Publication | Closed Access
Analysis of the contention access period of IEEE 802.15.4 MAC
234
Citations
28
References
2007
Year
Time-sensitive NetworkingEngineeringMulti-access NetworkEdge ComputingRecent RatificationWireless LanComputer EngineeringMobile ComputingWireless ComputingWireless AccessRadio Access ProtocolMedium Access ControlIeee 802.15.4Contention Access PeriodWsn ApplicationsEnergy-efficient Networking
IEEE 802.15.4 PHY‑MAC specifications for low‑rate, low‑power, low‑cost wireless personal area networks aim to enable widespread deployment of wireless sensor networks across commercial applications. The study evaluates the throughput and energy efficiency of the contention access period in IEEE 802.15.4 and proposes a modification for scenarios that omit MAC‑level acknowledgements. The authors model the contention access period as nonpersistent CSMA with backoff and validate the analysis with extensive ns‑2 simulations. Shutting down the radio between transmissions yields significant power savings while maintaining throughput in applications where an inactive superframe period is undesirable.
The recent ratification of IEEE 802.15.4 PHY-MAC specifications for low-rate wireless personal area networks represents a significant milestone in promoting deployment of wireless sensor networks (WSNs) for a variety of commercial uses. The 15.4 specifications specifically target wireless networking among low-rate, low-power and low-cost devices that is expected to be a key market segment for a large number of WSN applications. In this article, we first analyze the performance of the contention access period specified in the IEEE 802.15.4 standard in terms of throughput and energy consumption. This analysis is facilitated by a modeling of the contention access period as nonpersistent CSMA with backoff. We show that, in certain applications in which having an inactive period in the superframe may not be desirable due to delay constraints, shutting down the radio between transmissions provides significant savings in power without significantly compromising the throughput. We also propose and analyze the performance of a modification to the specification which could be used for applications in which MAC-level acknowledgements are not used. Extensive ns -2 simulations are used to verify the analysis.
| Year | Citations | |
|---|---|---|
Page 1
Page 1