Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet - - PowerPoint PPT Presentation
Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet - - PowerPoint PPT Presentation
Modeling IEEE 802.15.4 based Wireless Sensor Network with Packet Retry Limits Prasan Kumar Sahoo Vanung University, Taiwan Jang-Ping Sheu National Tsing Hua University, Taiwan Outline Introduction Objectives System Model
Outline
Introduction Objectives System Model Analytical Models Performance Evaluation Conclusions
Introduction
IEEE 802.15.4 MAC is designed for Wireless Personal Area Networks (WPANs)
Short Range Low Power Low Cost Small Networks
Objectives
Design analytical models for wireless sensor networks (WSN):
To evaluate energy consumption To evaluate throughput Based on IEEE 802.15.4 MAC with retry limits.
Consider unsaturated traffic conditions
All nodes of the network do not have packets to transmit at the same time.
System Model
Network Topology Data Transfer Methods Channel Access Mechanism
Network Topology
We design analytical models for the star topology based WSN.
Data Transfer Method
In star topology, only two types of data transfer methods are used.
Uplink: Network Devices Coordinator Downlink: Coordinator Network Devices
Take accounts of the acknowledgements Only concentrate on the uplink data transfer
Sensed data are generally flown from devices to the coordinator.
Data Transfer Model
Beacon Data Acknowledgement
Channel Access Mechanism
Two types of CSMA-CA in IEEE 802.15.4
Slotted (in beacon enabled network) Un-slotted (in non-beacon enabled network) Consider slotted CSMA-CA with ACK
Channel Access Mechanism
Each device shall maintain three variables for each transmission attempts.
Number of Backoffs (NB) Contention Window Length (CW): Number of backoff periods that need to be cleared of channel activity before the transmission can commence Backoff Exponent (BE): backoff period=R(0, 2BE-1)
Analytical Models
Transmission Policy Packet Collision Probability Probability of Sensing Channel Busy The Markov Chain Model
aMaxFrameRetries: Maximum number of retries allowed after a transmission failure macAckWaitDuration: Maximum number of symbols to wait till receiving an ACK. macMinBE: Minimum value of the backoff exponent aMaxBE: Maximum value of the backoff exponent macMaxCSMABackoffs (m): Maximum number of backoffs the CSMA-CA algorithm will attempt before declaring a channel access failure
Definition of parameters
Transmission Policy
NRT =0 NB=0, CW=2, BE=macMinBE Locate backoff period boundary Delay for random (2BE-1) unit backoff periods Perform CCA on backoff boundary NB=NB+1, CW=2, BE=min(BE+1, aMaxBE) Channel idle? NB> macMaxCSMABackoffs (m) ? Channel Access Failure CW=CW-1 CW=0? Channel Access Success, and Transmit data Receive corresponding ACK in time? Failure Success NRT=NRT+1, NRT> aMaxFrameRetries ? Y Y N Y Y N N N N Y CSMA/CA Slotted ? Y (1) (2) (3) (4) (5) (6) (7) (8)
Packet Collision Probability
pc: Probability of collision is seen by a packet, if it is transmitted after performing CCA twice.
- N: Number of nodes associated to the coordinator
p0: Probability that the node has no packet ready to transmit. τ: Probability that the node is performing first CCA.
[ ]
1 0)
1 ( 1 1
−
− − − =
N c
p p τ
Probability of Sensing Channel Busy
Mi(s)=-1: Event that there is at least one transmission in the medium in slot i Mi(c)=-1: Event that some station start sensing during slot i Mi(s) 0: Event that no station in the medium is transmitting in slot i Mi(c) 0 : Event that no station starts sensing during slot i
The Markov Chain Model
Three stochastic processes: s(t), c(t) and r(t) s(t): Represents the backoff stage for NB, c(t): Represents backoff counter for CW, r(t): Represents retransmission counter for NRT
The Markov Chain Model
Sj,x,k = P{s(t) = j, c(t) = x, r(t) = k} j: {0, 1, ...,m}, x: { −2, − 1, ...,Wj −1}, k: {0, 1, ..., aMaxFrameRetries}, m: represents the macMaxCSMABackoffs Wj = 2min(j+macMinBE,aMaxBE)
The Markov Chain Model
Transition Probability
≤ ≤ − ≤ ≤ ≤ ≤ = − tries aMaxFrame k W x Backoffs macMaxCSMA j k x j k x j P
j
Re ; 1 1 ; for , 1 ) , , | , 1 , (
) , min(
2 where ,
aMaxBE macMinBE j j
W
+
=
Transition Probability
≤ ≤ ≤ ≤ − = − tries aMaxFrame k Backoffs macMaxCSMA j k j k j P Re ; for , 1 ) , , | , 1 , ( α ≤ ≤ − ≤ ≤ − ≤ ≤ = +
+ +
tries aMaxFrame k W x Backoffs macMaxCSMA j W k j k x j P
j j
Re ; 1 ; 1 for , ) , , | , , 1 (
1 1
α
Transition Probability
≤ ≤ − ≤ ≤ = tries aMaxFrame k W x W k Backoff macMaxCSMA x P Re ; 1 for , ) , , | , , ( α
Transition Probability
≤ ≤ ≤ ≤ − = − − tries aMaxFrame k Backoffs macMaxCSMA j k j k j P Re ; for , 1 ) , 1 , | , 2 , ( β ≤ ≤ − ≤ ≤ − ≤ ≤ = − +
+ +
tries aMaxFrame k W x Backoffs macMaxCSMA j W k j k x j P
j j
Re ; 1 ; 1 for , ) , 1 , | , , 1 (
1 1
β
Transition Probability
≤ ≤ − ≤ ≤ = − tries aMaxFrame k W x W k Backoff macMaxCSMA x P Re ; 1 for , ) , 1 , | , , ( β
Transition Probability
− ≤ ≤ − ≤ ≤ ≤ ≤ = − + 1 Re ; 1 ; for , ) , 2 , | 1 , , ( tries aMaxFrame k W x Backoffs macMaxCSMA j W p k j k x P
c
≤ ≤ − ≤ ≤ ≤ ≤ − = − tries aMaxFrame k W x Backoffs macMaxCSMA j W p k j x P
c
Re ; 1 ; for , 1 ) , 2 , | , , (
Transition Probability
-
− ≤ ≤ ≤ ≤ = − 1 ; for , ) Re , 2 , | , , ( W x Backoffs macMaxCSMA j W p tries aMaxFrame j x P
c
Throughput Estimation
In order to demonstrate that the IEEE 802.15.4 is suitable for low-rate WSNs, we develop the analytical model for throughput. ptr: probability that there is at least one transmission in the considered slot time
- ps: the probability that a transmission occurring
- n the channel is successful
- {
}
N p L tr p ] ) 1 ( 1 [ 1 ) 1 )( 1 ( τ β α − − − − − =
tr p N p p N L s p 1 ) 1 ( 1 ) 1 ( ) 1 )( 1 ( − − − − × − − = τ τ β α
Throughput Estimation
Taking S as the average amount of payload successfully transmitted in one backoff period
- Tpl: duration of payload transmission
σ : duration of an empty slot time Tc: duration of a collision Ts: duration of a successful transmission
c s tr s s tr tr pl tr s
T p p T p p p T p p S ) 1 ( ) 1 ( − + + − = σ
Throughput Estimation
- TCCA: duration for performing CCA
- TL: duration for transmitting L-slot packet
- δ: duration for waiting an ACK
- TACK: duration for receiving an ACK
- An example for Ts:
max
2 , 2 δ δ + + = + + + =
L CCA c Ack L CCA s
T T T T T T T
CCA
T 2
L
T
δ
ACK
T
Energy Consumption Estimation
Es: Energy consumption for each succeful transmission Ec: Energy consumption due to each collision.
Energy Consumption Estimation
Performance Evaluation
We use ns-2 as the simulator A star topology with 30 nodes Transmission range: 7 meters Transceiver configured as CC2420
Carrier frequency: 2.4 GHz Effective data rate: 250 kbps
Provide various data rates per flow
unsaturated traffic conditions
Analytical and Simulated Results
2 4 6 8 10 12 14 16 18 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Data rate (pkts per second) Throughput (kbps)
- Ana. 50 bytes
- Sim. 50 bytes
- Ana. 25 bytes
- Sim. 25 bytes
- Ana. 10 bytes
- Sim. 10 bytes
5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Energy consumption (Joule) 100 bytes 50 bytes 10 bytes
High Data Rate
5 10 15 20 25 30 35 40 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Throughput (kbps)
100 bytes 50 bytes 10 bytes
10 20 30 40 50 60 70 80 90 100 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Packet delivery ratio (%) 100 bytes 50 bytes 10 bytes
0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per second) Energy consumption (Joule) 100 bytes 50 bytes 10 bytes
Low Data Rate
1 2 3 4 5 6 7 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per second) Throughput (kbps) 100 bytes 50 bytes 10 bytes 10 20 30 40 50 60 70 80 90 100 0.1 0.3 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 Data rate (pkts per seconde) Packet delivery ratio (%) 100 bytes 50 bytes 10 bytes
5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Energy consumption (Joule) NRT = 3 NRT = 2 NRT = 1 NRT = 0
Different NRT Values
5 10 15 20 25 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Throughput (kbps) NRT = 3 NRT = 2 NRT = 1 NRT = 0 10 20 30 40 50 60 1 3 5 7 9 11 13 15 17 19 Data rate (pkts per second) Packet delivery ratio (%) NRT = 3 NRT = 2 NRT = 1 NRT = 0
Different Node Numbers
0.1 0.4 0.7 1 1.3 1.6 1.9 2 4 6 8 10 12 14 16 Throughput (kbps) Data rate(pps) 100 bytes 50 bytes 10 bytes
N = 1 N = 10 N = 20 N = 30