Skip to main content

Analysis of superframe adjustment and beacon transmission for IEEE 802.15.4 cluster tree networks

Abstract

Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the low-rate and short-distance wireless personal area network (PAN). A cluster tree network consists of several clusters; each cluster has a coordinator, known as cluster coordinator, and several device nodes. In the cluster tree topology of IEEE 802.15.4, a PAN coordinator periodically transmits beacon frames to its coordinator nodes as well as a coordinator node periodically transmit beacon frames to their device nodes. The main challenge in the cluster tree network is the collisions between beacons or even between beacon and data frames, which degrades the network performance. In order to decrease collisions, this article proposes the superframe adjustment and beacon transmission scheme (SABTS) by assigning the accurate values of beacon order and superframe order for the PAN coordinator, cluster coordinators, and device nodes, and deciding the precise time for the beacon transmission of PAN and coordinator nodes. A Markov chain model for the cluster tree network is developed with taking into account packet retransmission, acknowledgement, and defer transmission. Both analytical and simulation results show that SABTS performs better than IEEE 802.15.4 standard in terms of the probability of successful transmission, network goodput, and energy consumption.

Introduction

Wireless sensor networks based on the IEEE 802.15.4 standard have been designed to specify the physical layer (PHY) and medium access control (MAC) sublayer for low power consumption, short transmission range, and low-rate wireless personal area network (LR-WPAN)[1]. The IEEE 802.15.4 standard has three kinds of topology: star, peer-to-peer, and cluster tree topologies, which can operate on beacon- and non-beacon-enabled modes. The beacon-enabled mode has the most unique features of IEEE 802.15.4, while the beacons are used to synchronize the attached devices, to identify the personal area network (PAN), and to describe the structure of the superframe.

A cluster tree network consists of several clusters; each cluster has a coordinator, known as cluster coordinator, and several device nodes. A PAN coordinator serves as root to form the first cluster and initiates the network. The PAN coordinator and coordinator nodes broadcast beacon frames to their neighboring devices to complete the whole cluster networks. In a cluster tree topology, the PAN coordinator periodically transmits beacon frames to its coordinator nodes as well as the coordinator nodes periodically transmit beacon frames to their device nodes. However, if the coordinator nodes send beacon frames at the same time, collisions will happen among these beacon frames. Consequently, the children nodes in the cluster cannot synchronize and communicate with their coordinators. The main challenge in the cluster tree network of IEEE 802.15.4 beacon-enabled mode is the collisions between beacons or even between beacon and data frames, which degrades the network performance[2–4]. In other words, it is a crucial challenge on the cluster scheduling and collision avoidance (CA) in a cluster tree network.

To solve the aforementioned problem, a time division beacon scheduling (TDBS) and superframe duration (SD) scheduling mechanisms are proposed[2]. The idea of TDBS is to manage beacon frame transmission from coordinator nodes in a non-overlapping way while the idea of SD scheduling is to decide the duty cycle of router nodes. A multi-dimensional scheduling (MDS) is proposed to avoid beacon collision in LR-WPAN, which uses the clean channel searching scan to change the time offset to transmit a new beacon frame during the inactive period[3]. MDS can minimize the possibility of beacon collisions, but the power consumption of the PAN coordinator is more than that of IEEE 802.15.4 standard due to the process of channel searching scan during inactive period. Therefore, in order to improve the network performance by decreasing beacon collisions as well as the collisions between beacon and data packets, this article proposes the superframe adjustment and beacon transmission scheme (SABTS) which is based on the IEEE 802.15.4 slotted carrier sense multiple access with CA (CSMA/CA), to assign the accurate values of beacon order (BO) and superframe order (SO) for the PAN coordinator, cluster coordinators and device nodes, and to decide the precise time for beacon transmission of PAN and coordinator nodes.

A number of mathematical analysis models have been proposed to analyze the performance of IEEE 802.15.4 based on the Markov chain model without considering packet retransmissions[5–11]. Several modified Markov chain models including packet retransmissions have been investigated but not consider the defer transmission[12–15], while the authors of[16–18] improve the Markov chain models by considering the defer transmission. An analytical model based on Markov chain for multi-hop cluster network has been studied without taking into account the acknowledgement (ACK) to confirm the successes of data packet transmission, the defer transmission, and packet retransmission[19]. Lastly, we propose an analytical model based on Markov chain for SABTS cluster tree network with taking into account packet retransmission, ACK, and defer transmission by modifying the Markov chain model from[17]. The major contribution of this article is to model the channel access for a cluster tree network to obtain network goodput and energy consumption based on the proposed Markov chain.

Overview of IEEE 802.15.4

In the beacon-enabled mode of IEEE 802.15.4, each node employs two system parameters: BO and SO, which define beacon interval (BI) and SD, respectively, i.e., BI = aBaseSuperframeDuration × 2BO and SD = aBaseSuperframeDuration × 2SO, for 0 ≤ SO ≤ BO ≤ 14. aBaseSuperframeDuration denotes the minimum number of symbols in an active period, which is fixed to 960 symbols. The active period of each superframe consists of three parts: beacon, contention access period (CAP) and contention free period (CFP), while the active period is further equally divided into 16 time slots called aNumSuperframeSlots. The length of one slot is equal to aBaseSlotDuration × 2SO symbols, where aBaseSlotDuration is the minimum number of symbols in a slot and equal to 60 symbols. Figure1 shows an example of the superframe structure. In IEEE 802.15.4 standard, BO and SO shall be equal for all superframes on a PAN. All devices shall interact with the PAN only during the active portion of a superframe.

Figure 1
figure 1

An example of the superframe structure.

In CAP, each node performs the CSMA/CA algorithm before transmitting data frame or MAC command frame. Each device maintains three parameters: the number of backoff (NB), contention window (CW), and backoff exponent (BE). NB denotes the required NB while attempting to transmit data; CW denotes the number of backoff periods that need to be clear before committing transmission; and BE denotes how many backoff periods a device need to wait before trying to access the channel. The initial value of NB, CW, and BE are equal to 0, 2, and macMinBE, respectively, where macMinBE is equal to 3.

In the located boundary of the next backoff period, a device takes delay for random backoff between 0 and 2BE – 1 unit backoff period (UBP), where UBP is equal to 20 symbols (or 80 bits). A device performs clear channel assessment (CCA) to make sure whether the channel is idle or busy, when the number of random backoff periods is decreased to 0. The value of CW will be decreased by one if the channel is idle; and the second CCA will be performed if the value of CW is not equal to 0. If the value of CW is equal to 0, it means that the channel is idle after twice CCA; then a device is committed the data transmission. However, if the CCA is busy, the value of CW will reset to 2; the value of NB is increased by 1; and the value of BE is increased by 1 up to the maximum BE (macMaxBE), where the value macMaxBE is equal to 5. The device will repeatedly take random delay if the value of NB is less than the value of macMaxCSMABackoff, where the value of macMaxCSMABackoff is equal to 4; and the transmission attempt is decided to be failure if the value of NB is greater than the value of macMaxCSMABackoff.

Description of SABTS

SABTS aims to assign the accurate values of BO and SO for the PAN coordinator, cluster coordinators and device nodes, and to decide the precise time for the beacon transmission of PAN and coordinator nodes. In order to guarantee the data transmission from its coordinator nodes, the BI of the PAN coordinator should be the round function to the interarrival time (INTV) of data packets. Let us denote BOPAN be the BO for the PAN coordinator, which can be obtained by Equation 1, where Ncoord denotes the number of coordinator nodes; Rs, Bs, and Ns denote symbol rate, aBaseSlotDuration, and aNumSuperframeSlots, respectively, e.g., Rs, Bs, and Ns are equal to 62,500 symbols/s, 60 symbols, and 16 slots, respectively. To reduce the beacon collisions between the parent and children coordinators, the different BO between coordinators at different depth can be obtained by Equation 2, where BOcoord is the BO for coordinator. The PAN coordinator might often be powered; therefore, the SO for the PAN coordinator (SOPAN) can be set to its BOPAN as shown in Equation 3. For the SD, if we assume there is no CFP, the SD of coordinator (SDcoord) only consists of CAP and beacon as defined in Equation 4, where EstimatedCAPcoord and Lbeacon denote the estimated CAP for coordinator and the length of beacon, respectively, e.g., Lbeacon is equal to 190 symbols.

B O PAN = Log 2 N coord × I N T V × R s B s × N s
(1)
B O coord = B O PAN - 1
(2)
S O PAN = B O PAN
(3)
S D coord = E s t i m a t e d C A P coord + L Beacon
(4)

EstimatedCAPcoord is equal to the BI of coordinator (BIcoord) divided by the number of coordinator nodes (Ncoord), as shown in Equation 5. By using Equations 4 and 5, SDcoord can be obtained by Equation 6. Therefore, the value of SO for coordinator (SOcoord) can be obtained by Equation 7. BO and SO for device nodes (BOdev and SOdev) are decided by its coordinator node, which are equal to BO and SO of its coordinator node as shown in Equation 8.

E s t i m a t e d C A P coord = B I coord N coord = B s × N s × 2 B O coord N coord
(5)
S D coord = B s × N s × 2 S O coord = B s × N s × 2 B O coord N coord + 190
(6)
S O coord = Log 2 2 B O coord N coord + 0.2
(7)
B O dev = B O coord ; S O dev = S O coord
(8)

Based on the aforementioned description, SABTS can be resumed by flowchart as shown in Figure2. In this article, we consider the cluster tree topology with one PAN, three coordinator nodes, and nine device nodes as shown in Figure3. Figure4 shows an example of the superframe adjustment and precise time for beacon transmission for the cluster tree topology of Figure3, while INTV of each device node is equal to 0.1. As shown in Figure4, we get the different starting time of beacon transmission among coordinator nodes to avoid beacon collisions. Furthermore, the coordinator nodes and device nodes can save energy consumption during inactive periods. By using SABTS, we get the values of BO and SO for PAN to be equal to 4; the value of BO for each coordinator node and device node is equal to 3; and the value of SO for each coordinator node and device node is equal to 1.

Figure 2
figure 2

The flowchart of SABTS.

Figure 3
figure 3

The selected cluster tree topology.

Figure 4
figure 4

An example of SABTS for three coordinator nodes.

In order to reduce the collisions of the beacon transmissions among coordinator nodes, SABTS adjusts the beacon starting times of PAN and coordinator nodes. Let us denote TxOffsetPAN and TxOffset i to be the beacon starting times of PAN and the i th coordinator node, respectively. TxOffsetPAN starts at the beginning of superframe, then TxOffset i is adjusted by Equation 9, where S D coord i − 1 denotes the SD of the (i – 1)th coordinator node.

T x O f f s e t i = { T x O f f s e t PAN + L Beacon R s , i = 1 T x O f f s e t i − 1 + L Beacon R s + S D coord i − 1 , 2 ≤ i ≤ N coord
(9)

Analysis of SABTS

In this section, the Markov chain model for SABTS in the case of the acknowledged uplink data transmission is analyzed to obtain the stationary probabilities, whose state transition diagram is shown as Figure5. Let b i,j,k be the stationary probability at the stochastic state (s(t) = i, c(t) = j, and r(t) = k), where s(t), c(t), and r(t) represent backoff stage, backoff counter, and number of retransmissions, respectively, shown as Equation 10, where bi,-1,k, bi,-2,k, and bi,-3,k are the stationary probabilities for the first CCA1, the second CCA2, and packet transmission, respectively, at the i th backoff stage and the k th retransmission. Let b Si,k and b Ci,k be the stationary probabilities of the successful transmission and collision at the states of S i,k and C i,k shown as Equations (11) and (12), respectively, where m and R are the maximum NB stage and retransmissions, i.e., they are equal to 4 and 3, respectively.

b i , j , k = lim t → ∞ P s t = i , c t = j , r t = k , for i ∈ 0 , m , j ∈ − 3 , w i – 1 , k ∈ 0 , R
(10)
b S i , k = lim t → ∞ P S s ( t ) = S i , r t = k , i ∈ ( 0 , m ) , k ∈ 0 , R
(11)
b C i , k = lim t → ∞ P C s ( t ) = C i , r t = k , i ∈ ( 0 , m ) , k ∈ 0 , R
(12)
Figure 5
figure 5

The Markov chain model for CSMA/CA.

The parameters used in the Markov chain model are explained as follows. An IDLE state means that a device node has no packet to transmit. Let w i = 2 B E i be the backoff window at the i th backoff stage of a device, where BE i  = 3, 4, 5, 5, and 5 for 0 ≤ i ≤ m. Let us denote q to be the probability that packet arrives during the active period, which can be obtained by Equation 13, where Ldata, R b , and SDT are packet length (in bits), data rate (i.e., 250 kbps), and the SD time (in seconds), respectively; where SDT is equals to S D R s , and 1 I N T V is the number of packets in SDT.

q = L d a t a I N T V × R b × S D T
(13)

The MAC sublayer should transmit packet if the remaining CSMA/CA steps, i.e., two CCA analyses, frame transmission, and any ACK, can be completed before the end of CAP. Conversely, if the current CAP has not enough slots to transmit data packets, it should defer transmission until the beginning of the CAP in the next superframe. Let us denote d to be the probability of defer transmission, which can be obtained by Equation 14, where T txcca , T tx , Tack, and Ttx ack are the CCA transmission time, packet transmission time, time to wait for ACK, and time to transmit ACK from receiver to transmitter node, respectively.

d = 2 T txcca + T tx + T a c k + T t x a c k S D T
(14)

Let α and β be the probabilities that CCA1 and CCA2 are busy, respectively. CCA1 busy means that the tagged node at one of the CCA1 states while at least one of the other nodes at packet transmission state, while CCA2 busy means that the tagged node at one of the CCA2 states while at least one of the other nodes at packet transmission state. Let us denote Pcoll to be the probability of the collision of packet transmission, i.e., the tagged node at packet transmission state while at least one of other nodes in the packet transmission state at the same time. Let us also denote Pfail1 and Pfail2 to be the probabilities of fail transmission due to the maximum number of retransmissions after collisions and due to no channel to use after reaching the maximum backoff stage at the maximum retransmission stage, respectively.

To analyze the Markov chain model, several state transition probabilities are evaluated as shown from Equations 15 to 23. Equation 15 states the probability that the backoff counter is decreased after each slot. Equation 16 gives the probability of finding busy channel either in CCA1 and CCA2. Equation 17 states the probability of picking a backoff state in the next retransmission stage after the collision of packet transmission when having enough time to send packet in the remaining active period and channel idle in both CCA1 and CCA2. Equation 18 states the probability of entering the IDLE state after the collision of packet transmission while reach the maximum retransmission stage after finding the remaining active period to be enough to send packet and channel idle in both CCA1 and CCA2. Equation 19 gives probability that the remaining CAP is not enough to send packet and need to defer and pick backoff state in the next superframe. Equation 20 states the probability of successful packet transmission and picking new random backoff at the first backoff stage. Equation 21 states the probability of entering the IDLE state if the node has no data packet to transmit after successful packet transmission. Equation 22 states the probability of entering the IDLE state due to channel access failure. Equation 23 states the probability of going to the first backoff stage from the IDLE state if the node has data packet to transmit.

P ( i , j , k | i , j + 1 , k ) = 1 , for i ∈ ( 0 , m ) , j ∈ ( 0 , w i − 2 ) , k ∈ ( 0 , R )
(15)
P ( i , j , k | i - 1 ,0, k ) = w i − j w i ( 1 − d ) ( α ) + ( 1 − d ) ( 1 − α ) β = w i − j w i ( 1 − d ) α + ( 1 − α ) β , i ∈ ( 1 , m ) , j ∈ ( 0 , w i − 1 ) , k ∈ ( 0 , R )
(16)
P ( 0 , 0 , k | i , 0 , k − 1 ) = ( 1 − d ) ( 1 − α ) ( 1 − β ) ( P c o l l ) , k ∈ ( 1 , R )
(17)
P ( I D L E | i , 0 , R ) = ( 1 − d ) ( 1 − α ) ( 1 − β ) ( P c o l l ) ( 1 − q )
(18)
P ( 0 , j , k | i , 0 , k ) = w 0 − j w 0 ( d ) , k ∈ ( 0 , R )
(19)
P ( 0 , j , 0 | i , 0 , k ) = w 0 − j w 0 ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P c o l l ) ( q ) , i ∈ ( 0 , m ) , j ∈ ( 0 , w i − 1 ) , k ∈ ( 0 , R )
(20)
P ( I D L E | i , 0 , k ) = ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P c o l l ) ( 1 − q ) , i ∈ ( 0 , m ) , k ∈ ( 0 , R )
(21)
P I D L E | m , 0 , R = ( 1 − d ) [ α + ( 1 − α ) β ] ( 1 − q )
(22)
P ( 0 , j , 0 | I D L E ) = w 0 − j w 0 ( q ) , j ∈ ( 0 , w i − 1 )
(23)

By using Equation 16, the stationary probability b i,j,k can be obtained by Equation 24. From Equation 17, b 0,0,k can be obtained by Equation 25, where Y and X are the probabilities of entering the next backoff stage and the collision of packet transmission in a certain backoff stage, respectively. Similarly, b i,0,k can be obtained by Equation 26. Finally, the steady-state probabilities to perform random backoff, CCA1, CCA2, packet transmission, successful of packet transmission, collision of packet transmission, and idle can be obtained from Equations 27 to 33, respectively. Since the sum of probabilities in the Markov chain must be equal to one, we have Equation 34. By using Equations 27 to 34, we can get the value of b 0,0,0 easily by using excel spreadsheet.

b i , j , k = w i − j w i b i − 1 , 0 , k ( 1 − d ) [ α + ( 1 − α ) β ] = w i − j w i b i , 0 , k
(24)
b 0 , 0 , k = ( 1 − d ) ( 1 − α ) ( 1 − β ) P c o l l ∑ i = 0 m b i , 0 , k − 1 + ( 1 − d ) [ α + ( 1 − α ) β ] b m , 0 , k − 1 = ( 1 − d ) ( 1 − α ) ( 1 − β ) P c o l l ∑ i = 0 m b i , 0 , k − 1 + Y b m , 0 , k − 1 = b 0 , 0 , 0 ( 1 − d ) ( 1 − α ) ( 1 − β ) P c o l l ∑ i = 0 m Y i k + Y m + 1 k = b 0 , 0 , 0 ( 1 − d ) ( 1 − α ) ( 1 − β ) P c o l l 1 − Z 1 − Y k + Z k = b 0 , 0 , 0 ( 1 − d ) ( 1 − α ) ( 1 − β ) P c o l l U k + Z k = b 0 , 0 , 0 ( X k + Z k )
(25)

where Y = ( 1 − d ) [ α + ( 1 − α ) β ] ; Z = Y m + 1 ; U = 1 − Z 1 − Y ; and X = ( 1 − d ) ( 1 − α ) ( 1 − β ) P coll U for simplicity.

b i , 0 , k = b i − 1 , 0 , k ( 1 − d ) [ α + ( 1 − α ) β ] = ( 1 − d ) [ α + ( 1 − α ) β ] i b 0 , 0 , k = Y i b 0 , 0 , k = Y i b 0 , 0 , 0 X k + Z k f o r i ∈ ( 0 , m ) , k ∈ ( 0 , R )
(26)
P r a n d o m b a c k o f f = ∑ i = 0 m ∑ j = 0 w i − 1 ∑ k = 0 R b i , j , k = ∑ i = 0 m ∑ k = 0 R w i 2 Y i b 0 , 0 , k = w 0 2 b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − ( 2 Y ) R 1 − ( 2 Y ) + 4 Y 3 + 4 Y 4 = w 0 2 b 0 , 0 , 0 V Q
(27)

where V = 1 − ( X + Z ) R 1 − ( X + Z ) − 2 X Z and Q = 1 − ( 2 Y ) R 1 − ( 2 Y ) + 4 Y 3 + 4 Y 4 for simplicity.

p [ C C A 1 ] = ∑ i = 0 m ∑ k = 0 R b i , - 1 , k = ( 1 − d ) ∑ i = 0 m ∑ k = 0 R Y i b 0 , 0 , k = b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − Z 1 − Y ( 1 − d ) = b 0 , 0 , 0 V U ( 1 − d )
(28)
P C C A 2 = ∑ i = 0 m ∑ k = 0 R b i , - 2 , k = ( 1 − d ) ( 1 − α ) ∑ i = 0 m ∑ k = 0 R Y i b 0 , 0 , k = b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − Z 1 − Y ( 1 − d ) ( 1 − α ) = b 0 , 0 , 0 V U ( 1 − d ) ( 1 − α )
(29)
P p a c k e t t r a n s m i s s i o n = ∑ i = 0 m ∑ k = 0 R b i , − 3 , k = ( 1 − d ) ( 1 − α ) ( 1 − β ) ∑ i = 0 m ∑ k = 0 R Y i b 0 , 0 , k = b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − Z 1 − Y ( 1 − d ) ( 1 − α ) ( 1 − β ) = b 0 , 0 , 0 V U ( 1 − d ) ( 1 − α ) ( 1 − β )
(30)
P s u c c e s s f u l o f p a c k e t t r a n s m i s s i o n = ∑ i = 0 m ∑ k = 0 R b S i , k = ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P coll ) ∑ i = 0 m ∑ k = 0 R Y i b 0 , 0 , k = b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − Z 1 − Y ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P coll ) = b 0 , 0 , 0 V U ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P coll )
(31)
P c o l l i s i o n o f p a c k e t t r a n s m i s s i o n = ∑ i = 0 m ∑ k = 0 R b C i , k = ( 1 − d ) ( 1 − α ) ( 1 − β ) P coll ∑ i = 0 m ∑ k = 0 R Y i b 0 , 0 , k = b 0 , 0 , 0 X 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ = b 0 , 0 , 0 X V
(32)
P I D L E = ( 1 − q ) ∑ i = 0 m ∑ k = 0 R b S i , k + ( 1 − q ) ∑ i = 0 m b C i , R + ( 1 − q ) d ∑ i = 0 m b i , 0 , 0 + ( 1 − q ) Y b m , 0 , R + ( 1 − q ) P [ I D L E ] = ( 1 - q ) q ∑ i = 0 m ∑ k = 0 R b S i , k + ∑ i = 0 m b C i , R + d ∑ i = 0 m b i , 0 , 0 + Y b m , 0 , R = ( 1 - q ) q b 0 , 0 , 0 1 − ( X + Z ) R 1 − ( X + Z ) − 2 XZ 1 − Z 1 − Y ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P coll ) + ( X 2 + Z 2 ) X + d 1 − Z 1 − Y + Z ( X 2 + Z 2 ) = ( 1 - q ) q b 0 , 0 , 0 V U ( 1 − d ) ( 1 − α ) ( 1 − β ) ( 1 − P c o l l ) + ( X 2 + Z 2 ) ( X + Z ) + d U
(33)
∑ i = 0 m ∑ j = 0 w i − 1 ∑ k = 0 R b i , j , k + ∑ i = 0 m ∑ k = 0 R b i , - 1 , k + ∑ i = 0 m ∑ k = 0 R b i , - 2 , k + ∑ i = 0 m ∑ k = 0 R b i , - 3 , k + ∑ i = 0 m ∑ k = 0 R b S i , k + ∑ i = 0 m ∑ k = 0 R b C i , k + P [ I D L E ] = 1
(34)

Let φ1 and φ2 be the conditional probabilities that a tagged node will be at one of the CCA1 states after backoff and at one of the CCA2 states after sensing channel idle in the CCA1, which can be obtained by Equations 35 and 36, respectively. Let us denote τ to be the probability that a tagged node can transmit a packet, i.e., the tagged node is in one of the CCA1 states and senses the CCA2 is idle, while the other nodes do not in the CCA1 state, which can be expressed by Equation 37, where Nch is the number of children nodes of certain coordinator nodes. Therefore, the previous mentioned probabilities of α, β, Pcoll, Pfail1, and Pfail2 can be expressed by Equations 38 to 42, respectively.

φ 1 = ∑ i = 0 m ∑ k = 0 R b i , - 1 , k ∑ i = 0 m ∑ k = 0 R b i , - 1 , k + ∑ i = 0 m ∑ j = 0 w i - 1 ∑ k = 0 R b i , j , k = 1 − ( X + Z ) R + 1 1 − ( X + Z ) − 2 X Z 1 − Z 1 − Y ( 1 − d ) 1 − ( X + Z ) R + 1 1 − ( X + Z ) − 2 X Z 1 − Z 1 − Y ( 1 − d ) + w 0 2 1 − ( 2 Y ) R + 1 1 − ( 2 Y ) + 4 Y 3 + 4 Y 4 = V ' U ( 1 − d ) V ' U ( 1 − d ) + w 0 2 Q '
(35)

where V ' = 1 − ( X + Z ) R + 1 1 − ( X + Z ) − 2 X Z and Q ' = 1 − ( 2 Y ) R + 1 1 − ( 2 Y ) + 4 Y 3 + 4 Y 4 for simplicity.

φ 2 = ∑ i = 0 m ∑ k = 0 R b i , - 2 , k ∑ i = 0 m ∑ k = 0 R b i , - 1 , k + ∑ i = 0 m ∑ k = 0 R b i , - 2 , k + ∑ i = 0 m ∑ j = 0 w i - 1 ∑ k = 0 R b i , j , k = 1 − ( X + Z ) R + 1 1 − ( X + Z ) − 2 X Z 1 − Z 1 − Y ( 1 − d ) ( 1 − α ) 1 − ( X + Z ) R + 1 1 − ( X + Z ) − 2 X Z 1 − Z 1 − Y ( 1 − d ) ( 2 − α ) + w 0 2 1 − ( 2 Y ) R + 1 1 − ( 2 Y ) + 4 Y 3 + 4 Y 4 = V ' U ( 1 − d ) ( 1 − α ) V ' U ( 1 − d ) ( 2 − α ) + w 0 2 Q '
(36)
τ = φ 1 ( 1 − φ 1 ) N c h − 1 ( 1 − α ) ( 1 − β )
(37)
α = φ 1 1 − ( 1 − τ ) ( N c h − 1 ) 1 I N T V
(38)
β = φ 2 1 − ( 1 − τ ) ( N c h − 1 ) 1 I N T V
(39)
P c o l l = N c h τ 1 − ( 1 − τ ) ( N c h − 1 ) 1 I N T V
(40)
P f a i l 1 = ∑ i = 0 m b C i , R = b 0 , 0 , 0 X R + Z R X
(41)
P f a i l 2 = b m , 0 , R 1 − d α + 1 − α β = b 0 , 0 , 0 ( Y m ) X R + Z R ( 1 − d ) α + 1 − α β
(42)

Let us denote P dr to be the probability of a packet being dropped due to collision retransmission, which can be expressed by Equation 43. Because the probability of collision increases as the value of INTV decreases, we define P INTV be the fraction time of the total number of data packets and ACK packets to the CAP time of the superframe as expressed by Equation 44, where interframe space (IFS) is the minimum period between two successive frames transmitted from device[1]. Let us denote Pdropcoord and Psuccoord to be the probabilities of packet dropped and successful transmission from device node to its coordinator, respectively, which can be obtained by Equations 45 and 46. Similarly, let us denote PdropPAN and PsucPAN be the probabilities of packet dropped and successful transmission from coordinator node to the PAN coordinator, respectively, which can be obtained by Equations 47 and 48.

P dr = ∑ k = 1 R ( P c o l l ) k
(43)
P INTV = L d a t a + I F S + A C K I N T V × S D T N c h − 1
(44)
P d r o p c o o r d = P f a i l 1 + P f a i l 2 + P dr , i f P INTV < 1 1 , i f P INTV = 1
(45)
P s u c c o o r d = 1 − P d r o p c o o r d
(46)
P d r o p P A N = ( P d r o p c o o r d ) 2
(47)
P s u c P A N = ( 1 − P d r o p c o o r d ) ( 1 − P d r o p P A N )
(48)

Based on the aforementioned analyses, the number of successful packets received by PAN (NrecvPAN) and the network goodput (G), can be expressed by Equations 49 and 50, respectively, where Ndev, Nbeacon, and Tsim are the number of device nodes in network, the number of observed BIs of PAN, and the observed simulation time (in seconds), respectively.

N r e c v P A N = N d e v P s u c P A N T s i m I N T V
(49)
G = N r e c v P A N L d a t a N b e a c o n B I P A N
(50)

Basically, the total energy consumption of a cluster tree network consists of the energy consumptions by device nodes, coordinator node, and the PAN coordinator, denoted by Edev, Ecoord, and EPAN, respectively. Let us denote PWidle, PWsleep, PW tx , and PW rx to be the power consumptions for idle, sleeping, transmitting a packet, and receiving a packet, respectively. Let us also denote Lcca, Lbeacon, and Lack to be the lengths of CCA, beacon, and ACK transmissions, respectively. Moreover, let us denote DCdev, DCcoord, and DCPAN to be the duty cycles of device nodes, coordinator nodes, and the PAN coordinator, respectively.

The energy consumptions of a cluster tree network are analyzed as follows. The energy consumption of device nodes consist of seven parts as shown in Equation 51, i.e., the seven parts of energy consumptions are in order for backoff, CCA transmission, data packet transmission, idle, receiving beacon from its coordinator, receiving ACK, and sleeping, respectively, where dnode is the distance between device nodes (or coordinator nodes) and its coordinators (or the PAN coordinator). Similarly, the energy consumption of coordinator nodes can be obtained by Equation 52, which consists of 10 parts as in order for backoff, receiving data packet transmission from its children node, transmitting ACK to its children nodes, transmitting CCA, transmitting data packet, receiving ACK from its coordinator (i.e., PAN coordinator), idle, transmitting beacon, receiving beacon, and sleeping, respectively. The energy consumption of the PAN coordinator can be obtained by Equation 53, which consists of five parts as in order for idle, transmitting beacon, receiving data packet, transmitting ACK, and sleeping. Finally, the total energy consumption of a cluster tree network, Etotal, can be obtained by Equation 54.

E d e v = N d e v T s i m P W i d l e S D d e v B I P A N ∑ i = 0 m ∑ j = 0 w i - 1 ∑ k = 0 R b i , j , k + 2 P W tx I N T V L c c a R b d n o d e ∑ i = 0 m ∑ k = 0 R ( b i , - 1 , k + b i , - 2 , k ) + P W tx I N T V L d a t a R b P s u c c o o r d d n o d e + P W idle P [ I D L E ] S D d e v B I P A N + P W rx R b L b e a c o n B I c o o r d + P W rx I N T V L a c k R b P s u c c o o r d + P W s l e e p ( 1 − D C d e v ) B I d e v B I P A N
(51)
E c o o r d = N c o o r d T s i m N c h P W i d l e S D c o o r d B I P A N ∑ i = 0 m ∑ j = 0 w i - 1 ∑ k = 0 R b i , j , k + N c h P s u c c o o r d P W rx I N T V L d a t a R b + N c h d n o d e P s u c c o o r d P W tx I N T V L a c k R b + 2 P W tx I N T V L c c a R b P s u c c o o r d d n o d e ∑ i = 0 m ∑ k = 0 R b i , - 1 , k + b i , - 2 , k + P W tx I N T V L d a t a R b P s u c c o o r d P s u c P A N d n o d e + P W rx I N T V L a c k R b P s u c P A N + P W i d l e P [ I D L E ] S D c o o r d B I P A N + P W tx L b e a c o n R b d n o d e B I c o o r d + P W rx R b L beacon B I PAN + P W sleep ( 1 - D C coord ) B I coord B I PAN
(52)
E P A N = T s i m P W i d l e P [ I D L E ] S D P A N B I P A N + P W t x L b e a c o n R b d n o d e B I P A N + P W rx I N T V L d a t a R b P s u c P A N N d e v + P W tx I N T V L a c k R b P s u c P A N d n o d e N d e v + P W s l e e p ( 1 - D C P A N )
(53)
E t o t a l = E d e v + E c o o r d + E P A N
(54)

Simulation and analysis results

In this section, simulation experiments are performed by using the extended network simulator NS-2 to validate the analysis and performance evaluation. We consider a cluster topology with 1 PAN coordinator, 3 coordinator nodes, and 9 device nodes as shown in Figure3, where the distance between nodes (dnode) is equal to 10 m. The packet arrival rate follows the Poisson distribution with the INTV of data packets from 0.1 to 1, where packets have the same length of 560 bits. To simulate the performance of power consumption, we consider the radio parameters of Chipcon’s CC2420 2.4 GHz for the IEEE 802.15.4 RF transceiver[20], where the transmitting power PW tx , the receiving power PW rx , the idle power PWidle, and the sleeping power per time unit PWsleep are 31.32 mW, 35.28 mW, 712 μW, and 144 nW, respectively[16]. The BO and SO settings follow the proposed SABTS algorithm, but they are fixed for IEEE 802.15.4 standard, i.e., BO = SO = 6. Table1 summarizes the simulation parameters. We compute the probabilities of collision of packet transmission and entering the next backoff stage in a certain backoff stage. We also compare the analytical (ana) and simulation (sim) results between the proposed algorithm (SABTS) and IEEE 802.15.4 standard (Std) for network goodput, total network energy consumption, and the probability of successful packet transmission arriving at PAN.

Table 1 The simulation parameters

Figure6 shows the probabilities of collision of packet transmission and entering the next backoff stage in a certain backoff stage, denoted as X and Y, respectively, against the INTV of data packets by analytical model. The probabilities of X and Y of SABTS are lesser than those of IEEE 802.15.4 standard. Normally, the lesser probabilities of X and Y, the higher probability of successful packet transmission, which implies the lesser energy consumption needed for packet transmission, i.e., SABTS should have higher network goodput and lesser energy consumption than those of IEEE 802.15.4 standard.

Figure 6
figure 6

Probabilities of collision, X , and entering next backoff, Y , against the INTV of data packets.

Figure7 shows the probability of successful transmission arrives at the PAN coordinator (PsucPAN) against the INTV of data packets by analytical and simulation. SABTS obtains higher probability of successful transmission arriving at the PAN coordinator than that of IEEE 802.15.4 standard because the length of active period and the beacon transmission time are managed appropriately. The probability of successful transmission of IEEE 802.15.4 standard decreases more as traffic load increases because the heavy collision occurs either between beacons or between beacon and data frame.

Figure 7
figure 7

The probability of successful transmission against the INTV of data packets.

Figure8 shows the network goodput against the INTV of data packets. The network goodput obtained by simulation is very close to that obtained by analysis model. It is obvious the network goodput of SABTS is higher than that of IEEE 802.15.4 standard especially when the traffic load increases. The probability of collisions of transmitting beacons and data packets can be decreased, because the beacon transmission time and active period length are accurately managed by SABTS. In the light traffic load (i.e., INTV is equal to 1 and 0.9), the network goodput of SABTS is almost same as those of IEEE 802.15.4 standard; however, SABTS outperforms IEEE 802.15.4 standard as the traffic load increases.

Figure 8
figure 8

The network goodput against the INTV of data packets.

Figure9 shows the network energy consumption against the INTV of data packets. SABTS consumes lesser network energy than that of IEEE 802.15.4 standard. The energy consumption is obtained by summing the energy consumptions of the PAN coordinator, coordinator nodes, and children device nodes. By SABTS, the coordinator nodes and device nodes can save energy consumption during the inactive period as shown in Figure4. Moreover, SABTS gains the greater probability of successful transmission than that of IEEE 802.15.4 standard especially in heavy traffic load, which means that SABTS minimizes the energy consumption when retransmitting data packets.

Figure 9
figure 9

The network goodput against the INTV of data packets.

Conclusions

In this article, SABTS has been proposed to adjust two system parameters of superframe (i.e., BO and SO) and set the precise time for beacon transmission to achieve low energy consumption and to alleviate the collision of beacon and data packet transmissions. This article presented a comprehensive Markov chain analysis of IEEE 802.15.4, specifically for cluster tree network, to predict the network goodput as well as the network energy consumption. The validity of the analytical model is shown by closely matching its predictions to the simulation results. The results obtained by analytical model and simulation experiments show that SABTS performs better than IEEE 802.15.4 standard especially in the network goodput and the network energy consumption. However, this article pays much attention to the slotted CSMA/CA channel access mechanism within the CAP of a superframe, but for certain applications with low latency or specific bandwidth requirements it needs dedicated guaranteed time slots (GTS) channel to transmit its data packets without contention. For further research, the SABTS algorithm will be expected to consider GTS within the CFP of a superframe to improve the network performance.

Abbreviations

ACK:

Acknowledgement

BE:

Backoff exponent

BI:

Beacon interval

BO:

Beacon order

CAP:

Contention access period

CCA:

Clear channel assessment

CFP:

Contention free period

CSMA/CA:

Carrier sense multiple access with collision avoidance

CW:

Contention window

IFS:

Interframe space

INTV:

Interarrival time of data packets

LR-WPAN:

Low-rate wireless personal area network

MAC:

Medium access control sublayer

NB:

Number of backoffs

PAN:

Personal area network

SD:

Superframe duration (in symbols)

SDT:

Superframe duration time (in seconds)

SO:

Superframe order

UBP:

Unit backoff period (80 bits)

macMinBE:

The minimum value of BE

macMaxBE:

The maximum value of BE

macMaxCSMABackoff:

The maximum value of NBs

aBaseSlotDuration:

The minimum number of symbols in a slot

aNumSuperframeSlots:

The number of superframe slots

aBaseSuperframeDuration:

The minimum number of symbols in an active period

BOcoord:

BO for coordinator

BOdev:

BO for device node

BOPAN BO:

for PAN coordinator

SOcoord SO:

for coordinator

SOdev SO:

for device node

SOPAN SO:

for PAN coordinator

Ncoord:

The number of coordinator nodes

Rs:

Symbol rate (62,500 symbols/s)

Bs:

aBaseSlotDuration (60 symbols)

Ns:

aNumSuperframeSlots (16)

BIcoord:

BI of coordinator

SDcoord:

SD of coordinator

SDcoordi–1:

SD of the (i – 1)th coordinator

EstimatedCAPcoord:

Estimated CAP for coordinator

bi:

j,k: Stationary probability at the stochastic state (s(t) = i, c(t) = j and r(t) = k)

s(t):

Backoff stage

c(t):

Backoff counter

r(t):

Number of retransmissions

bi:

-1,k: Stationary probabilities for the first CCA1

bi:

-2,k: Stationary probabilities for the second CCA2

bi:

-3,k: Stationary probabilities for packet transmission

bSi:

k: Stationary probabilities of the successful transmission at the states of Si,k

bCi:

k: Stationary probabilities of the collision at the states of Ci,k

IDLE:

State that a device node has no packet to transmit

m:

The maximum NB stage (4)

q:

Probability that packet arrives during the active period

R:

The maximum number of retransmissions (3)

wi:

Backoff window

α:

Probabilities that CCA1 is busy

β:

Probabilities that CCA2 is busy

Ï•1:

Conditional probabilities that a tagged node will be at one of the CCA1 states after backoff

Ï•2:

Conditional probabilities that a tagged node will be at one of the CCA2 states after sensing channel idle in the CCA1

Ï„:

Probability that a tagged node can transmit a packet

X:

Probabilities of collision of packet transmission in a certain backoff stage

Y:

Probabilities of entering the next backoff stage

dnode:

The distance between device nodes (or coordinator nodes) and its coordinators (or PAN coordinator)

DCcoord:

The duty cycles of coordinator nodes

DCdev:

The duty cycles of device nodes

DCPAN:

The duty cycles of PAN coordinator

Ecoord:

Energy consumptions by coordinator node

Edev:

Energy consumptions by device nodes

EPAN:

Energy consumptions by PAN coordinator

Etotal:

Total energy consumption of a cluster tree network

G:

The network goodput

Lack:

The lengths of ACK transmissions

Lbeacon:

The length of beacon

Lcca:

The lengths of CCA

Ldata:

Packet length (in bits)

Nbeacon:

The number of observed BIs of PAN

Nch:

The number of children nodes of certain coordinator nodes

Ndev:

The number of device nodes in network

NrecvPAN:

The number of successful packets received by PAN

Pcoll:

Probability of collision of packet transmission

Pdr:

Probability of a packet being dropped due to collision retransmission

Pdropcoord:

Probabilities of packet dropped from device node to its coordinator

PdropPAN:

Probabilities of packet dropped from coordinator node to PAN coordinator

Pfail1:

Probabilities of fail transmission due to the maximum number of retransmissions after collisions

Pfail2:

the probabilities of fail transmission due to no channel to use after reaching the maximum backoff stage at the maximum retransmission stage

PINTV:

The fraction time of the total number of data packets and ACK packets to the CAP time of the superframe

Psuccoord:

Probabilities of successful transmission from device node to its coordinator

PsucPAN:

Probabilities of successful transmission from coordinator node to PAN coordinator

PWidle:

The power consumptions for idle

PWrx:

The power consumptions for receiving a packet

PWsleep:

The power consumptions for sleep

PWtx:

The power consumptions for transmitting a packet

Rb:

Data rate (250 kbps)

Tack:

Time to wait for ACK

Tsim:

The observed simulation time (in second)

Ttx:

Packet transmission time

Ttxack:

Time to transmit ACK from receiver to transmitter node

Ttxcca:

CCA transmission time

TxOffsetPAN:

The beacon starting times of PAN

TxOffseti:

The beacon starting times of the ith coordinator node.

References

  1. IEEE 802.15.4, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). (IEEE standard for information technology; 2006.

    Google Scholar 

  2. Koubaa A, Cunha A, Alves M, Tovar E: TDBS: a time division beacon scheduling mechanism for ZigBee cluster-tree wireless sensor networks. Real-Time Syst. J. 2008, 40(3):321-354. 10.1007/s11241-008-9063-4

    Article  MATH  Google Scholar 

  3. Kim J-W, Kim J, Eom D-S: Multi-dimensional channel management scheme to avoid beacon collision in LR-WPAN. IEEE Trans. Consum. Electron. 2008, 54(2):396-404.

    Article  Google Scholar 

  4. Lu J, Van Den Bossche A, Campo E: A new beacon scheduling mechanism for mesh wireless personal area networks based on IEEE 802.15.4. In IEEE 16th Conference on Emerging Technologies & Factory Automation (ETFA). Toulouse, France; 2011:1-4.

    Google Scholar 

  5. Park TR, Kim TH, Choi JY, Choi S, Kwon WH: Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/CA. IEEE. Electron. Lett. 2005, 41(18):1017-1019. 10.1049/el:20051662

    Article  Google Scholar 

  6. Lee T-J, Lee HR, Chung MY: MAC throughput limit analysis of slotted CSMA/CA in IEEE 802.15.4 WPAN. IEEE Commun. Lett. 2006, 10(7):561-563. 10.1109/LCOMM.2006.1673013

    Article  Google Scholar 

  7. Pollin S, Ergen M, Ergen S, Bougard B, Der Perre L, Moerman I, Bahai A, Varaiya P, Catthoor F: Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer. IEEE Trans. Wirel. Commun. 2008, 7(9):3359-3371.

    Article  Google Scholar 

  8. Zhang Y, Shu F: Packet size optimization for goodput and energy efficiency enhancement in slotted IEEE 802.15.4 networks. In IEEE Wireless Communications and Networking Conference. Budapest, Hungary; 2009:1-6.

    Google Scholar 

  9. He J, Tang Z, Chen H-H, Zhang Q: An accurate and scalable analytical model for IEEE 802.15.4 slotted CSMA/CA networks. IEEE Trans. Wirel. Commun. 2009, 8(1):440-448.

    Article  Google Scholar 

  10. Xiao Z, He C, Jiang L: An analytical model for IEEE 802.15.4 with sleep mode based on time-varying queue. In IEEE International Conference on Communications (ICC). Kyoto, Japan; 2011.

    Google Scholar 

  11. Buratti C: Performance analysis of IEEE 802.15.4 beacon-enabled mode. IEEE Trans. Veh. Technol. 2010, 59: 2031-2045.

    Article  Google Scholar 

  12. Tao Z, Panwar S, Gu D, Zhang J: Performance analysis and a proposed improvement for the IEEE 802.15.4 contention access period, vol. 4. In IEEE Wireless Communications and Networking Conference. Las Vegas, USA; 2006:1811-1818.

    Google Scholar 

  13. Park P, Di Marco P, Soldati P, Fischione C, Johansson KH: A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4. In IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. Macau, China; 2009:130-139.

    Google Scholar 

  14. Huang Y-K, Pang A-C, Hung H-N: A comprehensive analysis of low-power operation for beacon-enabled IEEE 802.15.4 wireless networks. IEEE Trans. Wirel. Commun. 2009, 8(11):5601-5611.

    Article  Google Scholar 

  15. Khanafer M, Guennoun M, Mouftah HT: Adaptive sleeping periods in IEEE 802.15.4 for efficient energy savings: markov-based theoretical analysis. In IEEE International Conference on Communications (ICC). Kyoto, Japan; 2011.

    Google Scholar 

  16. Gao B, He C, Jiang L: Modeling and analysis of IEEE 802.15.4 CSMA/CA with sleep mode enabled. In International Conference on Communication Systems. Guangzhou, China; 2008:6-11.

    Google Scholar 

  17. Jung CY, Hwang HY, Sung DK, Hwang GU: Enhanced Markov chain model and throughput analysis of the slotted CSMA/CA for IEEE 802.15.4 under unsaturated traffic conditions. IEEE Trans. Veh. Technol. 2009, 58(1):473-478.

    Article  Google Scholar 

  18. Shrestha B, Hossain E, Camorlinga S: A Markov model for IEEE 802.15.4 MAC with GTS transmissions and heterogeneous traffic in non-saturation mode. In IEEE International Conference on Communication Systems (ICCS). Singapore; 2010:56-61.

    Google Scholar 

  19. Martalo M, Busanelli S, Ferrari G: Markov chain-based performance analysis of multihop IEEE 802.15.4 wireless networks. Performance Eval. J. 2009, 66: 722-741. 10.1016/j.peva.2009.08.011

    Article  Google Scholar 

  20. Chipcon AS: SmartRF® CC2420 datasheet (rev 1.2). Chipcon Corp; 2004.

    Google Scholar 

Download references

Acknowledgments

This study was supported in part by the National Science Council (NSC) of Taiwan under Grant No. NSC 96-2221-E-011-055.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bih-Hwang Lee.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Lee, BH., Al Rasyid, M.U.H. & Wu, HK. Analysis of superframe adjustment and beacon transmission for IEEE 802.15.4 cluster tree networks. J Wireless Com Network 2012, 219 (2012). https://doi.org/10.1186/1687-1499-2012-219

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-219

Keywords