Abstract
Most of analyses for the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme for multi-hop wireless sensor networks (WSNs) focus on how to avoid the impacts of hidden terminal problems rather than how to derive the exact multi-hop characters. In this paper, we propose a novel analysis model to analyze and improve the behaviors of multi-hop WSNs touching upon both avoiding the impacts of hidden terminals and acquiring the exact multi-hop behaviors. At first, a novel Hidden Terminal Couple (HTC) algorithm is proposed to avoid the impacts of hidden terminals, and a parallel access scheme is proposed to dispense with taking the routing overhead into account. Along with these two strategies, the accurate statistical performance metrics of throughput and delay of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks for 1-hop and 2-hop scenarios are then predicted based on the models which contains n modified semi-Markov chains and one macro-Markov chain, in which nodes are assumed to locate randomly over a circle plane according to Poisson distribution. Moreover, performance comparisons between our scheme (called HTC scheme) and other multi-hop CSMA/CA schemes which involve hidden terminal avoiding are also proposed. Comprehensive NS-2 simulations demonstrate that the analysis results of these models match well the simulation results, especially for larger transmission range and relatively higher node density. Besides, the analysis and comparison results show that delay behavior of HTC is improved largely relatively to other schemes, while throughput performance is improved in some cases of more node density and larger transmission range.
1. Introduction
In recent years, wireless sensor networks (WSNs) have revolutionized the world of distributed systems and enabled many new applications. WSNs play more and more decisive roles in various aspects such as wide-range environmental surveillance, short-range health monitoring, inventory tracking, military locating, and so forth and almost touch upon all aspects of our life, especially after successful release of the IEEE 802.15.4 standard [1]. Besides energy efficiency requirements in WSNs that withdraw energy from batteries, other performance metrics such as service time, throughput, and so forth need to satisfy actual requirements of many real-time applications. In particular, it should take two or more hop communications into account when node transmission range is not enough to cover the entire network area for remote environmental monitoring of reserved areas which are important fields of wireless sensor networking techniques.
For multihop WSNs, the performance behaviors such as throughput, service delay energy efficiency, and so forth can be sharply deteriorated by two main reasons: the one is the impact of the “hidden terminal problem,” and the other is the establishment and maintenance of multihop routings. In contention-based wireless sensor networks, a node is not guaranteed to hear the signals from other nodes. If signals being transmitted from node A to node C cannot be sensed by node B, node B thinks that the channel is clear. As a result, node B might transmit packages to node C at the current transmitting. These two overlapped signals result in the failure of node C to capture either of the signals transmitted by node A or node B. This is called the hidden terminal problem, and node A can be considered as the hidden terminal of node B based on receiver C [2]. The hidden terminal problems bring about a large number of simultaneous transmissions or collisions, which must be eliminated or mitigated for guaranteeing network behaviors in multihop WSNs. In this paper, a novel algorithm HTC is proposed to eliminate or mitigate the impact of the hidden terminal problems.
In addition, packets should go through one or more relay nodes transmitted from the sender to the sink, and these relay nodes should be well chosen for the energy-constrained WSNs. Correct selection of the relay node plays an important role in performance behaviors, and this selection process is called the routing establishment. Packets transmitted through the same transmission path can exhaust the energy of the nodes in this path soon, and the communicating path should be altered adaptively according to the energy condition of the nodes. And also, new routings should be reestablished in the cases that any node is discarded when it exhausts its energy or a new node is joining into the communicating network. The routing establishment or maintenance can consume the overwhelming majority of energy in WSNs, even up to 80% [3]. In our energy-saving time-critical applications, a parallel access scheme is proposed to dispense with taking the routing overhead into account for multihop transmissions.
Furthermore, the existing performance analyses of CSMA/CA schemes in multihop wireless networks focus on how to mitigate the impacts of the hidden terminals [4–7] rather than how to derive the exact multihop behaviors or derive the multihop performance through the simple character superposition of several hops [8]. In this work, we propose a novel analysis model for CSMA/CA scheme based on a hidden terminal avoiding scheme HTC to analyze and improve the performance of multihop WSNs touching upon both avoiding the impacts of hidden terminals and acquiring the exact multihop behaviors, without taking the routing establishment or maintenance into account.
The rest of this paper is structured as follows. Section 2 gives a summary of related works and analysis premise of our model. A novel algorithm HTC is proposed in Section 3 to eliminate or mitigate the impact of the hidden terminal problems. Performance analysis models of multihop WSNs using semi-Markov chain models for CSMA/CA scheme and macro-Markov chain model for channel transitions are proposed in Section 4, along with a brief description of CSMA/CA scheme for IEEE 802.15.4. In Section 5, accurate analyses of throughput and delay are presented. Then, our model validations and comparisons of our model with other models using NS-2 simulator are provided in Section 6. Finally, concluding remarks and future work are presented in Section 7.
2. Related Works
Literature reviews presented here are threefold: (1) references related to the means used for avoiding the problem of hidden terminals for multihop WSNs, (2) references related to MAC schemes accompanied with routing for multihop WSNs, (3) references related to performance analyses of CSMA/CA schemes for multihop WSNs.
Many solutions have been proposed to eliminate or reduce the impact of the hidden-node problem in wireless networks [9], which can be roughly categorized as: (1) busy tone schemes; (2) Request-To-Send/Clear-To-Send (RTS/CTS) schemes, (3) carrier-sense tuning schemes, (4) hidden overhearing scheme, (5) node grouping schemes, (6) cross-layer schemes. Busy-tone multiple access method (BTMA) is proposed to evaluate and eliminate the hidden terminal problem in 1-persistent, non-persistent, and p-persistent CSMA schemes for the first time in [2], which introduces much control overhead for such a BTMA scheme. The handshake control message RTS/CTS is proposed to reserve the channel for a pair of a sender and a receiver, which can mitigate the impact of the hidden terminal problems greatly. The idea of RTS/CTS handshake is the widespread use of improving the performance of wireless networks for its simplification and efficiency such as [7, 10], and yet it is not an efficient solution for hidden terminal problems in wireless sensor networks [9]. A spatial-temporal analysis is presented in [7] to derive the real-world impact in multihop saturated and unsaturated throughput and then RTS/CTS is adopted to avoid the hidden terminal problems, in which the average number of hidden terminals is derived based on the distance between the sender and the receiver. RTS validation scheme is introduced in [10] to resolve the multihop false blocking process in which neighbors withdraw their transmissions for an entire DATA period without inquiring whether this DATA transmission is actually taking place, which can mitigate the multihop false blocking largely, but twice control messages can consume much energy in case of the relative small packet capacity. Two distributed adaptive power control algorithms which are adopted to minimize mutual interferences among links are proposed to avoid hidden terminals in [11]. Hidden overhearing is adopted in CR-MAC [12] which exchanges channel-reservation information to mitigate the impacts of hidden terminal problems and which achieves much higher throughput than RTS/CTS mode under saturated traffic. Grouping strategy [13] is a simple and efficient method to solve the IEEE 802.15.4 hidden terminals, which groups nodes according to their hidden terminal relationship and separates the transmission period into several nonoverlapping subperiods one for a group. H-NAMe scheme, a node-initiated grouping strategy, is proposed to solve the hidden terminals in [9], which is the improved strategy of [13]. A cross-layer detection and allocation (CL-DNA) scheme is proposed to solve the hidden terminal problems in IEEE 802.15.4 without the cost of extra control overhead in [14], which detects relationships of hidden nodes based on the overlapped signals and then allocates the hidden nodes into distinct sub-periods for transmissions.
In multihop wireless sensor networks, performance analyses and improvements cannot be achieved only depending on one layer schemes such as the hidden terminal avoiding strategies related above. Cross-layer designs combining MAC with routing play an important role in performance analyses and improvements of multihop networks for IEEE 802.15.4 standards, such as [15–19]. Delay Guaranteed Routing and MAC (DGRAM) protocol is proposed to reduce latency for delay-sensitive WSNs in [15], whose routes of data packets are integrated into DGRAM without considering a separate routing protocol based on slot reuse for using TDMA-based MAC. An adaptive and cross-layer framework is proposed for reliable and energy-efficient data collection in WSNs in [16], which involves an energy-aware adaptation module that captures the application's reliability requirements and autonomously configures the MAC layer based on the network topology and the traffic conditions in order to minimize the power consumption for both single-hop and multihop networking scenarios. Hybrid protocol combining contention-based and TDMA-based MAC with an embedded cross-layer optimization solution to provide routing-layer coarse-grained QoS support for latency-sensitive traffic is proposed in [17], in which a novel channel-reservation technique is proposed to significantly reduce delay by allowing packets to go through multiple hops within a single MAC frame and by also giving them higher priority channel access to reduce possible queuing delay. A transient analysis is proposed to obtain the delivery delay distribution which combines unslotted MAC with routing protocol in [18], whose nodes deploy to provide k-coverage for real-time applications. C-MAC, an optimized MAC layer based on CSMA/CA scheme for a topology of traffic destining to sink, is proposed in [19] to improve throughput for giving a larger priority to the k-tree core nodes which refer to the shortest paths to the sink containing exact k-leaves and coordinating among them to avoid collisions. Cross-layer designs are also adopted to evaluate and improve the performance of IEEE 802.11 networks, such as [20–22]. Interference level and the degree of spatial reuse of a frequency band can be controlled by varying the combination of the physical carrier-sensing (CS) range of the transmitter node and the target signal-to-interference ratio (SIR) set by the receiver node in [20], which improves throughput performance by the tradeoff between the CS range and SIR. Fairness for CSMA/CA scheme is derived by adopting only local information and performing localized operations without relying on overhearing in [21], which combines several novel rate control mechanisms including synchronized multiplicative decrease, proportional increase, and background transmission. A global optimality is derived through taking together individual optimality derived by local information for which different layers carry out distributed computation on different subsets of the decision variables in [22], which integrates three functions, congestion control, routing, and scheduling, in transport, network, and link layer into a coherent framework.
Packet transmission process using CSMA/CA scheme regardless of IEEE 802.11 or IEEE 802.15.4 can be modeled as Markov process, and most performance analyses adopt this model. The relatively early and comprehensive analysis of CSMA/CA scheme using Markov chain is presented in [23]. Other similar analyses for CSMA/CA scheme with single-hop WSNs use Markov model such as [24–27]. Two assumptions different from usual ones, which refers to the sensing of the channel probability differently from the backoff stages and the obtaining the channel probability depending on the node numbers, are proposed to improve delay and throughput and collision probability, respectively, in [28]. Similar Markov chains for performance analyses of multihop networks are presented in [29–33]. Node is assumed according to two-dimensional Poisson distribution and packet collision probability depends on the distance between the source and the destination in [29] whose two Markov chains are used for the throughput analysis, but it takes the transmission probability as the same value regardless of hops. Multihop transmission adopts master-slave manner in [30] in which GTS slots of bridge modes are allocated by the sink. Simple character superposition of several hops is presented in [31] based on assumption that arrival process at the relay is linear combination of the output processes of the source nodes, in which one Markov chain for the node CSMA/CA scheme and one Markov chain for the physical channel transition are used to analyze multihop throughput and delay. Collision domain for each node is determined based on both the interference range and routing, and the optimal flow over a given set of routes for any number of classes is derived by a flow-deviation algorithm but its Markov chain is not based on CSMA/CA scheme in [32]. A linear feedback model is introduced to evaluate characters of CSMA/CA under a general assumption about the traffic for the first time in [33].
In this work, we propose analysis models to analyze and improve the performance of CSMA/CA scheme for multihop WSNs, accompanied with a novel HTC algorithm to eliminate or mitigate the impact of the hidden terminal problem and a parallel access scheme to dispense with taking the routing overhead into account. Routing establishment and maintenance consume much energy, which is analyzed elaborately in [34, 35]. At first, the HTC algorithm is presented, in which a transmitter in 2-hop circle can randomly choose a receiver in its transmission range just the nodes in 1-hop to establish HTC pair. A parallel access scheme is proposed, in which nodes regardless of hops are bestowed on the fair chance to transmit packets to its neighbor of close upper hop circle adopting CSMA/CA scheme, until packets to sink. Then, the comprehensive models adopting n semi-Markov chains to describe the behaviors of CSMA/CA scheme for the nodes in n hops contending to the channel and one macro-Markov chain to describe the channel behaviors are proposed to analyze and improve the performance of multihop IEEE 802.15.4 CSMA/CA scheme. n denotes the number of hops which refers to the ratio of the distance from a source to the sink to the transmission range which can be denoted by
The main contributions in this paper are threefold. Firstly, a novel algorithm HTC is proposed to eliminate or mitigate the impacts of the hidden terminal problems, and a parallel access scheme to dispense with taking the routing overhead into account. Secondly, comprehensive and accurate models adopting Markov chains, combing the HTC algorithm and the parallel access scheme, are presented to analyze and improve the performance behaviors of time-critical large-scale multihop WSNs. Finally, comprehensive performance comparisons between HTC scheme and other hidden terminal avoiding schemes are proposed to validate the superiority of this time-critical scheme HTC based on the network parameters of node density, transmission range and traffic rate.
3. HTC Algorithm
As references in Section 2, the universal method to mitigate the effects of hidden terminal problems for WSNs and WLANs is the RTC/CTS handshake scheme. RTS/CTS-based methods are particularly suitable for the IEEE 802.11 networks but unsuitable for the modified CSMA/CA scheme in IEEE 802.15.4 standard for several reasons. First, data frame length is nearly identical to that of RTS/CTS frames, which leads to the same collision cost. In addition, RTS/CTS message exchanges are energy consuming for both sender and receiver. RTS/CTS is only limited to use in unicast transmissions but not in broadcast. Moreover, extra throughput degradation is introduced to WSNs according to the exposed terminal problems. And also, the relative simple and effective method to mitigate the effects of hidden terminal problems for wireless sensor networks is the grouping strategy presented in [9, 13]. Grouping algorithm has several limitations used for large-scale sensor networks. First, the maximal number of groups in WLAN is six, which is not enough for so many pending grouping sensor nodes in large-scale networks. Second, grouping establishment or maintenance consumes much more energy in large-scale sensor networks for more handshake information exchanges are needed [9, 13, 35]. Third, grouping algorithm is developed for the case of one-hop networks and consumes much energy in the case of multihop networks. Finally, nodes should participate in a special group no matter whether they have frames to transmit or not, which consumes unnecessary energy if they have no frames to be transmitted. This passive grouping algorithm is not suitable for the large-scale sensor networks.
For the large-scale multihop senor networks, the handshake information exchanges among sensor nodes can be sharply toned down through the establishment of Hidden Terminal Couple (HTC) between only two nodes. Moreover, nodes can only couple their hidden terminals when they have frames to be transmitted. This active HTC algorithm can consume much less energy for so many sensor nodes in large-scale networks.
In our large-scale multihop senor networks, nodes can eliminate or mitigate their hidden terminal effects by establishing and maintaining their Hidden Terminal Couple (HTC) pairs. We propose the HTC establishment process based on the nodes in 2-hop circle elaborately and then easily extend to the nodes in higher hop circle. HTC establishment in HTC pair establishment consists of four phases as follows.
3.1. Step 1: HTC Pair Request
After the network initialization completing, each node can be aware which hop is belong to knows its hop circle. Also, all nodes in the network can establish their one-hop neighbor list (NL) and update this NL every run stage. As the HTC request phase starts up, a transmitter T in 2-hop circle (
3.2. Step 2: HTC Information Exchange
After the Couple.request message sent from node T is correctly received by node R, node R can acquire and fuse the one-hop neighbor information of node R and node T. At the end of this fusion, node R can also derive the hidden terminals between node R and node T. Then, an acknowledgement (ACK) message is broadcast by node R. This ACK message contains the information of one-hop neighbors of R and T, following the information of hidden terminals between node R and node T. After the ACK frame is correctly received by node T, node T can start up its data fusion process. At the end of this fusion, node T can also acquire the one-hop neighbor information of node R and node T, following the hidden terminals of node R and node T.
The nodes within the one-hop circle of node R but not within the one-hop circle of node T are the hidden terminals of node T when node T transmits frames to node R, and the nodes within the one-hop circle of node T but not within the one-hop circle of node R are the hidden terminals of node R. Therefore, the nodes which are encircled by the pitch arc surrounded by, four points A, C, B, and E (i.e.,
After this HTC information exchange, node T and node R know the hidden terminals of each other. That is to say, the HTC coupled pairs are preliminarily established between node T and node R. Node T can choose the relay node R randomly, and the hidden terminals of node T and other relay nodes are also obtained through a similar way.
3.3. Step 3: HTC Information Notification
The relay node R can send the fused HTC message couple.notify to the sink after the HTC information is exchanged. The message couple.notify contains the hidden terminal information of the coupled pair of node T and node R. Node R notifies the sink that it establishes the HTC coupled pairs with node T, and the hidden terminals shut off their transceivers when node T transmits its packages to node R. After the HTC information is received by the sink correctly, the sink can update its HTC list, which contains the hidden terminal information of all HTC coupled pairs.
Also, the sink will exchange its one-hop neighbors with node R, and the nodes within the one-hop circle of the sink except for the common nodes of the circle centered R and the circle centered the sink are the hidden terminals of node R. These hidden terminals should shut off their transceivers when node R transmits frames to the sink. The sink is assumed to be the central node that manages all the HTC lists, and the sink fuses this hidden terminal information with the received HTC coupled information of node R and node T and establishes the HTC convergecast link list. The sink updates this link list after each transmission link buildup, such as the convergecast link of the transmission from node T and node R to the sink.
If the node T is in the one-hop (
3.4. Step 4: HTC Information Confirmation
After the HTC list and the HTC convergecast link list are established, the hidden terminals of the sink when node R transmits messages to the sink and the hidden terminals of node T when node T transmits messages to node R shut off their transceivers. The sink can send a message couple.confirm to node R to confirm this couple process, which contains the hidden terminal information of node R when it transmits its relayed packages to the sink and the hidden terminal information of node T when node T transmits its packages to node R. After node R receives this couple.confirm message correctly, node R can send the message couple.confirm to node T to confirm this HTC couple process. The HTC couple establishment is finished with node T receiving this couple.confirm message correctly. Collisions can be avoided or mitigated since the hidden terminals of node T in the 2-hop circle can shut off their transceivers when node T chooses a random node R in upper hop to transmit packages.
All nodes can carry out the HTC couple scheme in similar way when they have pending packages to transmit. Nodes receiving the frame can trigger the HTC of the transmission nodes and the corresponding received nodes. This active HTC algorithm can consume much less energy and can avoid or mitigate the effects of hidden terminals effectually. The sequence chart of the HTC scheme is demonstrated as Figure 2. Transmitter T in 2-hop circle can randomly choose a receiver R (relay node) in its transmission range just the node in 1-hop and send a message couple.request to node R. Node T and node R can exchange their one hop neighbors, and then the hidden terminals of each one can be derived. The HTC pair of node T and node R can be established. Node R sends this HTC establishment message couple.notify containing their hidden terminals to the sink. Sink fuses this HTC information accompanying the hidden terminal information of node R and then transmits a message couple.confirm to node R. Node R sends this couple.confirm to node T to confirm the HTC of node R and node T.
4. System Models
4.1. Slotted CSMA/CA Scheme in IEEE 802.15.4
First, we briefly explain the slotted CSMA/CA mechanism of the IEEE 802.15.4 MAC [1]. For the beacon-enabled mode, a superframe is bounded by the transmission of a beacon frame and consists of an active part and an optional inactive part in which the coordinator may go to a low-power (sleep) mode. The active part consists of three parts: beacon, contention access period (CAP), and contention-free period (CFP). Beacons, which commence at the beginning of the first slot, are used to synchronize attached nodes, identify Personal Area Networks (PANs), and describe the structure of the superframes. The CAP shall start immediately following the beacon and complete before CFP on a superframe slot boundary. All activities for nodes contending to access the channel are within this stage. The CFP, whose slots are referred to as guaranteed time slots (GTS), is reserved by the PAN coordinator for dedicated access by some devices to ensure time-critical transmission, that is, the contention-free activities. The basic time unit of the MAC protocol is the duration of the so-called backoff period. Backoff slot boundaries of every node in the PAN are aligned with superframe slot boundaries of the PAN coordinator. MAC sublayer shall ensure that the physical (PHY) commences all of its transmissions on the boundary of a backoff period. That is, each time a node wishes to transmit data frames during the CAP, it must locate the boundary of the next slot period. Moreover, before accessing the channel, it should wait a random number of backoff slots. During this period, the node is in a sleeping state to save energy. After a random delay, two slot CCAs are carried out. In this work, we only take the CAP behavior of IEEE 802.15.4 superframe into account for performance analyses.
The scheme to be implemented before accessing the channel is presented as follows when a node has pending packets to transmit. In the slotted CSMA/CA of the IEEE 802.15.4, the MAC sublayer initializes the number of backoff stage to 0 (denoted by
4.2. Markov Chains for CSMA/CA Scheme
Several assumptions are presented before deriving the analytical models.
Nodes are randomly located in the circle plane with the sink at the center, according to a two-dimensional Poisson distribution with a density of λ, which is also elaborately analyzed in [36, 37]. We assume identical range R of the communication, interference, and carrier sensing. Nodes regardless of hops are bestowed on the fair chance to transmit packets to its neighbor of close upper hop with CSMA/CA scheme, until packets to sink, which enable the beacon access mode available. We evaluate the hop-to-hop characters of CSMA/CA rather than end-to-end behaviors [38], without considering routing overhead. Also, propagation delay can be ignored in our multihop networks, not similar to that which takes propagation model into account in [39]. Nodes go to sleep going through a transient idle state at any of the following three situations: end of successful transmission, reaching retry limits, and reaching maximum backoff stage. Each packet length regardless of hops has the same value of L backoff units for packets transmitted from upper hop are fused by its receiver, and MAC-level ACKs can be left out of account. Together with relayed packets from previous hops, packet arrivals of nth hop follow an average arrival rate of We assume that all nodes regardless of hops contending for the channel should decrease their backoff counter to the initial values once one of them transmits successfully or packets are dropped because of accessing the channel unsuccessfully and collision [41].
In this section, n semi-Markov chain models of slotted CSMA/CA scheme of beacon enabled IEEE 802.15.4 with retry limits and one Markov chain model have shown macroscopic state transitions are presented to evaluate the metrics of throughput and packet service time which are uniquely determined by network operating points,
First, we study CSMA/CA behavior of one node using a three-dimensional Markov chain because each node regardless of hops is bestowed on the fair chance to transit packets. We define
We denote actual state transition adopting solid ovals and solid arrows for IEEE 802.15.4 CSMA/CA scheme of one hop node using Markov chain. In order to demonstrate the access procedure, we can show state transitions of other hop nodes using the same Markov scheme paralleled to the actual one with dashed ovals and dashes arrows which do not exist in actual state transition seen from Figure 3. The subscript of outputs refers to node states intuitively. Variables
Equation (1) shows the connection between single CSMA/CA backoff procedure block and macroscopic states. Backoff counter decreases by one unit with probability one in every interval regardless of channel state shown as (2). Equation (3) stands for the probability that a node goes to next backoff stage after either failed CCA1 or CCA2 and selects a random counter. As long as
4.3. Macroscopic State Transition
Macroscopic state transition is shown in Figure 4 with n hops of nodes. Macroscopic states which involve backoff procedures of n hops follow the same CSMA/CA algorithm from Figure 3, and we consider them as blocks. Channel macroscopic state transitions can be considered as several blocks resisted of many parallel CSMA/CA access processes in that each node regardless of hops can contend the channel to transmit its packets simultaneously, without access priority. That is to say, nodes in 2-hop circle can contend to access the channel with CSMA/CA scheme when nodes in other hop circles just contend to access the channel. We can present transition probabilities from Figures 3 and 4:
Equations (6)–(8) stand for the probabilities that node in nth hop goes to sleep after unsuccessful access of the channel at each retry, collision at the maximal retry, and successful transmission, respectively. Equation (9) stands for the probability that the channel remains in idle state at a random time. A packet is discarded if it accesses the channel unsuccessfully or reaches retry limit. In order to obtain operating points of our multihop system, we derive expressions of
Then, we can derive probability expressions of each block as follows. We assume there is no maximal delay stage limitation for consideration of evaluation simplification:
Equation (15) contains probabilities of backoff process, CCA1, CCA2, successful transmission process, and failure one for nth hop. From (16) and Figure 4, idle probability consists of four parts which refer to the probability of no packet presenting in any node, successful transmission probability of each hop node, unsuccessful transmission probability for retry limits of each hop node, and unsuccessful access probability for backoff stage limits of each hop node, respectively [23–25]:
In unsaturated conditions, a node will try to transmit only when new packets arrive at this node from upper layers. Substituting (15) and (16) into (12), we obtain that the normalized probability is related to variables

The establishment of HTC algorithm.

Sequence chart of the establishment of HTC algorithm.

Markov chain model for slotted IEEE 802.15.4 CSMA/CA scheme.

Macroscopic states transition. Outputs within blocks are those one-to-one corresponding outputs in Figure 3.
5. Performance Analysis
Probability that a node in nth hop attempts to sense the channel for the first time (CCA1) in a randomly chosen time slot is denoted by
We analyze the exact behaviors of separate hop, and the operating points of nth hop are denoted by
The hidden terminals of node T when the source node T transmits, denoted by the nodes in the area encircled by the pitch arc
We can derive the numbers of
We can derive the operating points of 1-hop in a similar way to that of 2-hop. We can refer the hidden terminal area of node R to the circle area with center at the sink except for the common area between node R and the sink, denoted by
We can derive the operating points of 1-hop in similar way to that of 2-hop. We can denote the hidden terminal area of node R by
5.1. Throughput Analysis
We denote by S the normalized system throughput defined as the fraction of time for the channel is used to successfully transmit payload bits. A random chosen slot consists of three fractions: the time for successful transmission, the time for collision and the time for idle or sleeping. Collision probability
The probability
Thus, throughput expression S of nth hop is derived through these parts:
Average packet payload size is
5.2. Delay Analysis
Access delay is also an important metric in low-rate wireless applications, especially for our time-critical systems. Define access delay, or packet service time, as the instant from the moment when packet arrives at a node to be transmitted to the moment when the receiver receives the packet. Packet service time is independent of the hop circle because the independent parallel access scheme is proposed for different hops and the hop-to-hop delay is taken into account only. We present all time consumption in backoff period. Define
PGF for the effective durations of the backoff period and sensing failure in (34) are derived as follows:
PGF of access delay consists of three factions as shown in (34): PGF for successful transmission, PGF for access failure, and PGF for reaching retry limits. Transmission commences as the channel being sensed idle for two CCAs, as factor
6. Model Validations
We present extensive simulations of slotted CSMA/CA of IEEE 802.15.4 to validate the accuracy of evaluated metrics for throughput and delay of HTC scheme using NS-2 simulator according to previous analyses. NS-2 is a popular discrete-event simulator which was originally designed for wired networks and has been subsequently extended to support wireless simulations [44]. The accuracy of evaluated expressions for throughput and delay is validated through extensive comprehensive simulations which are derived based on analyses of different parameters such as packet arrival rate, packet size, node density, transmission range, and so forth.
Nodes are randomly located in the circle according to a two-dimensional Poisson distribution with the sink at the center to simplify both the closed form expressions and the model of the hidden terminals. Node can be aware of its own hop number once it is presented in the system through the data header. Packet length is normalized as backoff period including the PHY header and MAC header. We assume that the entire superframe duration is active. Moreover, impacts of the beacon concluded in data packet can be neglected in this issue for the beacon order is set to 4. Each turnaround process is assumed to consume the same time and energy for simplification. Parameters used in simulations are listed in Table 1, and packet length and some of MAC parameters touched upon simulations are listed in the head of result figures. Experimental setups of NS-2 simulator used to conduct validations are similar to presentations in [45] in detail, and the propagation delay can be ignored in our scheme simulations. We validate the performance of our analyses firstly, considering 2-hop and 1-hop behaviors. Then, we compare the performance of our schemes with that of previous schemes such as Koubâa's [9] and Tseng's [14]. Besides, we can derive the characters of multihop networks by extending our analyses to higher hops. Our simulation results are mean values derived from 30 experience values for each scenario.
The parameters of our simulations.
Network operating points determined by carrier sensing probability

The behavior of parameters
We can analyze the performance of parameters
6.1. Throughput Validations
According to (32) in Section 5.1, system throughput is determined by packet length L, traffic arrival rate γ, node Poisson distribution density λ, transmission range R, and transmission probability
Throughput is sensitive to values of γ and λ at the same packet length, increasing rapidly with the increasing of γ and λ before arriving at saturated values because offered load increases largely at these cases. Shown in Figure 6(a), throughput arrives at peak value at traffic

Throughput as a function of traffic arrival rate γ, node density λ, packet length L, transmission range R, and transmission range. (a) Normalized throughput related to node density λ based on traffic rate γ. (b) Normalized throughput related to data length L based on traffic rate γ. (c) Normalized throughput related to transmission range R based on node density λ.
Throughput is also sensitive to transmission range as related before that the analysis results are consistent with the simulation results for larger transmission range. We emphasize that transmission range is fixed once a node model is chosen, but we can experience diverse transmission range to derive its great influence on system performance. We can see from Figure 6(c) that throughput decreases with increasing the range when λ is less than 0.06, whereas increases when λ is more than 0.06 for 1-hop. After arriving at its saturation value, throughput decreases slowly until arriving at a trimmed value. Throughput decreases rapidly with increasing hops for much more packet collisions take place among vast number of nodes. Moreover, throughput for a node in
6.2. Delay Validations
Delay is the most important character in our time-critical system, and we always attempt to improve the behavior of delay in order to obtain the real-time monitoring. From (34) in Section 5.2, mean delay of transmitting a packet is sensitive to γ, λ, and L. We take the hop-to-hop delay into account. This delay refers to the time in which a node in nth hop accesses the channel to transmit the packet to a node in
Delay increases rapidly with increasing traffic rate when traffic rate is low and increases slowly when traffic rate is high; for example, delay increases rapidly when γ is less than 0.42 for 1-hop, and the increasing rate slows down when γ is more than 0.42, shown in Figure 7(a). Data length exerts a tremendous influence on delay performance shown in Figure 7(b). In the same hop, access delay for nodes that contained long data differs little from that of short data when traffic rate is relatively low and traffic rate is relative high, while they differ appreciably from each other when traffic rate is a intermediate value. For example, access delay for

Delay as a function of traffic arrival rate γ, node density λ, packet length L, transmission range R, and transmission range. (a) Delay related to node density λ based on traffic rate γ. (b) Delay related to data length L based on traffic rate γ. (c) Delay related to transmission range R based on node density λ.
6.3. Performance Comparisons
Analysis and simulation results shown above are comprehensive for applications, and we can compare the performance metrics of our mechanism with those of other hidden terminal avoiding schemes. Our HTC scheme is used for time-critical monitoring and detection application, in which minimized delay is the most important target. We can derive the separate performance of each hop for nodes in different hops contending for the channel adopt the fair parallel access mechanism. Our scheme HTC excels in contending WSN networks with hidden terminals and routing establishment for adopting the distinguished improvement of two strategies, which refer to leaving the hidden terminals out of account once the HTC pair establishment and dispensing with taking the routing overhead into account for using the parallel access scheme. Through the comprehensive comparisons, we can derive that the delay performance metric of our scheme is obviously improved over other schemes such as [9, 14], while throughput is improved over others in some cases of more node density and larger transmission range.
A simple yet efficient hidden terminal avoidance mechanism for unslotted CSMA/CA of IEEE 802.15.4, H-NAMe, is proposed by Koubâa et al. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of nonhidden terminals that scale to multiple clusters via a cluster grouping strategy that guarantees no interference between overlapping clusters. H-NAMe scheme is a hidden-terminal avoiding scheme but has several limitations in large-scale sensor networks as related in Section 3. That are, the permissible number of groups can not support so many pending sensors in large-scale networks. Grouping algorithm is a passive algorithm which is not suitable for the large-scale sensor networks. Grouping algorithms in [9, 13] is developed for the case of one hop networks which can consumes much energy at the case of multihop networks. So, besides consuming much energy, the passive grouping process of H-NAMe scheme consumes much time in large-scale multihop networks. We can slightly adjust network parameters and MAC parameters for H-NAMe scheme in order to compare the performance metrics with our model, which is illustrated in later simulation figures such as Figures 8–11.

(a) Throughput comparisons for different hops based on traffic rate when node density is relatively low

(a) Throughput comparisons for different hops based on node density when transmission range is relatively low

(a) Delay comparisons for different hops based on traffic rate when node density is relatively low

(a) Delay comparisons for different hops based on node density when transmission range is relatively low
The first cross-layer technique CL-DNA (cross-layer detection and allocation) to solve the hidden terminal problem for CSMA/CA of IEEE 802.15.4 is proposed by Tseng et al. CL-DNA scheme combines the PHY layer and MAC layer. The PHY layer is responsible for detecting the device addresses from the collided signals to identify the hidden terminals upon the occurrence of frame collision. In the MAC layer, the dubious hidden terminals are double-checked via hidden terminal problem address verification procedure, and the confirmed addresses of the hidden terminals are then added to a hidden terminal address list. A hidden terminal is scheduled to access the channel by exclusively allocating time slots in different subperiods according to the number of hidden terminal pairs it belongs to and the size of hidden terminal address list, to eliminate the effect of the hidden terminal problem. The hidden terminals are detected actively by CL-DNA scheme, which consumes much less energy. However, the time allocation algorithm of CL-DNA consumes much energy in two-hop or multihop scenarios. Moreover, great confusion can be introduced into the address detection procedure in multihop networks if nodes in different hop access the channel adopting the parallel mode.
We compare the behaviors of these two hidden terminal avoiding IEEE 802.15.4 schemes of [9, 14] with our HTC scheme under low traffic rates and modify the backoff counters as no limitation when increasing the backoff stages for all three schemes. The simulation parameters are presented as in the same way as our above simulations.
Node density λ plays an important role in throughput performance of all three schemes, which can be seen from Figure 8. Nodes are passively grouped into a certain group whether they have packets to be transmitted or not, leading to nodes which have no pending packets contend to the channel in a certain group. And so, throughput is brought down. Throughput behavior of Koubâa's scheme is inferior to other two schemes in case of 1-hop when
Transmission range R also plays an important role in throughput performance seen in Figures 9(a) and 9(b). Throughput of Koubâa’ shows the worst performance in larger transmission range
We find that delay metric of HTC scheme is superior to those of Koubâa's and Tseng's schemes from Figures 10(a), 10(b), 11(a), and 11(b) in three aspects. Firstly, nodes having pending packets to be transmitted can establish the HTC couple pairs. This active coupled algorithm consumes much less time without scheduling to couple each and every node in so much nodes of large-scale network. And then, all nodes regardless hops can access the channel adopting a parallel CSMA/CA scheme. Nodes in higher hop circle dispense with waiting for nodes in lower hop completing their transmissions, which consumes much time. Moreover, all nodes regardless of hops can transmit their packets in an independent mechanism without taking the point of global view, while the scheme of Koubâa's needs to coordinate the operations of nodes in a whole group at least, and the scheme of Tseng's must take all addresses in the network into consideration.
Shown in Figures 10(a) and 10(b), delay increases slowly with the traffic rate increasing for 1-hop scenarios, while it increases acutely with the traffic rate increasing for 2-hop scenarios. Transmission range plays a great important role in delay performance shown in Figures 11(a) and 11(b). For the schemes of Koubâa's and Tseng's, delay increases to some enormous values, while delay of HTC scheme increases smoothly with the node density increasing.
We can find that the delay performance is improved greatly by adopting the novel scheme of HTC, in which the contending traffic, regardless of hops, has no priority over each other. Delay of HTC is superior to those of other schemes, while throughput is superior to others for the cases of more node density and larger transmission range. In such a time-critical system, the scheme of HTC supplies the satisfactory performance.
Moreover, calculations for throughput and access delay presented an exponential increase with the number of hops, and we analyze the behaviors of 1-hop and 2-hop comprehensively as above. Standing feature of our method is that performance analyses can be scaled easily to higher hop without enormous complexity. Compared to the establishment consumption of the HTC within node T and node R, the increased part of the overall consumption is the part of the consumption for the HTC information exchange between the node in the highest hop and the node in its lower hop near to it. The computational complexity just increases a little. We extend our analyses to higher hop, deriving the characters of multihop networks. Shown in Figure 12(a), throughput decreases rapidly with increasing hops until to a small trimmed value. For instance, throughput is decreased to 0.011 from 5-hop. Delay increases sharply with increasing hops, which shows the similar behavior as the throughput illustrated in Figure 12(b).

Multihop performance by extending above analyses to higher hops. (a) Normalized throughput related to node density based on hops. (b) Delay related to hops based on node density.
7. Conclusions
In this paper, we have presented a slotted CSMA/CA scheme HTC scheme, for multihop IEEE 802.15.4 networks using accurate and comprehensive n semi-Markov models and one macro-Markov model. At first, two strategies are performed to improve the performance of multihop WSNs: the HTC algorithm and a parallel access scheme. Then, the comprehensive models adopting n semi-Markov chains to describe the behaviors of CSMA/CA scheme for the nodes in n hops contending to the channel and one macro-Markov chain to describe the channel behaviors are proposed to analyze and improve the performance of multihop IEEE 802.15.4 CSMA/CA scheme. And then, the accurate statistical performance metrics of throughput and delay of unsaturated, unacknowledged IEEE 802.15.4 beacon enabled networks for 1-hop and 2-hop scenarios are predicted based on these models and improved strategies, in which nodes are assumed to locate randomly uniformly over a circle plane according to Poisson distribution with a density of λ. We consequently extend our models to analyze 3-hop or even higher hop networks.
Comprehensive NS-2 simulations demonstrate that the analysis results of these models match well the simulation results, especially for larger transmission range and relative higher node density. Moreover, performance comparisons between our HTC scheme and other multihop schemes with hidden terminal avoiding are also proposed. Besides, the analysis and comparison results show that the delay behavior of this time-critical scheme HTC is improved largely relatively to other schemes, and the throughput performance is improved in some cases of more node density and larger transmission range.
In multihop wireless sensor networks, the position of the sink has significant impact on the networks behaviors which is elaborately analyzed in [45]. And the distance between the transmitter and the sink plays an important role in network performance if the propagation model is taken into account. Moreover, heterogeneous nodes or heterogeneous access schemes can be the open questions in multihop networks. In the recent future, we can also extend our analysis to these pending problems.
