Skip to main content
Log in

Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

IEEE 802.15.4 standard has been proposed for low power wireless personal area networks. It can be used as an important component in machine to machine (M2M) networks for data collection, monitoring and controlling functions. With an increasing number of machine devices enabled by M2M technology and equipped with 802.15.4 radios, it is likely that multiple 802.15.4 networks may be deployed closely, for example, to collect data for smart metering at residential or enterprise areas. In such scenarios, supporting reliable communications for monitoring and controlling applications is a big challenge. The problem becomes more severe due to the potential hidden terminals when the operations of multiple 802.15.4 networks are uncoordinated. In this paper, we investigate this problem from three typical scenarios and propose an analytic model to reveal how performance of coexisting 802.15.4 networks may be affected by uncoordinated operations under these scenarios. Simulations will be used to validate the analytic model. It is observed that uncoordinated operations may lead to a significant degradation of system performance in M2M applications. With the proposed analytic model, we also investigate the performance limits of the 802.15.4 networks, and the conditions under which coordinated operations may be required to support M2M applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. Hu R, Qian Y, Chen HH, Jamalipour A (2011) Recent progress in machine-to-machine communications. IEEE Commun Mag 49:24–26

    Article  Google Scholar 

  2. Lu R, Li X, Liang X, Shen X, Lin X (2011) GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49:28–35

    Article  Google Scholar 

  3. Fadlullah Z, Fouda M, Kato N, Takeuchi A, Iwasaki N, Nozaki Y (2011) Toward intelligent machine-to-machine communications in smart grid. IEEE Commun Mag 49:60–65

    Article  Google Scholar 

  4. Lien S-Y, Chen K-C (2011) Massive access management for QoS guarantees in 3GPP machine-to-machine communications. IEEE Commun Lett 15:311–313

    Article  Google Scholar 

  5. IEEE Std 802.15.4 (2006) Wireless medium access control and physical layer specificaitons for low-rate wireless personal area networks

  6. IEEE Std 802.11 (1999) Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specification

  7. Lu G, Krishnamachari B, Raghavendra CS (2004) Performance evaluation of the IEEE 802.15.4 MAC for low-rate low-power wireless networks. In: Proc workshop on energy-efficient wireless communications and networks

  8. Zheng J, Lee MJ (2006) A comprehensive performance study of IEEE 802.15.4. Sensor Network Operations, IEEE Press, Wiley InterScience

  9. Khazzam S (2005) IEEE 802.15.4 MAC Protocol Model (used in ZigBee low-rate WPAN). OPNET contributed model

  10. Koubaa A, Alves M, Tovar E (2006) A comprehensive simulation study of slotted CSMA/CA for IEEE 802.15.4 wireless sensor networks. In: Proc workshop on factory communication systems

  11. Jurcik P et al (2007) A simulation model for the IEEE 802.15.4 protocol: delay/throughput evaluation of the GTS mechanism. In: Proc IEEE MASCOTS’07

  12. Misic J, Shafi S, Misic VB (2006) Performance of a beacon enabled 802.15.4 cluster with downlink & uplink traffic. IEEE Trans Parallel Distrib Syst 17(4):361–374

    Google Scholar 

  13. Ramachandran I, Das A, Roy S (2007) Analysis of the contention access period of IEEE 802.15.4 MAC. ACM Trans Sen Netw 3(1):1–29

    Article  Google Scholar 

  14. Park T et al (2005) Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/CA. Electron Lett 41(18):1017–1029

    Article  Google Scholar 

  15. Pollin S (2005) Performance evaluation of IEEE 802.15.4 slotted CSMA/CA algorithm. Tech Rep

  16. Tao Z et al (2006) Performance analysis and a proposed improvement for the IEEE 802.15.4 contention access period. In: Proc IEEE WCNC

  17. He J, Tang Z, Chen HH, Wang S (2008) An accurate Markov model for slotted CSMA/CA algorithm in IEEE 802.15.4 networks. IEEE Commun Lett 12:420–422

    Article  Google Scholar 

  18. Lee T, Lee H, Chung M (2006) MAC throughput limit analysis of slotted CSMA/CA in IEEE 802.15.4 WPAN. IEEE Commun Lett 10(7):561–563

    Article  Google Scholar 

  19. He J, Tang Z, Chen HH, Zhang Q (2009) An accurate and scalable analytical model for IEEE 802.15. 4 slotted CSMA/CA networks. IEEE Trans Wirel Commun 8(1):440–448

    Article  Google Scholar 

Download references

Acknowledgements

This work was partly supported by the UK Engineering and Physical Sciences Research Council (EPSRC) with grant reference number EP/1010157/1, and Taiwan National Science Council research grant NSC99-2221-E-006-016-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsiao-Hwa Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ma, C., He, J., Chen, HH. et al. Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. Peer-to-Peer Netw. Appl. 7, 274–284 (2014). https://doi.org/10.1007/s12083-012-0154-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0154-6

Keywords

Navigation