# Evaluation of a duty-cycled asynchronous X-MAC protocol for vehicular sensor networks

- Mohammed Zaki Hasan
^{1}and - Fadi Al-Turjman
^{1}Email author

**2017**:95

https://doi.org/10.1186/s13638-017-0882-7

© The Author(s) 2017

**Received: **21 September 2016

**Accepted: **9 May 2017

**Published: **23 May 2017

## Abstract

An asynchronous medium access control (MAC) duty-cycled protocols have higher energy efficiency and lower packet latency than synchronized ones due to reduced idle listening. Moreover, they provide efficient utilization of energy supplied to mobile sensors. They are considered very important in MAC protocols due to the adverse effects of hidden terminals which causes energy consumption in sensor networks. Therefore, in this paper, the impact of hidden terminals on the performance of an asynchronous duty-cycled MAC protocol X-MAC for vehicle-base sensor is investigated via analysis and simulations. We propose a Markov model to analyze the quality-of-service (QoS) parameters in terms of energy consumption, delay, and throughput. Our analytical model provides QoS parameter values that closely match the simulation results under various network conditions. Our model is more computationally efficient and provides accurate results quickly compared with simulations. More importantly, our model enables the designers to obtain a better understanding of the effects of different numbers of mobile sensor nodes and data arrival rates on the performance of an asynchronous MAC duty-cycled protocol.

## Keywords

## 1 Introduction

Devices in the IoT connect with each other using a variety of protocols, and there still exist a large amount of devices that use older communication protocols but have diverse real-time needs. Therefore, VSNs offers integrated communication protocols for effectively monitoring the physical world, especially in urban areas where a high concentration of vehicles equipped with onboard sensors is expected [5, 6]. Despite this, integration have benefits such as increasing revenue, reducing costs, and energy efficiency. However, there exists a serious problem with traffic congestion in decision making for vehicular traffic which is a challenge due to the particular characteristics, such as the highly dynamic topology and the intermittent connectivity [4]. Consequently, VSN has challenges in supporting the real-time traffic information that can significantly improve the safety of the transportation and can reduce the traffic congestion [7]. This information will help drivers to make smarter decisions in timely manner to prevent accidents, improve the efficiency of the selected route, and provide a safer distance among other vehicles. Therefore, the duty of the embedded sensor is to capture images and measure distance all around a vehicle in order to monitor traffic in an allocated area, while utilizing different devices that can measure several physical traffic parameters [5]. Hence, the view of the vehicle as a sensor platform can improve the traffic flow, via supporting communication with the roadside infrastructure in order to provide ubiquitous coverage [8]. The relative velocities of vehicles are fairly much higher in than 50 km/h in urban environments and more than 100 km/h on the highway [4]. Vehicles also move at different directions. Thus, vehicles can quickly access or leave the network in a very short period of time. This results in more frequent changes in the network topology which affects the network design significantly. For example, the routing protocol design will be more difficult due to hidden/exposed terminal problem in MAC protocols [9]. Vehicles are typically not affected by strict energy constraints and can be easily equipped with sensor platforms [10]. Meanwhile, VSNs represent a significantly novel and challenging deployment scenario, which considerably differs from the traditional Wireless Sensor Network (WSN) and thus requires innovative solutions in the MAC layer [11]. However, designing an integrated architecture for both WSNs and VSNs often starts with the definition of a MAC protocol since it is a fundamental issue in determining the energy consumption properties and the basic data transport capabilities of the network [12].

This design of an efficient and effective sensory MAC protocol providing QoS requirements for real-time traffic management is considered as the most important step in end-to-end QoS provisioning over VSNs [13] since it regulates nodes’ access to a shared channel and has become a major active research in recent years [14]. This regulation explicates as duty cycling approach that is considered as one of the primary mechanisms for providing QoS in VSNs [15].

Particularly, duty cycling means that every node in the network is periodically alternating between an awake and a sleep state [16]. Therefore, the duration of a duty cycle is equivalent to the time of an awake state plus the time of sleep state [17]. Whereas the idle state has been founded in IEEE 802.11p standard for vehicular communication that consumes substantial energy to transmit up to 1000 messages with 32 dBm and therefore should be avoided in VSNs [4].

To understand the performance of VSNs and in order to optimize the designed routing protocol [18], an accurate analytical framework for MAC protocol is required. The main idea of this framework provides an analytical scheme that dynamically adapt the vehicles’ rate of transmission according to their priority. The analytical model shall describe the effects of assigning various values including the density and transmission range of vehicle to protocol parameter under given specific scenarios in order to achieve the QoS requirements.

The remainder of the paper is organized as follows: section 2 discusses some related works devoted entirely to analytical modeling of MAC protocols. Section 3 introduces the synchronous X-MAC protocol, through overview of problem definition of hidden terminal and analyzing power consumption, delay, and network throughput. Section 4 introduces the behavior of X-MAC protocol under specific network conditions through using the proposed Markov model. Meanwhile section 5 introduces the performance analysis of synchronized X-MAC protocol. Furthermore, section 6 introduces detailed simulation and analysis for the performance of a synchronized X-MAC protocol of various scenarios. Finally, section 7 concludes the current.

## 2 Related works

To better understand the mechanism of a MAC protocol, it is useful to realize that MAC protocols consists usually of three main logical components [19]. First, a collision avoidance (CA) algorithm which uses physical carrier-sensing to register and/or reserve the channel for the duration of the data transmission. Second, a contention resolution algorithm which uses mechanisms such as back-off to regulate the access to the channel [19]. Third, distributed coordination function (DCF) which is not specifically designed for high mobility network [7].

Various MAC protocols have been proposed to mitigate the adverse effects of hidden terminals through CA, since the hidden problem has demonstrated its energy-saving capabilities [11]. However, in a heterogeneous wireless networks, a hidden problem should be defined as a node out of the range of the sender which covers the receiver. Most CA algorithms are based on sender-initiated, including an exchange of short request-to-send (RTS) and clear-to-send (CTS) messages between a pair of sending and receiving nodes before the transmissions of the actual data packet and the optional acknowledgment packet [8]. Whereas in receiver-initiated, a receiver broadcasts a probing packets whenever it wakes up from sleeping state, while a sender with data packet to transmit waits in the listening state until the probing packets from the receiver is received. Therefore, receiver-initiated MAC protocol degrades the network performance with asymmetric links, due to several experienced sender failures in receiving the probing packets from the receiver. And hence, the asymmetric links waste energy, increase delay, and degrade the packet receive ratio (PRR). Meanwhile, RTS and CTS message exchange mechanism could not be the solution for VSNs since these exchange messages may not be able to arrive to all hidden nodes [20].

MAC protocols can be divided into two main categories of duty-cycled MAC protocols [17]. One is synchronized protocols, like S-MAC [21] and T-MAC [22]. The other is asynchronous protocols, like X-MAC [17] and B-MAC [23]. Asynchronous duty-cycled MAC protocols remove the energy overhead for synchronization and are easier to implement as they do not require local synchronization [24]. X-MAC protocol uses data packets as preambles and suits it for sparse networks as the energy and collision increase linearly with the node density. And thus, the performance of X-MAC protocol is evaluated in this work when equipped with CA algorithm to address the performance degradation of wireless multihop communications with hidden terminals, and their impact on MAC protocols. Additionally, the X-MAC contention-based protocol does not perform well in asymmetric scenarios due to the quality of the link from the receiver to the sender which causes the hidden terminal problems and can be avoided if the communication was not receiver-initiated [25].

Many researchers evaluated the performance of various network protocols through simulations [26]. However, the simulation environment/software is usually too expensive and/or time-consuming, especially while considering a huge network size/capacity [27]. Meanwhile, the analytical models can be more effective in such cases, since the scale of modern networks and the degree of complexity often necessitate the use of simplified assumptions, e.g., Markov, Poisson traffic, or other models. Furthermore, it is hard to capture the dynamic nature of a network without an analytical model; therefore, an analytical model is needed to provide insight into the performance of both routing and MAC protocols [27].

Bianchi [28] proposed an accurate analytical model to analyze the performance of single-hop IEEE 802.11. Ziouva [28] improved Bianchi’s model by adding a deriving saturation delay beside throughput. In an area other than IEEE 802.11 specifically in WSNs the author in [29] proposed a radio model to compute the lower bound of X-MAC protocol. A new hybrid MAC scheme called Zebra MAC (ZMAC) is proposed in [30] for sensor networks which combine the strengths of TDMA and CSMA while offsetting their weaknesses. The authors in [31] implements an efficient TDMA protocol that apply duty-cycling function for multihop WSNs using semi-Markov chain. Authors tries to avoid channel access problems such as over hearing and hidden terminal by adapting the wakeup/sleep state of each node to the actual operational conditions such as traffic demand and node density. Short range V2V communication was investigated in [32]. The authors present a study in which effective information such as the message size, transmission range, and velocity of vehicles is exchanged. Such exchanged parameters are considered as factors in analytical model to evaluate the performance of communication. Meanwhile, the authors in [33] presents a study of connectivity in vehicular ad hoc network in traffic free-flow. Actually, the authors use the analytical model in describing the distribution of distances between the vehicles, traffic flow on the highway to evaluate the effects of various system’s parameters (such as distribution of velocity, traffic flow, and transmission range of vehicles) the network on connectivity.

B-MAC [23] considers the default MAC protocol for Mica2 that allows an application to implement its own MAC through a well-defined interface. To achieve channel utilization and low power operations, the authors adopt low power listening (LPL) and scheduling the clear channel sensing (CCA) technique to reduce duty cycle and to minimize idle listening. Yang in [34] modeled and analyzed the throughput of a synchronized duty-cycle S-MAC protocol for WSNs. S-MAC protocol has different rules for accessing the media as compared against other MAC protocols such as X-MAC or B-MAC. Yang also proposed a Markov model to analyze the throughput of X-MAC. It should be emphasized that our proposed model is fundamentally different from the one proposed by Yang [29]. Our proposed model analyzes the performance of X-MAC protocol when it is equipped with CA algorithm and aimed of addressing the performance degradation of VSNs with hidden terminal. However, none included the hidden terminal problem in their analytical models. The paper focuses on the evaluate of an adaptive energy-efficient X-MAC protocol for duty-cycled VSNs. A Markov queuing model is proposed for modeling the behavior of the X-MAC contention based on the specific sleep/wake-up pattern in the duty cycle. Our proposed model quantifies the desirable QoS metrics for contention-based MAC protocols in multihop fashion to address the hidden terminal problem and to provide fairness in medium sharing among the vehicles.

## 3 Overview of X-MAC protocol

Asynchronous protocols have is promising applications in WSNs since they avoid synchronization overhead, and hence provide higher energy efficiency than synchronized MAC protocols [29]. Many variations asynchronous duty-cycled MAC protocols have been proposed to improve energy efficiency and packet latency by allowing each node to independently and periodically sleep to save energy [35]. Additionally, asynchronous protocols use a series of short preamble packets to avoid synchronous overheads and hence have higher energy efficiency than synchronized MAC protocols [36]. These short preamble packets carry the address information of the sink node. As a results the intermediate nodes can go to sleep as soon as they hear the first short preamble. Moreover, the sink can reply with an ACK message in between two successive short preambles to stop the timeline and to start transfering the data packets [17].

*T*for every node. Every node begins its duty with a fixed-cycle length determined with an arbitrary offset and continues its duty cycling as if the medium had been idle. For each successfully delivered data packet, the average communication time is \(\frac {T}{2}\) pulsing the length of data packet

*L*

_{DATA}[29].

X-MAC also has collision related within increasing the network density, i.e., the number of senders increases, and they wake up and begin to send their preamble at the same time since. Thus, all nodes including sink-nodes cannot determine the destination address information in preamble when collision occurs among nodes. In this case, the sender continues sending preambles until next wake-up time [17]. Hence, for each colliding data packet, the average communication of sending data packet is also *T*.

This paper proposes a mathematical model for X-MAC protocol which to includes the effects of CA algorithm. Our proposed model focuses onto two main contributions which are: (1) solving the problem of medium contention such as hidden or exposed terminal problem, and (2) providing resource reservation for real-time traffic control system in a distributed vehicle-based sensor environment. Moreover, supporting QoS in the routing or transport layer cannot be provided unless the assumption of MAC protocols solves the problems of medium contention and supports reliable communication [37].

Our proposed model acts as analyzer for the performance of X-MAC since the Markov model is used to describe the behavior of accessing of synchronized duty-nodes to the channel. The proposed model elaborates on which type of low duty-cycled MAC protocols should be selected in order to resource the wireless channel reservation that assures the desirable QoS level in real-time traffic control systems.

## 4 Markov model of X-MAC

- 1.
Event arrivals denote a stochastic process {

*A*(*t*)|*t*≥0} that represents the total number of arrivals that have occurred from time 0 to time*t*; this procedure creates an independent Poisson process at each node, and the number of packet arrivals in any time slot is distributed with a Poisson process with parameter*λ**τ*, for time of arrival*t**τ*≥0. - 2.
Let

*π*_{ ı }(*t*) denote the steady state of power for the node at time*t*; the inter-arrival*δ*≥0 times (that is, the distribution of time at state*ı*before marking the transition) are independent and exponentially distributed with the*λ*, where*o*(*δ*) is defined as a function of*δ*such that \({\lim }_{\delta \longrightarrow 0}\frac {o(\delta)}{\delta }\). - 3.
The queueing discipline of data packets is first-come, first-served (FCFS).

- 4.
The queueing system assumes equilibrium under the condition that the probability of arrival is less than the independent probability of transmitting the information packet or

*λ*<*β*. - 5.
The processing and radio-transmission times are independent and identical (

*ı*.*ı*.*d*.) with an arbitrary distribution. - 6.
Retransmission is supported.

- 7.
When an event is sensed, the node processes it and sends the information packet with a probability of transmission per node per cycle, and every sensor node in the network has an independent probability of transmitting information packet

*β*in the duty cycle.

*ρ*. Therefore, the probability of finding

*n*neighboring nodes in an area

*S*is given by [34].

*T*

_{ R }for transmission and receiving in time-slotted mode, then the number of

*n*neighbors within a circular region of

*T*

_{ R }is given as [40].

*T*is assumed not just the propagation delay, but also the transmission delays (SYNC, RTS, CTS, DATA, and ACK), processing delay, carrier sense delay and queuing delay. (e) Each sensor node has transmission range

*T*

_{ R }defined as [38]

*T*

_{ S }is sensing range, and the interference range is defined as \(T_{I}=T_{R}\sqrt [\beta ]{TR_{CP}}\), where

*T*

*R*

_{ CP }and

*Sen*are defined threshold of capture ratio, and the receive sensitivity in Watt, respectively [38]. (f) The propagation model is defined as

*d*defined the distance between two transmission nodes. This model cover with free-space model is defined by

where both *G*
_{
t
} and *G*
_{
r
} are defined by the antenna gain, *γ* is the wavelength, and *β* is defined by the path-loss exponent [38].

Assumptions

Symbol | Quantity |
---|---|

| Number of nodes in the network |

| Length of a cycle |

| Contention window size in units of a time slot |

| Queue capacity in units of a data packet |

| Number of data packet in queue |

| Data packet size |

| the state of node |

| the probability of transition from state |

| Probability of transmission failure of data packet |

| Probability of successfully transmission of data packet |

| Number of sensor nodes in specified area |

| Density of sensor nodes |

| Transmission range |

| Sensing range |

| Interference range |

| Expected data packet arrival rate at the MAC layer |

| Probability of |

| The stationary distribution of the Markov model |

| The probability of an arbitrary node transmitting in time slot |

| Packet delay |

*M*with finite state slots from left to right, which corresponds to 0 state for processing packets in the queue and so on to

*m*packets in the queue (full queue). Specifically, if a packet arrives and the queue is full, then the packet is simply dropped; nevertheless, the packets are removed from the queue when they are successfully transmitted. By contrast, when the queue is neither full nor empty, then a node may obtain access to the media to transmit packets with an independent probability. The analysis of the Markov discrete-time M/M/1 queuing model offers insights into the traffic behavior of vehicle-based sensor networks in general and points to an idea for a control algorithm.

If an abnormal event of interest is detected during the specified operations, then Eqs. 7a and 7b describe all transitions from an empty-queue status to a non-empty status according to the Poisson process probability of new packet arrival *λ*. The typical schedule-driven operation for vehicle-based sensor node operates with two timers: one for the wake-up mode and another for sleep mode, for each node in the network [37]. Therefore, if an abnormal event is detected by a sensor node and needs to be transmitted to another node or to the sink, the node stops the sleep-mode timer, turns on its radio, and starts processing the event; otherwise, the node remains in sleep mode. Equations 7c and 7f describe the transition probability of the schedule-driven duty-cycle node operation, including the processing and transmission of information packets.

Equations 7d and 7e also describe the non-transition probability state (i.e., the probability of having a non-decreasing queue), which can be obtained from two terms depending on the oldest information packets still in the queue and winning the contention to access the media (first term) or otherwise (second term) [35, 38].

### 4.1 The hidden problem formulation

According to the heavy-traffic assumption [41], each node in the network always has a packet in its buffer to be sent. Suppose a node is ready to transmit with probability *p*
_{
s
}, the probability of collision is *p*
_{
f
},*A*
_{
ı
} defines the probability that *ı* of data packet arrives at node during a cycle, and *A*
_{≥ı
} is the probability that no less than *ı* data packets arrive at a node during a cycle. Then, *p*
_{
s
} is considered as a protocol-specific parameter that is slot independent. This means that the probability of transmission and the collision varies from another time slot, depending on the behavior of both duty-cycled node which modeled as Markov-chain and the state of channel which is depicted in Fig. 4, where *π*
_{0} indicate the steady state of a node. Because of a node may transmit or not in the slot depending to the mechanism that is used to avoid and resolve the collision as well as the current state of the channel [39]. Therefore, there is an exact relationship between *p*
_{
s
} and *p*
_{
f
} and should be derive to investigate the effects of *p*
_{
s
} and *p*
_{
f
} on performance of multihop network.

*W*is the minimum contention window size and

*m*is the retry limit. Suppose that the sensor node is in a steady state, then the probability of an arbitrary sensor node transmitting in time slot denoted by

*τ*is [42].

where *λ* defines the average event inter arrival rate, *T*
_{tran} is the transmission time, and *Y* defines the processing time per event.

*τ*depends on the conditional transmission probability

*p*

_{ s }and collision probability

*p*

_{ f }, which is still unknown as shown in Eq. 3. Therefore, to find the value

*τ*, it should be first assumed successfully received value as the probability that only one node of the

*n*neighboring nodes is transmitting [43]. Because each node

*n*transmits with probability

*τ*, therefore,

*p*

_{ f }in a time slot at least one

*n*still transmit this yields as [44]

Equations 5 and 6 represent a nonlinear system in the two unknowns *τ* and *p*
_{
s
} that solved using Gregory-Newton Forward Difference Approach [45].

Consequently, it can use a similar approach to build the Markov chain model for duty-cycle MAC protocol of a saturated node to obtain the relationship between *p*
_{
s
} and *p*
_{
f
} because of low duty-cycle MAC protocols used the same factors like IEEE802.11 protocols to quantify the QoS parameters. Expect that there is extra delay in low duty-cycle MAC protocol which is caused by the sleep period of each node [46].

### 4.2 Media access rules of X-MAC

*N*

_{tx}(

*A*) and defined as

*R*is the transmission range defined as

*N*

_{rx}that is distributed outside E transmission range is defined as \(E=\sqrt [\beta ]{\frac {P_{\text {tx}}(A)}{\alpha Sen}}\) cannot detect the transmission of node A [38]. This set is delimited by the shaded area and is calculated using the geometry equations as [1].

*A*

_{ x }(

*T*

_{ R }) be the common shaded area that illustrates the locations at which possible hidden terminals reside. These circles of radius of

*E*and

*T*

_{ I }intersect at two points \(\left (u,-\sqrt {E^{2}-u^{2}}\right)\) and \(\left (u,\sqrt {E^{2}-u^{2}}\right)\) where \(u=\frac {E^{2}+T_{R}^{2}-T_{I}^{2}}{2T_{R}}\). Therefore,

Hidden sensor nodes distributed inside the shaded area that illustrates the locations at which possible hidden terminals reside may limit the performance of contention-based MAC protocols. Because of their transmission results in collisions, the proposed model quantified the problem by deriving the probability of collision for avoiding this limitation.

The axioms of probability used to estimate the collision probability are performed by evaluating the dimensions of probabilistic of combination of events that might occur within *A*
_{
x
} and *A*
_{
h
} areas. Therefore, the derivation of collision probability depends on two rules: the addition rule which deals with the probability of union of more events; and the multiplication rule which deals with the probability of intersection of two events.

*E*

_{ x }be an event which collision occurs by one or more nodes within

*A*

_{ x }area, and

*E*

_{ h }be an event which collision occurs by one or more nodes within

*A*

_{ h }area. Then, the collision probability

*p*

_{ f }is calculated as [1]

*E*

_{ x }which is given as [1]

*E*

_{ h }that can be obtained as in [1] by

## 5 QoS parameter analysis of X-MAC protocol

QoS parameters expressed in terms of energy consumption, delay, and throughput can be calculated within a cycle time, since X-MAC works in duty-cycled fashion. Therefore, an active period of a wake-up node is defined in cycle time as *T*
_{awake} time units. During this active period, the preamble packets data packet has size *S*, and an ACK message are assumed as *T*
_{pre},*T*
_{Data}, and *T*
_{ACK} time slot units to transmit, hence, Markov model has a unique stationary distribution *π*=*π*
_{0},…,*π*
_{
M
} [29].

*n*nodes, and then each node wakes up periodically for successful transmission of a data packet with probability (1−

*π*

_{0})

*p*

_{ s }which takes time on average \(\frac {T}{2}+T_{\text {Data}}\). Each node uses \(\frac {T}{2}\) periodically to send preamble packets and then a node starts to listen to the ACK messages between two successive preamble packets, whereas

*T*

_{Data}is used periodically to successfully transmit a data packet with specific probability. Hence, the average time it takes to send preamble packets is \(\frac {T}{2}\left (\frac {T_{\text {pre}}}{T_{\text {pre}}+T_{\textrm {ACK}}}\right)\). The average time a node takes to listen to the media is \(\frac {T}{2}\left (\frac {T_{\textrm {ACK}}}{T_{\text {pre}}+T_{\textrm {ACK}}}\right)\). Finally, the amount of energy that is consumed in this case is calculated as [18]

*π*

_{0})

*p*

_{ f }that implies other node synchronizes to send preamble packets. However, in this case, there is no preamble packets that may be received correctly because of collision, and then the node continues sending preamble packets with average time \(T\left (\frac {T_{\text {pre}}}{T_{\text {pre}}+T_{\textrm {ACK}}}\right)\), and the average time of listen to media between two successive preambles is \(T\left (\frac {T_{\text {ACK}}}{T_{\text {pre}}+T_{\text {ACK}}}\right)\). The amount of energy consumed in this case is [18]

*T*

_{ACK}message to receive the data packet. However, any intermediate nodes may wake up to send a preamble packet or listen to receive

*T*

_{ACK}message from the sink. As a result, the time on average of the receiving node is \(\frac {T_{\text {pre}}+T_{\textrm {ACK}}}{2}\). Therefore, the amount of energy consumed is

*p*

_{ s }for each node that wins the contention and the steady state of the Markov model

*π*

_{0}during the cycle. Therefore, a node starts to send contends for the media during the cycle until win the contention with probability

*p*

_{ s }and the probability 1−

*p*

_{ s }to lose the contention. Hence, the delay is given along cycle length

*T*.

*A*

_{ x }. And B is defined as an event that occurs by two or multiple node winners in the contention with area

*A*

_{ h }. Then [9],

*P*

_{ r }(

*A*,free|empty) and

*P*

_{ r }(

*B*,free|empty), assume that a node has an empty queue and directly wakes up and detects the event and transmit a data packet for its neighbors. At the same time, other nodes wake up but do not have any data packet for transmission. Therefore,

*P*

_{ r }(free|empty) is defined as the probability of a free channel when a node wakes up and has data packet in its queue ready for transmission. As mentioned, each node in X-MAC protocol periodically wakes up and sends preamble packets and then a node starts to listen to channel; the channel have the same probability of being free or busy in every time slot [18]. Hence, when a node wakes up, no matter whether its queue is empty or not, the node sees the channel with the same probability of being free or busy. Therefore,

*C*

_{free}, assume that the interval of time transmission ends, and the free channel begins, there are number of cycles

*cycle*that could define the free channel until some nodes begin to transmit at

*t*

^{ t h }slot. Thus, the average length of free channel is

*c*

*y*

*c*

*l*

*e*

*T*+

*t*, and the probability of transmission event is [18]

The successful transmission probability *P*
_{suc} could be similar as the obtained probability of collision *P*
_{col} as long as the channel is free for *cycle* cycles and *t* slots.

*P*

_{ r }(free) is obtained. Plugging 30 and 32 into 28, and then plugging 31 and 32 into 29, the successful transmission probability for each node

*p*

_{ s }the probability of collision

*p*

_{ f }are obtained. Therefore, the throughput per second per hop of X-MAC protocol can be calculated as

## 6 Simulation results

*m*

^{2}.

Experiment parameters for X-MAC protocol

Parameter | Value |
---|---|

| 200 ms |

| 50 ms |

| 30 ms |

| 15 ms |

| 15 ms |

| 5 ms |

Topology structure | Square (50 × 50 |

distributed uniformly | |

Total number of sensor nodes | 5, 12, 17 sensor nodes |

Message payload | 64 b |

Node density | .002,.005,.007 |

Tx data rate | 250 kbps |

Transmission range | 18−29 m |

Propagation delay | 1 |

| 0.0525 W |

| 0.0591 W |

| 0.0525 W |

*T*from 50 to 200 ms as shown in Fig. 8. Figure 9 shows the performance of X-MAC protocol under varying vehicle densities in the network and transmission range of each vehicle varying from 18 to 29 m as shown in Fig. 10. From these results, it can be seen that the analytical results of the proposed model match the simulation results.

### 6.1 Varying the cycle length

In this experiment, we vary the cycle length, Fig. 7 a shows the power consumption of the X-MAC protocol obtained from simulations and from our power consumption analysis using the Markov model. Our analytical results match the simulation results with percentage difference or max difference in power consumption. The power consumption decreases as the length of cycle period increases which means that whenever the cycle length increases, the unsuccessful data transmission increases due to increase in the rate of collision probability. Consequently, as the cycle length increases and as the number of vehicles increases, the power consumed in data transmission increases, and the active period in each cycle is fixed. Therefore, all vehicles in the network expect the source vehicle and the sink node in either successful transmission or unsuccessful transmission to go to the sleep state as long as the cycle length increases. Thus, the power saving in this longer sleep period is more than in longer transmission period, the power consumption of X-MAC protocol decreases as the cycle length increases.

Figure 7 b shows that the average delay of the X-MAC protocol increases as the length of cycle period increases. Usually, before the X-MAC protocol saturates and the cycle length starts from small value with a few vehicles in the network. X-MAC protocol can deliver all the incoming data packets as soon as they arrive in the network, hence, the delay is nearly zero. Once X-MAC protocol saturates and the cycle length increases, both the contention and queue delay increases proportional to the increases of the cycle length and the number of nodes. Since the X-MAC protocol can no longer deliver all the incoming data packets, the queue at each vehicle overflows and data packets are dropped.

Figure 7 c reveals that the average throughput of the X-MAC protocol decreases as the cycle length increases and as the number of vehicles in the network increases. This means that before X-MAC saturates, the amount of incoming data packet delivered remains in the queue and slightly decreases when X-MAC protocol saturates and as the number of vehicles in network increases further. As the X-MAC protocol can no longer deliver all the incoming data packets because of the increasing collisions at the following specified period.

### 6.2 Varying the number of nodes

In this experiment, we vary the number of vehicles. Figure 9 shows that the power consumption of X-MAC protocol increases under varying vehicle densities in the network and transmission range of each vehicle in the network as seen in Fig. 10. Whenever the transmission range increases, the unsuccessful data transmission increases since the rate of collision probability increases and hence more power is consumed. Consequently, as the transmission range increases and as the number of vehicles increases, the power consumed in data transmission increases, as the active period in each cycle is fixed. Therefore, all vehicles in the network expect the main vehicle source and the main sink node in either successful transmission or unsuccessful transmission wake-up as longer as the cycle length increases. Thus, power savings in this longer sleep period became more than in longer transmission period, the power consumption of X-MAC protocol decreases as the cycle length increases.

Figure 9 b shows the delay of the X-MAC protocol. Before X-MAC saturates, the delay slowly increases with lower node density and with fewer variation in the transmission range vehicle in cycle. Moreover, as the number of vehicles increases, a vehicle tends to have a higher probability of successful transmission leading to saturation state. Therefore, the delay dramatically increases as X-MAC saturates because of the increases in the rate of collision probability in a cycle. This means that the more vehicles in the network leads to decreasing the probability of successful transmission of packets when X-MAC saturates. Hence, according to the main parts of X-MAC protocol data packets delay (the queue delay and contention delay) this increase is obvious when the number of vehicles and the transmission range increase.

Figure 9 c shows the throughput of X-MAC protocol. Before X-MAC saturates, the amount of incoming data packet in cycle remains, the node can deliver all incoming data packets in cycle. Once the transmission range of vehicle in a cycle increases, the throughput decreases as well as the vehicle density increases. This means that X-MAC can no longer deliver all incoming data packets, because of increasing the transmission range leading a vehicle tends to have higher probability of successful packet transmission leading to saturation state. Therefore, the throughput shrinks dramatically because of the increase in the probability of collision.

### 6.3 Discussion

The proposed Markov model for asynchronous duty-cycled MAC protocols has been applied in X-MAC protocol to optimize some protocol parameters to achieve desirable performance. Conceptually, X-MAC is considered as higher efficient protocol than synchronized S-MAC protocol because of the avoidance synchronization overheads. Therefore, asynchronous X-MAC can achieve more desirable performance than synchronized S-MAC for the delay and throughput [49]. But this does not mean that asynchronous X-MAC does not suffer from hidden terminals especially when varying the vehicles and density. As the vehicles and density increases, more than one vehicle wake up and begin to send their preambles simultaneously. Therefore, other vehicles cannot determine the information in preambles and collisions occur. Consequently, and based on the assumption used in Markov model in synchronous MAC protocol, our proposed model uses two different values of probabilities for transmission and collision, *p*
_{
s
} and *p*
_{
f
}, respectively, to handle the hidden terminal problem and to estimate the communication links performance. Finally, we should distinguish between the effect of asymmetric and symmetric links in order to provide the adequate functionality to routing protocols. Asymmetric links are caused by several factors like node mobility, heterogeneous radio technologies, and irregularities in radio ranges. Although it is difficult to achieve high network connectivity, high data rate transmission, and low latencies, but according to our observations, it is expected that asymmetric links will be more common in the future VSNs. Actually, the hidden terminal problem will be more complicated with the existence of asymmetric links, where the receiver and the sender do not share the channel feedback and hidden nodes may interfere with the on going transmissions [50]. Furthermore, because of the feedback from the receiver in RTS/CTS, exchanged messages may have to pass through several relay nodes before being delivered to all others nodes. However, MAC protocols might need to exploit asymmetric links to solve the hidden terminal problem while maintaining the lowest cost. In fact the network utilization and cost are weights derived and constrained by the network resource management (NRM) approach, where some routing or MAC protocols based on QoS parameters such as (power consumption, throughput, and latency) are application-dependent and imposed by the node specification. Therefore, to optimize these parameters in order to achieve the desirable benefits and network performance, the NRM approach shall be chosen based on the desire QoS parameters. As a result, the inclusion of asymmetric links in the MAC protocol design can further improve the network performance.

## 7 Conclusions

In this paper, the QoS parameters of X-MAC are modeled and analyzed using Markov chain model. Our model presents analytical results which have been validated by simulation results for the selected QoS parameters under various network conditions and traffic loads. It provides sufficient information about the links between the vehicles to determine the optimal path and to select the intermediate nodes for packet routing from source to distention. Our future work will focus on analyzing the QoS parameters for synchronized protocols and extending the model to multihop networks.

## Declarations

### Acknowledgements

The authors extend their appreciation to the anonymous reviewers for their helpful and supportive comments towards improving our paper.

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## Authors’ Affiliations

## References

- F Al-Turjman, H Hassanein, M Ibnkahla, Quantifying connectivity in wireless sensor networks with grid-based deployments. Elsevier: J. Netw. Comput. Appl.
**36**(1), 368–377 (2013).Google Scholar - F Al-Turjman, Information-centric sensor networks for cognitive IoT: an overview. Ann. Telecommun.
**72**(1), 3–18 (2017).View ArticleGoogle Scholar - GT Singh, FM Al-Turjman, Learning data delivery paths in QoI-aware information-centric sensor networks. IEEE Internet Things J.
**3**(4), 572–580 (2016).View ArticleGoogle Scholar - F Cunha, et al, Data communication in VANETs. Ad Hoc Netw.
**44**(C), 90–103 (2016).View ArticleGoogle Scholar - K Nellore, GP Hancke, A survey on urban traffic management system using wireless sensor networks. Sensors.
**16**(2), 157 (2016).View ArticleGoogle Scholar - F Al-Turjman, M Gunay, CAR Approach for the internet of things. Can. J. Electr. Comput. Eng.
**39**(1), 11–18 (2016).View ArticleGoogle Scholar - W Xiang, et al, Wireless access in vehicular environments. EURASIP J. Wirel. Commun. Netw.
**2009**(1), 1–2 (2009).View ArticleGoogle Scholar - GP Hancke, GP Hancke Jr, The role of advanced sensing in smart cities. Sensors.
**13**(1), 393–425 (2012).View ArticleGoogle Scholar - T Asha, N Muniraj, Energy efficient topology control approach for mobile ad hoc network. Int. J. Comput. Sci. Issues (IJCSI).
**10**(4), 289 (2013).Google Scholar - U Lee, M Gerla, A survey of urban vehicular sensing platforms. Comput. Netw.
**54**(4), 527–544 (2010).View ArticleMATHGoogle Scholar - U Lee, et al, Dissemination and harvesting of urban data using vehicular sensing platforms. IEEE Trans. Veh. Technol.
**58**(2), 882–901 (2009).View ArticleGoogle Scholar - P Suriyachai, U Roedig, A Scott, A survey of MAC protocols for mission-critical applications in wireless sensor networks. IEEE Commun. Surv. Tutor.
**14:**, 240–264 (2012).View ArticleGoogle Scholar - N Saxena, A Roy, J Shin, Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks. Comput. Netw.
**52:**, 2532–2542 (2008).View ArticleMATHGoogle Scholar - P Mohapatra, AD HOC NETWORKS: technologies and protocols (Springer Science & Business Media, 2005).Google Scholar
- MZ Hasan, H Al-Rizzo, F Al-Turjman, A survey on multipath routing protocols for QoS assurances in real-time multimedia wireless sensor networks. IEEE Commun. Surv. Tutor (2017). doi:10.1109/COMST.2017.2661201.
- P Park, et al, Duty-cycle optimization for IEEE 802.15.4 wireless sensor networks. ACM Trans. Sensor Netw. (TOSN).
**10**(1), 12 (2013).Google Scholar - M Buettner, GV Yee, E Anderson, R Han, in presented at the Proceedings of the 4th international conference on Embedded networked sensor systems. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks (Boulder, Colorado, USA, 2006), pp. 307–320.Google Scholar
- Y Ou, W Heinzelman, Modeling and performance analysis for duty-cycled MAC protocols with applications to S-MAC and X-MAC. IEEE Trans. Mob. Comput.
**11**(6), 905–921 (2012).View ArticleGoogle Scholar - A Iyer, C Rosenberg, Understanding the key performance issues with MAC protocols for multihop wireless networks. Wirel. Commun. Mob. Comput.
**6:**, 745–760 (2006).View ArticleGoogle Scholar - G Wang, et al, A MAC layer protocol for wireless networks with asymmetric links. Ad Hoc Netw.
**6**(3), 424–440 (2008).View ArticleGoogle Scholar - Y Wei, J Heidemann, D Estrin, in Proc. of the IEEE Int. Conf. on Computer and Communications Societies INFOCOM ’02. An energy-efficient MAC protocol for wireless sensor networks (New York, 2002), pp. 1567–1576.Google Scholar
- KL Dam, in proceedings of the 1st Int. Conf. on embedded networked sensor systems. An adaptive energy-efficient MAC protocol for wireless sensor networks (Los Angeles, 2003), pp. 171–180.Google Scholar
- J Polastre, J Hill, D Culler, in Proc.SenSys’04. Versatile low power media access for wireless sensor networks, (2004), pp. 95–107.Google Scholar
- F Al-Turjman, H Hassanein, M Ibnkahla, in Proc. of the IEEE Local Computer Networks (LCN). Quantifying Connectivity of Grid-based Wireless Sensor Networks under Practical Errors (Denver, 2010), pp. 224–227.Google Scholar
- A Razaque, KM Elleithy, Energy-efficient boarder node medium access control protocol for wireless sensor networks. Sensors.
**14:**, 5074–5117 (2014).View ArticleGoogle Scholar - S Oteafy, F Al-Turjman, H Hassanein, in Proc. of the IEEE International Global Communications Conf. (GLOBECOM). Pruned Adaptive Routing in the Heterogeneous Internet of Things (Anaheim, 2012), pp. 232–237.Google Scholar
- H Wu, RM Fujimoto, G Riley, in Proceedings of the winter conference in simulation. Experiences parallelizing a commercial network simulator (Arlington, 2001), pp. 1353–1360.Google Scholar
- G Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun.
**18:**, 535–547 (2000).View ArticleGoogle Scholar - Y Ou, WB Heinzelman, in Global Telecommunications Conference (GLOBECOM 2010), 2010. Modeling and throughput analysis for X-MAC with a finite queue capacity (IEEE, 2010), pp. 1–5.Google Scholar
- I Rhee, A Warrier, M Aia, J Min, ML Sichitiu, Z-MAC: a hybrid MAC for wireless sensor networks. IEEE/ACM Trans. Netw. (TON).
**16:**, 511–524 (2008).View ArticleGoogle Scholar - MZ Hasan, F Al-Turjman, H Al-Rizzo, in International wireless communications and mobile computing conference (IWCMC). Evaluation of a duty-cycled protocol for TDMA-based Wireless Sensor Networks, (2016), pp. 964–969.Google Scholar
- G Yan, DB Rawat, Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks. Ad Hoc Netw.
**58**(1), 25–35 (2017).View ArticleGoogle Scholar - F Al-Turjman, in 2016 IEEE 41st Conference on local computer networks (LCN). Hybrid Approach for Mobile Couriers Election in Smart-Cities (Paris, 2016), pp. 507–510.Google Scholar
- O Yang, W Heinzelman, in 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). Modeling and throughput analysis for SMAC with a finite queue capacity (Melbourne, 2009), pp. 409–414.Google Scholar
- MR Ahmad, E Dutkiewicz, X Huang, in
*Emerging communications for wireless sensor networks*. InTech. A survey of low duty cycle MAC protocols in wireless sensor networks, (2011), pp. 69–90. https://www.intechopen.com/books/emerging-communications-for-wirelesssensor-networks/a-survey-of-low-duty-cycle-mac-protocols-in-wireless-sensor-networks. - P Suriyachai, U Roedig, A Scott, A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks. IEEE Commun. Surv. Tutor.
**14**(2), 240–264 (2012).View ArticleGoogle Scholar - MA Yigitel, OD Incel, C Ersoy, QoS-aware MAC protocols for wireless sensor networks: a survey. Comput. Netw.
**55:**, 1982–2004 (2011).View ArticleGoogle Scholar - A Bachir, D Barthel, M Heusse, A Duda, in International conference on in wireless networks, Communications and Mobile Computing. Hidden nodes avoidance in wireless sensor networks (Maui, 2005), pp. 612–617.Google Scholar
- J Garcia-Luna-Aceves, Y Wang, in
*Ad Hoc Networks*. Collision avoidance protocols in ad hoc networks (Springer, 2005), pp. 23–61. https://link.springer.com/chapter/10.1007%252F0-387-22690-7_2. - F Al-Turjman, H Hassanein, M Ibnkahla, in Proc. of the IEEE Queen’s Biennial Symposium on Communications (QBSC). Quantifying the Effects of Placement Errors on WSN Connectivity in Grid-based Deployments (Kingston, 2010), pp. 59–62.Google Scholar
- A Redondi, et al, Compress-then-Analyze vs Analyze-then-compress: what is best in visual sensor networks?IEEE Trans.Mob. Comput.
**PP**(99), 1–1 (2016).Google Scholar - F Al-Turjman, H Hassanein, M Ibnkahla, Towards prolonged lifetime for deployed WSNs in outdoor environment monitoring. Elsevier Ad Hoc Netw. J.
**24**(A), 172–185 (2015).View ArticleGoogle Scholar - Y Kim, C Yang, C-H Liu, in IEEE GLOBECOM in Global telecommunications conference. Throughput analysis of randomized sleep scheduling with constrained connectivity in wireless sensor networks (IEEE, 2008), pp. 1–6.Google Scholar
- D Rodenas-Herraiz, A-J Garcia-Sanchez, F Garcia-Sanchez, J Garcia-Haro, On the improvement of wireless mesh sensor network performance under hidden terminal problems. Futur. Gener. Comput. Syst.
**45:**, 95–113 (2015).View ArticleGoogle Scholar - Z Chu, HX Nguyen, TA Le, M Karamanoglu, et al., in Proc. of teh Int. Conf. on Wireless Days. Game theory based secure wireless powered D2D communications with cooperative jamming (Portugal, 2017), pp. 95–98.Google Scholar
- MZ Hasan, F Al-Turjman, H Al-Rizzo, Optimized Multi-Constrained Quality-of-Service Multipath Routing Approach for Multimedia Sensor Networks. IEEE Sensors J.
**17**(7), 2298–2309 (2017).View ArticleGoogle Scholar - TE Salti, D Stacy, et al., in Proc. of the International Wireless Communications and Mobile Computing Conference. Packet delivery significance and metrics improvements in protocols for 3-D routing in Wireless Sensor Networks (Nicosia, 2014), pp. 1130–1135.Google Scholar
- G Singh, F Al-Turjman, in Proc. of the International Wireless Communications and Mobile Computing Conference (IWCMC). Cognitive Routing for Information-Centric Sensor Networks in Smart Cities (Nicosia, 2014), pp. 1124–1129.Google Scholar
- E Ziouva, T Antonakopoulos, CSMA/CA performance under high traffic conditions: throughput and delay analysis. Comput. Commun.
**25:**, 313–321 (2002).View ArticleGoogle Scholar - G Wang, et al, in
*Proceedings of the international conference on wireless communications and mobile computing*. A simulation study of a MAC layer protocol for wireless networks with asymmetric links (ACMVancouver, British Columbia, Canada, 2006), pp. 929–936.Google Scholar