Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet - - PowerPoint PPT Presentation

modeling ieee 802 15 4 based wireless sensor network with
SMART_READER_LITE
LIVE PREVIEW

Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet - - PowerPoint PPT Presentation

Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet Retry Limits Prasan Kumar Sahoo Vanung University, Taiwan Jang-Ping Sheu National Tsing Hua University, Taiwan Outline Introduction Objectives System Model


slide-1
SLIDE 1

Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet Retry Limits

Prasan Kumar Sahoo Vanung University, Taiwan Jang-Ping Sheu National Tsing Hua University, Taiwan

slide-2
SLIDE 2

Outline

Introduction Objectives System Model Analytical Models Performance Evaluation Conclusions

slide-3
SLIDE 3

Introduction

IEEE 802.15.4 MAC is designed for Wireless Personal Area Networks (WPANs)

Short Range Low Power Low Cost Small Networks

slide-4
SLIDE 4

Objectives

Design analytical models for wireless sensor networks (WSN):

To evaluate energy consumption To evaluate throughput Based on IEEE 802.15.4 MAC with retry limits.

Consider unsaturated traffic conditions

All nodes of the network do not have packets to transmit at the same time.

slide-5
SLIDE 5

System Model

Network Topology Data Transfer Methods Channel Access Mechanism

slide-6
SLIDE 6

Network Topology

We design analytical models for the star topology based WSN.

slide-7
SLIDE 7

Data Transfer Method

In star topology, only two types of data transfer methods are used.

Uplink: Network Devices Coordinator Downlink: Coordinator Network Devices

Take accounts of the acknowledgements Only concentrate on the uplink data transfer

Sensed data are generally flown from devices to the coordinator.

slide-8
SLIDE 8

Data Transfer Model

Beacon Data Acknowledgement

slide-9
SLIDE 9

Channel Access Mechanism

Two types of CSMA-CA in IEEE 802.15.4

Slotted (in beacon enabled network) Un-slotted (in non-beacon enabled network) Consider slotted CSMA-CA with ACK

slide-10
SLIDE 10

Channel Access Mechanism

Each device shall maintain three variables for each transmission attempts.

Number of Backoffs (NB) Contention Window Length (CW): Number of backoff periods that need to be cleared of channel activity before the transmission can commence Backoff Exponent (BE): backoff period=R(0, 2BE-1)

slide-11
SLIDE 11

Analytical Models

Transmission Policy Packet Collision Probability Probability of Sensing Channel Busy The Markov Chain Model

slide-12
SLIDE 12

aMaxFrameRetries: Maximum number of retries allowed after a transmission failure macAckWaitDuration: Maximum number of symbols to wait till receiving an ACK. macMinBE: Minimum value of the backoff exponent aMaxBE: Maximum value of the backoff exponent macMaxCSMABackoffs (m): Maximum number of backoffs the CSMA-CA algorithm will attempt before declaring a channel access failure

Definition of parameters

slide-13
SLIDE 13

Transmission Policy

NRT =0 NB=0, CW=2, BE=macMinBE Locate backoff period boundary Delay for random (2BE-1) unit backoff periods Perform CCA on backoff boundary NB=NB+1, CW=2, BE=min(BE+1, aMaxBE) Channel idle? NB> macMaxCSMABackoffs (m) ? Channel Access Failure CW=CW-1 CW=0? Channel Access Success, and Transmit data Receive corresponding ACK in time? Failure Success NRT=NRT+1, NRT> aMaxFrameRetries ? Y Y N Y Y N N N N Y CSMA/CA Slotted ? Y (1) (2) (3) (4) (5) (6) (7) (8)

slide-14
SLIDE 14

Packet Collision Probability

pc: Probability of collision is seen by a packet, if it is transmitted after performing CCA twice.

  • N: Number of nodes associated to the coordinator

p0: Probability that the node has no packet ready to transmit. τ: Probability that the node is performing first CCA.

[ ]

1 0)

1 ( 1 1

− − − =

N c

p p τ

slide-15
SLIDE 15

Probability of Sensing Channel Busy

Mi(s)=-1: Event that there is at least one transmission in the medium in slot i Mi(c)=-1: Event that some station start sensing during slot i Mi(s) 0: Event that no station in the medium is transmitting in slot i Mi(c) 0 : Event that no station starts sensing during slot i

slide-16
SLIDE 16

The Markov Chain Model

slide-17
SLIDE 17

Three stochastic processes: s(t), c(t) and r(t) s(t): Represents the backoff stage for NB, c(t): Represents backoff counter for CW, r(t): Represents retransmission counter for NRT

The Markov Chain Model

slide-18
SLIDE 18

Sj,x,k = P{s(t) = j, c(t) = x, r(t) = k} j: {0, 1, ...,m}, x: { −2, − 1, ...,Wj −1}, k: {0, 1, ..., aMaxFrameRetries}, m: represents the macMaxCSMABackoffs Wj = 2min(j+macMinBE,aMaxBE)

The Markov Chain Model

slide-19
SLIDE 19

Transition Probability

      ≤ ≤ − ≤ ≤ ≤ ≤ = − tries aMaxFrame k W x Backoffs macMaxCSMA j k x j k x j P

j

Re ; 1 1 ; for , 1 ) , , | , 1 , (

) , min(

2 where ,

aMaxBE macMinBE j j

W

+

=

slide-20
SLIDE 20

Transition Probability

      ≤ ≤ ≤ ≤ − = − tries aMaxFrame k Backoffs macMaxCSMA j k j k j P Re ; for , 1 ) , , | , 1 , ( α       ≤ ≤ − ≤ ≤ − ≤ ≤ = +

+ +

tries aMaxFrame k W x Backoffs macMaxCSMA j W k j k x j P

j j

Re ; 1 ; 1 for , ) , , | , , 1 (

1 1

α

slide-21
SLIDE 21

Transition Probability

      ≤ ≤ − ≤ ≤ = tries aMaxFrame k W x W k Backoff macMaxCSMA x P Re ; 1 for , ) , , | , , ( α

slide-22
SLIDE 22

Transition Probability

      ≤ ≤ ≤ ≤ − = − − tries aMaxFrame k Backoffs macMaxCSMA j k j k j P Re ; for , 1 ) , 1 , | , 2 , ( β       ≤ ≤ − ≤ ≤ − ≤ ≤ = − +

+ +

tries aMaxFrame k W x Backoffs macMaxCSMA j W k j k x j P

j j

Re ; 1 ; 1 for , ) , 1 , | , , 1 (

1 1

β

slide-23
SLIDE 23

Transition Probability

      ≤ ≤ − ≤ ≤ = − tries aMaxFrame k W x W k Backoff macMaxCSMA x P Re ; 1 for , ) , 1 , | , , ( β

slide-24
SLIDE 24

Transition Probability

      − ≤ ≤ − ≤ ≤ ≤ ≤ = − + 1 Re ; 1 ; for , ) , 2 , | 1 , , ( tries aMaxFrame k W x Backoffs macMaxCSMA j W p k j k x P

c

      ≤ ≤ − ≤ ≤ ≤ ≤ − = − tries aMaxFrame k W x Backoffs macMaxCSMA j W p k j x P

c

Re ; 1 ; for , 1 ) , 2 , | , , (

slide-25
SLIDE 25

Transition Probability

     − ≤ ≤ ≤ ≤ = − 1 ; for , ) Re , 2 , | , , ( W x Backoffs macMaxCSMA j W p tries aMaxFrame j x P

c

slide-26
SLIDE 26

Throughput Estimation

In order to demonstrate that the IEEE 802.15.4 is suitable for low-rate WSNs, we develop the analytical model for throughput. ptr: probability that there is at least one transmission in the considered slot time

  • ps: the probability that a transmission occurring
  • n the channel is successful
  • {

}

N p L tr p ] ) 1 ( 1 [ 1 ) 1 )( 1 ( τ β α − − − − − =

tr p N p p N L s p 1 ) 1 ( 1 ) 1 ( ) 1 )( 1 ( −       − − − × − − = τ τ β α

slide-27
SLIDE 27

Throughput Estimation

Taking S as the average amount of payload successfully transmitted in one backoff period

  • Tpl: duration of payload transmission

σ : duration of an empty slot time Tc: duration of a collision Ts: duration of a successful transmission

c s tr s s tr tr pl tr s

T p p T p p p T p p S ) 1 ( ) 1 ( − + + − = σ

slide-28
SLIDE 28

Throughput Estimation

  • TCCA: duration for performing CCA
  • TL: duration for transmitting L-slot packet
  • δ: duration for waiting an ACK
  • TACK: duration for receiving an ACK
  • An example for Ts:

             

max

2 , 2 δ δ + + = + + + =

L CCA c Ack L CCA s

T T T T T T T

 

CCA

T 2

 

L

T

 

δ

 

ACK

T

slide-29
SLIDE 29

Energy Consumption Estimation

Es: Energy consumption for each succeful transmission Ec: Energy consumption due to each collision.

slide-30
SLIDE 30

Energy Consumption Estimation

slide-31
SLIDE 31

Performance Evaluation

We use ns-2 as the simulator A star topology with 30 nodes Transmission range: 7 meters Transceiver configured as CC2420

Carrier frequency: 2.4 GHz Effective data rate: 250 kbps

Provide various data rates per flow

unsaturated traffic conditions

slide-32
SLIDE 32

Analytical and Simulated Results

2 4 6 8 10 12 14 16 18 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Data rate (pkts per second) Throughput (kbps)

  • Ana. 50 bytes
  • Sim. 50 bytes
  • Ana. 25 bytes
  • Sim. 25 bytes
  • Ana. 10 bytes
  • Sim. 10 bytes
slide-33
SLIDE 33

5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Energy consumption (Joule) 100 bytes 50 bytes 10 bytes

High Data Rate

5 10 15 20 25 30 35 40 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Throughput (kbps)

100 bytes 50 bytes 10 bytes

10 20 30 40 50 60 70 80 90 100 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Packet delivery ratio (%) 100 bytes 50 bytes 10 bytes

slide-34
SLIDE 34

0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per second) Energy consumption (Joule) 100 bytes 50 bytes 10 bytes

Low Data Rate

1 2 3 4 5 6 7 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per second) Throughput (kbps) 100 bytes 50 bytes 10 bytes 10 20 30 40 50 60 70 80 90 100 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per seconde) Packet delivery ratio (%) 100 bytes 50 bytes 10 bytes

slide-35
SLIDE 35

5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Energy consumption (Joule) NRT = 3 NRT = 2 NRT = 1 NRT = 0

Different NRT Values

5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Throughput (kbps) NRT = 3 NRT = 2 NRT = 1 NRT = 0 10 20 30 40 50 60 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Packet delivery ratio (%) NRT = 3 NRT = 2 NRT = 1 NRT = 0

slide-36
SLIDE 36

Different Node Numbers

0.1 0.4 0.7 1 1.3 1.6 1.9 2 4 6 8 10 12 14 16 Throughput (kbps) Data rate(pps) 100 bytes 50 bytes 10 bytes

N = 1 N = 10 N = 20 N = 30

slide-37
SLIDE 37

Conclusions

We consider a beacon-enabled slotted CSMA-CA of IEEE 802.15.4 Develop analytical models for throughput and energy consumption under unsaturated traffic conditions. Simulated results show that the standard is suitable for low data rate transmission. In order to get better throughput, the payload size should be as large as possible.

Retransmission of collided packets should be considered for a network of lower data rate (WSN).

slide-38
SLIDE 38

Thank you for your kind attention!