Skip to main content

Throughput analysis for coexisting IEEE 802.15.4 and 802.11 networks under unsaturated traffic

Abstract

Wireless personal area networks (WPAN) and wireless local area networks (WLAN) based on IEEE 802.15.4 and 802.11 standards operate in overlapping unlicensed frequency bands; therefore, they create harmful interference for each other if deployed in the same geographical area. There has been various performance analysis of the media access control (MAC) protocols for both networks individually. However, the coexistence performance of the two networks is less well-understood, which has been mainly studied via computer simulation. In this paper, we attempt to close this gap by developing a comprehensive mathematical model to evaluate the throughput performance of the carrier sense multiple access with collision avoidance (CSMA/CA) protocols of coexisting 802.15.4 WPAN and 802.11 WLAN. Specifically, we consider two coexistence scenarios, called symmetric and asymmetric scenarios. In the symmetric scenario, wireless nodes in both networks can sense one another while in the asymmetric scenario, only WPAN nodes can sense active WLAN nodes but WLAN nodes cannot sense the transmissions from WPAN nodes. The proposed models effectively resolve the major challenge arising from the fact that the MAC protocols in the two networks operate in different time scales. In addition, we explicitly capture detailed operations and interactions of the underlying MAC protocols. We then propose to employ the developed models for channel allocation to achieve fair throughput sharing among WPAN nodes. Numerical results confirm the excellent accuracy of the proposed models and their usefulness for performance evaluation and design of the heterogeneous network.

1 Introduction

The IEEE 802.15.4-based wireless personal area network (WPAN) has been widely employed in many applications, thanks to its low-cost and low-power characteristics. IEEE 802.11b/g wireless local area network (WLAN) is another standard which has seen tremendous success with widespread adoption worldwide. However, both IEEE 802.15.4 WPAN and IEEE 802.11b/g WLAN operate in the overlapping 2.4-GHz unlicensed ISM spectrum. As a result, the WPAN performance can be severely impacted by transmissions from the higher-power WLAN if they are located in the same geographical area. Study of the coexistence performance between these WPAN and WLAN and development of enhanced solutions for these networks are important research problems. Given ZigBee is one of the most popular standards based on IEEE 802.15.4, we adopt the implicit custom in the literature where we refer to IEEE 802.15.4 WPAN and ZigBee network interchangeably in this paper. Because of the crowded unlicensed ISM spectrum, it would be every challenging to configure all IEEE 802.11 WLAN and IEEE 802.15.4 ZigBee networks to operate on orthogonal frequency bands.

There have been several measurements reporting that the IEEE 802.15.4-based WPAN can experience high packet loss as they operate on the same channel and suffer from co-channel interference from IEEE 802.11 WLAN [15]. Interactions between these two radio technologies were investigated when the distance between ZigBee and WLAN nodes was varied in [1, 2]. In [1], the authors confirmed that the WLAN nodes still perform backoff during the ZigBee transmissions if the WLAN and ZigBee nodes are sufficiently separated. In addition, it was shown that WLAN can suffer from the harmful interference when coexisting with WPAN [3, 6]. In [3], the authors demonstrated the significant performance degradation of WLAN when the two networks coexist. Specifically, WLAN throughput is degraded more significantly as the ZigBee duty cycle or WLAN transmission rate increases. In addition, the UDP packet error rate increases and becomes very noticeable as the ZigBee duty cycle increases. This implies that retransmissions at the link layer could not completely shield the collisions and interference from the WPAN. Furthermore, the main reason behind the performance degradation of the WLAN is that the WPAN backoff slot is significantly longer than that of the WLAN (320 versus 20 μs, respectively), which reduces the effectiveness of the listen-before-send mechanisms of the two media access control (MAC) protocols.

Moreover, the work [7] confirmed that WLAN packet error rate does not significantly depend on the number and traffic of ZigBee nodes while ZigBee nodes experience much higher packet error rate when coexisting with the WLAN. Moreover, the ZigBee packet error rate increases significantly as the WLAN traffic arrival rate becomes larger. However, the ZigBee packet error rate can be improved considerably as we increase the ZigBee polling time or the ZigBee transmission power (or signal-to-interference ratio (SIR)). In [8], it was illustrated via experimental study that the ZigBee packet error rate increases with decreasing frequency offsets between communication bands of WLAN and WPAN. This is because the WLAN power spectral density is not uniform over the communication bandwidth. Moreover, it was shown again in this work that the WPAN can improve its packet error rate with higher transmission power. These existing works, therefore, demonstrate the mutual impacts between WLAN and WPAN, and the levels of the mutual impacts on packet error rate and throughput depend on different parameters including the relative distance between them, frequency offset, traffic arrival rate or duty cycle, communication rate, and transmission power.

There have been some efforts in developing more efficient coexistence solutions for WLAN and ZigBee networks. In [9, 10], the authors proposed to employ a ZigBee signaler to cooperate the transmissions of ZigBee and WLAN devices. The authors in [11, 12] proposed to exploit the silent periods during which WLAN nodes are idle for ZigBee nodes’ communications. The work [13] developed the interference detection and channel switching method to enable ZigBee nodes to avoid WLAN interference. In [14], frequency hopping techniques were adopted to mitigate the coexistence interference. Nevertheless, none of these works provided any mathematical model for performance evaluation and enhancement of the coexisting networks.

Throughput analysis for the MAC protocol of either WLAN or ZigBee network under saturated and non-saturated traffic conditions have been conducted separately in the literature. Bianchi was among the first who have developed mathematical models to evaluate the saturated performance of WLAN [15]. In [16], an alternative model based on the approximated p-persistent MAC protocol was devised for performance analysis and optimization of WLAN throughput. Performance study of the unsaturated system where WLAN nodes do not always have packets to transmit was conducted in [17]. The authors in [18] developed an analytical model for the IEEE 802.15.4 network based on the approximated non-persistent MAC under the unsaturated load condition. In [19], the authors proposed to employ renewal theory for analysis of the slotted non-persistent IEEE 802.15.4 MAC. The authors in [20] invented another analytical Markov chain (MC) model for the unsaturated slotted carrier sense multiple access with collision avoidance (CSMA/CA) of the IEEE 802.15.4 MAC considering the superframe structure. The MC model for throughput analysis of saturated and unsaturated IEEE 802.15.4 networks was developed in [21].

Mathematical throughput analysis of coexisting WLAN and ZigBee network is very underexplored in the literature. In [22], the authors performed mathematical analysis for the coexistence of WLAN and ZigBee network under some specific MAC and network settings. Specifically, this work assumed that the clear channel assessment (CCA) mode 2 is employed where each network node can only detect the transmission of other nodes of the same network (transmissions from WLAN nodes are transparent from or cannot be detected by ZigBee nodes and transmissions from ZigBee nodes are transparent from or cannot be detected by WLAN nodes). Moreover, the WLAN was assumed to broadcast data without using the standard CSMA/CA protocol and retransmitting erroneous packets. With these assumptions, the WLAN and WPAN are completely undetected from each other and the analysis is equivalent to studying the impacts of interference from one network to another.

We propose mathematical models to evaluate the coexistence performance of 802.15.4 ZigBee network and 802.11 WLAN. There is discrepancy in the transmission powers of WLAN and WPAN nodes; therefore, the impacts of mutual wireless interference on the throughput performance of WLAN and ZigBee network would depend on the coexistence situations and distances between the network nodes. In this paper, we consider two different scenarios, namely the symmetric and asymmetric ones. Specifically, the symmetric scenario represents the case where WLAN and ZigBee nodes can sense each other (i.e. all network nodes are sufficiently close to one another) whereas the asymmetric scenario describes the setting where ZigBee nodes can sense transmissions from WLAN nodes but WLAN nodes cannot sense the transmissions from ZigBee nodes. In addition, we study the general unsaturated traffic and develop the MC-based mathematical models for both scenarios where the interactions for a typical pair of WLAN and ZigBee nodes are studied considering detailed operations of both MAC protocols. Importantly, we assume that both networks employ the CCA mode 1, which detects a busy channel by comparing the measured signal strength or energy with a predetermined threshold. It is noted that the CCA mode 1 is more commonly used than the CCA mode 2 in practice [7].

Major challenges for developing such analytical models arise from the fact that the two MAC protocols of 802.15.4 WPAN and 802.11 WLAN operate in different time scales and they employ distinct backoff and CCA mechanisms. To overcome these obstacles, we propose to approximate the two MAC protocols by the corresponding p-persistent MAC protocols. Although this type of approximation has been adopted in analyzing the MAC throughput performance of individual networks (e.g. for 802.11 WLAN MAC in [16]), development of comprehensive mathematical models for performance analysis of the coexisting 802.15.4 ZigBee network and 802.11 WLAN is highly non-trivial. This indeed enables us to make important technical contributions toward understanding the complicated coexistence performance of the underlying MAC protocols. In addition, we also discuss how to employ the developed models for fair channel allocation between the two networks. Finally, we present numerical results to validate the proposed analytical model, demonstrate the impacts of different parameters on the throughput performance, and show the usefulness of the model in designing fair channel sharing for the considered heterogeneous environment.

The remaining of this paper is organized as follows. In Section 2, we describe both 802.15.4 and 802.11 MAC protocols and the considered coexistence scenarios. In Section 3, we present the MC-based analytical model for coexistence performance analysis in the symmetric scenario. In Section 4, we describe the throughput analysis for the asymmetric scenario. Application of the proposed framework for channel allocation is discussed in Section 5. We present the numerical results in Section 6 followed by conclusion in Section 7.

2 MAC protocols and coexistence model

In the following, we would like to briefly describe the MAC protocols of the 802.11 and 802.15.4 wireless networks. It is assumed that the reader is familiar with these protocols. For more information about the physical layer and MAC layer of the 802.11 and 802.15.4 with detailed MAC protocol description, the reader is referred to [7, 9, 2325].

2.1 IEEE 802.15.4 MAC protocol

We consider the IEEE 802.15.4 MAC protocol that operates in the beacon mode [23], where a PAN coordinator periodically sends the beacon for synchronization and each ZigBee node competes with others for transmission during the contention access period (CAP) by using the slotted CSMA/CA protocol. In this protocol, there are three important parameters, namely NB represents the number of attempts so far by the current packet, C W is the number of slots that need to be in the “clear” condition by sensing before a device that is allowed to access the channel, and w denotes the number of backoff slots a device needs to wait before sensing the channel. NB is often initiated at 0 and upper-bounded by NBmax=m z while C W is set equal to 2 before each transmission attempt and reset to 2 each time channel is sensed busy.

At the beginning, each ZigBee node independently delays for a random number of slots w chosen in the range from 0 to \(\phantom {\dot {i}\!}2^{{\text {BE}}_{\text {NB}}}\) -1 where BE0=minBE is the initial and minimum backoff exponent and then performs two clear CCAs. If the channel is sensed busy during either CCA, C W is reset to 2, and NB increases by one. That means BENB+1=BENB+1, which is upper-bounded by maxBE. If NB is less than or equal to NBmax, the above backoff and CCA processes are repeated; otherwise, the transmission fails and the node can start this procedure again in the next frame. We denote the ZigBee backoff slot duration as t bo.

2.2 IEEE 802.11 MAC protocol

The IEEE 802.11 MAC protocol is the CSMA/CA-based contention-based access scheme [24]. In this protocol, a WLAN node needs to sense the channel while performing backoff, which is described in the following. If a channel is sensed idle during a Distributed Interframe Space (DIFS) interval, the node proceeds to perform backoff; otherwise, it defers its operation in the current busy period. When the channel is sensed idle for a DIFS interval, the node generates the random backoff delay uniformly chosen in the interval [0, CW-1] and starts counting down while listening to the medium.

Initially, the contention window size CW is set equal to the minimum value CWmin. The node decreases its backoff timer by one for every silent time slot period. Moreover, the backoff timer is suspended as long as the channel is sensed busy (there are transmissions from other nodes). The decrease of the backoff timer is resumed when a channel is sensed idle for a DIFS interval. When the backoff timer reaches zero, the node begins to transmit its packet. If the destination node receives a packet successfully, it waits for a Short Interframe Space (SIFS) interval, and then sends an ACK to the source node.

If the source node does not receive the ACK within an ACK timeout duration, it proceeds to retransmission. For each retransmission, the node doubles the contention window and enters the backoff delay process. If the contention window reaches the maximum contention window \({CW}_{\max }=2^{m_{w}}\text {CW}_{\min }\), it remains unchanged until the transmission succeeds. We denote δ as the WLAN backoff slot duration. According to the 802.15.4 and 802.11 standards, the ZigBee backoff slot duration t bo is much larger than that of the WLAN slot duration δ. This raises one major challenge in developing mathematical models to evaluate the coexistence performance besides the different operations of the two underlying MAC protocols.

2.3 Coexistence model

We consider the coexistence setting where the ZigBee network and WLAN operate on the same frequency channel and geographical area. We assume that WLAN and ZigBee users operate in the non-saturation mode where the users do not always have packets to transmit. The offered load due to each WLAN and ZigBee node is assumed to follow the Poisson distribution with average arrival rates λ w and λ zpkts/s, respectively. We further assume that packets arriving at the nodes are buffered awaiting transmissions. We consider the one-hop star topologies for WLAN and ZigBee network where the coordinators correspond to the access point (AP) in WLAN and PAN coordinator in ZigBee network (Fig. 1).

Fig. 1
figure 1

Coexistence scenarios between WLAN and ZigBee network

Since the transmission power of IEEE 802.11 WLAN node is much larger than that of IEEE 802.15.4 ZigBee nodes, the manner that one network impacts the other would depend on the relative distance between nodes in the two networks. To study the coexistence performance comprehensively, we consider two scenarios. In the first scenario (also called symmetric scenario), any node of either network can perfectly sense and detect the transmissions of any other nodes. This would be the case as the distance between WLAN nodes and ZigBee nodes are small (distance d is small). For the second scenario (all called asymmetric scenario), ZigBee nodes can sense and detect the transmissions of WLAN nodes but the WLAN nodes cannot sense and detect the transmissions of ZigBee nodes. This would happen as the distance d between WLAN nodes and ZigBee nodes are sufficiently large [2]. The considered coexistence scenarios are illustrated in Fig. 1.

3 Performance analysis for symmetric scenario

3.1 Markov chain model

In the considered setting, the nodes of either network are able to sense and detect transmissions from any other nodes. Therefore, we analyze the coexistence performance by defining a MC that captures the interactions for a typical pair of WLAN and ZigBee nodes. The behavior of the pair of the tagged (WLAN, ZigBee) nodes is characterized by the bi-dimensional discrete-time MC {a(t),b(t)} where:

  • a(t) represents the states of the WLAN node including the backoff stages W i (i=1,…,m w ) and idle state I w at time t. From this definition, \(W_{m_{w}}\) denotes the “maximum backoff stage” of the WLAN node.

  • b(t) describes the states of the ZigBee node comprising the idle state I z, backoff stage Z j (j=1,…,m z ), the first CCA state C 1j and the second CCA state C 2,j in backoff stage j, and transmission state T x of the ZigBee node at time t. Again, \(Z_{m_{z}}\) represents the “maximum backoff stage” of the ZigBee node.

Note that most existing MC models for analyzing either IEEE 802.11 or IEEE 802.15.4 MAC protocol individually are based on two-dimensional MC (e.g. the models in [15] and [21]). Applying this approach for coexistence performance analysis of IEEE 802.11 and IEEE 802.15.4 networks would require to establish a four-dimensional MC, which is too complex and non-tractable. By representing the states of each node in the considered (WLAN, ZigBee) pair by a single variable, we attain a much more manageable model. Modeling of the IEEE 802.15.4 MAC protocol using one-dimensional MC has been adopted in [18]; however, analyzing the coexistence performance of the two networks is far more challenging and still an open problem. Note also that the idle states I w and I z for WLAN and ZigBee nodes, respectively, are utilized to capture the cases where the buffers at these nodes are empty.

To analyze the achievable throughput of each network in the considered heterogeneous environment, one has to characterize the transition probabilities of all possible transitions of the MC {a(t),b(t)} based on which the steady-state probabilities can be calculated. Since the two MAC protocols of IEEE 802.11 and IEEE 802.15.4 networks operate in different time scales (i.e. t boδ), we propose to analyze the {a(t),b(t)} over the shorter time scale of WLAN and approximate the backoff mechanisms of both MAC protocols by the corresponding p-persistent MAC. In fact, this approximation has been confirmed to be very accurate for analyzing the WLAN MAC protocol [16]. We will validate the excellent accuracy of this approximation for coexistence performance analysis later in Section 6.

Specifically, in the approximated WLAN p-persistent MAC protocol, the random backoff time is drawn according to a geometric distribution with parameters s i in backoff stage W i where s i =2/(CW i +1) and CW i is the contention window in the backoff stage W i [16]. That means if the channel is idle in a backoff slot, the WLAN node transmits and defers the transmission at backoff stage W i with probability s i and (1−s i ), respectively. In contrast, if the channel is busy, no action is taken. The backoff stage increases when a transmission fails and the retry limit has not been reached. When a transmission succeeds, the WLAN node moves to the idle state I w with probability (1−q w) or to the first backoff stage W 1 with probability q w. We also assume that the WLAN transmission collides with probability p or succeeds with probability 1−p.

To resolve the heterogeneous time-scale issue, we consider the operations of the IEEE 802.15.4 MAC over the WLAN time slot unit. Toward this end, the length of the first and second CCAs, denoted as L C and measured in WLAN backoff slot, is \(L_{\mathrm {C}}=\frac {t_{\text {bo}}}{\delta }L_{\text {cca}}\) where L cca is the length of CCA measured in the ZigBee backoff slot. We also approximate the IEEE 802.15.4 MAC protocol by the corresponding p-persistent MAC protocol. That means the random backoff time in the backoff stage Z j follows the geometric distribution with parameter p j where p j is calculated as [18]

$$\begin{array}{*{20}l} p_{j} &= \frac{2}{2^{\text{BE}_{j}}{t_{\text{bo}}}/{\delta}+1}. \end{array} $$
((1))

Moreover, upon a successful transmission, the tagged ZigBee node changes to the idle state I z with probability 1−q z and to the first backoff state Z 1 with probability q z. At the backoff state Z j , the ZigBee node remains in this backoff state with probability (1−p j ) or enters the first CCA state C 1,j with probability p j . We assumed that the channel is sensed busy in the first CCA and the second CCA occurs with probabilities α and β, respectively. This is the case if there is at least one node rather than tagged pair of (WLAN, ZigBee) nodes that transmit their packets. In the following, we describe the transitions and the corresponding transition probabilities of the MC {a(t),b(t)}.

3.2 Transition probabilities of Markov chain

We can describe the state space S of the MC {a(t),b(t)} as

$$\begin{array}{*{20}l} & S = \left\{\text{all states}~x\text{:} \left(I_{\mathrm{w}}, I_{\mathrm{z}}\right),\left(I_{\mathrm{w}},Z_{j}\right), \left(I_{\mathrm{w}}, C_{k,j}\right),\right. \\ &\left. \left(I_{\mathrm{w}}, T_{x}\right), \left(W_{i}, I_{\mathrm{z}}\right),\left(W_{i},Z_{j}\right), \left(W_{i},C_{k,j}\right),\left(W_{i}, T_{x}\right),\right. \\ &\left. ~i=1,\dots,m_{w};~ j=1,\dots,m_{z};~ k=1,2\right\}. \end{array} $$
((2))

To analyze this MC, we have to determine all possible transitions and the corresponding transition probabilities of this MC. To demonstrate the derivations, we present the transitions of the MC as the tagged WLAN node is in the idle state I w considering all possible transitions between the states of the ZigBee node, which are shown in Fig. 2, in the following. The underlying transitions have the form (I w,y)→(I w,z) for the tagged (WLAN, ZigBee) nodes. Due to the space constraint, derivations for other transitions are given in the online technical report [26].

Fig. 2
figure 2

Transitions of the form (I w,y)→(I w,z) of (WLAN, ZigBee) nodes

Here, the WLAN node remains in the idle state with probability (1−q w) where there is no new packet arrival while the ZigBee node can transit to one of the possible states. Specifically, the transitions illustrated in Fig. 2 occur with the following transition probabilities1

$$ P \left\{I_{\mathrm{w}},C_{1,j}|I_{\mathrm{w}},Z_{j}\right\} = \left(1-q_{\mathrm{w}}\right) p_{j}, \: j \in \left[1,m_{z}\right] $$
((3))
$$ P \left\{I_{\mathrm{w}},C_{2,j}|I_{\mathrm{w}},C_{1,j}\right\} = (1-q_{\mathrm{w}})(1-\alpha), \: j \in \left[1,m_{z}\right] $$
((4))
$$ P \left\{I_{\mathrm{w}},T_{x}|I_{\mathrm{w}}, C_{2,j}\right\} = (1-q_{\mathrm{w}})(1-\beta), \: j \in \left[1,m_{z}\right] $$
((5))
$$ \begin{aligned} {}P \left\{I_{\mathrm{w}},C_{1,j}|I_{\mathrm{w}},C_{k,j-1}\right\} = \left\{ \begin{array}{l} (1-q_{\mathrm{w}})\alpha p_{j},\: j \in (1,m_{z}], k=1 \\ (1-q_{\mathrm{w}})\beta p_{j}, \: j \in (1,m_{z}], k=2 \end{array}\right. \end{aligned} $$
((6))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}},C_{1,1}|I_{\mathrm{w}},C_{k,m_{z}}\right\} = \left\{ \begin{array}{l} (1-q_{\mathrm{w}})\alpha q_{\mathrm{z}} p_{1}, \: k=1 \\ (1-q_{\mathrm{w}})\beta q_{\mathrm{z}} p_{1}, \: k=2 \end{array}\right. \end{array} $$
((7))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}},Z_{j}|I_{\mathrm{w}},C_{k,j-1}\right\} = \frac{\left(1-p_{j}\right)}{p_{j}} P \left\{I_{\mathrm{w}},C_{1,j}|I_{\mathrm{w}},C_{k,j-1}\right\} \end{array} $$
((8))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}},Z_{1}|I_{\mathrm{w}},C_{k,m_{z}}\right\} = \frac{\left(1-p_{1}\right)}{p_{1}} P\left\{I_{\mathrm{w}},C_{1,1}|I_{\mathrm{w}},C_{k,m_{z}}\right\} \end{array} $$
((9))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}},I_{\mathrm{z}}|I_{\mathrm{w}}, C_{k,m_{z}}\right\} = \left\{ \begin{array}{l} (1-q_{\mathrm{w}})\alpha(1-q_{\mathrm{z}}), \: k=1 \\ (1-q_{\mathrm{w}})\beta(1-q_{\mathrm{z}}), \: k=1 \end{array}\right. \end{array} $$
((10))
$$\begin{array}{*{20}l} &{} P\left\{I_{\mathrm{w}}, Z_{1}|I_{\mathrm{w}}, T_{x}\right\} = P\left\{I_{\mathrm{w}}, Z_{1}|I_{\mathrm{w}}, I_{\mathrm{z}}\right\} = (1-q_{\mathrm{w}})q_{\mathrm{z}}(1-p_{1}) \end{array} $$
((11))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}}, C_{1,1}|I_{\mathrm{w}}, T_{x}\right\} = P \left\{I_{\mathrm{w}}, C_{1,1}|I_{\mathrm{w}}, I_{\mathrm{z}}\right\} = (1-q_{\mathrm{w}})q_{\mathrm{z}}p_{1} \end{array} $$
((12))
$$\begin{array}{*{20}l} & P \left\{I_{\mathrm{w}}, I_{\mathrm{z}}|I_{\mathrm{w}},T_{x}\right\} = P \left\{I_{\mathrm{w}}, I_{\mathrm{z}}|I_{\mathrm{w}}, I_{\mathrm{z}}\right\} = (1-q_{\mathrm{w}})(1-q_{\mathrm{z}}). \end{array} $$
((13))

Equation (3) captures the case where the tagged ZigBee node finishes the backoff in the backoff stages Z j and proceeds to the first CCA state C 1,j . Equation (4) represents the case the channel is sensed idle during the first CCA with probability (1−α) after which the ZigBee node enters the second CCA. In (5), we consider the transition of the ZigBee node from the idle channel state during the second CCA to the transmitting state. Equations (6) and (7) describe the scenarios where the ZigBee node experiences the busy channel in the first and second CCAs, respectively. In these cases, the ZigBee node enters the first CCA of the next backoff stage in Eq. (6) or the first CCA of the first backoff stage when it is at the maximum backoff state and its buffer is backlogged in Eq. (7).

Similarly, Eqs. (8) and (9) capture the transitions where the ZigBee node experiences all busy CCAs, and it enters the next backoff stage. Equation (10) corresponds to transitions where the ZigBee node experiences the busy channel for all CCAs at the maximum backoff stage and its buffer is empty; consequently, it enters the idle state. For transitions whose probabilities are given in (11) and (12), the ZigBee node finishes the transmission, its buffer is backlogged, and it evolves to either the first backoff stage or the first CCA of the first backoff stage, respectively. Equation (13) accounts for the case where the ZigBee node’s buffer is empty after its transmission; therefore, it enters the idle state.

3.3 Throughput analysis

Recall that we employ either x or explicit description {a(t),b(t)} to specify a particular state of the MC. Let π(x) denote the steady probability of state x, which is in the state space described in (2). Suppose we arrange all the states x such that their indices range from 0 to v max. In order to calculate the steady-state distribution of the MC, we can write all transition probabilities into the corresponding matrix P whose elements P{x |x} denote the transition probability from states x to states x . Then, the steady-state probabilities can be determined by solving the following equations:

$$ {\boldsymbol{\pi}} \mathbf{P} = {\boldsymbol{\pi}}; \quad \sum\limits_{x=0}^{v_{\max}}\pi(x) = 1. $$
((14))

where π denotes the steady-state probability vector, which is defined as π=[π(0),…,π(v max)]. These steady-state probabilities π are the functions of p, q w, q z, α, and β.

The probability that one node (either WLAN or ZigBee node) attempts to transmit in a generic backoff slot τ is equal to the total probability of the following events: the ZigBee node is in one of the backoff states, it senses the idle channel in the second CCA, and the WLAN node starts transmission at one of the backoff stages. The dwell time of the states in which the ZigBee node is in the transmission states (i.e. states (I w,T x ) and (W i ,T x )) and the sensing states (i.e. states (I w,C k,j ) and (W i ,C k,j )) are T z and L C, respectively where i=1,…,m w , j=1,…,m z and k=1,2; and the dwell time of all other states are 1. Hence, the transmission probability τ can be calculated as in (15) where Ψ is given in (16).

$$ \begin{aligned} \tau &= \frac{1}{\psi} \left(\sum\limits_{i=1}^{m_{w}} s_{i} \sum\limits_{j=1}^{m_{z}} \left[ \pi \left(W_{i},Z_{j}\right) + L_{C} \pi \left(W_{i},C_{1,j}\right) \right]\right. \\ &\left.\quad+ L_{C} \sum\limits_{j=1}^{m_{z}} \sum\limits_{i=1}^{m_{w}}\left(1-\beta+s_{i}\right) \pi\left(W_{i},C_{2,j}\right)\right. \\ & \quad\left. + \, L_{\mathrm{C}}(1-\beta) \sum\limits_{j=1}^{m_{z}} \pi\left(I_{\mathrm{w}},C_{2,j}\right) + \sum\limits_{i=1}^{m_{w}} s_{i} \pi\left(W_{i}, I_{\mathrm{z}}\right)\right) \\ \end{aligned} $$
((15))
$$ \begin{aligned} {}\psi &= \sum\limits_{j=1}^{m_{z}} \left[\sum\limits_{i=1}^{m_{w}} \pi\left(W_{i},Z_{j}\right) + \sum\limits_{k=1}^{2} \pi\left(W_{i},C_{k,j}\right) L_{\mathrm{C}}\right] \\ &\quad+\! \sum\limits_{i=1}^{m_{w}} \left[T_{z} \pi\left(W_{i},T_{x}\right) + \pi\left(W_{i}, I_{\mathrm{z}}\right)\right] \!+ \!T_{z} \pi\left(I_{\mathrm{w}},T_{x}\right)\,+\, \pi\left(I_{\mathrm{w}}, I_{\mathrm{z}}\right)\\ &\quad + \sum\limits_{j=1}^{m_{z}} \left[\pi\left(I_{\mathrm{w}}, Z_{j}\right) + \sum\limits_{k=1}^{2}\pi\left(I_{\mathrm{w}}, C_{k,j}\right) L_{\mathrm{C}}\right] \end{aligned} $$
((16))

Similar to the derivation of τ, the probability that a WLAN node attempts to transmit in a generic slot τ w , the probability that a ZigBee node starts sensing in a generic slot ϕ, and the probability that the ZigBee node attempts to transmit in a generic slot τ z are given respectively as

$$\begin{array}{*{20}l} \tau_{w} &= \frac{1}{\psi} \left(\sum\limits_{i=1}^{m_{w}}s_{i} \sum\limits_{j=1}^{m_{z}} \left[\pi\left(W_{i},Z_{j}\right) + \sum\limits_{k=1}^{2} \pi\left(W_{i},C_{k,j}\right) L_{\mathrm{C}}\right] \right. \\ & \qquad\qquad\qquad\qquad\qquad\qquad\quad \left. + \sum\limits_{i=1}^{m_{w}}s_{i} \pi\left(W_{i}, I_{\mathrm{z}}\right) \right) \end{array} $$
((17))
$$\begin{array}{*{20}l} \phi &= \frac{1}{\psi} \left[ \sum\limits_{i=1}^{m_{w}} \sum\limits_{j=1}^{m_{z}}p_{j}\pi\left(W_{i}, Z_{j}\right) + \sum\limits_{j=1}^{m_{z}}p_{j}\pi\left(I_{\mathrm{w}}, Z_{j}\right)\right] \end{array} $$
((18))
$$\begin{array}{*{20}l} \tau_{z} &= \frac{(1-\beta)L_{\mathrm{C}}}{\psi} \left(\sum\limits_{i=1}^{m_{w}}(1-s_{i})\sum\limits_{j=1}^{m_{z}}\pi\left(W_{i},C_{2,j}\right)\right. \\ & \qquad\qquad\qquad\qquad\qquad\quad\left. + \sum\limits_{j=1}^{m_{z}}\pi\left(I_{\mathrm{w}}, C_{2,j}\right) \right). \end{array} $$
((19))

The collision probability p is calculated as p=1−(1−τ)(n−1) [15] for n=n w+n z where n w and n z denote the number of WLAN and ZigBeez nodes, respectively. The expected length of a generic WLAN slot \(E[S_{t_{w}}]\) can be calculated as2

$${} \begin{aligned} E[S_{ts_{w}}] &= (1-P_{\mathrm{t}})\delta + P_{\text{tw}}(1-P_{\mathrm{s}})(1-P_{\text{tz}})T_{cw} \\ & \quad + P_{\text{tw}}P_{\text{tz}} T_{z} \,+\, P_{\text{tw}} P_{\mathrm{s}} T_{s}\! +\! P_{\text{tz}} (1-P_{\mathrm{s}})T_{z} \!+ \!P_{\text{tz}}P_{\mathrm{s}}T_{z} \end{aligned} $$
((20))

where P t is the probability that there is at least one transmission (either WLAN transmission or ZigBee transmission); P tw and P tz denote the probabilities that there is at least one WLAN transmission and one ZigBee transmission in the considered slot, respectively; and P s represents the conditional probability that there is exactly one node transmitting in a given slot. We can compute these probabilities as follows:

$$\begin{array}{*{20}l} P_{\mathrm{t}} &= 1-(1-\tau)^{n} ;~ P_{\text{tw}} = 1-(1-\tau_{w})^{n_{\mathrm{w}}} \end{array} $$
((21))
$$\begin{array}{*{20}l} P_{tz} &= 1-(1-\tau_{z})^{n_{\mathrm{z}}} ;~ P_{\mathrm{s}} = n\tau(1-\tau)^{n-1}/P_{\mathrm{t}}. \end{array} $$
((22))

The probabilities q w and q z that there is at least one packet to be transmitted from the MAC buffer of a WLAN or ZigBee node can be estimated as [17]

$$\begin{array}{*{20}l} q_{\mathrm{w}} = 1-e^{-\lambda_{\mathrm{w}} E[S_{t_{w}}]} ;~ q_{\mathrm{z}} = 1-e^{-\lambda_{\mathrm{z}} E[S_{t_{w}}]} \end{array} $$
((23))

where λ w and λ z are the packet arrival rates of WLAN and ZigBee nodes, respectively. Therefore, q w and q z are the functions of τ, λ w and λ z.

We now derive the probabilities α and β that the channel is busy in the first and second CCAs, respectively. Let P i|i denote the probability that the channel progresses to the idle state in the next slot given that it is idle in the current slot where these slots are the ZigBee backoff slots. The probability that the channel is idle in a general ZigBee slot can be computed as

$$\begin{array}{*{20}l} P_{i} &= P_{i|i}P_{i}+P_{i|b}\left(1-P_{i}\right) \end{array} $$
((24))

where P i|b denotes the probability that the channel becomes idle given that it is busy at the current slot. Since a busy duration lasts for L=P tw(1−P s)(1−P tz)T cw+P tw P s T s +P tw P tz T z +P tz T z on average, a busy slot will end with probability \(\frac {1}{L}\) during a random slot [19]. There is always an idle slot after the end of a busy slot for ZigBee node. Therefore, an idle slot follows the end of the busy slot occurs if none of WLAN nodes transmits during one ZigBee backoff slot, which yields

$$\begin{array}{*{20}l} P_{i|b} &= \frac{1}{L}(1-P_{\text{tw}})^{L_{\mathrm{C}}}. \end{array} $$
((25))

Let P b|i denote the probability that the channel is busy in current slot k given that it is idle in the previous slot k−1 measured in the ZigBee backoff slot. This can occur when the channel is idle in slot k−2 and at least one ZigBee node performs sensing in that time slot or there is at least one WLAN node transmitting at any WLAN slots in slot k given none of the node transmits during slot k−1. Hence,

$$\begin{array}{*{20}l} P_{b|i} &= (1-(1-\phi)^{n_{\mathrm{z}}})P_{i|i}+(1-P_{\mathrm{t}})^{L_{\mathrm{C}}}P_{\text{tw}}L_{\mathrm{C}}. \end{array} $$
((26))

In addition, we have

$$\begin{array}{*{20}l} P_{i|i} &= 1-P_{b|i}. \end{array} $$
((27))

From (26) and (27), we have

$$\begin{array}{*{20}l} P_{i|i} &= \frac{1-(1-P_{\mathrm{t}})^{L_{\mathrm{C}}}P_{\text{tw}}L_{\mathrm{C}}}{1+(1-(1-\phi)^{n_{\mathrm{z}}})}. \end{array} $$
((28))

Substituting the results in (25) and (28) into (24), we have P i is equal to 1−α.

Finally, the probability that the channel is found to be idle in the second CCA state given the channel is idle in the first CCA is equal to 1−β, which is indeed P i|i . Therefore, α and β are the functions of τ, τ w , τ z and ϕ through P i and P i|i . Hence, we have a system of equations based on which the steady-state probabilities, and probabilities p, q w, q z, α, β can be found by using the numerical method. The throughput achieved by each ZigBee and WLAN nodes can be expressed as

$$ S_{\mathrm{z}} = \frac{T_{z} n_{\mathrm{z}}\tau_{z}(1-\tau)^{n-1}} {E[S_{t_{w}}]} $$
((29))
$$ S_{\mathrm{w}} = \frac{T_{s}n_{\mathrm{w}}\tau_{w}(1-\tau)^{n-1}}{E[S_{t_{w}}]} $$
((30))

which completes the throughput analysis.

4 Performance analysis for asymmetric scenario

In this scenario, the WLAN nodes cannot sense and detect the transmissions of the ZigBee nodes. This means that a particular WLAN node senses the idle channel whenever there is no other WLAN transmissions and it will transmit its packet when its backoff counter reaches zero.

4.1 Analytical model

Since WLAN nodes cannot sense ongoing transmissions from ZigBee nodes, WLAN nodes can start transmissions during ZigBee node’s transmission. We assume that a WLAN transmission collides with other WLAN transmissions with probability P cw while WLAN collisions due to ZigBee transmissions occur with probability P cz. Hence, the WLAN transmission is successful if there is no collision with other WLAN and ZigBee transmissions, which happens with probability (1−P cw)(1−P cz). This yields the collision probability of a WLAN node

$$\begin{array}{*{20}l} P_{c} &= P_{\text{cw}}+P_{\text{cz}}-P_{\text{cw}}P_{\text{cz}}. \end{array} $$
((31))

It can be observed that the WLAN performance can be analyzed similarly to the non-coexisting scenario with the ZigBee network with the new collision probability P c . Therefore, we perform the analysis for WLAN and ZigBee network separately in the following.

4.1.1 WLAN analytical model

The analysis of WLAN in the non-coexisting scenario and unsaturated traffic has been studied using the two dimensional MC model in [17], whose important derivations are given here for completeness. The transmission probability of a WLAN node τ w is given in Eq. (32) where \(\phantom {\dot {i}\!}P_{\text {cw}}=1-(1-\tau _{w})^{n_{\mathrm {w}}-1}\).

$$ \begin{aligned} &{}\tau_{w} \!= \frac{2(1-2P_{c})q_{\mathrm{w}}}{q_{\mathrm{w}} \!\left[(W\,+\,1)(1\,-\,2P_{c}) + {WP}_{c}\left(1\,-\,(2P_{c})^{m_{w}}\right)\right] \,+\, 2(1\,-\,q_{\mathrm{w}})(1\,-\,P_{c})(1\,-\,2P_{c})}. \end{aligned} $$
((32))

The probability that there is at least one WLAN transmission in the considered generic time slot is given as

$$\begin{array}{*{20}l} P_{\text{tw}} = 1-(1-\tau_{w})^{n_{\mathrm{w}}} \end{array} $$
((33))

Let P s be the conditional probability that a WLAN transmission is successful, which is given by

$$\begin{array}{*{20}l} P_{s} &= \frac{n_{\mathrm{w}}\tau_{w}(1-\tau_{w})^{n_{\mathrm{w}}-1}}{P_{\text{tw}}}. \end{array} $$
((34))

Let E[S tw] denote the expected length of a generic WLAN slot, which does not depend on the existence of the ZigBee network. Here, this value is calculated considering the empty WLAN time slot, WLAN collision duration, and WLAN successful transmission duration. Hence, E[S tw] can be computed as

$$\begin{array}{*{20}l} E[S_{\text{tw}}] = (1-P_{\text{tw}})\delta +P_{\text{tw}}P_{s}(1-P_{\text{cz}})T_{s} \\ +P_{\text{tw}}(1-P_{s})T_{cw}+P_{\text{tw}}P_{s}P_{\text{cz}}T_{cw}. \end{array} $$
((35))

The probability q w is given as

$$\begin{array}{*{20}l} q_{\mathrm{w}} &= 1-e^{-\lambda_{\mathrm{w}}E[S_{\text{tw}}]}. \end{array} $$
((36))

4.1.2 ZigBee analytical model

We define the following one-dimensional MC for a tagged ZigBee node Z(t)={b(t)} where b(t) represents the states of a ZigBee node. Specifically, we can describe the state space Z of this MC as

$$\begin{array}{*{20}l} Z & = \left\{\text{all state}~y: I_{\mathrm{z}}, Z_{j}, C_{k,j}, T_{x}, j=1,\dots, m_{z}; k=1,2\right\}. \end{array} $$
((37))

Similar to Section 3, we approximate the ZigBee backoff counter by a geometric random variable with parameter p j during the backoff stage Z j as given in (1). Since each ZigBee node independently determines its backoff value and automatically decreases the backoff counter, the channel sensing procedure of each ZigBee node at two CCAs depends on the WLAN transmissions. Suppose that the channel is sensed busy at the first and second CCA by a tagged ZigBee node with probabilities α and β, respectively. Denote \(P\{\acute {y}|y\}\) as the transition probability from state y to state \(\acute {y}\). Transitions among different states of a tagged ZigBee node are shown in Fig. 3. The probabilities of all possible transitions are listed as follows:

$$\begin{array}{*{20}l} P\{I_{\mathrm{z}}|I_{\mathrm{z}}\} &= P\{I_{\mathrm{z}}|T_{x}\} =1-q_{\mathrm{z}}\\ P\{Z_{1}|I_{\mathrm{z}}\} &= q_{\mathrm{z}}(1-p_{1})\\ P\{Z_{1}|I_{\mathrm{z}}\} &= q_{\mathrm{z}}p_{1}\\ P\left\{Z_{j}|C_{k,j-1}\right\} &= \left\{ \begin{array}{l} \alpha(1-p_{j}); ~k=1, j=2, \dots, m_{z} \\ \beta(1-p_{j});~k=2, j=2, \dots, m_{z} \end{array}\right.\\ P \left\{C_{1,j}|C_{k,j-1}\right\} &= \left\{ \begin{array}{l} \alpha p_{j}; ~k=1, j=2, \dots, m_{z} \\ \beta p_{j}; ~k=2, j=2, \dots, m_{z} \end{array}\right. \\ P \left\{I_{\mathrm{z}}|C_{k,m_{z}}\right\} &= \left\{ \begin{array}{l} \alpha(1-q_{\mathrm{z}});~k=1 \\ \beta(1-q_{\mathrm{z}}); ~k=2 \end{array}\right. \\ P \left\{Z_{1}|C_{k,m_{z}}\right\} &= q_{\mathrm{z}} P\left\{BZ_{j}|C_{k,j-1}\right\} \\ P \left\{C_{1,1}|C_{k,m_{z}}\right\} &= q_{\mathrm{z}}P\left\{C_{1,j}|C_{k,j-1}\right\} \\ P\left\{C_{1,j}|Z_{j}\right\} &= p_{j};~j=1,\dots, m_{z} \\ P\left\{C_{2,j}|C_{1,j}\right\} &= (1-\alpha);~j=1,\dots, m_{z} \\ P\left\{T_{x}|C_{2,j}\right\} &= (1-\beta);~j=1,\dots, m_{z}. \end{array} $$
((38))
Fig. 3
figure 3

Markov chain for tagged IEEE 802.15.4 WPAN node

Let π(y) denote the steady probability of state y, which belongs to the state space Z. Suppose we arrange all states whose indices range from 0 to u max. Let P denote the one-step transition probability matrix and π denote the steady-state probability vector, which is defined as π=[π(0),…,π(u max)]. Here, the elements of matrix P are \(p_{y,\acute {y}}=P\{\acute {y}|y\}\), which are computed in (38). We can calculate the steady-state probabilities of all the states vy solving the following set of equations

$$\begin{array}{*{20}l} \boldsymbol{\pi}\mathbf{P} = \boldsymbol{\pi}; \quad \sum\limits_{y=0}^{u_{\max}}\pi(y) = 1. \end{array} $$
((39))

Note that these steady-state probabilities are functions of α, β, and q z.

4.2 Throughput analysis

The probabilities that a ZigBee node starts sensing and attempts to transmit in a generic slot are given, respectively as

$$\begin{array}{*{20}l} \phi &= \frac{1}{\psi}\sum\limits_{j=1}^{m_{z}}p_{j}\pi(Z_{j}) \end{array} $$
((40))
$$\begin{array}{*{20}l} \tau_{z} &= \frac{(1-\beta)}{\psi}\sum\limits_{j=1}^{m_{z}}\pi\left(C_{2,j}\right) \end{array} $$
((41))

where

$$\begin{array}{*{20}l}{} \psi &\!= \!\pi(I_{\mathrm{z}})+T_{z}\pi(T_{x})+\!\sum\limits_{j=1}^{m_{z}}\pi(Z_{j})+L_{\mathrm{C}}\sum\limits_{j=1}^{m_{z}}\sum\limits_{k=1}^{2}\pi\left(C_{k,j}\right). \end{array} $$
((42))

Let P tz be the probability that there is at least one ZigBee transmissions in the considered slot, which is given by

$$\begin{array}{*{20}l} P_{\text{tz}} &= 1-(1-\tau_{z})^{n_{\mathrm{z}}}. \end{array} $$
((43))

Now, we determine the WLAN collision probability P cz due to ZigBee transmissions. This collision event indeed occurs as a WLAN transmission encounters at least one ZigBee transmission. Since the WLAN and ZigBee are quite separated geographically in the asymmetric scenario, we assume that the WLAN transmission can be corrupted by the ZigBee transmissions with probability γ where γ≤1. In addition, the WLAN collision probability P cz can be expressed as

$$\begin{array}{*{20}l} P_{\text{cz}} &= \gamma P_{\text{tz}}. \end{array} $$
((44))

Recall that the ZigBee node can still sense successfully the WLAN transmissions in the considered asymmetric scenario. Therefore, the expected length of a generic ZigBee slot E[S tz] can be obtained by considering the durations and the corresponding probabilities of the idle slot (t bo) and the busy slot (T z , T s or T cw ) as follows:

$$ \begin{aligned} E[S_{\text{tz}}] &= (1-P_{\mathrm{t}})t_{\text{bo}}+P_{\text{tz}}T_{z}+P_{\text{tw}}P_{s}(1-P_{\text{cz}})T_{s} \\ & \quad +P_{\text{tw}}(1-P_{s})T_{cw}+P_{\text{tw}}P_{s}P_{\text{cz}}T_{cw} \end{aligned} $$
((45))

where P t represents the probability that there is at least one transmission (either WLAN or ZigBee transmission) in the considered time slot

$$\begin{array}{*{20}l} P_{\mathrm{t}} &= 1-(1-\tau_{w})^{n_{\mathrm{w}}}(1-\tau_{z})^{n_{\mathrm{z}}}. \end{array} $$
((46))

Then, the probability q z is obtained as

$$\begin{array}{*{20}l} q_{\mathrm{z}} &= 1-e^{-\lambda_{\mathrm{z}}E[S_{\text{tz}}]}. \end{array} $$
((47))

To compute the τ z and ϕ, we need to know α and β, which can be derived in a similar manner with that in Section 3. In particular, the probability P i|b is given by

$$\begin{array}{*{20}l} P_{i|b} &= \frac{1}{L}(1-P_{\text{tw}})^{L_{\mathrm{C}}} \end{array} $$
((48))

where

$$ \begin{aligned} L &= P_{\text{tz}}T_{z}+P_{\text{tw}}P_{s}(1-P_{\text{cz}})T_{s}+P_{\text{tw}}(1-P_{s})T_{cw} \\ & \quad+ P_{\text{tw}}P_{s}P_{\text{cz}}T_{cw}. \end{aligned} $$
((49))

The probability P b|i is computed similarly to (26)

$$\begin{array}{*{20}l} P_{b|i} &= (1-(1-\phi)^{n_{\mathrm{z}}})P_{i|i}+(1-P_{\mathrm{t}})^{L_{\mathrm{C}}}P_{\text{tw}}L_{\mathrm{C}}. \end{array} $$
((50))

Using the results in (50) and (27), we can obtain P i|i . Then, substituting P i|i and the results in (48) into (24), we obtain the P i . Hence, the probability that a channel is sensed busy in the first CAA α and the second CCA β can be written as α=P i and β=P i|i . Then, all the probabilities can be solved by using the numerical method. Finally, the throughput achieved by the ZigBee and WLAN node can be expressed as

$$\begin{array}{*{20}l} S_{\mathrm{z}} &= \frac{T_{z}n_{\mathrm{z}}\tau_{z}(1-\tau_{w})^{n_{\mathrm{w}}}(1-\tau_{z})^{n_{\mathrm{z}}-1}} {E[S_{\text{tz}}]} \end{array} $$
((51))
$$\begin{array}{*{20}l} S_{\mathrm{w}} &= \frac{T_{s}n_{\mathrm{w}}\tau_{w}(1-\tau_{w})^{n_{\mathrm{w}}-1}(1-P_{\text{cz}})}{E[S_{\text{tw}}]}. \end{array} $$
((52))

Therefore, we have completed the throughput analysis.

5 Fair channel allocation

We describe how to distribute the ZigBee nodes over overlapped and not overlapped channels, which are shared and not shared with WLAN nodes, respectively, to achieve fair throughput sharing among ZigBee nodes by using the proposed analytical models. Let Ω over and Ω non represent the sets of overlapping and non-overlapping channels of ZigBee network and WLAN, respectively.

To determine the channel allocation for ZigBee nodes, let \(S_{\text {over}}^{k}\left (\lambda _{\mathrm {w}},n_{\mathrm {w}},\lambda _{\mathrm {z}},n_{\mathrm {k}}\right)\) be the throughput achieved by a ZigBee node on the overlapping channel f k (f k Ω over) where λ w is the average arrival rate of WLAN, n w is the number of WLAN nodes occupying channel f k , λ z is the average arrival rate of ZigBee nodes, and n k is number of ZigBee nodes assigned channel f k . Also, let \(S_{\text {non}}^{k}\left (\lambda _{\mathrm {z}}, n_{\mathrm {k}}\right)\) be the throughput achieved by a ZigBee node on the non-overlapping channel f k (f k Ω non). These throughput measures can be calculated by using the analytical models presented in the previous Sections 3 and 4 depending on the considered coexistence scenario, which are assumed to be stored in a look-up table.

We are interested in assigning the ZigBee nodes to all channels so that the throughput achieved by each ZigBee node is as even as possible (the perfect scenario is where the throughput of all ZigBee nodes is the same). Here, we assume that the traffic load of WLAN (represented by its average packet arrival rate λ w) and the number of WLAN nodes n w on each overlapping channel are the same for simplicity even though this assumption can be relaxed.3 Suppose there are n z ZigBee nodes. Let n 1 and n 2 be the number of ZigBee nodes assigned to each overlapping and non-overlapping channel, respectively. Then, we obtain the assignment solution by solving the following optimization problem

$$\begin{array}{*{20}l} \min ~ &\Delta S(n_{1}, n_{2}) = |S_{\text{non}}^{l}(\lambda_{\mathrm{z}},n_{2})-S_{\text{over}}^{k}(\lambda_{\mathrm{w}}, n_{\mathrm{w}}, \lambda_{\mathrm{z}}, n_{1})| \\ &\: \forall f_{l}\in \Omega_{\text{non}}, f_{k}\in\Omega_{\text{over}} \\ &\text{s.t.} ~n_{1} |\Omega_{\text{over}}| + n_{2} |\Omega_{\text{non}}| = n_{\mathrm{z}}. \end{array} $$
((53))

Since n 1 and n 2 can only take integer values, the constraint in problem (53) can be written as \(n_{2}=\left \lceil \frac {n_{\mathrm {z}}-n_{1}|\Omega _{\text {over}}|}{|\Omega _{\text {non}}|}\right \rceil \). Since there are only a finite number of possible choices for (n 1,n 2), we can easily search for the one that achieves the minimal objective.

6 Numerical results

We evaluate the ZigBee throughput performance when the ZigBee network coexists with the WLAN network on the same frequency channel. We assume that the packet arrivals of each WLAN and ZigBee node follow the Poisson distribution with mean value of λ w and λ z pkt/s, respectively. In the asymmetric scenario, we assume the probability γ is set to 0.5. To obtain the numerical results presented in this section, we choose the MAC parameters for IEEE 802.11 and IEEE 802.15.4 network as detailed in Table 1.

Table 1 MAC parameters of IEEE 802.11b and IEEE 802.15.4 network

For the considered coexistence model, we assume there are n w WLAN nodes and n z ZigBee nodes, respectively. Also, we consider m w =5 for WLAN and m z =5 for the Zibgee network. We also evaluate the throughput of ZigBee network assuming that the values of CCA, minBE, and maxBE are set equal to 2, 3, and 5, respectively. Simulation results are presented for varying number of ZigBee nodes, varying number of WLAN nodes, and different packet arrival rates of WLAN and ZigBee nodes. We refer to the symmetric and asymmetric scenarios as scenarios 1 and 2 in the following.

To obtain numerical results, we have developed an event-driven simulator on Matlab where we have implemented all MAC protocol functions (randome backoff, CCA, data transmission, ACK, DIFS, and SIFS) for both WLAN and WPAN exactly with the corresponding time intervals. In particular, the backoff slots of the WLAN and WPAN nodes are δ=20 μs and t bo=320 μs, respectively. Therefore, the WPAN nodes are less responsive to accessing the channel compared to WLAN nodes. In addition, we have implemented the corresponding carrier sensing outcomes for the considered symmetric and asymmetric scenarios. Specifically, the WLAN and WPAN nodes can sense the transmissions from each other in the symmetric scenario while the WPAN nodes can sense the transmissions from WLAN nodes but not vice versa in the asymmetric scenario. Moreover, to obtain reliable throughput values for each considered setting, we have run both MAC protocols of the two coexisting networks over sufficiently long simulation time and calculate the achievable throughput along the way. Each simulation run is stopped only if the achievable throughput changes less than 1 % around its stable value. Moreover, each point in the throughput curves of each figure is obtained through one independent simulation run described above. For better presentation, we do not show simulation reliability parameters such as standard deviations in all the figures. Moreover, we have assumed that both WLAN and WPAN employ the fixed transmission rates. Therefore, the link adaptation with multiple rates to exploit the time-varying wireless channel is not considered.

In Fig. 4, we show the throughput of ZigBee network versus the packet arrival rate of WLAN nodes (λ w) for n w=5, 10, n z=5, and two values of packet arrival rate of ZigBee nodes λ z=10, 50 pkt/s for scenario 1. The figure confirms that the throughput achieved by the proposed analytical model matches with the simulation results very well, which validate our model. The figure also shows that the ZigBee throughput decreases when the packet arrival rate of WLAN node increases. Moreover, larger number of WLAN node results in lower throughput for the ZigBee network. Moreover, the ZigBee throughput tends to zero as the WLAN node’s load reaches the saturated regime.

Fig. 4
figure 4

Throughput of 802.15.4 network in coexistence between 802.15.4 and unsaturated 802.11 networks in scenario 1

In Fig. 5, we show that as the number of ZigBee nodes increases, its throughput decreases as expected. In addition, if there is no WLAN nodes coexisting with ZigBee nodes, the ZigBee throughput is much higher than that under the coexistence in scenario 1. This is because WLAN nodes can prevent the channel access from ZigBee nodes. In fact, the ZigBee backoff slot duration is much longer than the WLAN backoff slot duration, which limits the ZigBee nodes’ opportunities to access the channel in comparison with WLAN nodes. The ZigBee throughput performance also varies as we vary the number of WLAN nodes and the packet arrival rate of WLAN nodes as well as the packet arrival rate of ZigBee nodes. Specifically, larger number of WLAN nodes and/or smaller packet arrival rate of ZigBee nodes result in lower throughput of the ZigBee network. Figure 6 demonstrates that when the packet arrival rate of ZigBee node increases, its throughput increases in scenario 1. However, when the ZigBee packet arrival rate reaches the saturation value, the throughput decreases slightly. In fact, with higher ZigBee packet arrival rate, the busy probability in CCAs become higher because of more transmitted packets and WLAN preemption.4

Fig. 5
figure 5

Throughput of 802.15.4 network versus number of ZigBee nodes in scenario 1

Fig. 6
figure 6

Throughput of 802.15.4 network versus ZigBee packet arrival rate in scenario 1

In Fig. 7, we validate the accuracy of the proposed analytical model for scenario 2. The figure shows that, in the presence of WLAN interference, the ZigBee throughput decreases very rapidly down to about 0.025 for ZigBee packet arrival rate λ z=50 and zero for λ z=10. Similar to scenario 1, when the WLAN packet arrival rate increases, the ZigBee throughput decreases dramatically. In scenario 2, the ZigBee throughput is lower and decreases faster than that in scenario 1. This is because, in scenario 2, WLAN nodes cause more collisions to ZigBee transmissions since WLAN nodes cannot sense and detect the ZigBee transmissions. Figure 8 depicts the ZigBee throughput for varying number of ZigBee nodes n z in scenario 2. This figure shows that the ZigBee throughput tends to zero as the number of ZigBee nodes becomes larger.

Fig. 7
figure 7

Throughput of 802.15.4 network versus WLAN packet arrival rate in the scenario 2

Fig. 8
figure 8

Throughput of 802.15.4 network versus number of ZigBee nodes in scenario 2

In Fig. 9, we illustrate the ZigBee throughput versus the ZigBee packet arrival rate. This figure confirms that the ZigBee throughput increases as the ZigBee packet arrival rate increases. However, when the ZigBee packet arrival rate becomes sufficiently large, the ZigBee throughput decreases slightly. This is due to the fact that the busy probabilities in two CCAs are larger as the ZigBee packet arrival rate reaches the saturated traffic condition. In addition, the WLAN preemption and ZigBee collisions due to WLAN transmissions happen more frequently in scenario 2. Therefore, the ZigBee throughput in scenario 2 is much lower than that in scenario 1. In Fig. 10, we demonstrate the WLAN throughput versus the WLAN packet arrival rate. It can be observed that the WLAN throughput increases and then slightly decreases as the WLAN packet arrival rate becomes larger. Moreover, when λ w is less than a critical value around 70 pkt/s, the WLAN throughput in the scenario 1 is higher than that in the scenario 2 and the reverse is true if λ w is larger than the critical WLAN arrival rate.

Fig. 9
figure 9

Throughput of 802.15.4 network versus ZigBee packet arrival rate in scenario 2

Fig. 10
figure 10

Throughput of WLAN versus WLAN packet arrival rate for number of WLAN n w=10 and number of ZigBee network n z=10 in both scenario 1 and scenario 2

Finally, we illustrate the variation of Δ S(n 1,n 2), which is the objective of problem (53), for different channel assignment solutions in Fig. 11 considering the actual channel deployment for ZigBee and WLAN [1] where |Ω over|=12, |Ω non|=4. We set n z equal to 70 and 120 for scenarios 1 and 2, respectively. Here, n w is set to 10 in every overlapping channels, and λ z and λ z are equal to 50 pkt/s. Figure 11 also shows that (n 1, n 2) = (2, 12) results in the fairest throughput sharing for ZigBee nodes in scenario 1 while (n 1, n 2) = (1, 27) achieves fairest throughput sharing for scenario 2.

Fig. 11
figure 11

Variation of Δ S(n 1,n 2) under different channel allocation solutions

7 Conclusions

We have developed analytical models for throughput evaluation of ZigBee nodes coexisting with WLAN nodes in the IEEE 802.11 network in both symmetric and asymmetric scenarios. The proposed models are based on the MC analysis for one pair of typical (WLAN, ZigBee) nodes considering detailed operations of MAC protocols in the two networks. We have then proposed to employ the analytical model for channel allocation that achieves fair throughput sharing among ZigBee nodes. We have validated the analytical models through simulation studies. The impacts of different parameters on the throughput performance of the ZigBee network and WLAN have been also studied.

8 Endnotes

1 In this paper, we adopt the following notation P{y 2,z 2|y 1,z 1}=P{a(t+1)=y 2,b(t+1)=z 2|a(t)=y 1,b(t)=z 1}.

2 The “generic slot” concept has been proposed by Bianchi in his seminal paper on the performance analysis of the CSMA/CA MAC protocol for the 802.11 network [15]. A generic slot indeed captures different possible “slot” or intervals related to the operations of the underlying MAC protocol, namely the backoff slot, the transmission interval during which the data packet is transmitted.

3 If the arrival rates of WLAN on different channels and the number of WLAN nodes n w on each overlapping channel are different, then we have to optimize multiple variables n i , which is the number of ZigBee nodes assigned for channel i. Therefore, it is still possible even though the optimization complexity is higher.

4 The ZigBee network can become unstable for sufficiently large values of the arrival rate of the ZigBee node. Note that for the “unstable” regime, the network will be in the saturated traffic regime where each node always has data to transmit.

References

  1. C-JM Liang, NB Priyantha, J Liu, A Terzis, in Proc. SenSys ’10. Surviving Wi-Fi interference in low power ZigBee networks (NewYork, 2010), pp. 309–322.

  2. W Yuan, X Wang, J-PMG Linnartz, in Proc. IEEE VTC. A coexistence model of IEEE 802.15.4 and IEEE 802.11 b/g (Delft, Netherlands, 2007), pp. 1–5.

  3. S Pollin, I Tan, B Hodge, C Chun, A Bahai, in Proc. CrownCom. Harmful coexistence between 802.15.4 and 802.11: a measurement-based study (Singapore, 2008), pp. 1–6.

  4. A Sikora, VF Groza, in Proc. IEEE IMTC 2005. Coexistence of IEEE 802.15.4 with other systems in the 2.4 GHz-ISM-Band (Ottawa, 2005), pp. 1786–1791.

  5. W Yuan, X Wang, J-PMG Linnartz, IGMM Niemegeers, Coexistence performance of IEEE 802.15.4 wireless sensor networks under IEEE 802.11b/g interference. Wirel. Pers. Commun. 68(2), 281–302 (2013).

    Article  Google Scholar 

  6. I Howitt, JA Gutierrez, in Proc. IEEE WCNC, 3. IEEE 802.15.4 low rate—wireless personal area network coexistence issues (LA, USA, 2003), pp. 1481–1486.

  7. L Angrisani, M Bertocco, D Fortin, A Sona, Experimental study of coexistence issues between IEEE 802.11b and IEEE 802.15.4 wireless networks. IEEE Trans. Instrum. Meas. 57(8), 1514–1523 (2008).

    Article  Google Scholar 

  8. R de Francisco, L Huang, G Dolmans, in Proc. IEEE VTC. Coexistence of WBAN and WLAN in medical environments (Anchorage, AK, US, 2009), pp. 1–5.

  9. X Zhang, KG Shin, Cooperative carrier signaling: harmonizing coexisting WPAN and WLAN devices. IEEE/ACM Trans. Netw. 21(2), 426–439 (2013).

    Article  Google Scholar 

  10. X Zhang, KG Shin, in Proc. ACM MobiHoc. Enabling coexistence of heterogeneous wireless systems: case for ZigBee and WiFi, (2011).

    Google Scholar 

  11. J Huang, G Xing, G Zhou, R Zhou, in Proc. IEEE ICNP 2010. Beyond co-existence: exploiting WiFi white space for ZigBee performance assurance (Kyoto, 2010), pp. 305–314.

  12. S Geirhofer, L Tong, BM Sadler, Dynamic spectrum access in the time domain: modeling and exploiting white space. IEEE Commun. Mag. 45(5), 66–72 (2007).

    Article  Google Scholar 

  13. P Yi, A Iwayemi, C Zhou, Developing ZigBee deployment guideline under WiFi interference for smart grid applications. IEEE Trans. Smart Grid. 2(1), 110–120 (2011).

    Article  Google Scholar 

  14. J-S Han, S-H Lee, H-S Kim, Y-H Lee, in Proc. IEEE WCNC 2011. Performance improvement of IEEE 802.15.4 in the presence of co-channel interference (Cancun, Quintana Roo, 2011).

  15. G Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18(3), 535–547 (2000).

    Article  Google Scholar 

  16. F Cali, M Conti, E Gregori, Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. Netw. 8(6), 785–799 (2000).

    Article  Google Scholar 

  17. F Daneshgaran, M Laddomada, F Mesiti, M Mondin, Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects. IEEE Trans. Wirel. Comm. 7(4), 1276–1286 (2008).

    Article  Google Scholar 

  18. I Ramachandran, AK Das, S Roy, Analysis of the contention access period of IEEE 802.15.4 MAC. ACM Trans. Sens. Netw. 3(4), 1–29 (2007).

    Google Scholar 

  19. X Ling, Y Cheng, JW Mark, X Shen, A renewal theory based analytical model for the contention access period of IEEE 802.15.4 MAC. IEEE Trans. Wirel. Comm. 7(6), 2340–2349 (2008).

    Article  Google Scholar 

  20. CY Jung, HY Hwang, DK Sung, GU Hwang, Enhanced Markov chain model and throughput analysis of the slotted CSMA/CA for IEEE 802.15.4 under unsaturated traffic conditions. IEEE Trans. Veh. Tech. 58(1), 473–478 (2009).

    Article  Google Scholar 

  21. S Pollin, M Ergen, SC Ergen, B Bougard, LVd Perre, I Moerman, A Bahai, P Varaiya, F Catthoor, Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer. IEEE Trans. Wirel. Commun. 7(9) (2008).

  22. SY Shin, HS Park, WH Kwon, Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b. Comput. Netw. 51(12), 3338–3353 (2007).

    Article  Google Scholar 

  23. IEEE 802.15.4 Specification, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANS), (2003).

  24. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE standards 802.11 (1997).

  25. G Thonet, P Allard-Jacquin, P Colle, ZigBee WiFi coexistence,white paper and test report, Schneider Electric (2008).

  26. P Luong, TM Nguyen, LB Le, Throughput analysis for coexisting IEEE 802.15.4 and 802.11 networks under unsaturated traffic. Technical report. Online: http://www.necphy-lab.com/pub/CoexistenceReport.pdf.

Download references

Acknowledgements

This work was supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada under the Strategic Partnership Grant (SPG), UM Project# 40247.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Long Bao Le.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luong, P., Nguyen, T.M. & Le, L.B. Throughput analysis for coexisting IEEE 802.15.4 and 802.11 networks under unsaturated traffic. J Wireless Com Network 2016, 127 (2016). https://doi.org/10.1186/s13638-016-0586-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-016-0586-4

Keywords