|Table of Contents|

Performance of media access control protocol for ZigBee network based on Markov chain


Research Field:
Publishing date:


Performance of media access control protocol for ZigBee network based on Markov chain
Cheng HongbinSun XiaDong Ruizhi
School of Computer Science and Engineering,Changshu Institute of Technology,Changshu 215500,China
ZigBee media access control throughput power consumption protocol parameters
To optimize the performance of media access control(MAC)protocol for ZigBee network,a mechanism based on saturated traffic for channel competitive access is proposed.This paper establishes a Markov chain model for the process of node state transition.The numerical analysis of throughput and node average power consumption based on the mechanism is carried out.The impact of protocol parameters such as NB and aminBE on the performance of conflict probability,throughput and node average power consumption is researched.The results show that this model can describe the mechanism of channel competitive access well and that the reasonable settings for parameters can improve the performance of the MAC protocol.


[1] Park T R,Kim T H,Choi J Y,et al.Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/CA[J].IEEE Electronics Letters,2005,41(18):1017-1019.
[2]Chen Zhijia,Lin Chuang,Wen Hao.An analytical model for evaluating IEEE 802.15.4 CSMA/CA protocol in low-rate wireless application[A].Proceedings of International Conference on Advanced Information Networking and Applications Workshops[C].Ontario,Canada:NiagaraFalls,2007:899-904.
[3]Ramachandran I,Das A K,Roy S.Analysis of the contention access period of IEEE 802.15.4 MAC[J].ACM Transactions on Sensor Networks,2007,3(1):4:1-4:22.
[4]Park P,Ergen S C,Fischione C,et al.Duty-cycle optimization for IEEE 802.15.4 wireless sensor networks[J].ACM Transactions on Sensor Networks(TOSN),2013,10(1):12:1-12:32.
Cheng Hongbin,Wang Xiaonan,Sun Xia,et al.Channel access delay analysis of node for 6LoWPAN[J].Application Research of Computers,2013,30(1):246-248.
[7]Zhao Lu,Bai Guangwei,Shen Hang,et al.Priority-based IEEE 802.15.4 CSMA/CA mechanism for WSNs[J].The Journal of China Universities of Posts and Telecommunications,2013,20(1):47-53.
[8]Wen Hao,Lin Chuang,Chen Zhijia,et al.An improved Markov model for IEEE 802.15.4 slotted CSMA/CA mechanism[J].Journal of Computer Science and Technology,2009,24(3):495-504.
Fang Mei,Lu Yang,Guan Junming,et al.Throughput analysis of 802.15.4 networks working on non-saturation situation[J].Journal of System Simulation,2010,22(4):1037-1041.
[10]Fourty N,Van Den Bossche A,Val T.An advanced study of energy consumption in an IEEE 802.15.4 based network:Everything but the truth on 802.15.4 node lifetime[J].Computer Communications,2012,35(14):1759-1767.
[11]Garg R,PaulusA R,Jaiswal A K,et al.Performance analysis of a beacon and non beacon enabled IEEE 802.15.4 star WSNs with different traffic loads[J].International Journal of Current Engineering and Technology,2014,4(1):987-992.
[12]Park P,Di Marco P,Fischione C,et al.Modeling and optimization of the IEEE 802.15.4 protocol for reliable and timely communications[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(3):550-564.
Shuai Xiaoying,Qian Huanyan.β-Persistent binary exponential two stage backoff alogorithm[J].Journal of Nanjing University of Science and Technology,2014,38(4):506-511.


Last Update: 2015-02-28