Next Article in Journal
Joint Estimation of Source Range and Depth Using a Bottom-Deployed Vertical Line Array in Deep Water
Next Article in Special Issue
Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks
Previous Article in Journal
Adaptive Grouping Distributed Compressive Sensing Reconstruction of Plant Hyperspectral Data
Previous Article in Special Issue
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference

by
Prasan Kumar Sahoo
1,2,
Sudhir Ranjan Pattanaik
3 and
Shih-Lin Wu
1,2,4,*
1
Department of Computer Science and Information Engineering, Chang Gung University, Taoyuan 33302, Taiwan
2
Department of Cardiology, Chang Gung Memorial Hospital, Linkou 33305, Taiwan
3
Department of Electrical Engineering, Chang Gung University, Taoyuan 33302, Taiwan
4
Department of Electrical Engineering, Ming Chi University of Technology, New Taipei City 24301, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(6), 1320; https://doi.org/10.3390/s17061320
Submission received: 6 April 2017 / Revised: 23 May 2017 / Accepted: 5 June 2017 / Published: 7 June 2017
(This article belongs to the Collection Smart Communication Protocols and Algorithms for Sensor Networks)

Abstract

:
The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly.

1. Introduction

The main objective of deployment of sensors in Wireless Sensor Networks (WSNs) is to monitor the environmental conditions such as pressure, temperature, sound, etc. The physical layer and medium access control of IEEE 802.15.4-enabled [1] WSN is suitable for the low-power wireless networks. The Internet of Things (IoT), where ZigBee devices play a major role, is getting popular in smart homes and smart city applications. The existing IEEE 802.15.4 MAC scheme has been modified to meet the critical requirements of IoT applications and both the slotted and unslotted medium access control schemes for the short-range communication devices with low duty cycle have been defined in the newly-modified IEEE 802.15.4e [2] standard. The superframe structure follows the slotted MAC of the IEEE 802.15.4e and is suitable for different applications in the Internet of Things (IoT).
ZigBee technology is suitable for home and industrial automation, remote control applications and provides connectivity to different sensor devices, which can provide long battery life. On the other hand, WiFi technology gives connectivity to the IoT devices more conveniently. In different applications of IoT, such as smart home, healthcare, smart industry, smart city and smart community, both WiFi and ZigBee devices are used and operated in the 2.4-GHz ISM band, which may cause interference. The conventional MAC protocols are useless in managing the disparate transmit-power levels, asynchronous time slots and incompatible PHY layers of such heterogeneous networks and needs to be improved to cope with the existing technological demands.
The star topology is preferable for IoT applications, where the coverage vicinity is small and low latency is needed. The coordinator in the star topology controls the communication by sending packets and beacons for the synchronization among devices. All devices are allowed to communicate with the PAN coordinator only after successfully association with the coordinator. However, the communications are affected due to collisions or interference with respect to the packet arrival rate of the devices. Mostly, the network collision occurs due to simultaneous channel assessment or the hidden terminal problem. Besides, interference occurs due to the presence of both WiFi and ZigBee devices when their channels overlap. The novelty of the CSMA/CA mechanism is to avoid the collision during the ongoing transmission of another device in the network, which is not hidden. However, ZigBee’s Rx/Tx switching duration is 192  μ s, and the DIFS (Distributed Inter-Frame Space) of WiFi is only 50  μ s. Hence, in between ZigBee’s Rx/Tx switching duration, a WiFi transmitter can easily preempt the channel access. The coexistence of these wireless devices in a network increases the interferences, collisions, delay and energy consumptions. Moreover, ZigBee packet losses and retransmissions lead to lower reliability and faster draining of the ZigBee battery. Therefore, these issues are significant in the smart home network, where both WiFi and ZigBee devices coexist.
Sensor devices in WSNs follow the IEEE 802.15.4e MAC scheme during the Contention Access Period (CAP), performing slotted CSMA/CA to access the channel to reduce the collisions. The sensor devices have buffer constraints, and the data packet is dropped when the buffer is full. Hence, the devices having more data in the buffer should get priority to access the channel so that the packet drop rate can be minimized. However, the IEEE 802.15.4e CSMA/CA mechanism provides equal priority to all devices and does not consider the buffer limitation of the devices, which might lead to buffer overflow. The collision rate in WSNs increases with respect to the number of contending devices due to the limited backoff window size. During the Contention-Free Period (CFP), sensors transmit data directly to the coordinator. However, the transmission failures may occur due to path fading and interferences in WSNs during CFP, and sensor devices buffer the data to transmit in the next superframe. Under such a circumstance, retransmission delays and the packet drop rate increase due to the buffer constraints of the devices. Hence, it is crucial to investigate the current problems and to find solutions to reduce their impact on the overall network performance.
The main contributions of our paper are summarized as follows.
  • A new frame structure is designed for data transmission, which can identify and avoid the hidden terminal problem.
  • A new superframe structure is designed for the transmission failure due to interference between WiFi and ZigBee devices.
  • A modified channel access mechanism is proposed to reduce the packet drop rates, energy consumptions and to enhance the throughput.
  • A Markov chain model is designed to analyze the performance of our proposed MAC.
  • Performance analysis of our proposed methods is made to study the reliability, latency, throughput and energy consumption.
The rest of the paper is organized as follows. The overview of IEEE 802.15.4e general superframe structure and channel access mechanism are briefly reviewed in Section 2. We review the related works in Section 3. The network model and our proposed methods are presented in Section 4. We develop the analytical models in Section 5. Performance analysis of different network parameters based on our models is studied in Section 6. Simulation results are discussed in Section 7, and concluding remarks are made in Section 8.

2. Overview of the IEEE 802.15.4e Protocol

The IEEE 802.15.4e standard defines the Physical layer (PHY) and MAC sublayer specifications for the devices having a low data rate, low power and short-range communication, which is quite good enough for the wireless ZigBee networks. The IEEE 802.15.4e-enabled devices operate in the license-free 868∼868.6-MHz, 902∼928-MHz and 2400∼2483.5-MHz bands with a data rate of 250 kb/s to satisfy a set of applications. Two types of devices, a Full-Function Device (FFD) and a Reduced-Function Device (RFD), are present in the IEEE 802.15.4e-based network. Both star and peer-to-peer networks are supported by the IEEE 802.15.4e standard, and both topologies work in either a beacon-enabled mode or non-beacon-enabled mode. In a star topology, communication is normally made with the PAN coordinator only, whereas any device can communicate with any other one in its communication range in the peer-to-peer network.
The IEEE 802.15.4e standard defines the slotted medium access control scheme for the short-range communication devices with low data rates. There are many MAC schemes defined by IEEE 802.15.4e, such as Time Slotted Channel Hopping (TSCH), Low Latency Deterministic Networks (LLDN), Deterministic and Synchronous Multi channel Extension (DSME), Radio Frequency Identification blink (RFID) and Asynchronous Multi-Channel Adaptation (AMCA). However, the standard specifies the optional use of the general superframe structure under beacon-enabled mode for low duty cycle devices in the network as described in the following subsection.

2.1. General Superframe Structure

In a beacon-enabled network, the PAN coordinator periodically broadcasts the beacon that contains the information about the superframe structure. The length of a superframe is known as Beacon Interval ( B I ) and is defined by the parameter Beacon Order ( B O ).
B I = a b a s e s u p e r f r a m e d u r a t i o n × 2 B O s y m b o l s , 0 B O 14
The B I is divided into active and inactive parts as shown in Figure 1. The active part duration is called the Superframe Duration ( S D ) and is defined by the parameter Superframe Order ( S O ).
S D = a b a s e s u p e r f r a m e d u r a t i o n × 2 S O s y m b o l s , 0 S O B O 14
In Figure 1, the beacon duration, Contention Access Period (CAP) and CFP are present in the active part of the superframe. The superframe contains 16 superframe slots of equal duration out of which the first slot is reserved for a PAN coordinator to broadcast the beacon frame. It is used for the synchronization with the PAN coordinator and re-synchronization of the devices that go to power saving or sleep mode. In the CAP period, the devices access the channel by using the slotted CSMA/CA, whereas in CFP, the devices assess the channel by the reservation-based channel access mechanism.

2.2. Channel Access Mechanism

The devices in the network follow CSMA/CA mechanism to access the channel that is the key component in IEEE 802.15.4e MAC to communicate with the PAN coordinator. A device having data initializes the variables B E and N B , where B E is the backoff exponent and N B represents the number of times the CSMA/CA mechanism is required to be postponed before attempting the transmission. Before every transmission, the value of N B is initialized to zero. The MAC layer waits for a random backoff period in the range of [ 0 , 2 B E 1 ] units as the backoff period before accessing the channel. After the backoff duration expires, the tagged device goes for two times clear channel assessment (CCA) to know the channel condition and allows transmitting data provided the channel is found idle during both CCAs. After transmitting the data, the tagged device waits for the acknowledgment, which is interpreted as the successful packet transmission. However, if the channel is found busy during any CCA, the tagged device increases the value of B E and N B by one for each channel access failure and goes for the random backoff before performing the next CCA. The maximum values of B E and N B are B E m a x and maxMacBackoff ( N B m a x ) , respectively. The values of B E and N B are incremented for each channel access failure, and the packet is dropped by the device if the value of NB exceeds the value of N B m a x . The flow chart of the IEEE 802.15.4e CSMA/CA mechanism is depicted in Figure 2.

3. Related Work

The IEEE 802.15.4 CSMA/CA mechanism is a deterministic approach that avoids collision by using the binary exponential backoff scheme without considering the status of the communication channel. Hence, the authors in [3] have designed one collision-aware backoff algorithm, where the nodes in the network can dynamically choose their backoff interval based on the status of the communication channel. However, the proposed algorithm cannot avoid collisions due to hidden terminal problems. To reduce the collisions, the author in [4] divide the transmission durations into a number of sub-periods based on the network environment, and one device uses only one sub-period. Though it can reduce the effects of the hidden terminal problems, it cannot provide priority to the devices with higher buffer status to access the channel first. A Time-Division Multiple Access (TDMA)-based scheme is designed in [5] for real-time data transmission to ensure collision-free transmission. The proposed time-division approach can work under ideal channel conditions, which is unrealistic. Considering the hidden terminal problem, the authors in [6] have proposed one hybrid model by combining CSMA/CA with TDMA. Though the hybrid model considers the hidden terminal problem, it requires global information of the network devices. The authors in [7] analyze the throughput of IEEE 802.15.4 MAC considering the presence of the hidden terminal problem in the network. To reduce the hidden terminal problem, the authors in [8] design one algorithm that identifies the hidden nodes by analyzing the received signal powers. However, these works focus on only ZigBee devices in the network without considering any external interferences.
Packet loss occurs due to interference when both WiFi and ZigBee channels overlap. The simple way to avoid the interferences among the devices in a network is to use different channels. However, the available channels are limited, for which the authors in [9] have designed a new MAC scheme with an increasing number of CCAs to alleviate the collisions in WiFi transmissions. However, the proposed mechanisms cannot avoid collisions due to the hidden terminal problem, and also, a significant amount of energy for CCAs is consumed in these methods. To detect the interference, the authors in [10] propose a new protocol that helps a device to switch adaptively into a safe channel. However, performance analysis in terms of latency and power consumption is not made in such adaptive channel switching. Under external interference, the theoretical analysis of throughput for WSNs has been studied in [11]. The authors in [12] have analyzed the interferences due to signal arrival direction and losses under the smart building scenario, though the reliability of the data communications is not considered. The authors in [13] propose one cooperative carrier signaling technique to avoid the interference between ZigBee and WiFi devices. However, the main drawback is that one dedicated ZigBee device should be present in the network to send the busy signal, which can increase the network cost. To analyze the performance of the coexistence of WiFi and ZigBee devices, the authors in [14] have designed the Markov model for normalized saturation throughput to ensure the quality of service and fairness. In the proposed method, both transmission failure devices and ready to transmit devices have equal priority to access the channel.
The battery power is a major constraint for ZigBee devices, and the major power consumption by the ZigBee device is due to data retransmission when there is a collision or channel error. Hence, the authors in [15] have designed one Additional Carrier Sensing (ACS) algorithm to reduce energy consumptions by avoiding further channel access through the information during the second CCA. However, the wastage of energy is possible when the second CCA is found busy due to data transmission. A new MAC protocol is designed in [16] to avoid the channel being busy due to acknowledgment packet transmission without any additional CCA. However, it cannot avoid collisions due to the hidden terminal problem. Since, one acknowledgment packet is about 22 symbols and one backoff slot is about 20 symbols, the authors in [17] propose one segmentized CCA to increase the possibilities of transmission by neglecting the channel busy condition for the shake of the ACK packet. However, it cannot avoid the end of the data packet instead of the ACK one. Apart from this, the authors in [18] design an analytical model to predict the energy consumption and throughput for the saturated and unsaturated traffics. However, these works have not considered the buffer status of the devices to improve the energy efficiency. The authors in [19] have introduced the Markov model to calculate the impact of energy consumption based on the probability of delivering a packet. A detailed analysis of the energy consumption of the Body Area Networks (BAN) with respect to packet inter-arrival time is discussed in [20]. However, the authors have not considered the external WiFi interferences with the ZigBee devices.
The authors in [21] have designed one generalized technique to investigate the performance for the slotted CSMA/CA scheme in the IEEE 802.15.4 standard. The majority of the present analytical models consider ideal channel conditions, though wireless channels are prone to burst errors. Hence, the authors in [22] have designed one three-dimensional Markov model to evaluate the performance of the IEEE 802.15.4 MAC scheme considering the burst channel errors. However, they have not considered the collisions due to the hidden terminal problem in the network. The authors have designed the time critical services in [23] and the priority-based adaptive MAC schemes for the WSNs in [24]. However, none of these schemes focus on how to enhance the reliability of the network. To  analyze the reliability, the authors in [25] design one analytical model to study the performance of MAC with the assumption that only ZigBee devices are present in the network. However, they have not considered the external network interferences.
In this paper, we not only propose a new superframe structure to avoid the hidden terminal problem in the network to enhance the reliability, but also design one channel access mechanism based on the current buffer condition of the device to reduce the packet drop rates. In addition, one analytical model is proposed to evaluate the performance in terms of throughput, delay, energy consumption and reliability considering the presence of both WiFi and ZigBee devices in a system.

4. Proposed Methods

In order to reduce the collisions and packet drop rates in a star topology-based wireless network, a new superframe structure and channel access mechanism are developed. Details of the network model and proposed schemes are discussed as follows.

4.1. Network Model

Consider a star topology-based WSN for different IoT applications such as smart healthcare, smart city and smart home, where all devices are connected to the network coordinator and follow the IEEE 802.15.4e superframe structure. It is assumed that the transmission range of the devices are equal to their sensing range. The CSMA/CA mechanism of IEEE 802.15.4e MAC is the key component, which allows the devices to access the channel uniformly. In our proposed model, all of the devices follow the CSMA/CA mechanism during the CAP period to transmit the data/guarrented time slot(GTS)request frames to the coordinator. Since power consumption is one of the major issues in WSNs, all devices go for the power saving mode after data transmission. A device that accesses the channel during the CAP period can defer transmission to a next superframe if the remaining slots are not enough.

4.2. Proposed Data Transmission Frame Structure

In this section, the structure of a new data frame is proposed, which can detect the hidden devices attached to the coordinator in a star topology. The main concept of the hidden terminal problem is that the carrier sensing range of a node is not large enough to detect the ongoing transmission. As per our assumption, the carrier sensing range of one device is equal to its transmission range, and a device cannot detect the ongoing transmissions by other devices due to the presence of obstacles. However, in a star topology, all devices are present within the communication range of the PAN coordinator. Hence, collision can occur only at the PAN coordinator for which the PAN coordinator does not transmit the acknowledgment to the devices.
In WSN, when a packet is partially received, the information in the header can often be recovered and is used to identify the transmitter of that corrupted packet through the capture effects [26]. Even if the strength of two signals is the same, the radios of the sensor devices can detect and decode the undamaged signals through this capture effect. This can be only possible if the header of the colliding packet is not overlapped. Suppose two devices A and B are hidden from each other and device B transmits its data when the transmission of device A is going on. Hence, collision occurs at the PAN coordinator as their transmissions overlap fully or partially as shown in Figure 3. According to the IEEE 802.15.4e standard, the data transmission frame contains the MAC header (MHR), MAC payload and MAC footer (FHR). As shown in Figure 3a, partial overlapping occurs when device B transmits data after the MHR part of device A. The data frames overlap fully, when both devices A and B transmit simultaneously as shown in Figure 3b. The PAN coordinator can recover the sender’s address correctly from the partial frame; those are not overlapping with the subsequent frames after collision occurs due to such hidden devices.
For example, as shown in Figure 4a, the address of device A is recovered correctly [26] after the collision with hidden device B. Then, the PAN coordinator allocates one GTS slot to the device A in order to avoid subsequent hidden device collisions. However, in order to identify the other device associated with the collision (here, device B), we propose to add a replica of the sender device address in the rear part of the data frame as shown in Figure 5. This enables the PAN coordinator to correctly recover the address of the second device associated with the collision (here, device B), as shown in Figure 4b. In the sparse network, the probability that the second device has a collision with another third device is less. However, if multiple collisions occur due to hidden nodes, then the first and last device associated with the collision are correctly identified, and both devices are allotted GTS slots for data transmission. This proposed method reduces the subsequent collisions in the network by restricting the collided devices to go for further contention.

4.3. Proposed Superframe Structure

In the previous section, how to identify the hidden devices due to collision is discussed. It is to be noted that the hidden devices are identified only when the collided frames overlap partially and the PAN coordinator recovers the sender’s address correctly from those partially overlapped frames. However, it may happen that the collided frames overlap fully when two nodes can have the same backoff window, and therefore, the PAN coordinator cannot recover the sender address from those fully-overlapped frames. To overcome this problem due to simultaneous transmission, we propose here a newly-modified superframe structure.
As discussed in Section 2, the superframe structure contains the beacon, CAP, CFP and the inactive part. In order to reduce the delay for retransmission and to increase the reliability, we interchange the CFP and CAP parts and modify the inactive part of the superframe as shown in Figure 6. It is proposed to use this inactive part of the superframe for failure devices to improve the reliability. We partition the inactive part into a number of retransmission opportunities, and each of these retransmission intervals is again subdivided into the notice, reserved and unreserved period. Hence, our proposed superframe structure contains the beacon, CFP, CAP, notice, reserved and unreserved periods, which are defined as follows.
  • Beacon period: In this period, the PAN coordinator first broadcasts the beacon in the network, and all associated devices synchronize with the PAN coordinator upon receiving the beacon successfully.
  • CFP period: In this period, devices allocated with GTS slots by the PAN coordinator can transmit their data without any contention.
  • CAP period: In this period, devices associated with the PAN coordinator compete with other devices, and the winner device can transmit its data. However, collisions may occur during this interval.
  • Notice period: In this period, the PAN coordinator sends the acknowledgment to the devices whose data packets are successfully received. Furthermore, it informs those devices whose addresses are correctly identified during the collisions due to hidden nodes and assigns the GTS slots in the next coming reserved period.
  • Reserved period: During this period, the coordinator provides a retransmission opportunity to the GTS failure devices. Besides, the devices those are correctly identified during the CAP due to the hidden terminal problem are assigned new GTS slots to transmit their data without contention.
  • Unreserved period: In this period, the contended devices who have not received the acknowledgment or have not been identified by the PAN coordinator can compete among themselves to transmit their data.
It is to be noted that both ZigBee and WiFi devices operate in the 2.4-GHz ISM band. The ZigBee devices use narrow band channels as compared to the WiFi’s broadband spread spectrum channels. There are 3 WiFi and 16 ZigBee channels each of 22 MHz and 2 MHz, respectively. The guard band between any two ZigBee channel is 3 MHz. Hence, as shown in Figure 7, each WiFi device’s channel overlaps with four consecutive ZigBee channels. The devices operating in those overlapping channels experience interference from the WiFi devices.
The Signal-to-Noise-plus-Interference Ratio (SNIR) is a quantity used to give theoretical upper bounds on channel capacity in wireless communication. The SINR can be determined as in [27]:
S I N R = 10   l o g 10 ( P r P n + P i )
where P r , P n , P i are the actual power received from the desired signal, noise power and the interferer power. The level of interferences depends on the interferer’s power, which is directly proportional to the distance from the interferer devices. Hence, the close proximity of ZigBee and WiFi devices in the overlapping channels from each other increases the interference levels. In order to avoid the interference, we suggest if channel C H i (for example, ZigBee channel Number 11) is used during the CAP period, then the channel C H i + 4 (i.e., ZigBee Channel 15) should be used during the retransmission period. The key features of our proposed superframe structure are that the reserved and unreserved periods are used only for the transmission failure devices to access the channel. Hence, the probability of collision and interference due to WiFi is reduced. The network coordinator is aware of the collision or interference during the CAP period. Hence, it remains active during the retransmission period. Otherwise, it goes for power saving mode. Therefore, the use of our proposed superframe structure reduces the energy consumption, delay and increases the reliability significantly.

4.4. New Channel Access Mechanism

Devices in WSNs follow the IEEE 802.15.4e standard channel access mechanism. In the existing CSMA/CA, all devices have equal probabilities for accessing the channel irrespective of their buffer status. However, it is more appropriate to allow the devices with higher buffer status to access the channel first so that the packet drop rate of the devices can be reduced. Besides, the CSMA/CA mechanism allows a limited contention window for which the probability of choosing the same number of random backoff periods is high. Hence, to solve this contention problem and to give priority to the devices having higher buffer status to access the channel, a new channel access mechanism is proposed. The buffer status of the devices is used to update the contention window. Initially, all devices have the same lower bound of the contention C W m i n = 0 window based on the IEEE 802.15.4e standard. However, nodes can have different upper bounds based on their buffer status as calculated in the following equation.
C W i = C W M A X B i , M a x B i , n o w B i , M a x
where C W i , B i , M a x , B i , n o w and C W M A X are the contention window, maximum buffer size, current buffer size of i-th device and the upper bound of the contention window as in the IEEE 802.15.4e standard, respectively. The IEEE 802.15.4 CSMA/CA mechanism proposes two times CCA to avoid the collision due to acknowledgment. However, in the modified superframe structure as discussed in Section 4.3, a separate time interval named the notice period is used for the purpose of acknowledgment. Hence, in our proposed channel access mechanism, we use only one CCA, which helps to decrease the energy consumption of the devices in the network. As given in Algorithm 1, let the i-th device attempt to transmit data during the CAP of the superframe. Accordingly, it initializes the variables N B , C W i and R t r n s . N B is the number of times the CSMA/CA mechanism requires the delay before attempting the current transmission, which is initialized to “0” in each new transmission. C W i is the contention window length of the i-th device. R t r n s is the number of retransmission attempts. The MAC layer waits for a backoff period, i.e., a random backoff period ( R b c k ) = r a n d o m ( 0 , C W i ) units. After the backoff period is over, a device performs its CCA provided the remaining time ( R t i m e ) in the allotted period is sufficient to complete the transmission. Let the duration required to perform the CCA and data transmission be T c c a and T p k t , respectively.
Two cases may arise during the CCA, which could be either channel idle or busy. The tagged device starts transmission if the channel is found idle. Otherwise, it goes for the r a n d o m ( 0 , T p k t ) sleep period before the next attempt. The value of N B is incremented for each channel access failure up to maxMacBackoff ( N B m a x ) . The packet is discarded, if the value of NB crosses the value N B m a x considering the channel access failure. Successful channel access does not guarantee the transmission success. The transmission failure may occur due to collisions or interference from the WiFi channels. Upon successfully receiving the data packets or decoding the addresses of the collided devices, the PAN coordinator sends the information during the notice period. It is to be noted that the upper bound of retransmission attempts due to collision or channel error is MaxFrameRetries ( M A X R t r n s ) . Each transmission failure increases the value of ( R t r n s ) by one. The packet is also discarded when the value of R t r n s exceeds ( M A X R t r n s ) . Otherwise, the retransmission attempts by the collided devices follow the same channel access mechanism as discussed earlier until they attain the maximum number of channel access failures or retransmission failures.
Algorithm 1 The modified CSMA/CA mechanism
Require: 
N B = 0 , R t r n s = 0 , T c c a = 8 s y m b o l s , packet duration T p k t ;
Ensure: 
Transmission success/failure.
1:
Listen to the channel;
2:
if (Beacon not received) then
3:
    Wait for beacon;
4:
else
5:
     C W i = C W M A X B i , M a x B i , n o w B i , M a x ;
6:
     R b c k = r a n d o m ( 0 , C W i ) ;
7:
    if ( R t i m e R b c k + T c c a + T p k t ) then
8:
         N B = N B + 1 ;
9:
        if ( N B > N B m a x ) then
10:
           Stop due to channel access failure;
11:
        else
12:
           go to step 1;
13:
        end if
14:
    else
15:
        Access channel after R b c k duration;
16:
        if (channel busy) then
17:
           Switch to power saving mode for r a n d o m ( 0 , T p k t ) duration;
18:
            N B = N B + 1 ;
19:
           if ( N B > N B m a x ) then
20:
               Stop due to channel access failure;
21:
           else
22:
               go to step 5;
23:
           end if
24:
        else
25:
           Start transmission and wait for ACK;
26:
           if (ACK is not received) then
27:
                R t r n s = R t r n s + 1 ;
28:
               if R t r n s M A X R t r n s then
29:
                   Wait for next retransmission period and go to step 5;
30:
               else
31:
                   Stop due to transmission failure;
32:
               end if
33:
           end if
34:
        end if
35:
    end if
36:
end if
Our proposed channel access mechanism uses only one CCA and gives priority to the devices based on buffer status for which energy consumption and packet drop rate decreases significantly in the network. Again, only the collided devices can contend during the subsequent retransmission periods in different channels, which reduces the contention collision and interferences for which the reliability is increased significantly.

5. Analytical Models for the Proposed MAC

In this section, we design the Markov chain model as shown in Figure 8 to analyze the channel access scheme during the contention period for the associated devices in the network. Based on the notations given in Table 1, the analytical model is designed taking the unsaturated traffic condition.
Let N be the number of devices associated with a PAN coordinator in a smart home for data communications. Let s ( t ) and c ( t ) represent the backoff stage for NB and backoff counter for CW at time t, respectively for the stochastic processes as shown in Figure 8. Let,
S j , k = lim t P { s ( t ) = j , c ( t ) = k }
where k is the index of the backoff counter and k { 1 , , C W i 1 } , while C W i is the contention window for i-th device, j is the index of backoff stage and j { 0 , , N B m a x } , while N B m a x is the maximum number of allowable backoff stages. The state S j , 1 represents the start of the channel access at the j-th backoff stage, where j { 0 , , N B m a x } . In our model, the states I, R, T stand for the idle state, ready state and transmit state, respectively. Let, p 1 be the probability that the device has a packet to transmit. After generating the packet, a device goes to the ready state R, chooses a random backoff and goes to the state S 0 , k , where k { 0 , 1 , , C W i 1 } . The state S j , k represents the backoff state.
Let α be the channel busy probability during the CCA and p 2 be the transmission deferred probability due to the current remaining time in the CAP period being insufficient to carry out the data transmission. Whenever a device finds the channel idle during CCA, it enters into the transmission state and tries to transmit packets. Let P s be the probability of successful packet transmission.
We can derive the transition probabilities as follows based on the proposed Markov chain model as given in Figure 8. A device after having a packet to transmit goes to the ready state, and the corresponding transition probability from the initial state to the ready state is:
P { R | I } = p 1 .
The device initially goes for the random backoff before accessing the channel and moves from the ready state to the first time backoff state S 0 , k . The corresponding transition probability is deduced as follows.
P { S 0 , k | R } = 1 C W i f o r 0 k C W i 1 .
After reaching a backoff state, the backoff counter is decremented with probability one. The corresponding transition probability is deduced as:
P { S j , k | S j , k + 1 } = 1 f o r 0 j N B m a x a n d 0 k C W i 1 .
The tagged device reaches the channel sensing state provided the current remaining time in the CAP period is sufficient to carry out the data transmission. The corresponding transition probability can be derived as follows.
P { S j , 1 | S j , 0 } = 1 p 2 f o r 0 j N B m a x .
However, the tagged device will go for the random backoff again, if the current remaining time in the CAP period is insufficient to carry out the data transmission. The corresponding transition probability can be derived as follows.
P { S j + 1 , k | S j , 0 } = p 2 C W i f o r 0 j N B m a x   a n d 0 k C W i 1 .
The tagged device starts data transmission after the CCA is successful. The transition probability for this case can be derived as follows.
P { T | S j , 1 } = 1 α f o r 0 j N B m a x .
However, the tagged device will go for random backoff again, if the current CCA is failed. The corresponding transition probability can be derived as follows.
P { S j + 1 , k | S j , 1 } = α C W i f o r 0 j N B m a x a n d 0 k C W i 1 .
Once the device reaches the maximum backoff attempts for transmission, the device returns back to the idle state no matter whether the transmission attempt is successful or failed. Hence, the corresponding transition probability can be deduced as follows.
P { I | S N B m a x , 0 } = ( p 2 + ( 1 p 2 ) α ) + ( 1 p 2 ) ( 1 α ) P s .
Considering these transition probabilities, the probability of a device at state S j , k can be derived as follows, where S j , k is the stationary distribution of the Markov chain.
After the channel access failure in the current backoff state, the tagged device enters into the next backoff state, and the probability for the corresponding state is:
S j , k = C W i k C W i [ S j 1 , 0 { p 2 + ( 1 p 2 ) α ) } ] ; f o r 1 j N B m a x a n d 0 k C W i 1 .
Once the device finds the channel idle during the CCA without attaining the retry limits, it will enter into the initial backoff state, and the corresponding state probability can be deduced as:
S 0 , k = C W i k C W i [ { j = 0 N B m a x S j , 0 } ( 1 p 2 ) ( 1 α ) { ( 1 P S ) + P S p 1 } + S N B m a x , 0 ( p 2 + ( 1 p 2 ) α p 1 ] ; 0 k C W i 1 .
Normally, a device defers to data transmission if the remaining time in the contention period is insufficient to complete the transmission, and we can derive the corresponding state probability as follows.
S j , 1 = ( 1 p 2 ) S j , 0 ; f o r 0 j N B m a x .
The tagged device starts transmission after the channel access is successful during the j-th backoff state. Hence, the probability for the corresponding state can be deduced as follows.
T = ( 1 α ) S j , 1 ; f o r 0 j N B m a x .
A device enters into the idle state after completion of the data transmission or has no new packet to transmit, and the corresponding state probability is deduced as:
I = 1 p 1 ( P s T + ( p 2 + ( 1 p 2 ) ( 1 α ) ) S N B m a x , 0 ) .
A device enters into the ready state whenever it has a new packet or needs to retransmit the failed packet. Hence, the corresponding state probability can be derived as follows.
R = ( 1 P s ) T + p 1 I .
The sum of the probabilities of all states should be equal to one based on the rule of the probability for which we can get the following equation.
I + R + j = 0 N B m a x i = 0 C W i 1 S j , i + j = 1 N B m a x S j , 1 + T = 1
We can deduce the probabilities of all states by solving these equations. The probability for a device that attempts the CCA for the first time can be calculated as follows.
ϕ = j = 0 N B m a x S j , 0 ( 1 p 2 ) .

6. Performance Analysis

The bit error rate probability P b ( ζ ) for IEEE 802.15.4 can be calculated [1] as given in the following equation.
P b ( ζ ) = 8 15 1 16 k = 2 16 ( 1 ) k 16 k e 20 ζ ( 1 k 1 )
where ζ is the SINR. Let, p 1 be the probability for a device having a packet for the transmission and α be the probability that the channel is found busy during CCA due to data transmission by other ZigBee devices or WiFi devices available in a smart home. Let, λ w be the Poisson packet arrival rates for WiFi devices. Therefore, the channel found busy during CCA duration ( T c c a ) by the ZigBee device due to WiFi transmission is 1 e T c c a λ w . Similarly, a ZigBee device found busy due to transmission of any other ZigBee device in the network is L D ( 1 ( 1 ϕ ) N 1 ) ( 1 α ) e T c c a λ w , where L D is the packet length and N is the number of contending ZigBee devices. Therefore, the probability of finding the channel busy during CCA is given as follows.
α = 1 ( 1 L D ( 1 ( 1 ϕ ) N 1 ) ( 1 α ) ) e T c c a λ w
When the channel access is failed or the current remaining duration in the contention period is insufficient for the transmission, the ZigBee device decides to go for the next backoff. Hence, the probability of going for the next backoff is:
P b a c k o f f = p 2 + ( 1 p 2 ) α .

6.1. Reliability

A transmission is always successful when exactly one ZigBee device transmits without any channel error or collision. The packet error depends on the bit error rate and the packet length. Let, L D a t a be the length of the data packet in bits, N be the number of ZigBee devices and T p k t be the ZigBee packet duration. A transmission will be successful if the ZigBee device receives the acknowledgment packet corresponding to its transmitted packet. The coordinator sends the acknowledgment packet, if exactly one ZigBee device transmits without any channel error and no WiFi device starts transmission during the ongoing ZigBee transmission. Hence, the successful transmission probability for a ZigBee device is:
P s = N ϕ ( 1 ϕ ) N 1 ( 1 ( 1 ϕ ) N ) ( 1 P b ( ζ ) ) L D a t a e T p k t λ w .
The packet is dropped mainly due to retry limits or channel access failure. The channel access failure occurs when the tagged ZigBee device does not find any channel ideal during m a x M a c B a c k o f f number of backoffs. Considering the Markov chain model presented in Figure 8, the probability of channel access failure can be derived as follows.
P c f = { p 2 + ( 1 p 2 ) α } b m , 0 .
In our proposed modified superframe, separate durations are allotted for collided devices, i.e., only failure devices contend during those periods. Let P s j be the probability of successful transmission by a ZigBee device in the j-th allocated retransmission duration of the proposed modified superframe. If the expected number of ZigBee devices that contend in the j-th retransmission period is N j , then:
P s j = N j ϕ ( 1 ϕ ) N j 1 ( 1 ( 1 ϕ ) N j ) ( 1 P b ( ζ ) ) L D a t a e T p k t λ w .
Let us assume that m a x F r a m e R e t r i e s = r . Hence, the probability of transmission failure during all r attempts is:
P t f = j = 1 r ( 1 P s j )
It is assumed that the generated data packets are first buffered by each device and then are transmitted to the coordinator. However, the ZigBee device has buffer constraints. Let the data arrival rate of the ZigBee devices be λ z , the service rate be μ z and the buffer maximum be l number of packets. Hence, the device can calculate its utilization rate, which is ρ z = λ z μ z . Let P b f be the probability that the buffer of the ZigBee device is full, i.e., there are l number of packets in the buffer of the ZigBee device. Hence, the newly-generated packet will be discarded due to full buffer being:
P b f = ρ z l i = 0 l ρ z i
Furthermore, the reliability can be deduced as follows.
P R = ( 1 P c f ) ( 1 P t f ) ( 1 P b f )

6.2. Throughput

Let S be the normalized throughput of a ZigBee device. The ratio of average time occupied by the successful transmission information to the interval between two consecutive transmissions is known as normalized throughput. The channel is sensed as busy, if there is at least one ZigBee device sending packets. Let P t r j be the probability that there is at least one transmission during the j-th time transmission. Again, there are N j ZigBee devices attached to the coordinator during j-th time transmission, and ϕ is the probability that a ZigBee device attempts carrier sensing for the first time for transmission. Hence,
P t r j = ( 1 ( 1 ϕ ) N j ) ( 1 α )
Therefore, the normalized throughput of a ZigBee device during the j-th time transmission is:
S j = P t r j P s j L D ( 1 P t r j ) σ + P t r j P s j T s + P t r j ( 1 P s j ) T c
where T s is the average time for successful transmission and T c is the average time that the channel is occupied due to collision. Let L D be the time of the payload and σ be the duration for a unit backoff slot. Since acknowledgment is transmitted separately in the notice period in our proposed superframe, the durations of these T s and T c are equal and are calculated as:
T s = T c = T c c a + σ + T p k t
where T c c a , T p k t and σ are the time duration for performing CCA, for transmitting the data and the duration of one backoff slot, respectively. Hence, the average normalized throughput of a ZigBee device is:
S = j = 0 r S j r

6.3. Delay

The network delay is defined as the total time taken for the information to travel from the source device to the destination device. It is to be noted that in our proposed modified superframe transmission, failure devices use separate retransmission period. Let D j be the delay that the packet is transmitted successfully at time j + 1 . Then,
D j = T s + j T R + i = 0 j D b
where D b is the delay that the ZigBee device found the channel idle during m a x M a c B a c k o f f number of backoffs, T s is the average time of successful transmission and T R is the allocated retransmission duration due to transmission failure. Let B k be the event that the channel access is successfully at the ( k + 1 ) -th time provided the channel access is failed for k-th times. Let B be the event that the channel access is successful within m a x M a c B a c k o f f . Hence, the expected delay for backoff during one transmission attempt is:
D b = k = 0 m k P b a c k o f f k ( 1 P b a c k o f f ) 1 P b a c k o f f m + 1 ( C W i 1 2 )
A device has to wait until the next superframe starts, if the packet is generated outside of the contention period. The packet arrival of ZigBee devices is assumed to follow the Poisson distribution with average packet arrival rate λ z . Then, the waiting time is:
W t i m e = 0 B I ( B I x ) λ z e λ z x d x .
Propagation delay P d e l a y is the amount of time it takes for one bit to travel through a one-hop destination. Let E j be the event that the packet is transmitted successfully at time j + 1 provided the packet has been failed for j times. Let E be the event that the packet is transmitted successfully within m a x F r a m e R e t r i e s . Considering the m a x F r a m e R e t r i e s = r, the conditional probability can be derived as follows.
P r ( E j / E ) = P s j + 1 k = 1 j ( 1 P s k ) 1 k = 1 r ( 1 P s k ) .
Hence, the delay can be derived as follows.
D = j = 0 r P r ( E j / E ) D j + W t i m e + P d e l a y .

6.4. Energy

In this section, we analyze the energy consumption of the ZigBee devices in smart home applications. Here, the energy consumption is defined as the average energy consumption by a ZigBee device to successfully transmit one slot amount of data. Let us consider P r x and P t x to be the energy consumption to receive and to transmit a packet, respectively. ZigBee devices are assumed to be in the power saving state during the backoff procedure. Taking T p k t , T A , T c c a as the time duration of transmitting a packet, receiving an acknowledgment and CCA duration, respectively, the average energy consumption per device can be analyzed as follows.
E = α T c c a P r x + ( 1 α ) { ( 1 P s ) E c + P s E s } ( 1 α ) P s T p k t
where E s is the energy consumption of successful transmission and E c is energy consumption due to collision, which can be calculated as:
E s = T c c a P r x + T p k t P t x + T A P r x E c = T c c a P r x + T p k t P t x

7. Performance Evaluation

In this section, our proposed models are evaluated and validated by using the OMNeT++ [28] simulator. We conduct the simulation to compare the performance of our proposed scheme with IEEE 802.15.4e. For the simulation, we consider the star topology and devices are located randomly in the area of 30 × 20 m 2 with the PAN coordinator at the center. Again, we compare our work with the IEEE 802.15.4e standard for channel access failure, throughput, reliability, average MAC delay, energy consumption and packet drop rate over the Poisson arrival rate. We validate and compare our proposed mechanisms with the IEEE 802.15.4e standard. According to the standard, simulation parameters are set as shown in Table 2. Each simulation is performed for 50 rounds, and the results are produced by taking the average of those 50 rounds.
As shown in Figure 9, the number of devices are taken along the X axis, and the corresponding channel access failure probability is obtained as shown along the Y axis. It is observed that the channel access failure probability increases as the number of devices attached to a coordinator increases. However, the channel access failure following our schemes during the retransmission is negligible. In our simulation, it is considered that all devices can assess the channel during the contention access period, i.e., in the transmission period of the superframe. However, the devices that fail to assess the channel during this transmission period can access the channel during the newly-allocated retransmission period. As shown in Figure 10, when our work is compared with the IEEE 802.15.4e scheme, it is found that the channel access failure probability of our work is significantly less during both the transmission and retransmission period. Again, as shown in Figure 9, it is observed that our simulation result matches the analytical one.
The throughput corresponding to different numbers of devices is depicted in Figure 11, and it is observed that the throughput decreases as the number of devices attached to a PAN coordinator increases irrespective of their packet arrival rate. When the packet arrival rate is one packet per second and five devices are attached to the coordinator, the normalized throughput is 0.46. It is observed that the throughput of our work is higher during both transmission and retransmission, which is reflected in Figure 12, when we compare our work with the IEEE 802.15.4e standard.
Figure 13 compares the reliability of data transmission with respect to different numbers of devices. When we consider the packet arrival rate as one packet per second, it is observed that the reliability decreases, along with the number of devices attached to a PAN coordinator increases. From Figure 14, it is observed that the reliability of our work is higher than the IEEE 802.15.4e scheme, and the simulation results of our scheme match with the analytical one.
As shown in Figure 15, the number of devices is taken along the X axis, and the corresponding delay is obtained as shown along the Y axis. It is observed that the delay increases slowly as the number of devices increases when we consider the packet rate as one packet per second. When the data payload is 100 bytes and five devices are considered, the delay is nearly 0.056 s during the transmission and 0.059 s during retransmission, if the packet arrival rate is one packet per second. From Figure 16, it is also observed that the packet transmission delay in our work is significantly less as compared to the IEEE 802.15.4e scheme for different arrival rates, and our simulation result coincides with the analytical one.
Figure 17 shows the packet drop rate with the variable number of devices. It is observed that the packet drop rate increases as the of number of devices increases considering one packet per second. When the data payload is 100 bytes and five devices are considered, the packet drop rate is nearly 0.22 during the transmission. However, the packet drop rate is negligible during the retransmission. As shown in Figure 18, the packet drop rate of our work is significantly less as compared to the IEEE 802.15.4e scheme.
The energy consumption in joules/byte with different numbers of devices when one packet per second arrives at a device is shown in Figure 19. The energy consumption increases as the number device increases. When we consider only five devices and the data payload is 100 bytes, the average energy consumption for successful packet transmission is nearly 2.38466 × 10 5 Joule during the transmission and 1.81308 × 10 5 Joule during the retransmission. The energy consumption of our work is significantly less than the IEEE 802.15.4e scheme and is shown in Figure 20. We achieve this improved result through our proposed separate retransmission period and single CCA operation rather than two times consecutive CCA operations as suggested in the IEEE 802.15.4e standard and by allowing only collided devices to contend during the retransmission period.
As shown in Figure 21, the number of devices is taken along the X axis, and the corresponding energy consumption in joules is obtained as given along the Y axis. It is observed that the energy consumption increases as the numbers of devices attached to a coordinator increase. However, the energy consumption in our schemes is significantly less for different interference levels of WiFi as compared to the IEEE 802.15.4e. Figure 22 shows the delay with a variable number of devices under WiFi interferences. It is observed that the delay increases as the numbers of devices increase considering one packet per second. However, the delay of our mechanism is significantly less as compared to the IEEE 802.15.4e scheme.
Figure 23 compares the reliability of data transmission with respect to different numbers of devices under WiFi interferences. It is observed that the reliability of our work is significantly higher than the IEEE 802.15.4e scheme. The throughput corresponding to different numbers of devices is depicted in Figure 24, and it is observed that the throughput decreases as the number of devices attached to a PAN coordinator increases irrespective of the interference level. It is observed that the throughput of our work is marginally higher than the IEEE 802.15.4e scheme.

8. Conclusions

In this paper, a newly-designed superframe structure is proposed for the IEEE 802.15.4e-enabled sensor nodes, where dynamic allocation is made for the transmission failure devices to increase the reliability and reduce the delay. A new data frame structure is proposed to identify the devices due to collision in the hidden terminal problem. A new channel access mechanism is designed based on the current buffer status of the devices, which reduces the packet drop rates and enhances the throughput. Analytical models are developed to study the performance metrics of the network such as reliability, throughput and delay. Our proposed method increases the reliability, throughput and delay significantly of the collided packets. The results obtained from the analytical model and simulation indicate that our mechanisms can improve the performance of the network even if in hidden terminal problems. Hence, our performance analysis models and mechanisms can be implemented in wireless sensor networks for smart home applications, where latency and reliability are the major requirements.

Acknowledgments

This work is partly supported by the Ministry of Science and Technology (MOST), Taiwan, under Grant Numbers 105-2221-E-182-050, 104- 2221-E-182-032, 104-2745-8-182-001 and 105-2221-E-182-043.

Author Contributions

Prasan Kumar Sahoo, Sudhir Ranjan Pattanaik and Shih-Lin Wu conceived of and designed the protocol and experiments, analyzed the data and wrote the paper. Sudhir Ranjan Pattanaik performed the experiments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. IEEE Standard 802.15.4-2011: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). Available online: http://standards.ieee.org/getieee802/download/802.15.4-2011.pdf (accessed on 7 June 2017).
  2. IEEE Standard 802.15.4e-2012: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). Available online: http://ieeexplore.ieee.org/document/6185525/ (accessed on 7 June 2017).
  3. Liu, Q.; Czylwik, A. A collision-aware backoff mechanism for IEEE 802.15.4 wireless sensor networks. In Proceedings of the IFIP Wireless Days (WD), Valencia, Spain, 13–15 November 2013; pp. 1–3. [Google Scholar]
  4. Kim, T.H.; Han, J.S.; Kim, H.S.; Lee, Y.H. Alleviation of contention collision in IEEE 802.15.4 networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; pp. 65–70. [Google Scholar]
  5. Anwar, M.; Xia, Y.; Zhan, Y. TDMA-Based IEEE 802.15.4 for Low-Latency Deterministic Control Applications. IEEE Trans. Ind. Inform. 2016, 12, 338–347. [Google Scholar] [CrossRef]
  6. Shrestha, B.; Hossain, E.; Choi, K.W. Distributed and Centralized Hybrid CSMA/CA-TDMA Schemes for Single-Hop Wireless Networks. IEEE Trans. Wirel. Commun. 2014, 13, 4050–4065. [Google Scholar] [CrossRef]
  7. Wijetunge, S.; Gunawardana, U.; Liyanapathirana, R. Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes. In Proceedings of the 11th International Symposium on Communications and Information Technologies, Hangzhou, China, 12–14 October 2011; pp. 303–308. [Google Scholar]
  8. Um, J.Y.; Ahn, J.S.; Lee, K.W. Evaluation of the effects of a grouping algorithm on IEEE 802.15.4 networks with hidden nodes. J. Commun. Netw. 2014, 16, 81–91. [Google Scholar] [CrossRef]
  9. Guennoun, M.; Khanafer, M.; Mouftah, H.T. Modeling of variable Clear Channel Assessment MAC protocol for Wireless Sensor Networks. Comput. Commun. 2015, 59, 67–83. [Google Scholar] [CrossRef]
  10. Wagh, S.S.; More, A.; Kharote, P.R. Performance Evaluation of IEEE 802.15.4 Protocol Under Coexistence of WiFi 802.11b. Procedia Comput. Sci. 2015, 57, 745–751. [Google Scholar] [CrossRef]
  11. Elshabrawy, T. Network throughput analysis of IEEE 802.15.4 enabled wireless sensor networks with FEC coding under external interference. AEU Int. J. Electron. Commun. 2015, 69, 1641–1649. [Google Scholar] [CrossRef]
  12. Ghayvat, H.; Mukhopadhyay, S.C.; Gui, X. Issues and mitigation of interference, attenuation and direction of arrival in IEEE 802.15.4/ZigBee to wireless sensors and networks based smart building. Measurement 2016, 86, 209–226. [Google Scholar] [CrossRef]
  13. Zhang, X.; Shin, K.G. Cooperative Carrier Signaling: Harmonizing Coexisting WPAN and WLAN Devices. IEEE/ACM Trans. Netw. 2013, 21, 426–439. [Google Scholar] [CrossRef]
  14. Zhang, W.; Suresh, M.A.; Stoleru, R.; Chenji, H. On Modeling the Coexistence of 802.11 and 802.15.4 Networks for Performance Tuning. IEEE Trans. Wirel. Commun. 2014, 13, 5855–5866. [Google Scholar] [CrossRef]
  15. Lee, B.H.; Lai, R.L.; Wu, H.K.; Wong, C.M. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks. Sensors 2010, 10, 6275–6289. [Google Scholar] [CrossRef] [PubMed]
  16. Sahoo, P.K.; Pattanaik, S.R.; Wu, S.-L. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks. Sensors 2017, 17, 168. [Google Scholar] [CrossRef] [PubMed]
  17. Son, K.J.; Hong, S.H.; Moon, S.P.; Chang, T.G.; Cho, H. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks. Sensors 2016, 16, 815. [Google Scholar] [CrossRef] [PubMed]
  18. Pollin, S.; Ergen, M.; Ergen, S.C.; Bougard, B.; Perre, L.V.D.; Moerman, I.; Bahai, A.; Varaiya, P.; Catthoor, F. Performance analysis of slotted carrier sense IEEE802.15.4 medium access layer. IEEE Trans. Wirel. Commun. 2008, 7, 3359–3371. [Google Scholar] [CrossRef]
  19. Recas, J.; Khaled, N.; Barrio, A.A.D.; Hermida, R. Generic Markov model of the contention access period of IEEE 802.15.4 MAC layer. Digit. Signal Process. 2014, 33, 191–205. [Google Scholar] [CrossRef]
  20. Khan, Z.A.; Rasheed, M.B.; Javaid, N.; Robertson, B. Effect of Packet Inter-arrival Time on the Energy Consumption of Beacon Enabled MAC Protocol for Body Area Networks. Procedia Comput. Sci. 2014, 32, 579–586. [Google Scholar] [CrossRef]
  21. Park, P.; Marco, P.D.; Soldati, P.; Fischione, C.; Johansson, K.H. A generalized Markov chain model for effective analysis of slotted IEEE802.15.4. In Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, China, 12–15 October 2009; pp. 130–139. [Google Scholar]
  22. Wijetunge, S.; Gunawardana, U.; Liyanapathirana, R. Performance analysis of IEEE 802.15.4 MAC protocol for WSNs in burst error channels. In Proceedings of the 11th International Symposium on Communications and Information Technologies, Hangzhou, China, 12–14 October 2011; pp. 286–291. [Google Scholar]
  23. Yu, J.; Park, L.; Park, J.; Cho, S.; Keum, C. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks. Sensors 2016, 16, 656. [Google Scholar] [CrossRef] [PubMed]
  24. Bhandari, S.; Moh, S. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks. Sensors 2016, 16, 401. [Google Scholar] [CrossRef] [PubMed]
  25. Ma, X.; Trivedi, K.S. Reliability and performance of general two-dimensional broadcast wireless network. Perform. Eval. 2016, 95, 41–59. [Google Scholar] [CrossRef]
  26. Whitehouse, K.; Woo, A.; Jiang, F.; Polastre, J.; Culler, D. Exploiting the capture effect for collision detection and recovery. In Proceedings of the 2nd IEEE Workshop (EmNetS-II), Sydney, Australia, 31 May 2005; pp. 45–52. [Google Scholar]
  27. Shin, S.Y.; Park, H.S.; Kwon, W.H. Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b. Comput. Netw. 2007, 51, 3338–3353. [Google Scholar] [CrossRef]
  28. OMNeT++ Homepage. Available online: http://www.omnetpp.org (accessed on 6 July 2016).
Figure 1. Superframe structure of IEEE 802.15.4e-enabled devices.
Figure 1. Superframe structure of IEEE 802.15.4e-enabled devices.
Sensors 17 01320 g001
Figure 2. Channel access mechanism of IEEE 802.15.4e.
Figure 2. Channel access mechanism of IEEE 802.15.4e.
Sensors 17 01320 g002
Figure 3. Overlapping of the data transmission frame due to the hidden terminal problem. (a) Partial overlapping of the data transmission frame; (b) full overlapping of the data transmission frame.
Figure 3. Overlapping of the data transmission frame due to the hidden terminal problem. (a) Partial overlapping of the data transmission frame; (b) full overlapping of the data transmission frame.
Sensors 17 01320 g003
Figure 4. Address recovery during collisions due to hidden nodes. (a) Address of device Ais recovered correctly; (b) the address of both devices A and B is recovered correctly.
Figure 4. Address recovery during collisions due to hidden nodes. (a) Address of device Ais recovered correctly; (b) the address of both devices A and B is recovered correctly.
Sensors 17 01320 g004aSensors 17 01320 g004b
Figure 5. The proposed data frame structure.
Figure 5. The proposed data frame structure.
Sensors 17 01320 g005
Figure 6. Proposed superframe structure.
Figure 6. Proposed superframe structure.
Sensors 17 01320 g006
Figure 7. Channel overlapping between WiFi and ZigBee devices.
Figure 7. Channel overlapping between WiFi and ZigBee devices.
Sensors 17 01320 g007
Figure 8. Markov chain model for the proposed channel access mechanism.
Figure 8. Markov chain model for the proposed channel access mechanism.
Sensors 17 01320 g008
Figure 9. Validation of our proposed scheme for channel access failure for different numbers of devices.
Figure 9. Validation of our proposed scheme for channel access failure for different numbers of devices.
Sensors 17 01320 g009
Figure 10. Comparison of channel access failure for different numbers of devices.
Figure 10. Comparison of channel access failure for different numbers of devices.
Sensors 17 01320 g010
Figure 11. Validation of the throughput of our proposed scheme for different numbers of devices.
Figure 11. Validation of the throughput of our proposed scheme for different numbers of devices.
Sensors 17 01320 g011
Figure 12. Comparison of the throughput of our proposed scheme with the IEEE 802.15.4e standard.
Figure 12. Comparison of the throughput of our proposed scheme with the IEEE 802.15.4e standard.
Sensors 17 01320 g012
Figure 13. Validation of the reliability of our proposed scheme for different numbers of devices.
Figure 13. Validation of the reliability of our proposed scheme for different numbers of devices.
Sensors 17 01320 g013
Figure 14. Comparison of the reliability of our proposed scheme with the IEEE 802.15.4e standard.
Figure 14. Comparison of the reliability of our proposed scheme with the IEEE 802.15.4e standard.
Sensors 17 01320 g014
Figure 15. Validation of delay of our proposed scheme for different numbers of devices.
Figure 15. Validation of delay of our proposed scheme for different numbers of devices.
Sensors 17 01320 g015
Figure 16. Comparison of the delay of our proposed scheme with the IEEE 802.15.4e standard.
Figure 16. Comparison of the delay of our proposed scheme with the IEEE 802.15.4e standard.
Sensors 17 01320 g016
Figure 17. Validation of the packet drop rate of our proposed scheme for different numbers of devices.
Figure 17. Validation of the packet drop rate of our proposed scheme for different numbers of devices.
Sensors 17 01320 g017
Figure 18. Comparison of the packet drop of our proposed scheme with the IEEE 802.15.4e standard.
Figure 18. Comparison of the packet drop of our proposed scheme with the IEEE 802.15.4e standard.
Sensors 17 01320 g018
Figure 19. Validation of the energy consumption of our proposed scheme for different numbers of devices.
Figure 19. Validation of the energy consumption of our proposed scheme for different numbers of devices.
Sensors 17 01320 g019
Figure 20. Comparison of the energy consumption of our proposed scheme with the IEEE 802.15.4e standard.
Figure 20. Comparison of the energy consumption of our proposed scheme with the IEEE 802.15.4e standard.
Sensors 17 01320 g020
Figure 21. Comparison of the energy consumption of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Figure 21. Comparison of the energy consumption of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Sensors 17 01320 g021
Figure 22. Comparison of the delay of our scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Figure 22. Comparison of the delay of our scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Sensors 17 01320 g022
Figure 23. Comparison of the reliability of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Figure 23. Comparison of the reliability of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Sensors 17 01320 g023
Figure 24. Comparison of the throughput of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Figure 24. Comparison of the throughput of our proposed scheme with the IEEE 802.15.4e standard under different WiFi interference levels.
Sensors 17 01320 g024
Table 1. Notation table.
Table 1. Notation table.
NotationValue
NNumber of devices attached to PAN coordinator;
p 1 Packet generation probability;
σ Unit backoff slot duration;
p 2 Probability to defer transmission;
ϕ Probability of channel access for first time;
α Probability of channel busy during CCA;
P b ( ζ ) Probability of bit error rate;
P s Probability of transmission attempt successful;
T c c a Time duration for CCA;
T p k t Average data packet transmission duration;
Table 2. Simulation parameters.
Table 2. Simulation parameters.
NotationValue
Radio band 2.4 GHz
Data rate250 kbps
Carrier sensing sensitivity 85 dBm
Communication channel number11
Beacon interval 15.6 × 2 5 ms
Superframe duration 15.6 × 2 3 ms
Unit backoff duration20 symbols
PHY overhead6 bytes
MAC overhead3 bytes
Transmission energy consumption 9.1 mA
Receiving energy consumption 5.9 mA
Turnaround energy consumption 7.5 mA

Share and Cite

MDPI and ACS Style

Sahoo, P.K.; Pattanaik, S.R.; Wu, S.-L. A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference. Sensors 2017, 17, 1320. https://doi.org/10.3390/s17061320

AMA Style

Sahoo PK, Pattanaik SR, Wu S-L. A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference. Sensors. 2017; 17(6):1320. https://doi.org/10.3390/s17061320

Chicago/Turabian Style

Sahoo, Prasan Kumar, Sudhir Ranjan Pattanaik, and Shih-Lin Wu. 2017. "A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference" Sensors 17, no. 6: 1320. https://doi.org/10.3390/s17061320

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop