Throughput analysis of IEEE 802.15.4 beacon-enabled MAC protocol in the presence of hidden nodes

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    The presence of hidden nodes degrades the performance of wireless networks due to an excessive amount of data frame collisions. The IEEE 802.15.4 medium access control (MAC) protocol, which is widely used in current wireless sensor networks, does not provide any hidden node avoidance mechanisms and consequently could lead to severe performance degradation in networks with hidden nodes. This paper presents a simple technique based on discrete-time Markov chain analysis to approximate the throughput of IEEE 802.15.4 MAC protocol in the presence of hidden nodes. Using different network configurations, we validate the applicability of the proposed analysis for generic star-topology networks. Based on the analysis, the effects of network size, topology, frame length and frame arrival rate on the throughput of the system are investigated.
    Original languageEnglish
    Pages (from-to)1889-1908
    Number of pages10
    JournalWireless Networks
    Volume20
    Issue number7
    DOIs
    Publication statusPublished - 2014

    Fingerprint

    Dive into the research topics of 'Throughput analysis of IEEE 802.15.4 beacon-enabled MAC protocol in the presence of hidden nodes'. Together they form a unique fingerprint.

    Cite this