Adaptive IEEE 802.15.4 Protocol For Reliable and Timely Communications
Adaptive IEEE 802.15.4 Protocol For Reliable and Timely Communications
E
tot
(V) (1a)
s.t.
R(V) R
min
, (1b)
D(V) D
max
, (1c)
V
0
V V
m
. (1d)
The decision variables of the node V = (m
0
, m, n) are
m
0
macMinBE,
m macMaxCSMABackoffs ,
n macMaxFrameRetries .
0 , 1 , m 0 , 0 , m 0 , 1 , m 0 , 2 W , m
m
0 , 1 W , m
m
1 1
1 1
1 1
0
W
1
1
W
1
m
W
1
c
P 1
c
P 1
c
P 1
n , 1 , 0 n , 0 , 0 n , 1 , 0 n , 2 W , 0
0
n , 1 W , 0
0
n , 1 , 1 n , 0 , 1 n , 1 , 1 n , 2 W , 1
1
n , 1 W , 1
1
n , 1 , m n , 0 , m n , 1 , m n , 2 W , m
m
n , 1 W , m
m
1 1
1
1
1 1
0
W
1
1
W
1
m
W
1
c
P 1
c
P 1
c
P 1
c
P
c
P
c
P
c
P
c
P
c
P
0
Q
q
q 1
0 , 0 , 2 0 , L , 2
c
n , 1 L , 2
c
n , 0 , 2
0 , 0 , 1
0 , 1 L , 1
s
n , 0 , 1
n , 1 L , 1
s
q 1
q
q
q
q 1
q 1
1 L0
Q
1
Q
1 1
Fig. 1. Markov chain model for CSMA/CA of IEEE 802.15.4.
state of retransmission counter at time t experienced by a node
to transmit a packet. By assuming independent probability
that nodes start sensing, the stationary probability that a
node attempts a rst carrier sensing in a randomly chosen
slot time is constant and independent of other nodes. The
triple (s(t), c(t), r(t)) is the three-dimensional Markov chain
in Fig. 1, where we use (i, k, j) to denote a particular state.
We denote the MAC parameters by V = (m
0
, m, n), m
b
macMaxBE, W
0
2
m0
, W
m
2
min(m0+m,m
b
)
.
The Markov chain consists of four main parts corresponding
to the idle-queue states, backoff states, clear channel assess-
ment (CCA) states, and packet transmission states. The states
(Q
0
, . . . , Q
L01
) correspond to the idle-queue states when
the packet queue is empty and the node is waiting for the
next packet generation time. Note that the idle-queue states
(Q
0
, . . . , Q
L01
) take into account the sampling interval. The
states from (i, W
m
1, j) to (i, W
0
1, j) represent the
backoff states. The states (i, 0, j) and (i, 1, j) represent rst
CCA (CCA
1
) and second CCA (CCA
2
), respectively. Let
be the probability that CCA
1
is busy, and the probability
that CCA
2
is busy. The states (1, k, j) and (2, k, j) cor-
respond to the successful transmission and packet collision,
respectively. By knowing the duration of an ACK frame, ACK
timeout, inter-frame spacing (IFS), data packet length, and
header duration, we dene the packet successful transmission
time L
s
and the packet collision time L
c
as
L
s
= L + t
ack
+ L
ack
+ IFS ,
L
c
= L + t
m,ack
, (2)
where L is the total length of a packet including overhead
4
b
0,0,0
=
_
_
_
1
2
_
1(2x)
m+1
12x
W
0
+
1x
m+1
1x
_
1y
n+1
1y
+ (1 )
1x
m+1
1x
1y
n+1
1y
+ (L
s
(1 P
c
) + L
c
P
c
)(1 x
m+1
)
1y
n+1
1y
+ L
0
q
1q
_
x
m+1
(1y
n+1
)
1y
+ P
c
(1 x
m+1
)y
n
+ (1 P
c
)
(1x
m+1
)(1y
n+1
)
1y
__
1
if m m
b
m
0
_
1
2
_
1(2x)
m
b
m
0
+1
12x
W
0
+
1x
m
b
m
0
+1
1x
+ (2
m
b
+ 1)x
m
b
m0+1 1x
mm
b
+m
0
1x
_
1y
n+1
1y
+ (1 )
1x
m+1
1x
1y
n+1
1y
+ (L
s
(1 P
c
) + L
c
P
c
)(1 x
m+1
)
1y
n+1
1y
+ L
0
q
1q
_
x
m+1
(1y
n+1
)
1y
+ P
c
(1 x
m+1
)y
n
+(1 P
c
)
(1x
m+1
)(1y
n+1
)
1y
__
1
otherwise
(3)
and payload, t
ack
is ACK waiting time, L
ack
is the length of
ACK frame, and t
m,ack
is the timeout of the ACK, see details
in [1].
We have the following results:
Lemma 1: Let the stationary probability of the Markov
chain in Fig. 1 be
b
i,k,j
= lim
t
P(s(t) = i, c(t) = k, r(t) = j),
where i (2, m), k (1, max(W
i
1, L
s
1, L
c
1)), j
(0, n). Then, for 0 i m
b
i,k,j
=
W
i
k
W
i
b
i,0,j
, 0 k W
i
1 , (4)
where
W
i
=
_
2
i
W
0
, i m
b
m
0
,
2
m
b
, i > m
b
m
0
,
and
b
i,0,j
=
_
(1 )(1 )P
c
m
i=0
( + (1 ))
i
_
j
( + (1 ))
i
b
0,0,0
, (5)
where b
0,0,0
given in Eq. (3), x = +(1 ), y = P
c
(1
x
m+1
), and P
c
is the collision probability. Moreover,
b
1,k,j
= (1 P
c
)(1 x)
m
i=1
b
i,0,j
, 0 k L
s
1 ,
(6)
and
b
2,k,j
= P
c
(1 x)
m
i=1
b
i,0,j
, 0 k L
c
1 . (7)
Proof: See Appendix A.
We remark here that the term b
0,0,0
, which plays a key
role in the analysis, is different from the corresponding term
given in [4], [14][17] due to our accurate modelling of the
retransmissions, ACK, unsaturated trafc, and packet size. In
the next section, we demonstrate the validity of the Markov
chain model by Monte Carlo simulations.
Now, starting from Lemma 1, we derive the channel sensing
probability and the busy channel probabilities and . The
probability that a node attempts CCA
1
in a randomly chosen
time slot is
=
m
i=0
n
j=0
b
i,0,j
=
1 x
m+1
1 x
1 y
n+1
1 y
b
0,0,0
. (8)
This probability depends on the probability P
c
that a trans-
mitted packet encounters a collision, and the probabilities
and . These probabilities are developed in the following.
The term P
c
is the probability that at least one of the N1
remaining nodes transmit in the same time slot. If all nodes
transmit with probability , P
c
is
P
c
= 1 (1 )
N1
,
where N is the number of nodes. Similarly to [4], we derive
the busy channel probabilities and as follows. We have
=
1
+
2
, (9)
where
1
is the probability of nding channel busy during
CCA
1
due to data transmission, namely,
1
= L(1 (1 )
N1
)(1 )(1 ) ,
and
2
is the probability of nding the channel busy during
CCA
1
due to ACK transmission, which is
2
= L
ack
N(1 )
N1
1 (1 )
N
(1 (1 )
N1
)(1 )(1 ) ,
where L
ack
is the length of the ACK. With a similar way, the
probability of nding the channel busy during CCA
2
is
=
1 (1 )
N1
+ N(1 )
N1
2 (1 )
N
+ N(1 )
N1
. (10)
Now, we are in the position to derive the carrier sensing
probability and the busy channel probabilities and by
solving the system of non-linear equations (8), (9), and (10) for
these probabilities, see details in [28]. From these probabilities
then one could derive the expressions of the reliability, delay
for successful packet delivery, and power consumption that
are needed in (1). The drawback of such an approach is that
there is no closed form expression for these probabilities, the
system of equations that gives , and must be solved by
numerical methods. This may be computationally demanding
and therefore inadequate for use in simple sensor devices. In
the following, we instead present a simple analytical model of
the reliability, delay for successful packet delivery, and power
consumption. The key idea is that sensor nodes can estimate
the busy channel probabilities and and the channel sensing
probability . Therefore, nodes exploit local measurements to
evaluate the performance metrics, rather than solving nonlinear
equations. Details follow in the sequel, where we derive these
approximate expressions for Eqs. (1a)(1c).
5
3 4 5 6 7 8
0.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
sim, q=0.3
app, q=0.3
pollin, q=0.3
sim, q=0.5
app, q=0.5
pollin, q=0.5
sim, q=0.7
app, q=0.7
pollin, q=0.7
MAC parameter, m0
r
e
l
i
a
b
i
l
i
t
y
(a) m
0
= 3, . . . , 8, m
b
= 8, m = 4, n = 3
2 3 4 5
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
sim, q=0.3
app, q=0.3
pollin, q=0.3
sim, q=0.5
app, q=0.5
pollin, q=0.5
sim, q=0.7
app, q=0.7
pollin, q=0.7
MAC parameter, m
r
e
l
i
a
b
i
l
i
t
y
(b) m = 2, . . . , 5, m
0
= 3, m
b
= 8, n = 3
0 1 2 3 4 5 6 7
0.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
sim, q=0.3
app, q=0.3
pollin, q=0.3
sim, q=0.5
app, q=0.5
pollin, q=0.5
sim, q=0.7
app, q=0.7
pollin, q=0.7
MAC parameter, n
r
e
l
i
a
b
i
l
i
t
y
(c) n = 0, . . . , 7, m
0
= 3, m
b
= 8, m = 4
Fig. 2. Reliability as a function of the trafc regimes q = 0.3, 0.5, 0.7, and MAC parameters m
0
= 3, . . . , 8, m
b
= 8, m = 2, . . . , 5, n = 0, . . . , 7 with
Pollins Markov chain model [4]. The length of the packet is L = 3 and the number of nodes is N = 20.
B. Reliability
The main contributions of this section are the derivation
of both precise and approximated expression of the reliabil-
ity (1b) of the optimization problem (1), where we recall the
reliability is the probability of successful packet reception.
Proposition 1: The reliability is
R(V) = 1
x
m+1
(1 y
n+1
)
1 y
y
n+1
. (11)
Proof: In slotted CSMA/CA, packets are unsuccessfully
received due to two reasons: channel access failure and retry
limits. Channel access failure happens when a packet fails to
obtain idle channel in two consecutive CCAs within m + 1
backoffs. Furthermore, a packet is discarded if the transmission
fails due to repeated collisions after n+1 attempts. Following
the Markov model presented in Fig. 1, the probability that the
packet is discarded due to channel access failure is
P
dc
= x
m+1
n
j=0
y
j
=
x
m+1
(1 y
n+1
)
1 y
. (12)
The probability of a packet being discarded due to retry limits
is
P
dr
= y
n+1
. (13)
The reliability is given by
R(V) = 1 P
dc
P
dr
,
from which the proposition follows.
Approximation 1: An approximation of the reliability is
R(V) = 1 x
m+1
(1 + y) y
n+1
(14)
where
y =(1 (1 (1 + x)(1 + y)
b
0,0,0
)
N1
)(1 x
2
) ,
b
0,0,0
=2/(W
0
(1 + 2x)(1 + y) + 2L
s
(1 x
2
)(1 + y)
+ L
0
q/(1 q)(1 + y
2
+ y
n+1
)) ,
and y = (1 (1 )
N1
)(1 x
2
).
Proof: The expression of the state probability b
0,0,0
is
the main responsible for the non-linear equations that give
, and . Therefore, we approximate b
0,0,0
. Let the approx-
imation be
b
0,0,0
. Given z 0, we use that
1 z
m+1
1 z
1 + z , if z 1 . (15)
By using this approximation, Eq. (44) is approximated by
m
i=0
Wi1
k=0
n
j=0
b
i,k,j
b
0,0,0
2
[(1 + 2x)W
0
+ 1 + x] (1 + y) .
(16)
Similarly, Eq. (45) is approximated by
m
i=0
n
j=0
b
i,1,j
b
0,0,0
(1 )(1 + x)(1 + y) 0 . (17)
Eq. (46) is approximated by
n
j=0
_
Ls1
k=0
b
1,k,j
+
Lc1
k=0
b
2,k,j
_
b
0,0,0
L
s
(1 x
m+1
)(1 + y), (18)
where we assume that the packet collision time is approx-
imated to the packet successful transmission time, namely
L
s
L
c
. Finally, using K
0
= L
0
q/(1 q), the approximated
idle-queue stages of Eq. (47) is
L01
l=0
Q
l
b
0,0,0
K
0
_
1 + y + P
c
(1 x
m+1
)(y
n
y 1)
.
(19)
By summing together Eqs. (16)(19), the approximated state
probability is
b
0,0,0
2
W
0
r
1
+ 2r
2
(20)
where
r
1
= (1 + 2x)(1 + y) ,
r
2
= L
s
(1 x
2
)(1 + y) + K
0
(1 + y
2
+ y
n+1
) ,
y = (1 (1 )
N1
)(1 x
2
) .
Now, we put
b
0,0,0
into Eq. (11) to obtain the approximated
reliability:
R(V) = 1 x
m+1
(1 + y) y
n+1
,
6
3 4 5 6 7 8
0
10
20
30
40
50
60
70
80
90
sim, q=0.3
app, q=0.3
sim, q=0.5
app, q=0.5
sim, q=0.7
app, q=0.7
MAC parameter, m0
a
v
e
r
a
g
e
d
e
l
a
y
(
m
s
)
(a) m
0
= 3, . . . , 8, m
b
= 8, m = 4, n = 3
2 3 4 5
4
5
6
7
8
9
10
11
12
13
sim, q=0.3
app, q=0.3
sim, q=0.5
app, q=0.5
sim, q=0.7
app, q=0.7
MAC parameter, m
a
v
e
r
a
g
e
d
e
l
a
y
(
m
s
)
(b) m = 2, . . . , 5, m
0
= 3, m
b
= 8, n = 3
0 1 2 3 4 5 6 7
3
4
5
6
7
8
9
sim, q=0.3
app, q=0.3
sim, q=0.5
app, q=0.5
sim, q=0.7
app, q=0.7
MAC parameter, n
a
v
e
r
a
g
e
d
e
l
a
y
(
m
s
)
(c) n = 0, . . . , 7, m
0
= 3, m
b
= 8, m = 4
Fig. 3. Average delay as a function of the trafc regimes q = 0.3, 0.5, 0.7 and MAC parameters m
0
= 3, . . . , 8, m
b
= 8, m = 2, . . . , 5, n = 0, . . . , 7.
The length of the packet is L = 3 and the number of nodes is N = 20.
where y = (1(1 )
N1
)(1x
2
) and is the approximated
carrier sensing probability = (1 + x)(1 + y)
b
0,0,0
.
We remark that
R(V) is a function of the measurable busy
channel probabilities and , the channel access probability
and the MAC parameters m
0
, m
b
, m, n. The approximation
is based on estimated values of x and .
We use Monte Carlo simulations of the Markov chain in
Fig. 1 to validate the approximated model of the reliability.
The simulations are based on the specications of the IEEE
802.15.4 [1] with several values of the trafc regime and MAC
parameters. Simulation data was collected out of 5 runs, each
lasting 210
5
time slots. Fig. 2 compares the reliability given
by Eq. (14), the analytical model in [4], and Monte Carlo
simulations as a function of the trafc regimes q = 0.3, 0.5, 0.7
with N = 10 nodes and different MAC parameters m
0
, m, n.
In the gure, note that Pollin refers to the reliability model
derived in [4]. Our analytical expression matches quite well
the simulation results. The expression is closer to simulation
results under low trafc regime q = 0.5, 0.7 than high trafc
regime q = 0.3 because the approximation given by Eq. (15)
holds if x = + (1 ) 1, but x increases as the trafc
and the number of nodes increases. The reliability approaches
1 under very low trafc regime q = 0.7. In Fig. 2(a), 2(b),
the reliability increases as MAC parameters m
0
, m increase,
respectively. In Fig. 2(c), we observe that the improvement of
reliability is small as the retry limits n increases for n 3.
Notice that the reliability saturates to 0.95 for trafc regime
q = 0.3 for n 3. Hence, the retransmissions are necessary
but not sufcient to obtain high reliability under high trafc
regimes.
C. Delay
In this section, we derive the constraint of average delay (1c)
of the optimization problem (1). The average delay for a
successfully received packet is dened as the time interval
from the instant the packet is at the head of its MAC queue
and ready to be transmitted, until the transmission is successful
and the ACK is received. In this section, we develop an
approximation for such an average delay, which is given by
Approximation 2. To this aim, we need some intermediate
technical steps. In particular, we characterize (a) the expression
of the delay for a successful transmission at time j + 1 after
jth events of unsuccessful transmission due to collision and
(b) the expected value of the approximated backoff delay due
to busy channel. We address these issues in the following.
Let D
j
be the random time associated to the successful
transmission of a packet at the jth backoff stage. Denote with
A
j
the event of a successful transmission at time j + 1 after
jth events of unsuccessful transmission. Let A
t
be the event
of successful transmission within the total attempts n. Then,
the delay for a successful transmission after jth unsuccessful
attempts is
D =
n
j=0
1
Aj |At
D
j
,
where 1
Aj|At
is 1 if A
j
|A
t
holds, and 0 otherwise and D
j
=
L
s
+j L
c
+
j
h=0
T
h
, with T
h
being the backoff stage delay,
L
s
is the packet successful transmission time, and L
c
is the
packet collision transmission time as dened in Eq. (2).
Lemma 2: The probability of successful transmission at
time j + 1 after jth events of unsuccessful transmission due
to collision is
Pr(A
j
|A
t
) =
(1 y) y
j
1 y
n+1
. (21)
Proof: A transmission may be successful with probability
1 P
c
, or collide with probability P
c
. Then, the probability
of the event A
j
|A
t
is
Pr(A
j
|A
t
) =
P
j
c
(1 x
m+1
)
j
n
k=0
(P
c
(1 x
m+1
))
k
where the normalization comes by considering all the possible
events of successful attempts A
t
. Note that (1 x
m+1
) is the
probability of successful channel access within the maximum
number of m backoff stages.
In the following, we give the total backoff delay T
h
. Let
T
h,i
be the random time needed to obtain two successful
CCAs from the selected backoff counter value in backoff level
i. Recall that a node transmits the packet when the backoff
counter is 0 and two successful CCAs are detected [1]. Denote
with B
i
the event occurring when the channel is busy for i
times, and then idle at the time i + 1. Let B
t
be the event
of having a successful sensing within the total number of m
sensing attempts. If the node accesses an idle channel after its
7
3 4 5 6 7 8
1.5
2
2.5
3
3.5
4
x 10
4
E
tot, i
, sim, q=0.5
E
tot, i
, app, q=0.5
E
tot, s
, sim, q=0.5
E
tot, s
, app, q=0.5
E
tot, i
, sim, q=0.7
E
tot, i
, app, q=0.7
E
tot, s
, sim, q=0.7
E
tot, s
, app, q=0.7
MAC parameter, m0
p
o
w
e
r
c
o
n
s
u
m
p
t
i
o
n
(
W
)
(a) m
0
= 3, . . . , 8, m
b
= 8, m = 4, n = 3
2 3 4 5
1.5
2
2.5
3
3.5
4
x 10
4
E
tot, i
, sim, q=0.5
E
tot, i
, app, q=0.5
E
tot, s
, sim, q=0.5
E
tot, s
, app, q=0.5
E
tot, i
, sim, q=0.7
E
tot, i
, app, q=0.7
E
tot, s
, sim, q=0.7
E
tot, s
, app, q=0.7
MAC parameter, m
p
o
w
e
r
c
o
n
s
u
m
p
t
i
o
n
(
W
)
(b) m = 2, . . . , 5, m
0
= 3, m
b
= 8, n = 3
0 1 2 3 4 5 6 7
1
1.5
2
2.5
3
3.5
4
x 10
4
E
tot, i
, sim, q=0.5
E
tot, i
, app, q=0.5
E
tot, s
, sim, q=0.5
E
tot, s
, app, q=0.5
E
tot, i
, sim, q=0.7
E
tot, i
, app, q=0.7
E
tot, s
, sim, q=0.7
E
tot, s
, app, q=0.7
MAC parameter, n
p
o
w
e
r
c
o
n
s
u
m
p
t
i
o
n
(
W
)
(c) n = 0, . . . , 7, m
0
= 3, m
b
= 8, m = 4
Fig. 4. Average power consumption of I-mode and S-mode as a function of the trafc regimes q = 0.3, 0.5, 0.7 and MAC parameters m
0
= 3, . . . , 8,
m
b
= 8, m = 2, . . . , 5, n = 0, . . . , 7. The length of the packet is L = 3 and the number of nodes is N = 20.
i th busy CCA, then
T
h
=
m
i=0
1
Bi|Bt
T
h,i
,
where
T
h,i
= 2 T
sc
+
i
k=1
T
sc
h,k
+
i
k=0
T
b
h,k
, (22)
and where 2T
sc
is the successful sensing time,
i
k=1
T
sc
h,k
is the unsuccessful sensing time due to busy channel during
CCA, and
i
k=0
T
b
h,k
is the backoff time.
Lemma 3: The expected value of the approximated backoff
delay is
E[
T
h
] =2S
b
_
1 +
1
4
_
1
1
m+1
_
2W
0
1 (2)
m+1
1 2
3(m + 1)
m+1
1
_
+
3
1
(W
0
+ 1)
__
,
(23)
where = max(, (1 )).
Proof: By considering the busy channel during two
CCAs, the probability of the event B
i
|B
t
is approximated by
Pr(B
i
|B
t
) =
i
m
k=0
k
, (24)
where = max(, (1 )) (note that this is the term that
gives the approximation, see accurate model in [29]). The
approximation of the average backoff period is
E[
T
h
] =
m
i=0
Pr(B
i
|B
t
) E[
T
h,i
] (25)
=2T
sc
+
m
i=0
Pr(B
i
|B
t
)
i
k=0
_
2
k
W
0
1
2
S
b
+ 2T
sc
k
_
where the approximated sensing time E[
T
h,i
] considers the
worst case, i.e., a failure of the second sensing (CCA
2
), which
implies that T
sc
= S
b
and that each sensing failure takes 2T
sc
in Eq. (22).
Now, we are in the position to derive an approximation of
the average delay for successfully received packets.
Approximation 2: The expected value of the approximated
delay is
D(V) =T
s
+E[
T
h
]
+
_
y
1 y
(n + 1) y
n+1
1 y
n+1
_
(T
c
+E[
T
h
]) . (26)
Proof: By considering the Lemma 2, we derive
D(V) =
n
j=0
Pr(A
j
|A
t
) E[
D
j
]
where E[
D
j
] = T
s
+ j T
c
+
j
h=0
E[
T
h
] and E[
T
h
] is given
in Lemma 3.
Fig. 3 shows the average delay as obtained by Eq. (26)
as a function of different trafc regimes q = 0.3, 0.5, 0.7
with a given number of nodes N = 10 and different MAC
parameters m
0
, m, n. The analytical model predicts well the
simulation results. The accuracy is reduced under high trafc
regime q = 0.3 due to the approximation given by Eq. (15).
Observe that the average delay increases as trafc regime
increases due to high busy channel probability and collision
probability. Fig. 3(a) shows that the average delay increases
exponentially as m
0
increases. Hence, we conclude that m
0
is the key parameter on average delay in comparison to m, n.
D. Power Consumption
Here, we derive the objective function, power consumption
of the node (1a) of the optimization problem (1). We propose
two models for the average power consumption, depending on
the radio state during the backoff mechanism specied by the
IEEE 802.15.4 standard. Let us denote by I-mode and S-mode
the situation when the radio is set in idle mode or in sleep
mode during backoff period, respectively.
Approximation 3: The energy consumption of the I-mode
E
tot,i
(V) is given by Eq. (27) and of the S-mode
E
tot,s
(V)
is given by Eq. (28), where state probability
b
0,0,0
is given
in Eq. (20), P
i
, P
sc
, P
sp
, P
w
, P
t
and P
r
are the average power
consumption in idle-listen, channel sensing, sleep states, wake-
up state, transmit and receiving states, respectively.
Proof: By considering the Markov chain given in Fig. 1,
we see that the average power consumption of I-mode
E
tot,i
(V) is
E
tot,i
(V) =E
b,i
+ E
sc
+ E
t
+ E
q
+ E
w,i
.
8
E
tot,i
(V) =
P
i
2
_
(1 x)(1 (2x)
m+1
)
(1 2x)(1 x
m+1
)
W
0
1
_
+ P
sc
(2 ) + (1 )(1 ) (P
t
L + P
i
+ L
ack
(P
r
(1 P
c
) + P
i
P
c
))
+ P
w
q
_
x
m+1
(1 + y) + P
c
(1 x
2
)y
n
+ (1 P
c
)(1 x
2
)(1 + y)
_
b
0,0,0
(27)
E
tot,s
(V) =P
sc
(2 ) + (1 )(1 ) (P
t
L + P
i
+ L
ack
(P
r
(1 P
c
) + P
i
P
c
)) + P
w
_
b
0,0,0
(1 (0.5x)
m+1
)
W
0
(1 0.5x)
1 y
n+1
1 y
_
(28)
In the following, we derive these terms.
The idle backoff power consumption is
E
b,i
=P
i
m
i=0
Wi1
k=1
n
j=0
b
i,k,j
=
P
i
2
_
(1 x)(1 (2x)
m+1
)
(1 2x)(1 x
m+1
)
W
0
1
_
, (29)
where the carrier sensing probability is measured by each
node and P
i
is the average power consumption in idle-listen.
By putting together Eqs. (44), (45) and (8), the average
power consumption of the sensing state is
E
sc
=P
sc
m
i=0
n
j=0
(b
i,0,j
+ b
i,1,j
) = P
sc
(2 ) , (30)
where P
sc
is the average power consumption in channel
sensing. Similarly, by substituting Eq. (46) and Eq. (8), the
average power consumption for packet transmission including
both successful transmission and packet collision E
t
is
E
t
=P
t
1
i=2
L1
k=0
n
j=0
b
i,k,j
+ P
i
1
i=2
n
j=0
b
i,L,j
+
n
j=0
L+L
ack
+1
k=L+1
(P
r
b
1,k,j
+ P
i
b
2,k,j
) (31)
=(1 x) (P
t
L + P
i
+ L
ack
(P
r
(1 P
c
) + P
i
P
c
)) ,
where P
t
and P
r
are the average power consumption in trans-
mit and receiving states, respectively. Analogously, E
q
is the
power consumption of idle stage without packet generation:
E
q
= P
sp
L01
l=0
Q
l
0 , (32)
where P
sp
is the average power consumption in sleep states,
which we assume negligible. Since a node wakes up only after
generating packet, the wake-up power consumption E
w,i
is
E
w,i
=P
w
(1 q)Q
L01
=P
w
q
_
x
m+1
(1 + y) + P
c
(1 x
2
)y
n
+(1 P
c
)(1 x
2
)(1 + y)
_
b
0,0,0
, (33)
where P
w
is the average power consumption in wake-up
state and the state probability
b
0,0,0
is given in Eq. (20).
By summing Eqs. (29)(33), we obtain the average power
consumption of I-mode in closed form.
The average power consumption of S-mode
E
tot,s
(V) during
backoff states can be derived by following an approach similar
to the I-mode:
E
tot,s
(V) =E
b,s
+ E
sc
+ E
t
+ E
q
+ E
w,s
,
where the sleep backoff power consumption is
E
b,s
= P
sp
m
i=0
Wi1
k=1
n
j=0
b
i,k,j
0 ,
the wake-up power consumption is
E
w,s
=P
w
m
i=0
n
j=0
b
i,1,j
P
w
_
b
0,0,0
W
0
1 (0.5x)
m+1
1 0.5x
1 y
n+1
1 y
_
, (34)
and E
sc
, E
t
, E
q
is given in Eqs. (30), (31), (32), respectively.
Note that since the radio is set in sleep mode during backoff
period, node wakes up for each CCA
1
state.
Fig. 4 compares the analytical model and simulation results
of power consumption for both I-mode and S-mode as a
function of different trafc regimes q = 0.5, 0.7 with a number
of nodes N = 10 and different MAC parameters m
0
, m, n.
We observe that the power consumption of I-mode increases
as MAC parameters (m
0
, m, n) increase under low trafc
regime q = 0.5, 0.7 since the node needs to stay more time
in idle sleep stage without packet generation under low trafc
regime q = 0.5, 0.7, the main component of average power
consumption is the idle backoff time rather than transmit
or receiving power consumption i.e., P
t
> P
i
> P
sp
and
P
r
> P
i
> P
sp
. However, the power consumption of S-
mode decreases as m
0
increases because of sleep mode during
the backoff time. It is interesting to observe that the power
consumption has a weaker dependence on m and n than m
0
.
V. IEEE 802.15.4 OPTIMIZATION
In the previous sections we developed the expressions of the
performance metrics. Here, we present a novel approach where
each node locally solves the optimization problem. Consider
the reliability, delay and power consumption as investigated in
Section IV. The optimization problem (1) can be written by
using Eq. (14) of Approximation 1 for reliability constraint,
Eq. (26) of Approximation 2 for delay constraint and Eq. (27)
or (28) of Approximation 3 for power consumption. Note
that the power consumption is given by Eq. (27) if the I-
mode is selected, and it is given by Eq. (28), if the S-mode
is selected. The solution of the optimization problem gives
9
the optimal MAC parameter (m
0
, m, n) that each node uses
to minimize its energy expenditure, subject to reliability and
delay constraints. Notice that the problem is combinatorial
because the decision variables take on discrete values.
A vector of decision variables V is feasible if the reliability
and delay constraints are satised. The optimal solution may
be obtained by checking every combination of the elements of
V that gives feasibility, and then checking the combination that
gives the minimum objective function. Clearly, this approach
may have a high computational complexity, since there are
648 = 192 combinations of MAC parameters to check [1].
Therefore, in the following we propose an algorithm that gives
the optimal solution by checking just a reduced number of
combinations.
From Figs. 2, 3 and 4, we remark here that the reliability
and power consumption of both I-mode and S-mode are
increasing function as the parameter n increases. This property
is quite useful to solve (1) by a simple algorithm with reduced
computational complexity, as we see next.
The search of optimal MAC parameters uses an iterative
procedure according to the component-based method [30].
In particular, the probabilities , , and are estimated
periodically by each node. If a node detects a change of
these probabilities, then the node solves the local optimiza-
tion problem (1) using these estimated values. The solution
is achieved by nding the value of n that minimizes the
energy consumption given a pair of values for m
0
and m.
Since the power consumption is increasing with n, it follows
that the minimum is attained at the lowest value of n that
satises the constraints. Given that the reliability is increasing
with n, simple algebraic passages give that such a value is
n = f(m
0
, m), with
f(m
0
, m) =
_
ln(1 x
m+1
(1 + y) R
min
)
ln( y)
1
_
, (35)
where y = (1 (1 )
N1
)(1 x
2
) and
=
2r
3
2
m0
r
1
+ 2r
2
,
with
r
1
= (1 + 2x)(1 + y) ,
r
2
= L
s
(1 x
2
)(1 + y) +
L
0
q(1 + y
2
+ y
n+1
)
1 q
,
r
3
= (1 + x)(1 + y) ,
and y = (1 (1 )
N1
)(1 x
2
). Eq. (35) returns the
optimal retry limits given a pair m
0
, m. Notice that x and y
are measurable since node estimates , , and . By using this
simple algorithm, a node checks just 64 = 24 combinations
of the MAC parameters m
0
, m instead of 6 4 8 = 192
combinations that would be required by an exhaustive search.
We have seen by the Approximations 1, 2 and 3 that
the performance metrics are function of the busy channel
probabilities and and the channel access probability .
Once these probabilities are known at a node, the optimal
MAC parameters of that node can be readily computed by the
simple algorithm. In the algorithm, the number of nodes and
packet generation rates are assumed to be known, whereas
the busy channel probability and channel access probability
are periodically estimated in each node during the sensing
states of the MAC layer, and they do not require an ACK
mechanism, as we describe the details in the following. In
addition, the robustness of the algorithm to possible errors in
the estimation of the number of nodes and trafc load is then
investigated in Section VI-C.
The average busy channel probabilities and are es-
timated at each node while sending a data packet to the
coordinator. These probabilities are initialized at the beginning
of the nodes operation. The estimations of the busy channel
probabilities and the channel access probability use a sliding
window. When the node senses the channel at CCA
1
or
CCA
2
, these probabilities are updated by =
b
+ (1
b
) , =
b
+ (1
b
)
for some
b
(0, 1), respectively.
Note that and
are the busy channel probability of CCA
1
and CCA
2
of the current sliding window, respectively. There-
fore, a node does not require any extra communication and
sensing state to estimate these probabilities compared to the
IEEE 802.15.4 standard. By contrast, the estimation algorithms
for IEEE 802.11 proposed in [19] and [31] are not energy
efcient since a node needs to sense the channel state during
the backoff stage. This allows one to estimate the average
length of idle period. Hence, these schemes are implementable
only in I-mode. By contrast, our scheme is applied in both I-
mode and S-mode and does not require any computation load
during the backoff stage.
During an initialization phase of the algorithm, a node
communicates with the initial MAC parameters m
0
= 3, m
b
=
8, m = 4, n = 3. Then, the busy channel probabilities and
and the channel access probability are estimated in each node
during the channel sensing state of IEEE 802.15.4 without any
extra states. The application requirements are communicated
by the coordinator to the node if there are changes. It is
also possible that each node makes a decision of application
requirements depending on the data type e.g., strict delay
requirement for alarm message.
VI. NUMERICAL RESULTS FOR THE ADAPTIVE
IEEE 802.15.4 ALGORITHM
In the following, we present Monte Carlo simulations to
analyze the performance of our adaptive tuning algorithm
of the MAC parameters, under both stationary and transient
conditions. The analytical modelling that we have proposed in
Section IV is based on a Markov chain that has been validated
experimentally in [32]. Therefore, the Monte Carlo simulations
that we use here are representative of the real-world behavior
of the network.
In the stationary conditions, the application requirements
and network scenario are constant, whereas in transient con-
dition there are variations. The simulations are based on the
specications of the IEEE 802.15.4 and the practical imple-
mentation aspects described in Section V. In the simulations,
the network considers the I-mode and S-mode of the node
to compare the performance on the reliability, average packet
delay and power consumption. Furthermore, we investigate the
fairness of resource allocation, robustness to network changes
and sensitivity to inaccurate parameter estimations. Note that
it is not possible to compare our algorithm to other algorithms
10
0.2 0.3 0.4 0.5 0.6 0.7
0.85
0.9
0.95
1
Imode, R
min
= 0.9, D
max
=50
Imode, R
min
= 0.95, D
max
=50
Smode, R
min
= 0.95, D
max
=20
Smode, R
min
= 0.95, D
max
=100
default MAC
trafc load, q
r
e
l
i
a
b
i
l
i
t
y
(a) Reliability
0.2 0.3 0.4 0.5 0.6 0.7
0
10
20
30
40
50
60
70
80
90
100
Imode, R
min
= 0.9, D
max
=50
Imode, R
min
= 0.95, D
max
=50
Smode, R
min
= 0.95, D
max
=20
Smode, R
min
= 0.95, D
max
=100
default MAC
trafc load, q
a
v
e
r
a
g
e
d
e
l
a
y
(
m
s
)
(b) Average delay
0.2 0.3 0.4 0.5 0.6 0.7
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Imode, R
min
= 0.9, D
max
=50
Imode, R
min
= 0.95, D
max
=50
Smode, R
min
= 0.95, D
max
=20
Smode, R
min
= 0.95, D
max
=100
trafc load, q
p
o
w
e
r
g
a
i
n
(c) Power gain
Fig. 5. Stationary condition: reliability, average delay and power gain of the I-mode, S-mode of proposed scheme and IEEE 802.15.4 with default parameter
(macMinBE = 3, macMaxBE = 5, macMaxCSMABackoffs = 4, macMaxFrameRetries = 3) as a function of the trafc load q = 0.2, . . . , 0.7, the reliability
requirement R
min
= 0.9, 0.95 and delay requirement Dmax = 20, 50, 100 ms for the length of the packet L = 7 and N = 10 nodes. Note that default
MAC refers to IEEE 802.15.4 with default MAC parameters.
0.9 0.92 0.94 0.96 0.98
10
20
30
40
50
60
70
80
90
100
0.2
0.205
0.21
0.215
0.22
0.225
0.23
0.235
0.24
0.245
0.25
z
reliability requirement, Rmin
d
e
l
a
y
r
e
q
u
i
r
e
m
e
n
t
,
D
m
a
x
Fig. 6. Stationary network condition: power consumption of S-mode as a
function of reliability constraint R
min
= 0.9, . . . , 0.99 and delay requirement
Dmax = 10, . . . , 100 ms for the trafc load q = 0.5, the length of packet
L = 3 and N = 10 nodes.
from the literature as the link-based ones [22][26], because
they modify the IEEE 802.15.4 standard and are focused on
different performance metrics (e.g., throughput). However, it
is possible to show that our algorithm outperform signicantly
the results in [22][26]. This is due to that these results use
the ACK feedback, which has a low update frequency with
respect to the channel and network variations, whereas our
algorithm reacts much faster. Details follow in the sequel.
A. Protocol Behavior in Stationary Conditions
In this subsection, we are interested to the improvement
of performance metrics of the proposed scheme at stationary
conditions of the network, namely without changing applica-
tion requirements and network scenarios. We also present a
fairness analysis of the adaptive protocol.
Figs. 5 compare the reliability, average delay and power
gain values of the protocol as obtained by our algorithm and
with default MAC parameters. Both the I-mode and S-mode for
various trafc congurations and requirements are considered.
The requirements for both the I-mode and S-mode are R
min
=
0.9, 0.95, D
max
= 50 and R
min
= 0.95, D
max
= 20, 100 ms,
respectively. Fig. 5(a) shows that both I-mode and S-mode
satisfy the reliability constraint for different trafc regime. We
observe strong dependence of the reliability of default MAC
with different trafc regime due to the xed MAC parameters.
At the high trafc regime q = 0.2, the reliability of default
MAC is 0.86. In Fig. 5(b), the delay constraint is fullled both
I-mode and S-mode. Observe that average delay of I-mode
decreases when trafc regime is low q 0.5. This is due
to that the optimal MAC parameters at higher trafc regime
increase more than the ones at lower trafc regime to satisfy
the reliability constraint.
Recall that the target of our proposed adaptive algorithm is
to use the tradeoff between application constraints and energy
consumption instead of just maximization of reliability or
minimization of delay. Therefore, to characterize quantitatively
the power consumption, we dene the power gain as
=
E
def
E
tot
(V)
E
def
where E
def
and E
tot
(V) are the average power consumption
of I-mode or S-mode for default MAC and proposed scheme,
respectively. The closer to 1, the better the power efciency.
Fig. 5(c) shows that the power gain increases as trafc regime
increases. This improvement is higher for S-mode than I-mode,
e.g., 0.49 for S-mode with R
min
= 0.95, D
max
= 100.
Although there is a strong dependence of the power gain on
the trafc regime, our proposed algorithm gives a better energy
efciency than the default MAC. Therefore, the numerical
results show clearly the effectiveness of our adaptive IEEE
802.15.4 protocol while guaranteeing the constraints.
Next, we observe the tradeoff between the power con-
sumption, reliability and delay constraints. Fig. 6 show the
dependence of the power consumption in S-mode with reli-
ability and delay constraints for a given trafc load, length
of packets, and number of nodes. Observe that as the delay
constraint becomes strict the power consumption increases. In
other words, the reliability constraint of S-mode is less critical
than delay constraint, see more results in [29].
The fairness of resource management is one of the most
important concerns when implementing the tuning algorithm
of the MAC parameters. We use Jains fairness index [33] to
show the fairness of our proposed scheme for both I-mode and
S-mode. We compute the fairness index of 10 nodes in a stable
network. The closer fairness index to 1, the better the achieved
fairness. Fig. 7 shows the fairness index of the reliability for
11
0.5 0.6 0.7 0.8 0.9
0.999
0.9991
0.9992
0.9993
0.9994
0.9995
0.9996
0.9997
0.9998
0.9999
1
Imode, R
min
= 0.99, D
max
= 10
Imode, R
min
= 0.99, D = 50
Smode, R
min
= 0.99, D = 10
Smode, R
min
= 0.99, D = 50
max
max
max
trafc load, q
f
a
i
r
n
e
s
s
i
n
d
e
x
o
f
r
e
l
i
a
b
i
l
i
t
y
Fig. 7. Fairness index of the reliability as a function of the trafc load
q = 0.5, . . . , 0.9, reliability requirement R
min
= 0.99 and delay requirement
Dmax = 10, 50 ms for the length of the packet L = 3 and N = 10 nodes.
the different requirements and trafc congurations with a
given length of the packet and number of nodes. Fig. 7 reports
a very high fairness achievement on reliability greater than
0.999. A similar behavior is found for delay and power con-
sumption. In other words, the MAC parameters of each node
converge to the optimal MAC parameter values. Therefore we
conclude that most of the nodes can share equally the common
medium.
B. Protocol Behavior in Transient Conditions
The adaptive IEEE 802.15.4 protocol is based on the
estimation of the busy channel probabilities and and the
channel access probability . In this section, we investigate the
convergence time of the optimal MAC parameters obtained by
our adaptive algorithm when the delay constraint changes.
Figs. 8(a), 8(b), 8(c), 8(d) show the behavior of channel
state, MAC parameters, reliability and packet delay when the
delay requirement changes for both I-mode and S-mode with
a given trafc load, length of packets, and number of nodes,
respectively. Fig. 8(a) reports the busy channel probabilities
and and channel access probability over time. In
Section V, we noticed that the update frequency of , ,
is different. is updated in each aUnitBackoffPeriod and
and are updated when a node stay in CCA
1
and CCA
2
,
respectively. Hence, the update frequency order of , , and
is rst, then , and nally . We remark here that the update
frequency of link-based adaptation is lower than the update
frequency of of our algorithm since link-based adaptation
requires an ACK transmission [22][26]. The update frequency
of channel estimation is a critical issue where the trafc regime
is low such as in monitoring applications.
Fig. 8(b) shows the adaptation of the MAC parameters. The
optimal (m
0
, m, n) of I-mode and S-mode adapts to (3, 2,
0) and (8, 5, 0) before the requirement changes, respectively.
Observe that the algorithm returns different parameters for
I-mode and S-mode due to the different power consumption
model, see details in Section IV. After the requirement changes
at time 26 s, the MAC parameters (m
0
, m, n) of S-mode adapt
from (8, 5, 0) to (5, 2, 0). We observe that the convergence
of the MAC parameters of proposed scheme is very fast
since our algorithm is based on analytical model instead of
heuristic considerations as in link-based adaptation, where the
algorithms adapt the contention window size by the ACK
transmission [22][26]. In addition, recall that our adaptive
0 5 10 15 20 25 30 35 40 45
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Smode,
Imode,
*100
*100
Imode,
Smode,
Imode,
Smode,
time (sec)
e
s
t
i
m
a
t
e
d
(a) , , behavior
0 5 10 15 20 25 30 35 40 45
1
0
1
2
3
4
5
6
7
8
9
Imode, m0
Imode, m
Imode, n
Smode, m0
Smode, m
Smode, n
time (sec)
M
A
C
p
a
r
a
m
e
t
e
r
(b) MAC parameter (m
0
, m, n) behavior
0 5 10 15 20 25 30 35 40 45
0.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
Imode
Smode
time (sec)
r
e
l
i
a
b
i
l
i
t
y
(c) Reliability behavior
20 40 60 80 100 120 140
0
20
40
60
80
100
120
140
160
Imode
Smode
number of received packet
p
a
c
k
e
t
d
e
l
a
y
(
m
s
)
(d) Packet delay behavior
Fig. 8. Transient condition: busy channel probabilities, channel access
probability, MAC parameters, reliability and delay of I-mode and S-mode for
the trafc load q = 0.6, length of the packet L = 3 and N = 10 nodes when
the delay requirement changes from Dmax = 100 ms to Dmax = 10 ms at
26 s.
IEEE 802.15.4 is based on the physical sensing information
before transmitting packets.
Fig. 8(c) shows the cumulative packet reception rate of I-
mode and S-mode. Note that the oscillation of reliability is
due to packet loss. In Fig. 8(c), the reliability of S-mode is
larger than I-mode since the MAC parameters m
0
and m are
larger than the ones of I-mode before the requirement changes.
By the same argument, we observe that the packet delay of
S-mode is about six times the one measured of I-mode in
Fig. 8(d). In addition, the packet delay is much more variable
in S-mode than the one in I-mode. Specically, with I-mode,
we have a reduction in the average MAC delay and a shorter
12
0 5 10 15 20 25 30
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Imode, , n1
, n1 Imode,
*100, n1 Imode,
Imode, , n11
, n11 Imode,
*100, n11 Imode,
time (sec)
e
s
t
i
m
a
t
e
d
(a) , , behavior
0 5 10 15 20 25 30
1
0
1
2
3
4
5
6
7
8
9
Imode, m0, n1
Imode, m, n1
Imode, n, n1
Imode, m0, n11
Imode, m, n11
Imode, n, n11
time (sec)
M
A
C
p
a
r
a
m
e
t
e
r
(b) MAC parameter (m
0
, m, n) behavior
0 5 10 15 20 25 30
0.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
Imode, n
1
Imode, n
11
time (sec)
r
e
l
i
a
b
i
l
i
t
y
(c) Reliability behavior
Fig. 9. Robustness when the number of nodes changes: busy channel
probabilities, channel access probability, MAC parameters and reliability
behavior of I-mode when the number of nodes changes sharply from N = 10
to N = 20 at time 17.6 s. Note that n
1
and n
11
represent the behavior
of one of N = 10 nodes plus new nodes after time 17.6 s. Trafc load is
q = 0.6, length of the packet is L = 3, the reliability and delay constraint
are R
min
= 0.95 and Dmax = 100 ms, respectively.
tail for the MAC delay distribution with respect to the S-mode.
After the requirement changes, the packet delay converges to
around 10 ms. In addition, the reliability decreases due to the
decreasing of the parameters m
0
and m in Fig. 8(c).
C. Robustness and Sensitivity Analysis
The performance analysis carried out so far assumed that
the number of nodes and trafc conguration are xed. This
assumption has allowed us to verify the effectiveness of
our adaptive algorithm for IEEE 802.15.4 in steady state
conditions. However, one of the critical issues in the design of
wireless networks is time varying condition. Therefore, in the
following analysis, we will investigate our algorithm to react
to changes in the number of nodes and trafc load when each
node has an erroneous estimation of these parameters.
Figs. 9 show the dynamical behavior of the I-mode node
when the number of nodes changes from N = 10 to N = 20
with an erroneous estimation of the number of nodes. At
time 17.6 s, the number of nodes sharply increases to 20,
when it was estimated to be 10. We assume that the wrong
estimation happens due to some errors in the estimation phase
or a biasing induced by the hidden-node phenomenon. This
0 5 10 15 20 25 30 35 40 45
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Imode, *100 Imode, Imode,
Smode,
*100
Smode,
Smode,
time (sec)
e
s
t
i
m
a
t
e
d
(a) , , behavior
0 5 10 15 20 25 30 35 40 45
1
0
1
2
3
4
5
6
7
8
9
Imode, m0
Imode, m
Imode, n
Smode, m0
Smode, m
Smode, n
time (sec)
M
A
C
p
a
r
a
m
e
t
e
r
(b) MAC parameter (m
0
, m, n) behavior
0 5 10 15 20 25 30 35 40 45
0.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
Imode
Smode
time (sec)
r
e
l
i
a
b
i
l
i
t
y
(c) Reliability behavior
Fig. 10. Robustness when the trafc load changes: busy channel probabilities,
channel access probability, MAC parameters, reliability and delay behavior of
I-mode and S-mode when the trafc load changes sharply from q = 0.8 to
q = 0.5 at time 25.6 s. The length of the packet is L = 3, the reliability and
delay constraint are R
min
= 0.95 and Dmax = 100 ms, respectively.
causes a signicant increase of the contention level. Note
that n
1
is one of existing nodes before the network change
and n
11
is one of the new nodes that enters the network at
time 17.6 s using its initial MAC parameters. In Fig 9(a), we
observe that the busy channel and channel access probabilities
of node n
11
become stable after the network changes by
updating the MAC parameters. Fig. 9(b) shows that the MAC
parameters (m
0
, m, n) converge to (3, 2, 0) of node n
1
and
n
11
. The gures indicate that the system reacts correctly to
the erroneous estimation of the number of nodes after a few
seconds. In Fig 9(c), the reliability fullls the requirement
R
min
= 0.95 for both the existing and new nodes. Similar
behaviors are observed for S-mode, see further details in [29].
Figs. 10 present the behavior of the node when the trafc
load changes sharply from q = 0.8 to q = 0.5 at time 25.6 s.
Nodes use a wrong estimation of the trafc load, which is
estimated to be q = 0.8, after the trafc load changes. The
results indicate that our algorithm is quite effective for the
trafc conguration change. In Fig. 10(a), the busy channel
and channel access probability increase as a result of higher
trafc regime q = 0.5 for both I-mode and S-mode. Fig. 10(b)
shows that the parameter m of S-mode updates from 2 to
13
10 15 20 25 30 35
0
0.05
0.1
0.15
0.2
0.25
Imode, m
0
Imode, m
Imode, n
Smode, m
0
Smode, m
Smode, n
percentage of error
N
R
M
S
D
Fig. 11. Sensitivity: NRMSD of I-mode and S-mode when the trafc load
q = 0.6, length of the packet L = 3, reliability requirement R
min
= 0.95
and delay requirement Dmax = 100 ms, and N = 10 nodes with different
percentage error in busy channel probabilities and and channel access
probability .
5 due to the increasing busy channel probability after the
trafc load changes at time 28 s. The gure indicates that the
system reacts correctly to the erroneous estimation of trafc
conguration and, in few seconds, the estimation of , and
allow to reach the optimal MAC parameters. In Fig. 10(c),
the reliability requirement R
min
= 0.95 is fullled for both
I-mode and S-mode. The reliability of I-mode is greater than
0.95 with some uctuations after trafc load increases.
Fig. 11 illustrates the sensitivity of adaptive IEEE 802.15.4
with respect to the estimation errors to the busy channel
probabilities and and the channel access probability . The
normalized root mean squared deviation (NRMSD) between
the optimal MAC parameters with exact estimation and the
ones with erroneous estimation is used as the indicator of
sensitivity. The normalization is taken over the range of MAC
parameters (m
0
, m, n). The NRMSD is approximately below
10% if the percentage of error is smaller than 20% for , , .
It is interesting to observe that m
0
of I-mode is very robust
to errors. This is due to the power consumption model, i.e.,
to the dominant factor m
0
of power consumption in I-mode.
The robustness of MAC parameter is m
0
> n > m and
n > m > m
0
for I-mode and S-mode, respectively. We can
show that errors below 20% in the estimation of , , give
a performance degradation below 3% in terms of reliability,
packet delay and energy gain for low trafc load.
VII. CONCLUSIONS
In this paper we developed an analysis based on a gen-
eralized Markov chain model of IEEE 802.15.4, including
retry limits, acknowledgements and unsaturated trafc regime.
Then, we presented an adaptive MAC algorithm for mini-
mizing the power consumption while guaranteeing reliabil-
ity and delay constraints of the IEEE 802.15.4 protocol.
The algorithm does not require any modications of the
standard. The adaptive algorithm is grounded on an opti-
mization problem where the objective function is the to-
tal power consumption, subject to constraints of reliability
and delay of the packet delivery and the decision variables
are the MAC parameters (macMinBE, macMaxCSMABackoffs,
macMaxFrameRetries) of the standard. The proposed adaptive
MAC algorithm is easily implementable on sensor nodes by
estimating the busy channel and channel access probability.
We investigated the performance of our algorithm under
both stationary and transient conditions. Numerical results
showed that the proposed scheme is efcient and ensures a
longer lifetime of the network. In addition, we showed that,
even if the number of active nodes, trafc conguration and
application constrains change sharply, our algorithm allow
the system to recover quickly and operate at its optimal
parameter by estimating just the busy channel and channel
access probabilities. We also studied the robustness of the
protocol to possible errors during the estimation process on
number of nodes and trafc load. Results indicated that the
protocol reacts promptly to erroneous estimations.
We plan to extend our study to the IEEE 802.11 standard.
REFERENCES
[1] IEEE 802.15.4 standard: Wireless Medium Access Control (MAC) and
Physical Layer (PHY) Specications for Low-Rate Wireless Personal
Area Networks (WPANs), IEEE, 2006. [Online]. Available: http:
//www.ieee802.org/15/pub/TG4.html
[2] A. Willig, K. Matheus, and A. Wolisz, Wireless technology in industrial
networks, Proceedings of the IEEE, vol. 93, no. 6, pp. 11301151, 2005.
[3] T. Abdelzaher, T. He, and J. Stankovic, Feedback control of data
aggregation in sensor networks, in IEEE CDC, 2004.
[4] S. Pollin, M. Ergen, S. C. Ergen, B. Bougard, F. Catthoor, A. Bahai, and
P. Varaiya, Performance analysis of slotted carrier sense IEEE 802.15.4
acknowledged uplink transmissions, in IEEE WCNC, 2008.
[5] J. R. Moyne and D. M. Tilbury, The emergence of industrial control
networks for manufacturing control, diagnostics, and safety data, Pro-
ceedings of the IEEE, vol. 95, no. 1, pp. 2947, 2007.
[6] IEEE 802.11 standard: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specications, IEEE, 1999. [Online].
Available: http://www.ieee802.org/11
[7] G. Bianchi, Performance analysis of the IEEE 802.11 distributed cordi-
nation function, in IEEE Journal on Selected Areas in Communications,
vol. 18, March 2000, pp. 535547.
[8] P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, IEEE 802.11 packet
delay a nite retry limit analysis, in IEEE GLOBECOM, 2003.
[9] Z. Hadzi-Velkov and B. Spasenovski, Saturation throughput-delay
analysis of IEEE 802.11 in fading channel, in IEEE ICC, 2003.
[10] O. Tickioo and B. Sikdar, Queueing analysis and delay mitigation in
IEEE 802.11 random access MAC based wireless networks, in IEEE
INFOCOM, 2004.
[11] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, Performance of
reliable transport protocol over IEEE 802.11 wireless LAN: Analysis
and enhancement, in IEEE INFOCOM, 2002.
[12] J. Zheng and M. L. Lee, A comprehensive performance study of IEEE
802.15.4, in IEEE Press Book, 2004.
[13] A. Koubaa, M. Alves, and E. Tovar, A comprehensive simulation study
of slotted csma/ca for IEEE 802.15.4 wireless sensor networks, in IEEE
WFCS, 2006.
[14] S. Pollin, M. Ergen, S. C. Ergen, B. Bougard, L. V. D. Perre, F. Catthoor,
I. Moerman, A. Bahai, and P. Varaiya, Performance analysis of slotted
carrier sense IEEE 802.15.4 medium access layer, in IEEE GLOBE-
COM, 2006.
[15] J. Mi si o, S. Shaf, and V. Mi si o, Performance of a beacon enabled IEEE
802.15.4 cluster with downlink and uplink trafc, in IEEE Transactions
on Parallel and Distributed Systems, Apr 2006, pp. 361376.
[16] P. K. Sahoo and J. P. Sheu, Modeling IEEE 802.15.4 based wireless
sensor network with packet retry limits, in IEEE PE-WASUN, 2008.
[17] C. Y. Jung, H. Y. Hwang, D. K. Sung, and G. U. Hwang, Enhanced
markov chain model and throughput analysis of the slotted CSMA/CA
for IEEE 802.15.4 under unsaturated trafc conditions, IEEE Transac-
tions on Vehicular Technology, vol. 58, no. 1, pp. 473478, 2009.
[18] A. Giridhar and P. R. Kumar, Toward a theory of in-network computa-
tion in wireless sensor networks, IEEE Communication Magazine, pp.
97107, April 2006.
[19] F. Cali, M. Conti, and E. Gregori, IEEE 802.11 protocol: design
and performance evaluation of an adaptive backoff mechanism, IEEE
Journal on Selected Areas in Communications, pp. 1774 1786, Sept.
2000.
[20] K. Yedavalli and B. Krishnamachari, Enhancement of the IEEE
802.15.4 MAC protocol for scalable data collection in dense sensor
networks, in ICST WiOPT, 2008.
14
[21] R. Bruno, M. Conti, and E. Gregori, Optimization of efciency and
energy consumption in p-persistent CSMA-based wireless LANs, IEEE
Transactions on Mobile Computing, pp. 10 31, Jan. 2002.
[22] Q. Pang, S. C. Liew, J. Y. B. Lee, and V. C. M. Leung, Performance
evaluation of an adaptive backoff scheme for WLAN: Research articles,
Wirel. Commun. Mob. Comput., pp. 867879, Dec. 2004.
[23] V. Bharghavan, A. J. Demers, S. Shenker, and L. Zhang, MACAW: A
media access protocol for wireless LANs, ACM SIGCOMM, 1994.
[24] B. Bensaou, Y. Wang, and C. C. Ko, Fair medium access in 802.11
based wireless ad-hoc networks, in ACM MobiHoc, 2000.
[25] J. G. Ko, Y. H. Cho, and H. Kim, Performance evaluation of IEEE
802.15.4 MAC with different backoff ranges in wireless sensor net-
works, in IEEE ICCS, 2006.
[26] A. C. Pang and H. W. Tseng, Dynamic backoff for wireless personal
networks, in IEEE GLOBECOM, 2004.
[27] S. C. Ergen, IEEE 802.15.4 summary, Advanced Technology Lab of
National Semiconductor, Tech. Rep., 2004.
[28] P. Park, P. D. Marco, P. Soldati, C. Fischione, and K. H. Johansson, A
generalized markov chain model for effective analysis of slotted IEEE
802.15.4, in IEEE MASS, 2009.
[29] P. Park, P. D. Marco, C. Fischione, and K. H. Johansson, Adaptive IEEE
802.15.4 protocol for energy efcient, reliable and timely communi-
cations, KTH, Tech. Rep., 2009, http://www.ee.kth.se/
pgpark/papers/
adaptive wpan opt.pdf.
[30] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computa-
tion: Numerical Methods. Athena Scientic, 1997.
[31] F. Cali, M. Conti, and E. Gregori, Dynamic tuning of the IEEE
802.11 protocol to achieve a theoretical throughput limit, IEEE/ACM
Transactions on Networking, pp. 785 799, Dec. 2006.
[32] S. C. Ergen, P. D. Marco, and C. Fischione, MAC protocol engine for
sensor networks, in IEEE Globecom, 2009.
[33] R. Jain, D. Chiu, and W. Hawe, A quantitative measure of fairness
and discrimination for resource allocation in shared computer systems,
Digital Equipment Corporation, Tech. Rep., 1984.
APPENDIX
A. Proof of Lemma 1
The proof has two steps. First, we derive the state transi-
tion probability of Markov chain. Second, the normalization
condition is applied to compute the probability b
0,0,0
.
The state transition probabilities associated with the Markov
chain of Fig. 1 are
P(i, k, j|i, k + 1, j) = 1, for k 0 , (36)
P(i, k, j|i 1, 0, j) =
+ (1 )
W
i
, for i m, (37)
P(0, k, j|i, 0, j 1) =
(1 )(1 )P
c
W
0
, for j n, (38)
P(Q
0
|m, 0, j) = q ( + (1 )), for j < n, (39)
P(Q
0
|i, 0, n) = q (1 )(1 ), for i < m, (40)
P(Q
0
|m, 0, n) = q, (41)
P(0, k, 0|Q
0
) =
1 q
W
0
, for k W
0
1 . (42)
Eq. (36) is the decrement of backoff counter, which happens
with probability 1. Eq. (37) represents the probability of
nding busy channel in CCA
1
or CCA
2
and a node selects
uniformly a state in the next backoff stage. Eq. (38) gives
the unsuccessful transmission probability after nding an idle
channel in both CCA
1
and CCA
2
, and a node picks uniformly
a state in the next retransmission stage. Eq. (39) and (40)
represent the probability of going back to the idle-queue stage
due to the channel access failure and retry limits, respectively.
Eq. (41) accounts for the trafc regime and is the probability
of going back to the idle-queue stage at backoff counter m
and retransmission stage n, which is given by q. Eq. (42)
models the probability of going back to the rst backoff stage
from the idle-queue stage. Owing to the chain regularities and
Eqs. (36)(42), we have Eqs. (6)(5).
By the normalization condition, we know that
m
i=0
Wi1
k=0
n
j=0
b
i,k,j
+
m
i=0
n
j=0
b
i,1,j
+
n
j=0
_
Ls1
k=0
b
1,k,j
+
Lc1
k=0
b
2,k,j
_
+
L01
l=0
Q
l
= 1 . (43)
We next derive the expressions of each term in Eq. (43).
From Eqs. (4) and (5), we have
m
i=0
Wi1
k=0
n
j=0
b
i,k,j
(44)
=
m
i=0
n
j=0
W
i
+ 1
2
( + (1 ))
i
b
0,0,j
=
_
_
b0,0,0
2
_
1(2x)
m+1
12x
W
0
+
1x
m+1
1x
_
1y
n+1
1y
if m m
b
m
0
b0,0,0
2
_
1(2x)
m
b
m
0
+1
12x
W
0
+
1x
m
b
m
0
+1
1x
+
(2
m
b
+ 1)x
m
b
m0+1 1x
mm
b
+m
0
1x
_
1y
n+1
1y
otherwise,
where x = + (1 ) and y = P
c
(1 x
m+1
). Similarly,
m
i=0
n
j=0
b
i,1,j
=
m
i=0
n
j=0
(1 )( + (1 ))
i
b
0,0,j
= (1 )
1 x
m+1
1 x
1 y
n+1
1 y
b
0,0,0
, (45)
and
n
j=0
_
Ls1
k=0
b
1,k,j
+
Lc1
k=0
b
2,k,j
_
(46)
= (L
s
(1 P
c
) + L
c
P
c
)(1 x
m+1
)
1 y
n+1
1 y
b
0,0,0
.
By considering that the successful transmission and the failure
events are due to the limited number of backoff stages m and
the retry limit n, the idle state probability is
Q
0
=q Q
L01
+ q
_
_
n
j=0
( + (1 )) b
m,0,j
+
m
i=0
P
c
(1 ) b
i,1,n
+
m
i=0
n
j=0
(1 P
c
) (1 ) b
i,1,j
_
_
=
q
1 q
_
x
m+1
(1 y
n+1
)
1 y
+ P
c
(1 x
m+1
)y
n
+(1 P
c
)
(1 x
m+1
)(1 y
n+1
)
1 y
_
b
0,0,0
, (47)
where L
0
is the idle state length without generating packets
and
L01
l=0
Q
l
= L
0
Q
0
. Note that Eqs. (44)(47) give
the state values b
i,k,j
as a function of b
0,0,0
. By replac-
ing Eqs. (44)(47) in the normalization condition given by
Eq. (43), we obtain the expression for b
0,0,0
.