By Topic

An Analytical Model for the Contention Access Period of the Slotted IEEE 802.15.4 with Service Differentiation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
E. D. Ngangue Ndih ; Sch. of Comput. & Commun. Sci., Swiss Fed. Inst. of Technol., Lausanne, Switzerland ; N. Khaled ; G. De Micheli

The IEEE 802.15.4 standard is poised to become the global standard for low data rate, low energy consumption wireless sensor networks (WSN). By assigning the same sets of contention access parameters for all data frames and nodes, the contention access period (CAP) of the slotted IEEE 802.15.4 medium access control (MAC) currently provides a priority-independent channel access functionality and no service differentiation. Several recent WSN applications such as wireless body sensor networks, however, may require service differentiation and traffic prioritization support to accommodate potential high-priority traffic (e.g., alarms or emergency alerts). By allowing different sets of access parameters and data frame lengths for different priority classes, this paper develops a Markov-chain-based analytical model of the CAP of the IEEE 802.15.4 MAC with service differentiation, under unsaturated traffic conditions. In particular, given two priority classes, our analytical model is used to evaluate the performance of a simple, yet effective, contention-window-based service differentiation strategy, in terms of the resulting throughput, average frame service time and access priority for each priority class. The accuracy of the analytical model is validated by extensive ns-2 simulation.

Published in:

2009 IEEE International Conference on Communications

Date of Conference:

14-18 June 2009