An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks
نویسندگان
چکیده
Numerous studies have shown that concurrent transmissions can help to boost wireless networkperformance despite the possibility of packet collisions. However, while these works provide empiricalevidence that concurrent transmissions may be received reliably, existing signal capture models onlypartially explain the root causes of this phenomenon. We present a comprehensive mathematicalmodel for MSK-modulated signals that makes the reasons explicit and thus provides fundamentalinsights on the key parameters governing the successful reception of colliding transmissions. A majorcontribution is the closed-form derivation of the receiver bit decision variable for an arbitrary numberof colliding signals and constellations of power ratios, time offsets, and carrier phase offsets. Wesystematically explore the factors for successful packet delivery under concurrent transmissions acrossthe whole parameter space of the model. We confirm the capture threshold behavior observed inprevious studies but also reveal new insights relevant to the design of optimal protocols: We identifycapture zones depending not only on the signal power ratio but also on time and phase offsets.
منابع مشابه
An Energy Efficient Clustering Method using Bat Algorithm and Mobile Sink in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of sensor nodes with limited energy. Energy efficiency is an important issue in WSNs as the sensor nodes are deployed in rugged and non-care areas and consume a lot of energy to send data to the central station or sink if they want to communicate directly with the sink. Recently, the IEEE 802.15.4 protocol is employed as a low-power, low-cost, and low rat...
متن کاملAnalysis of superframe adjustment and beacon transmission for IEEE 802.15.4 cluster tree networks
Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the low-rate and short-distance wireless personal area network (PAN). A cluster tree network consists of several clusters; each cluster has a coordinator, known as cluster coordinator, and several device nodes. In the cluster tree topology of IEEE 802.15.4, a PAN coordinator periodically ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملAnalytical Model for IEEE 802.15.4 Multi-Hop Networks with Improved Handling of Acknowledgements and Retransmissions
The IEEE 802.15.4 standard allows for the deployment of cost-effective and energy-efficient multi-hop networks. This document features an in-depth presentation of an analytical model for assessing the performance of such networks. It considers a generic, static topology with Poisson distributed datacollection as well as data-dissemination traffic. The unslotted CSMA/CA MAC layer of IEEE 802.15....
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1309.4978 شماره
صفحات -
تاریخ انتشار 2013