest of nodes, and thus its packet could poten-
tially be received in the sink prior to other traffic. Secondly, PRIMAC achieves
high packet delivery ratio in the network by using the collision minimizing strategy
derived in the section 6.3.2. In the case of the high priority nodes, PRIMAC utilizes
![Page 137: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/137.jpg)
112CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
1 2 3 4 5 6 7 8 9 100
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
CW (slots)
PA
TT
Slot Attempt Probability Distribution
High DI Priority NodeOther Nodes
Figure 59: Attempt Probability Distribution For Heterogeneous Network
a different probability of attempt that maintains the near-optimal performance nor-
malised channel throughput while giving a rapid medium access to the high priority
nodes.
In the previous section we found that a CW=10 slots provides the best results for
networks in the range of 3 to 20 nodes. In this section, we propose to use CW < 10
on high DI priority nodes in order to guarantee a higher probability of transmission
for these special nodes. Using ns-2 simulations, we consider several contention
windows for high priority nodes and we found that a rapid increasing attempt
distribution of CW=5, as seen in Fig. 59, achieves the following performance level
1. Maintain a high level of packet delivery ratio,
2. Maximize the average normalised channel throughput,
3. Reduce the interval between successful packet transmissions.
Refer to Fig. 60, Fig. 61 and Fig. 62 for one high priority node, and Fig. 63, Fig.
64 and Fig. 65 for three high priority nodes.
![Page 138: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/138.jpg)
6.4. A COMPARISON: PRIMAC AND IEEE 802.15.4 113
0 5 10 15 200.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
N
S
[ns−2 Simulation] PRIMAC Heterogeneous − 1 High Priority Node
L=20L=120L=300
Figure 60: S - One High Priority DI Node
Let us consider having first one high priority DI node in a network of 20 sensors.
From Fig. 60 we can see that the normalised channel throughput stays constant at
the maximum level, however note in Fig. 61 that the inter-successful transmission
of the high priority DI node with ID=1 is much lower than the rest of the nodes
for the different considered packet lengths.
Likewise for the case with 3 high priority DI nodes (ID=1, ID=2 and ID=3) in
a network of 20 devices, Fig. 63, 65 show that the normalised channel throughput
and packet delivery ratio is still optimal while Fig. 64 demonstrates that the trans-
mission occurs sooner for the 3 high priority DI nodes. In this chapter, we omit
the graphs corresponding to 2 high priority DI nodes, however, we found a similar
behaviour.
6.4 A comparison: PRIMAC and IEEE 802.15.4
In section 6.2 we presented the performance behaviour of PRIMAC in a typical
WSN setting of up to 20 nodes. We have shown that PRIMAC reaches near-optimal
![Page 139: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/139.jpg)
114CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
0 5 10 15 200
200
400
600
800
1000
N
Inte
r−S
ucce
sful
−Pac
ket T
ime
(slo
ts)
[ns−2 Simulation] PRIMAC Heterogeneous − 1 High Priority Node
L=20L=120L=300
Figure 61: Inter-Successful-Packet Time Per Node - One High Priority DI Node
0 5 10 15 200.99
0.992
0.994
0.996
0.998
1
N
Ps
[ns−2 Simulation] PRIMAC Heterogeneous − 1 High Priority Node
L=20L=120L=300
Figure 62: Ps per Node - One High Priority DI Node
![Page 140: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/140.jpg)
6.4. A COMPARISON: PRIMAC AND IEEE 802.15.4 115
0 5 10 15 200.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
N
S
[ns−2 Simulation] PRIMAC Heterogeneous − 3 High Priority Nodes
L=20L=120L=300
Figure 63: S - Three High Priority DI Node
0 5 10 15 200
200
400
600
800
1000
N
Inte
r−S
ucce
sful
−Pac
ket T
ime
(slo
ts)
[ns−2 Simulation] PRIMAC Heterogeneous − 3 High Priority Nodes
L=20L=120L=300
Figure 64: Inter-Successful-Packet Time Per Node - Three High Priority DI Node
![Page 141: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/141.jpg)
116CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
0 5 10 15 200.92
0.93
0.94
0.95
0.96
0.97
0.98
0.99
1
N
Ps
[ns−2 Simulation] PRIMAC Heterogeneous − 3 High Priority Nodes
L=20L=120L=300
Figure 65: Ps Per Node - Three High Priority DI Node
normalised channel throughput under saturated traffic conditions for all the consid-
ered networks sizes. In contrast, we found in chapter 4 that the recommended IEEE
802.15.4 MAC protocol with default parameters cannot reach optimal operation un-
der saturated traffic conditions. Fig. 66 demonstrates that both unacknowledged
packet transmission, as studied in chapter 4, and acknowledged transmission of
IEEE 802.15.4 present a considerable performance degradation compared to the
behaviour of an optimal network, even when the biggest packet size is used (120
Bytes).
In general, we found that IEEE 802.15.4 requires the network to be under unsatu-
rated traffic conditions in order to achieve maximum normalised channel through-
put regardless of the number of nodes and packet sizes, as seen in Fig. 67. In
comparison, PRIMAC maintains near-optimal normalised channel throughput un-
der saturated conditions for all network and packet lengths, and furthermore, in
homogeneous and heterogeneous networks.
Similarly Fig. 68 shows that the maximum packet delivery ratio of IEEE 802.15.4
with default parameters can only be achieved under unsaturated conditions and
tends to be around 50%. In this case, PRIMAC drastically outperforms IEEE
![Page 142: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/142.jpg)
6.4. A COMPARISON: PRIMAC AND IEEE 802.15.4 117
2 4 6 8 10 12 14 16 18 20
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7
0.75
N
Net
wor
k C
hann
el T
hrou
ghpu
t S
IEEE 802.15.4 − L=120 Bytes (12 slots)
Default ACK NetworkDefault UNACK NetworkOptimal Network
Figure 66: Normalised Channel Throughput S For Acknowledged And Unac-knowledged IEEE 802.15.4 With Default Parameters Under Saturated Conditions,And Also The Optimal Channel Throughput Achievable In Networks Using IEEE802.15.4
24
68
1012
5
10
15
200.2
0.4
0.6
0.8
1
LENGHT OF PACKET L (slots)
Optimal S for unsatureated IEEE 802.15.4 Networks
NETWORK SIZE (Nodes)
CH
AN
NE
L TH
RO
UG
HP
UT
S
Figure 67: Optimal Normalised Channel Throughput Sopt Achievable Under Un-saturated Conditions And Using IEEE 802.15.4 Default Parameters
![Page 143: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/143.jpg)
118CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
2 4 6 8 10 12 14 16 18 200
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
N
P
IEEE 802.15.4 � L=120 Bytes (12 slots)
Default ACK Network
Default UNACK Network
Optimal Network
S
Figure 68: Packet Delivery Ratio Ps For Acknowledged And Unacknowledged IEEE802.15.4 With Default Parameters Under Saturated Conditions, And Also The Cor-responding Optimal Packet Delivery Ratio Achievable In Networks Using IEEE802.15.4
802.15.4 since the packet delivery ratio is close to 100% in homogeneous and het-
erogeneous networks, as seen in Fig. 48 and Fig. 62 respectively.
6.5 Conclusions
This chapter presented Priority MAC, PRIMAC, which is medium access control
protocol for homogeneous and heterogeneous data-intensive networks. PRIMAC is a
contention-based MAC protocol that outperforms the recommended IEEE 802.15.4
MAC scheme in terms of normalised channel throughput and packet delivery ra-
tio. In a novel approach, PRIMAC combines a collision minimizing and node-
independent contention window strategies to orchestrate the access to the common
wireless medium. The devised PRIMAC MAC scheme achieves differentiated qual-
ity of service amongst nodes in a heterogeneous network. We believe PRIMAC
![Page 144: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/144.jpg)
6.5. CONCLUSIONS 119
represents a contribution for the next generation of wireless sensor netwotks that re-
quire multimedia or critical high rate data transmissions while the radio transceivers
of nodes are still limited in terms of data bandwidth.
![Page 145: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/145.jpg)
120CHAPTER 6. A PRIORITYMAC PROTOCOL FORDATA-INTENSIVE NETWORKS
![Page 146: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/146.jpg)
Chapter 7
Conclusions
This thesis has presented a medium access control protocol and optimization tech-
niques for wireless sensor networks that are capable of addressing the requirements
of data-intensive applications. In the following we revisited the main contributions,
assumptions and limitations of the proposed solutions.
7.1 Summary of Contributions
We have addressed in this thesis the requirements of the next generation of data-
intensive wireless sensor networks at the medium access control level. We have
derived mathematical formulations and designed techniques that could be applied
to the standard IEEE 802.15.4 MAC protocol in order to optimise its performance.
We proposed IEEE 802.15.4 network designs that are feasible for homogeneous
data-intensive WSNs, i.e. applications where data is generated in big quantities in
every single node. We proposed a novel Priority MAC protocol that is specifically
designed for data-intensive networks of homogeneous and heterogeneous nature.
The new protocol uses optimal contention strategies in order to effectively access a
shared wireless medium.
The main sections and contributions are summarised below:
121
![Page 147: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/147.jpg)
122 CHAPTER 7. CONCLUSIONS
1. A model of the standard IEEE 802.15.4 medium access control protocol. This
model is based on a mean-field approach and captures the behaviour the IEEE
802.15.4 CSMA-CA algorithm under saturated and unsaturated traffic condi-
tions. It allows us to obtain fundamental network metrics such as normalised
channel throughput, packet delivery ratio and packet transmission delay, and
evaluate the network for a variety of packet arrival rates, network sizes and
packet lengths. Using the model we managed to derive a simple expression
for optimal throughput received at the sink in a network with star topology.
This mathematical expression provides the maximum achievable normalised
channel throughput in a WSN, and therefore it represents a considerable con-
tribution to the knowledge of IEEE 802.15.4 CSMA-CA algorithm.
2. A methodology to design Homogeneous Data-intensive WSNs. In this case, we
designed networks with optimal normalised channel throughput and demon-
strated howWSNs with data-intensive packet generation could be created. We
initially found that the carrier sense multiple access with collision avoidance
algorithm that was designed for IEEE 802.15.4 networks can be optimised
by choosing non-standard parameters. The optimization made possible data-
intensive wireless sensor networks with homogeneous saturated traffic condi-
tions. To do this, the network designer requires complete knowledge of the
packet length L, arrival rate λ, and the number of sensor nodes N in order to
create a network that operates at the best performance point. However, this
complete knowledge is not always available during the design phase, and in
particular the number of active nodes is unknown when an unexpected sensing
event occurs. Therefore, we proposed PRIMAC-Uniform which is an adaptive
CSMA-CA protocol that manages to improve the packet delivery ratio whilst
keeping high levels of throughput for data-intensive WSNs when the number
of active nodes are not known a priori, for instance, consider a building mon-
itoring application where a maximum number of nodes NTotal are deployed,
but only NActive nodes become active in an event, where NActive < NTotal.
![Page 148: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/148.jpg)
7.1. SUMMARY OF CONTRIBUTIONS 123
3. Experimental validation of the performance of optimal networks. We devel-
oped a testbed of wireless sensor network to evaluate the performance of the
CSMA-CA algorithm that is defined for the IEEE 802.15.4 MAC protocol.
We consider two types of traffic conditions: saturated and unsaturated. We
found an excellent correspondence between our analytical model of the IEEE
802.15.4 CSMA-CA algorithm and experimental results in an indoor scenario
where nodes operate in close proximity using a Binary Phase-Shift Keying
(BPSK) modulation on the 915 MHz band. We corroborated that the chan-
nel utilization and communication reliability are not optimal for networks
with both saturated and unsaturated conditions when the default parameters
of the CSMA-CA algorithm are used.
4. Propose PRIMAC which is a Priority MAC protocol that provides service dif-
ferentiation per node for wireless sensor networks with data intensive traffic.
Traditionally, the main design considerations of the first generation of WSNs
were energy efficiency, scalability, coverage, and low-data transmission. PRI-
MAC steps up to a higher level of quality of service with the inclusion of
network performance metrics such as throughput, reliable packet delivery,
latency, and weighted medium access per node. PRIMAC is designed for ho-
mogeneous and heterogeneous networks that are composed of regular scalar
nodes of low-data content and data-intensive nodes. The protocol is based
on a time slotted contention access mechanism with adaptive contention win-
dow size and non-uniform probability distribution of transmitting in each
slot within the window. PRIMAC guarantees the delivery of data packets
with reduced access delay. In a homogeneous network, the nodes access the
shared medium in a fair mode with every device having the same opportunity
to have a successful transmission. In a heterogeneous network, the protocol
implements a weighted access strategy that allows the critical nodes to have
priority in the access of the shared medium, this is achieved without diminish-
ing key network performance metrics such as normalised channel throughput
![Page 149: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/149.jpg)
124 CHAPTER 7. CONCLUSIONS
and packet delivery ratio. To our knowledge, PRIMAC is the first proto-
col for wireless sensor networks that combines the use of non-uniform access
probability distributions with adaptive contention windows to orchestrate a
weighted access strategy in heterogeneous network conditions.
7.2 Future Work
We proposed in this thesis a priority MAC protocol for heterogeneous networks and
PRIMAC-Uniform for homogeneous data-intensive WSNs. In general, both propos-
als are constrained by common limitations. Firstly, the proposals were designed for
networks with single-hop communication and star topology since we estimated that
the state-of-the-art wireless sensor devices are stringently resource limited in terms
of wireless data transmission rate, available energy, processing power and physi-
cal size. We found that is feasible to maximize the efficient usage of resources in
the single-hop star topology scenarios. Therefore, we established that most generic
data-intensive applications will be characterized by such network configuration. As
part of our future work, we plan to consider networks that demand data-intensive
traffic and multi-hop communication. We will consider a data gathering network
topology where we find a main sink that collects the data from all devices, scalar
nodes that senses the environment and relay nodes that forwards the data from the
nodes to the sink. In particular, we intend to evaluate the performance of PRIMAC
in such scenarios and introduce the use of PRIMAC priority sensor nodes as relay
devices. The multi-hop topology creates a number of challenges at the network
layer such as route formation, traffic load balancing and wireless signal propagation
phenomenons that need to be addressed. Some of these challenges have been con-
sidered in the existence literature [3]. Specifically, the research questions that we
will address includes
1. Guarantee end-to-end quality of service in the communication between scalar
sensors and the main sink.
![Page 150: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/150.jpg)
7.2. FUTURE WORK 125
2. Determine the best methods to achieve multiple route communication. We
would consider using multiple transmission frequencies and time schedule
transmission.
3. Find the data gathering limitations of a network that uses PRIMAC as its
primary medium access control protocol.
A second limitation of our study is to assume that the communication is half du-
plex with symmetrical wireless transmission links where every node is assumed to
be in range of communication with all others. In chapter 5 we carried out experi-
ments with real sensor devices that proved that the maximum normalised channel
throughput was achievable with optimal sensor networks when the nodes are in close
proximity. We also found the hidden and exposed terminal effects could appear if
the distance between the nodes increased. In the data gathering scenario that will
study in the future we expect to find a higher degree of adverse wireless transmission
conditions. To address these issues, we will evaluate the use of multiple channels for
the different data routes. In the literature, we could find studies on how to achieve
optimal normalised channel throughput by using different frequencies in a multiple-
hop network [39, 47, 48, 49, 81, 107] which considered CSMA-based protocols for
the MAC sublayer. In our case, we will evaluate the performance of PRIMAC which
is a CSMA-based protocol with priority access for designated nodes.
Finally, PRIMAC and PRIMAC-Uniform for homogeneous data-intensive WSNs
have been tested with sensor nodes whose radio transmission capability is still
limited at around 250kbps, and therefore we recommended to design optimal data-
intensive networks of up to 20 nodes. In the next phase, we will intend to remove
this limitation. We could achieve this objective by introducing a new generation of
wireless sensor devices that are less limited in terms of resources, and specifically
data transmission rate. Additionally, we consider that data-intensive applications
could be feasible by using multi-radio devices as it has been proposed in [5, 104] for
wireless mesh networks and multi-hop wireless networks.
![Page 151: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/151.jpg)
126 CHAPTER 7. CONCLUSIONS
PRIMAC has been the first step in the realisation of data-intensive wireless sensor
networks. The application scenarios where our medium access control protocol
could be used are numerous and we plan to extend that range to higher levels with
the introduction of multi-hop data gathering networks.
![Page 152: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/152.jpg)
Bibliography
[1] Ameer Ahmed Abbasi and Mohamed Younis. A survey on clustering algo-
rithms for wireless sensor networks. Computer Communications, Volume 30,
Number 14-15, pages 2826–2841, October 2007.
[2] Ian F. Akyildiz, Tommaso Melodia and Kaushik R Chowdhury. A Survey
on Wreless Multimedia Sensor Networks. IEEE Wireless Communications,
Volume 51, Number 4, pages 921–960, March 2007.
[3] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam and Erdal Cayirci.
A Survey on Sensor Networks. IEEE Communications Magazine, Volume 40,
Number 8, pages 102–114, August 2002.
[4] Jamal N. Al-Karaki and Ahmed E. Kamal. Routing techniques in wireless sen-
sor networks A survey. IEEE Wireless Communications, Volume 11, Number
December, pages 6–28, 2004.
[5] Mansoor Alicherry, Randeep Bhatia, Li Erran, Bell Laboratories and Lucent
Technologies. Joint Channel Assignment and Routing for Throughput Op-
timization in Multi-radio Wireless Mesh Networks. In The Eleventh Annual
International Conference on Mobile Computing and Networking MOBICOM
05, pages 58–72, 2005.
[6] Giuseppe Anastasi, Marco Conti and Mario Di Francesco. A Comprehensive
Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor
127
![Page 153: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/153.jpg)
128 BIBLIOGRAPHY
Networks. IEEE Transactions on Industrial Informatics, Volume 7, Number 1,
pages 52–65, 2011.
[7] ATMEL Corporation. AVR Dragon Programmer for 8-bit and 32-
bit AVR devices with On Chip Debug (OCD) capability. Available in
http://www.atmel.com.
[8] ATMEL Corporation. AVR2025: IEEE 802.15.4 MAC stack software. Avail-
able in http://www.atmel.com.
[9] ATMEL Corporation. ZigBit 700/800/900 MHz Wireless Modules ATZB-
900-B0. Available in http://www.atmel.com.
[10] Luigi Atzori, Antonio Iera and Giacomo Morabito. The Internet of Things: A
survey. Computer Networks, Volume 54, Number 15, pages 2787–2805, 2010.
[11] Lichun Bao and J.J. Garcia-Luna-Aceves. A New Approach to Channel Access
Scheduling for AdHoc Networks. In 7th ACM International Conference On
Mobile Computing and Networking MOBICOM 01, pages 210–221, 2001.
[12] Paolo Baronti, Prashant Pillai, Vince W. C. Chook, Stefano Chessa, Alberto
Gotta and Y. Hu. Wireless sensor networks: A survey on the state of the
art and the 802.15.4 and ZigBee standards. Computer Communications, Vol-
ume 30, Number 7, pages 1655–1695, May 2007.
[13] J. Benson, T. O’Donovan, P. O’Sullivan, U. Roedig, C. Sreenan, J. Barton,
A. Murphy and B. O’Flynn. Car-Park Management using Wireless Sensor
Networks. Proceedings of 31st IEEE Conference on Local Computer Networks,
pages 588–595, 2006.
[14] Dimitri P. Bertsekas and Robert Gallager. Data Networks. Prentice-Hall, Inc,
Upper Saddle River, NJ, USA, 2nd edition, 1992.
[15] Dimitri P. Bertsekas and John N. Tsitsiklis. Introduction to Probability.
Athena Scientific, 2nd edition, 2008.
![Page 154: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/154.jpg)
BIBLIOGRAPHY 129
[16] Giuseppe Bianchi. Performance Analysis of the IEEE 802.11 Distributed
Coordination Function. IEEE Journal On Selected Areas in Communications,
Volume 18, Number 3, pages 535–547, 2000.
[17] Bruno Bougard, Francky Catthoor, Denis C. Daly, Anantha Chandrakasan
and Wim Dehaene. Energy Efficiency of the IEEE 802.15.4 Standard in Dense
Wireless Microsensor Networks : Modeling and Improvement Perspectives. In
Proc. Design Automation and Test in Europe Conf., pages 196–201, 2005.
[18] Nourchene Bradai, Lamia Chaari Fourati and Lotfi Kamoun. New Analytical
Model for IEEE 802.15.6 Under Saturation Condition and Noisy Channel. In
9th International Symposium on Communication Systems, Networks & Digital
Sign (CSNDSP), pages 243–248, 2014.
[19] Jeffrey M. Capone and Ioannis Stavrakakis. Delivering QoS requirements to
traffic with diverse delay tolerances in a TDMA environment. IEEE/ACM
Transactions on Networking, Volume 7, Number 1, pages 75–87, 1999.
[20] Deji Chen, Mark Nixon and Aloysius Mok. WirelessHART Real-Time Mesh
Network for Industrial Automation. Springer, New York, New York, USA,
2010.
[21] Lei Chen and Wendi B Heinzelman. A Survey of Routing Protocols that Sup-
port QoS in Mobile Ad Hoc Networks. IEEE Network, Volume 21, Number 6,
pages 30–38, 2007.
[22] Robert B. Cooper. Introduction to Queueing Theory. Elsevier North Holland,
Inc., New York, New York, USA, 2nd edition, 1981.
[23] Ian Demirkol, Cem Ersoy and Fatih Alagoz. MAC Protocols for Wireless
Sensor Networks A Survey. IEEE Communications Magazine, Volume 44,
Number April, pages 115–121, 2006.
[24] Samina Ehsan and Bechir Hamdaoui. A survey on energy-efficient rout-
ing techniques with QoS assurances for wireless multimedia sensor networks.
![Page 155: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/155.jpg)
130 BIBLIOGRAPHY
IEEE Communications Surveys and Tutorials, Volume 14, Number 2, pages
265–278, 2012.
[25] G. Ferrari, P. Medagliani, S. Di Piazza and M. Martalo. Wireless Sensor
Networks: Performance Analysis in Indoor Scenarios. EURASIP Journal on
Wireless Communications and Networking, Volume 2007, pages 1–14, 2007.
[26] HART Communication Foundation. HART Field Communication Protocol
Specification Revision 7, 2007.
[27] Jianliang Gao, Jia Hu and Geyong Min. A New Analytical Model for Slotted
IEEE 802.15.4 Medium Access Control Protocol in Sensor Networks. 2009
WRI International Conference on Communications and Mobile Computing,
pages 427–431, January 2009.
[28] Donald Gross, John F. Shortle, James M. Thompson and Carl M. Harris.
Queueing Theory. John Wiley & Sons, Ltd, Hoboken, NJ, USA, 4th edition,
2008.
[29] Eren Gurses and Ozgur B. Akan. Multimedia Communication in Wireless
Sensor Networks. Annales Des Telecommunications, Volume 60, Number 7-8,
pages 878–900, 2005.
[30] Jianhua He, Zuoyin Tang, Hsiao-Hwa Chen and Shu Wang. An Accurate
Markov Model for Slotted CSMA/CA Algorithm in IEEE 802.15.4 Networks.
IEEE Communications Letters, Volume 12, Number 6, pages 420–422, June
2008.
[31] Jianhua He, Zuoyin Tang, Hsiao-Hwa Chen and Qian Zhang. An Accurate and
Scalable Analytical Model for IEEE 802.15.4 Slotted CSMA/CA Networks.
IEEE Transactions on Wireless Communications, Volume 8, Number 1, pages
440–448, January 2009.
[32] Wendi Heinzelman, Anantha P. Chandrakasan and Hari Balakrishnan. An
application-specific protocol architecture for wireless microsensor networks.
![Page 156: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/156.jpg)
BIBLIOGRAPHY 131
IEEE Transactions on Wireless Communications, Volume 1, Number 4, pages
660–670, October 2002.
[33] Wendi Heinzelman, Anatha Chandrakasan and Hari Balakrishnan. Energy-
efficient communication protocol for wireless microsensor networks. System
Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Confer-
ence on, Volume 00, Number c, pages 10 pp. vol.2, 2000.
[34] Stephan Hengstler, Daniel Prashanth, Sufen Fong and Hamid Aghajan. Mesh-
Eye : A Hybrid-Resolution Smart Camera Mote for Applications in Dis-
tributed Intelligent Surveillance. In ACM/IEEE International Conference on
Information Processing in Sensor Networks (IPSN ’07), pages 360–369, Cam-
bridge, USA, 2007.
[35] K. D. Huang, K. R. Duffy, D. Malone and D. J. Leith. Investigating the
Validity of IEEE 802 . 11 MAC Modeling Hypotheses. In 19th Int. Symp.
Personal, Indoor and Mobile Radio Comm, Volume 1, pages 1–5, 2008.
[36] Pei Huang, Li Xiao, Soroor Soltani, Matt W. Mutka and Ning Xi. The
Evolution of MAC Protocols in Wireless Sensor Networks: A Survey. IEEE
Communications Surveys & Tutorials, Volume 15, Number 1, pages 1–20,
2013.
[37] IEEE Std. 802.11. Part 11: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications. IEEE Pres, Number ISO/IEC DIS
8802-11, March 1999.
[38] Teerawat Issariyakul and Ekram Hossain. Introduction to Network Simulator
NS2. Springer Science+Business Media, LLC, New York, New York, USA,
2009.
[39] N. Jain, S.R. Das and A. Nasipuri. A multichannel CSMA MAC proto-
col with receiver-based channel selection for multihop wireless networks. In
![Page 157: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/157.jpg)
132 BIBLIOGRAPHY
Tenth International Conference on Computer Communications and Networks,
Volume 00, pages 432–439. IEEE, 2001.
[40] Kyle Jamieson, Hari Balakrishnan and Y. C. Tay. Sift : A MAC Protocol
for Event-Driven Wireless Sensor Networks. In Third European Workshop on
Wireless Sensor Networks (EWSN 06), pages 260–275, 2006.
[41] Sukun Kim, Shamin Pakzad, David Culler and Martin Demmel, James
Fenves, Gregory Glaser, Steven Turon. Health Monitoring of Civil Infras-
tructures Using Wireless Sensor Networks. In 6th International Symposium
on Information Processing in Sensor Networks, pages 254–263. IEEE, April
2007.
[42] Leonard Kleinrock. Queueing Systems Volume I: Theory, Volume 1. Wiley-
Interscience, 1st edition, January 1975.
[43] Kurtis Kredo and Prasant Mohapatra. Medium access control in wireless
sensor networks. Computer Networks, Volume 51, Number 4, pages 961–994,
March 2007.
[44] Anurag Kumar, Eitan Altman, Daniele Miorandi and Munish Goyal. New
Insights From a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs.
IEEE/ACM Transactions on Networking, Volume 15, Number 3, pages 588–
601, June 2007.
[45] James F. Kurose and Keith W. Ross. Computer Networking. A Top-Down
Approach Featuring The Internet. Pearson Education, 3rd edition, 2005.
[46] Byung-Jae Kwak, Nah-Oak Song and M. E. Miller. Performance analysis of
exponential backoff. IEEE/ACM Transactions on Networking, Volume 13,
Number 2, pages 343–355, 2005.
[47] Pradeep Kyasanur and Nitin H. Vaidya. Capacity of multi-channel wireless
networks. Proceedings of the 11th annual international conference on Mobile
computing and networking - MOBICOM ’05, pages 43, 2005.
![Page 158: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/158.jpg)
BIBLIOGRAPHY 133
[48] Hieu Khac Le, Dan Henriksson and Tarek Abdelzaher. A Practical Multi-
channel Media Access Control Protocol for Wireless Sensor Networks. In
International Conference on Information Processing in Sensor Networks
(IPSN), pages 31–40. IEEE, April 2008.
[49] Hieu Khac Le, Dan Henriksson, Tarek Abdelzaher and N Goodwin Ave. A
Control Theory Approach to Throughput Optimization in Multi-Channel Col-
lection S ensor Networks. In 6th International Symposium on Information
Processing in Sensor Networks, 2007.
[50] Jin Lee. An Experiment on Performance Study of IEEE 802.15.4 wireless
networks. In IEEE International Conference on Emerging Technologies and
Factory Automation, Volume 2, pages 451–458, Catania, Italy, 2005.
[51] Winnie Louis Lee. Flexible-Schedule-Based TDMA Protocols for Supporting
Fault-Tolerance , On-Demand TDMA Slot Transfer , and Peer-to-Peer Com-
munication in Wireless Sensor Networks. Doctor of philosophy thesis, Uni-
versity of Western Australia, 2008.
[52] Winnie Louis Lee, Amitava Datta and Rachel Cardell-oliver. FlexiMAC: A
flexible TDMA-based MAC protocol for fault-tolerant and energy-efficient
wireless sensor networks. In 14th IEEE International Conference on Net-
works (ICON06), Volume 2, pages 1–6. IEEE Transactions on Parallel and
Distributed Systems, 2006.
[53] Winnie Louis Lee, Amitava Datta and Rachel Cardell-oliver. FlexiTP :
A Flexible-Schedule-Based TDMA Protocol for Fault-Tolerant and Energy-
Efficient Wireless Sensor Networks. Volume 19, Number 6, pages 851–864,
2008.
[54] Alberto Leon-Garcia and Indra Widjaja. Communication Network: Funda-
mental Concepts and Key Architectures. McGraw Hill, New York, New York,
USA, second edition, 2004.
![Page 159: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/159.jpg)
134 BIBLIOGRAPHY
[55] Alberto Leon-Garcia and Indra Widjaja. Communication Networks. Funda-
mental Concepts and Key Architectures. McGraw Hill, New York, NY, USA,
2nd edition, 2004.
[56] Xinhua Ling, Yu Cheng, Jon W. Mark and Xuemin Shen. A General Ana-
lytical Model for the IEEE 802.15.4 Contention Access Period. 2007 IEEE
Wireless Communications and Networking Conference, pages 316–321, 2007.
[57] Xinhua Ling, Yu Cheng, Jon W. Mark and Xuemin Shen. A Renewal Theory
Based Analytical Model for the Contention Access Period of IEEE 802.15.4
MAC. IEEE Transactions on Wireless Communications, Volume 7, Num-
ber 6, pages 2340–2349, June 2008.
[58] MAXIM Corporation. MAX3232 True RS-232 Transceiver for 3.3V. Available
in http://datasheets.maxim-ic.com/en/ds/MAX3222-MAX3241.pdf.
[59] T. Melodia and I. Akyildiz. Cross-layer QoS-aware communication for ultra
wide band wireless multimedia sensor networks. IEEE Journal on Selected
Areas in Communications, Volume 28, Number 5, pages 653–663, June 2010.
[60] J. Misic, V.B. Misic and S. Shafi. Performance of IEEE 802.15.4 Beacon
Enabled PAN with Uplink Transmissions in Non-saturation Mode - Access
Delay for Finite Buffers. First International Conference on Broadband Net-
works, pages 416–425, 2004.
[61] J. Misic, S Shafi and V. Misic. The Impact of MAC Parameters on the
Performance of 802.15.4 PAN. Ad Hoc Networks, Volume 3, Number 5, pages
509–528, September 2005.
[62] J. Misic, S Shafi and V.B. Misic. Performance of a Beacon Enabled IEEE
802.15.4 Cluster with Downlink and Uplink Traffic. IEEE Transactions on
Parallel and Distributed Systems, Volume 17, Number 4, pages 361–376, 2006.
[63] Alvaro Monsalve, Rachel Cardell-Oliver, Amitava Datta and Christof Hueb-
ner. Empirical evaluation of adapting IEEE 802.15.4 contention windows for
![Page 160: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/160.jpg)
BIBLIOGRAPHY 135
maximum performance. In IEEE International Symposium on Personal, In-
door and Mobile Radio Communications, PIMRC, pages 260–265, Sydney,
Australia, 2012. IEEE Commmunication Society.
[64] Alvaro Monsalve, Hai L Vu and Quoc Bao Vo. Optimal designs for IEEE
802.15.4 wireless sensor networks. Wireless Communications and Mobile Com-
puting, Volume 13, Number 18, pages 1681–1692, 2011.
[65] C. Siva Ram Murthy and B.S. Manoj. Ad-hoc Wireless Networks. Architec-
tures and protocols. Pearson Education, Upper Saddle River, NJ, USA, 2004.
[66] Network Simulator 2. Avaliable in http://www.isi.edu/nsnam/ns/ [March
2015].
[67] E. Ngangue Ndih, N. Khaled and G. De Micheli. An Analytical Model for
the Contention Access Period of the Slotted IEEE 802.15.4 with Service Dif-
ferentiation. 2009 IEEE International Conference on Communications, pages
1–6, June 2009.
[68] OPNET Technologies. Opnet. Available: http://www.opnet.com/.
[69] J. Polastre, J. Hill and D. Culler. Versatile Low Power Media Access for
Wireless Sensor Networks Categories and Subject Descriptors. ACM SEN-
SYS, pages 95–107, 2004.
[70] S. Pollin, M. Ergen, S. Ergen and Et Al. Performance Analysis of Slotted
Carrier Sense. IEEE Transactions on Wireless Communications, Volume 7,
Number 9, pages 3359–3371, 2008.
[71] Vaddina Prakash Rao. The simulative Investigation of Zigbee/IEEE 802.15.4.
Doctor of philosophy, Dresden University of Technology, 2005.
[72] Theodore S. Rappaport. Wireless Communications: Principles and Practice.
Prentice-Hall, Upper Saddle River, NJ, USA, 2nd edition, 2002.
![Page 161: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/161.jpg)
136 BIBLIOGRAPHY
[73] Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min. Z-MAC: A hybrid
MAC for wireless sensor networks. In SENSYS, pages 90–101, 2005.
[74] Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min and Mihail L. Sichitiu. Z-
MAC: A hybrid MAC for wireless sensor networks. IEEE/ACM Transactions
on Networking, Volume 16, pages 511–524, 2008.
[75] Injong Rhee, Ajit Warrier, Jeongki Min and Lisong Xu. DRAND: Distributed
Randomized TDMA Scheduling for Wireless Ad Hoc Networks. IEEE Trans-
actions on Mobile Computing, Volume 8, Number 10, pages 1384–1396, Oc-
tober 2009.
[76] Taka Sakurai and Hai L. Vu. MAC access delay of IEEE 802.11 DCF. IEEE
Transactions on Wireless Communications, Volume 6, Number 5, pages 1702–
1710, 2007.
[77] Cesar Santivanez and Ioannis Stavrakakis. Study of various TDMA schemes
for wireless networks in the presence of deadlines and overhead. IEEE Journal
on Selected Areas in Communications, Volume 17, Number 7, pages 1284–
1304, 1999.
[78] N. Saxena, A. Roy and J. Shin. Dynamic duty cycle and adaptive contention
window based QoS-MAC protocol for wireless multimedia sensor networks.
Computer Networks, Volume 52, Number 13, pages 2532–2542, September
2008.
[79] Loren Schwiebert, Sandeep K.S. Gupta and Jennifer Weinmann. Research
challenges in wireless networks of biomedical sensors. In Proceedings of the
7th annual international conference on Mobile computing and networking -
MOBICOM ’01, pages 151–165, 2001.
[80] Feng Shu and Taka Sakurai. Analysis of an Energy Conserving CSMA-CA.
IEEE GLOBECOM, pages 2536–2540, November 2007.
![Page 162: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/162.jpg)
BIBLIOGRAPHY 137
[81] Jungmin So and Nitin Vaidya. Multi-Channel MAC for Ad Hoc Networks
Handling Multi-Channel Hidden Terminals Using A Single. In The ACM
International Symposium on Mobile Ad Hoc Networking and Computing MO-
BIHOC 04, pages 222–233, 2004.
[82] Katayoun Sohrabi, Jay Gao, Vishal Ailawadhi and Gregory J Pottie. Pro-
tocols for Self-Organization of a Wireless Sensor Network. IEEE Personal
Communications, Volume 7, Number 5, pages 16–27, 2000.
[83] Katayoun Sohrabi and Gregory J Pottie. Performance of a novel self-
organization protocol for wireless ad-hoc sensor networks. IEEE 50th Ve-
hicular Technology Conference, Volume 2, pages 1222–1226, 1999.
[84] Stanislava Soro and Wendi Heinzelman. A Survey of Visual Sensor Networks.
Advances in Multimedia, Volume 2009, pages 1–22, 2009.
[85] John A Stankovic, Tarek F Abdelzaher, Chenyang Lu, L U I Sha, Jennifer C
Hou and Senior Member. Real-Time Communication and Coordination in
Embedded Sensor Networks. Communication, Volume 91, Number 7, 2003.
[86] C. Suh, Z. Mir and Y. Ko. Design and implementation of enhanced IEEE
802.15.4 for supporting multimedia service in Wireless Sensor Networks. Com-
puter Networks, Volume 52, Number 13, pages 2568–2581, September 2008.
[87] P Suriyachai, U Roedig and A Scott. A Survey of MAC Protocols for Mission-
Critical Applications in Wireless Sensor Networks. IEEE Communications
Surveys & Tutorials, Volume 14, Number 2, pages 240 – 264, 2012.
[88] Andrew Stuart Tanenbaum. Computer Networks. Prentice-Hall, Upper Saddle
River, NJ, USA, 4th edition, 2003.
[89] Z. Tao, S. Panwar, D. Gu and J Zhang. Performance Analysis and a Proposed
Improvement for the IEEE 802.15.4 Contention Access Period. In IEEE Wire-
less Communications and Networking Conference WCNC 06., pages 1811–
1818. IEEE, 2006.
![Page 163: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/163.jpg)
138 BIBLIOGRAPHY
[90] Y.C. Tay, K. Jamieson and H. Balakrishnan. Collision-Minimizing CSMA
and Its Applications to Wireless Sensor Networks. IEEE Journal on Selected
Areas in Communications, Volume 22, Number 6, pages 1048–1057, August
2004.
[91] Texas Instruments. Chipcon CC2420 2.4 GHz IEEE 802.15.4 / ZigBee-ready
RF Transceiver. Available in http://www.ti.com/product/CC2420.
[92] Texas Instruments. Chipcon CC2420 2.4 GHz IEEE
802.15.4 / ZigBee-ready RF Transceiver. Available in
http://www.ti.com/product/CC2420/technicaldocuments.
[93] The Institute of Electrical and Electronics Engineers. IEEE Std. 802.15.4
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifi-
cations for Low Rate Wireless Personal Area Networks (LR–WPANs). IEEE
Pres, 2003.
[94] The Institute of Electrical and Electronics Engineers. Wireless Medium Ac-
cess Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate
Wireless Personal Area Networks (WPANs), 2006.
[95] The Institute of Electrical and Electronics Engineers. Wireless Medium Ac-
cess Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate
Wireless Personal Area Networks (WPANs) Amendment 1: Add Alternate
PHYs, 2007.
[96] The Institute of Electrical and Electronics Engineers. 802.15.6-2012 - IEEE
Standard for Local and metropolitan area networks - Part 15.6 Wireless Body
Area Networks, 2012.
[97] Rajendran Venkatesh, Obraczka Katia and Luna Garcia Aceves J.J. Energy-
Efficient Collision-Free Medium Access Control. In SENSYS, pages 181–192,
2003.
![Page 164: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/164.jpg)
BIBLIOGRAPHY 139
[98] Rajendran Venkatesh, Obraczka Katia and Luna Garcia Aceves J.J. Energy-
Efficient , Collision-Free Medium Access Control for Wireless. Springer Sci-
ence, pages 63–78, 2006.
[99] Hai L. Vu and Taka Sakurai. Accurate delay distribution for IEEE 802.11
DCF. IEEE Communications Letters, Volume 10, Number 4, pages 317–319,
2006.
[100] C. Wang, K. Sohraby and M. Daneshmand. A survey of transport protocols
for wireless sensor networks. IEEE Network, Volume 20, Number 3, pages
34–40, May 2006.
[101] Y. Watanabe, H. Haya, M. Shinoda and Et Al. Sensor Data Collection System
for Health Monitoring of Railway Structures. Quarterly Report of RTRI,
Volume 50, Number 1, pages 14–19, 2009.
[102] Hao Wen, Chuang Lin, Zhi-Jia Chen, Hao Yin, Tao He and Eryk Dutkiewicz.
An Improved Markov Model for IEEE 802.15.4 Slotted CSMA/CA Mecha-
nism. Journal of Computer Science and Technology, Volume 24, Number 3,
pages 495–504, May 2009.
[103] Y. Wu, J. Stankovic, T. He and S. Lin. Realistic and Efficient Multi-Channel
Communications in Wireless Sensor Networks. IEEE 27th Conference on
Computer Communications INFOCOM, pages 1193–1201, April 2008.
[104] Kai Zeng, Zhenyu Yang and Wenjing Lou. Opportunistic Routing in Multi-
radio Multi-channel Multi-hop Wireless Networks. 2010 Proceedings IEEE
INFOCOM, Volume 9, Number 11, pages 1–5, March 2010.
[105] Yi Zhi Zhao, Chunyan Miao, Maode Ma, Jing Bing Zhang and Cyril Leung. A
survey and projection on medium access control protocols for wireless sensor
networks. ACM Computing Surveys, Volume 45, Number 1, pages 1–37, 2012.
[106] Jianliang Zheng and Myung J Lee. A Comprehensive Performance Study of
IEEE 802.15.4. Sensor Network Operations, pages 218–237, 2006.
![Page 165: Adaptive MAC Protocols For Data-intensive Wireless Sensor ......medium access control protocol that was presented in [64]. Chapter 5 proposes en-hancements to the recommended carrier](https://reader031.vdocuments.us/reader031/viewer/2022013022/5f96ce720639aa1d033e0f18/html5/thumbnails/165.jpg)
140 BIBLIOGRAPHY
[107] G. Zhou, Y. Wu, T. Yan and Et Al. A multifrequency MAC specially designed
for wireless sensor network applications. ACM Transactions on Embedded
Computing Systems, Volume 9, Number 4, pages 1–41, March 2010.
[108] ZigBee Alliance. ZIGBEE Specification. Document 053474r17. Available in
http://zigbee.org/Specifications/ZigBee/download.aspx.