- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Recently Accepted Articles ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2012 (2012), Article ID 940302, 11 pages

http://dx.doi.org/10.1155/2012/940302

## Investigation of Uncoordinated Coexisting IEEE 802.15.4 Networks with Sleep Mode for Machine-to-Machine Communications

^{1}School of Engineering and Applied Science, Aston University, Birmingham B47ET, UK^{2}College of Engineering, Swansea University, Wales SA28PP, UK

Received 20 April 2012; Revised 15 June 2012; Accepted 25 June 2012

Academic Editor: Lin Bai

Copyright © 2012 Chao Ma et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

The low-energy consumption of IEEE 802.15.4 networks makes it a strong candidate for machine-to-machine (M2M) communications. As multiple M2M applications with 802.15.4 networks may be deployed closely and independently in residential or enterprise areas, supporting reliable and timely M2M communications can be a big challenge especially when potential hidden terminals appear. In this paper, we investigate two scenarios of 802.15.4 network-based M2M communication. An analytic model is proposed to understand the performance of uncoordinated coexisting 802.15.4 networks. Sleep mode operations of the networks are taken into account. Simulations verified the analytic model. It is observed that reducing sleep time and overlap ratio can increase the performance of M2M communications. When the networks are uncoordinated, reducing the overlap ratio can effectively improve the network performance.

#### 1. Introduction

The increasingly popular M2M technology can enable machines to communicate directly with one another through wireless and/or wired system [1, 2]. With the increasing volume of wireless networks in recent years, the information can be exchanged between machine devices much easier and faster at low cost, which makes M2M technology more attractive to business as well as customers due to its huge potential on cost reduction and services improvement [3, 4]. Effective and reliable support from wireless networks for communications between the number of M2M devices is pivotal to the success of M2M technology. This paper aims to study the effectiveness of IEEE 802.15.4 network technology on support of M2M communications [5]. With increasing number of M2M devices which may be connected by IEEE 802.15.4 network, it is very likely to witness that multiple 802.15.4 networks are closely and independently deployed for M2M appellations. The interference of each other and hidden terminal problem may arise among these M2M devices, which can become severe problems for 802.15.4 networks-based M2M applications.

In this paper we investigate the issues of multiple uncoordinated coexisting 802.15.4 networks when they are closely deployed with sleep mode. Two representative network scenarios where two 802.15.4 networks are working in the sleep mode with different overlap ratios in the channel access periods are presented. We propose an analytic model to predict the system throughput and energy consumption with different media access control (MAC) parameters, frame length, the number of network devices for each network, and overlap ratios. The results show that the impact of uncoordinated multiple networks operations can lead to significant system performance drop when their channel access periods are most overlapped. The approaches of reducing sleep time and overlap ratio to increase the system performance are also studied. The analytic model is verified by simulations.

In the literatures, simulation-based evaluation of single 802.15.4 network has been widely reported including [6, 7]. Additionally, many analytic models have been proposed to capture the throughput and energy consumption performance of single 802.15.4 network with either saturated or unsaturated traffic. The limited scalability of the 802.15.4 MAC was pointed out by Yedavalli and Krishnamachari [8] where the performance in terms of throughput and energy consumption are studied. They showed that 802.15.4 MAC performed poorly when the number of contending devices was high. Mišić et al. proposed a Markov model to evaluate the throughput of 802.15.4 networks with unsaturated downlink and uplink traffic [9]. However, their analytical models do not have high accuracy. A simplified Markov model was proposed in [10], in which a geometric distribution was used to approximate the uniform distribution for the random backoff counter. But the approximation results in large inaccuracy in throughput prediction. A three-dimensional Markov model was proposed in [11] to evaluate the throughput of slotted carrier sense multiple access (CSMA). However, the state transitions in [11] were not correctly modelled. The model was revised with improved accuracy in [12]. Both Pollin et al. [13] and Singh et al. [14] also considered a star network topology and analysed the MAC protocol performance under assumption that saturated traffic conditions. They found out that a large fraction of packets was dropped during the channel access, and the dropping probability increases with the number of sensor devices. Park et al. [15] and He et al. [16] developed accurate analytical modes for 802.15.4 MAC protocol in the beacon-enabled mode for star network topology. In addition, the performance analysis was mainly targeted at validating the accuracy of the proposed model. Energy consumption and throughput performance of 802.15.4 MAC was analysed in [17]. However, none of these works has studied the uncoordinated operations of multiple coexisting 802.15.4 networks with sleep mode.

The remainder of this paper is organised as follows. In Section 2, we introduce the superframe structure and channel access algorithm of IEEE 802.15.4 standard briefly. Two scenarios and model assumption of the analytic model are introduced in Section 2 and the analytic model of two uncoordinated networks is presented in Section 3. Section 4 discusses the numerical results and performance analysis. The conclusions and future works are in Section 5.

#### 2. Channel Access Algorithm of IEEE 802.15.4

An IEEE 802.15.4 network can work either in nonbeacon-enabled or in beacon-enabled mode [5]. In the nonbeacon-enabled mode, there are no regular beacons, and devices communicate with each other using unslotted CSMA-CA algorithm. In the beacon-enabled mode, the coordinator transmits regular beacons for synchronisation and association procedures to control communication. A superframe structure is imposed in the beacon-enabled mode as shown in Figure 1, whose format is defined by the coordinator. The superframe is bounded by network regular beacons, and can have an active portion and an optional inactive portion. All communications take place in the active period while devices are allowed to enter a low-power (sleep) mode during the inactive period. The structure of this superframe is described by the values of () and (). The BO describes the beacon interval (BI), the SO describes the length of superframe duration (SD), and they are related, respectively, as follow: where aBaseSuperframeDuration = 960 symbols and .

The active portion of each superframe shall be composed of two parts: a contention access period (CAP) and an optional contention-free period (CFP). The CAP shall start immediately following the beacon and complete before the beginning of CFP on a superframe slot boundary. If the CFP is zero length, the CAP shall complete at the end of the active portion of the superframe. We neglect every CFP in this study, because it is designed for low-latency applications requiring specific data bandwidth which means only CAP in each active portion of superframe structure. In CAP, communication among devices uses slotted CSMA-CA algorithm for contention access. The 802.15.4 slotted CSMA-CA algorithm operates in unit of backoff slot. One backoff slot has the length of 20 symbols. In the rest of the paper backoff slot is simply called slot unless otherwise specified.

According to the acknowledgement (ACK) of successful reception of a data frame, the slotted CSMA-CA algorithm can be operated in two modes: ACK mode, if an ACK frame is to be sent and non-ACK mode, if an ACK frame is not expected to be sent. In this paper we will work on the non-ACK mode. In the non-ACK mode, every device in the network maintains three variables for each transmission attempt: NB, , and CW. NB denotes the backoff stage, representing the backoff times that have been retried in the slotted CSMA-CA process while one device is trying to transmit a data frame in each transmission. denotes the backoff window, representing the number of slots that one device needs to back off before clear channel assessment (CCA). CW represents the contention window length and is used to determine how many slots for the CCA before transmissions. CW will be set to two before each transmission and reset to two when the channel is sensed busy in CCAs.

Before each device starts a new transmission attempt, NB sets to zero and sets to . The backoff counter chooses a random number from and it decreases every slot without sensing channel until it reaches zero. If the number of backoff slots is greater than the remaining number of slots in the CAP, the MAC sublayer shall pause the backoff countdown at the end of the CAP and resume it at the start of the CAP in the next superframe [5]. If the number of backoff slots is less than or equal to the remaining number of slots in the CAP, the MAC sublayer shall check whether the number of remaining slots in current CAP is enough to complete the two CCAs and the frame transmission when backoff counter reaches zero. If the two CCAs and the frame transmission can be completed, the MAC sublayer shall request that the PHY perform the first CCA (denoted by CCA1) when backoff counter reaches zero. If channel is idle at CCA1, CW decreases one and the second CCA (denoted by CCA2) will be performed after CCA1. If channel is idle for both CCA1 and CCA2, the frame will be transmitted in next slots. If channel is busy in either CCA1 or CCA2, CW resets to two, NB increases by one, and is doubled but not exceed . If NB is smaller or equal to the allowed number of backoff retries macMaxCSMABackoffs (denoted by ), the above backoff and CCA processes are repeated. If NB exceeds , the CSMA-CA algorithm ends. If two CCAs and the frame transmission cannot be completed in the remaining CAP, the MAC sublayer shall wait until the start of the CAP in the next superframe and apply a further random backoff delay before evaluating whether it can proceed again.

#### 3. Model Assumption

There can be many scenarios with which the 802.15.4 networks may or may not interfere with each other if their operations are not coordinated when multiple 802.15.4 networks are deployed independently and closely. We assume two 802.15.4 networks are deployed closely and two simple representative scenarios are considered to focus on obtaining insights to the impact of uncoordinated operations on system performance.

We consider a star network topology with a PAN coordinator. These two networks are labelled by NET1 and NET2 with and denoting the number of basic devices in addition to one coordinator in each network, respectively. All the devices in its own network are within communication ranges of each other. Only uplink traffic from the basic devices to the coordinator in each network is considered. Each data frame has a fixed length which requires slots to transmit over the channel. The data payload in MAC layer frame is fixed slots, which is transmitted as the MAC payload in the MAC protocol data unit. In our scenarios, we assume that the two networks are both transmitting equal length of data payload slots using the same slots through the channel. We assume a saturated traffic with non-ACK mode, which means that each device has always traffic to send frames to its coordinator. The BOs of NET1 and NET2 are the same, which means the length of BIs of two networks are equal. The SOs of NET1 and NET2 are also set the same, which gives them equal active portions as well. We also consider an idle superframe structure, which means the active portions only consist of CAP without CFP, and an idle channel over which a frame fails if and only if collision happens.

*(1) Scenario I*

For this scenario we assume that both considered networks are operated on the same frequency channel and the communication range of each network is fully overlapped as shown in Figure 2(a). We consider the beacon-enabled mode as mentioned in the previous section. Each network has a coordinator, which is responsible for broadcasting the beacon frames in the beginning of superframes. For simplicity, we assume that the beacons from any network can be correctly received by all the basic devices which belong to that network. The two networks share the whole channel frequencies, which means they can detect each other’s transmissions through CCAs. For this scenario, the CAPs from each network can be partially overlapped or fully overlapped with different overlap ratio as shown in Figure 3. When , which is the worst case that the two networks are fully overlapped in channel access periods, and when , which means there is no interference between these two networks.

*(2) Scenario II*

In this scenario, we assume these two networks share the channel frequencies and their communication range is fully overlapped as shown in Figure 2(b). We consider that the basic devices of each network can only hear transmissions from the other devices in its own network but cannot detect transmissions from other networks, which means that the CCA detections for each device are not affected by the channel activities from the other networks. This could happen because the distance between the basic devices and the two networks is too far to hear each other, although they operate on the same frequency channel. But the coordinators for the networks can detect transmissions from all the basic devices not only their own networks but also the other networks. With this assumption hidden terminals are present from neighbour networks. The transmissions could be collided by the data from other networks if they have overlap in the channel access portion. The same with Scenario I, when , which is the worst case that the CAPs of two networks are fully overlapped, and means there is no interference in the CAPs for each network. We assume that the beacons from either network can be correctly received by all the devices belong to that network.

#### 4. Analytic Model for Scenarios

##### 4.1. Analytic Model of Scenario I

In the superframe structure, there is no activity from any device in the inactive portion for each network. The system performance of networks in CAP for Scenario I could be analysed separately with two parts according to different overlap ratio : nonoverlapped and overlapped part.

For the nonoverlapped part, the performance of networks could be analysed with the existing analytic model for single 802.15.4 network proposed in [12]. According to the idea of performance modelling in [12], the nonoverlapped part channel states sensed by each device of either 802.15.4 network can be modelled by a renewal process, which starts with an idle period and followed by a fixed length of slots (frame transmission), as shown in Figure 4.

The idle period depends on the random backoff slots and the transmission activities from each device. It is noted that the maximal number of idle slots is plus two slot CCAs. On the other hand, the slotted CSMA-CA operations of each individual device could be modelled by a Markov chain with finite states. Let denote the probability of a transmission from devices in network ( represents network identification, being 1 or 2) other than a tagged basic device in network starting after exactly th idle slots since the last transmission, where [12]. The transmission probability of a basic device in a general backoff slot can be calculated with the Markov chain constructed for each device.

Without loss of generality we consider NET1 and a tagged basic device in NET1. For the tagged basic device, its Markov chain consists of a number of finite states and each corresponds to a state of the CSMA-CA algorithm in one slot. These finite states are introduced below. Let denote the steady-state probability of a general state in the Markov state space. For simplicity we ignore the subscript “1” which corresponds to NET1 in the Markov states. In the following derivation we assume NET1 and NET2 use the same set of MAC parameters. It is trivial to extend to the cases with different sets of MAC parameters.

*(1) Busy State*

Denoted by , during which at least one device other than the tagged basic device transmits the th part of a frame of slots, with the backoff stage and backoff counter of the tagged basic device being and , respectively, where , , and , is the minimum of and [12]:

*(2) Backoff State*

Denoted by , during which the tagged basic device backoff with backoff counter being at backoff stage , after idle slots since the last transmission, where , and [12]:

*(3) Sensing State*

Denoted by , during which the tagged basic device performs CCA2 at the th backoff stage, after idle slots since the last transmission, where and [12]:

*(4) Initial Transmission State*

Denoted by , during which the tagged basic device starts to transmit a frame at backoff stage , after idle slots since the last transmission [12]:

*(5) Transmission State*

Denoted by , during which the tagged basic device transmits the th part of a frame, where . The first part is transmitted in the state [12]:

The transmission probability that the tagged basic device transmits after exactly idle slots since the last transmission for the nonoverlapped part in CAPs can be computed by , for , and for [12]:

With the above expressions derived for transmission probability ( and for NET1 and NET2, resp.), we can calculate channel busy probability ( and for NET1 and NET2, resp.) for the nonoverlapped part of CAPs with the tagged basic device in Scenario I (in NET1 and NET2, resp.) with :

Since the balance equations for all steady-state probabilities and expressions for and , have been derived, the Markov chain for the tagged basic device can be numerically solved. After the Markov chains are solved, we can calculate the throughput of nonoverlapped part for Scenario I with individualnetwork:

To analyse energy consumption, we use normalised energy consumption, defined in [17] as the average energy consumed to transmit one slot of payload. The energy consumption of transmitting a frame in a slot (denoted by ) and perform a CCA (denoted by ) in a slot is set to 0.01 mJ and 0.01135 mJ, respectively [17]. We use the to represent the normalised energy consumptions of the nonoverlapped part for Scenario I with NET1 and NET2, respectively:

For the overlapped part of CAPs in Scenario I, we have the transmission probabilities , and we use to denote the new channel busy probabilities:

The Markov chain for the tagged basic device can be numerically solved again with the new channel busy probabilities. The throughput of the overlapped part for overall system in Scenario I is obtained as follows:

For NET1 and NET2, the throughputs of overlapped part with Scenario I are obtained, respectively:

The normalised energy consumptions of overlapped part for Scenario I are defined as with NET1 and NET2, respectively:

Now, we can combine the nonoverlapped and overlapped part of CAPs together with different overlap ratio . The various sleep time in BIs with different SOs is also considered. For Scenario I, we have throughputs of NET1 and NET2 are calculated by The overall network throughput is calculated by

The normalised energy consumption of Scenario I for NET1 and NET2 is, respectively

##### 4.2. Analytic Model of Scenario II

So far we have presented the performance analytic mode for Scenarios I with different sleep time and different overlap ratios. In this subsection we will give the analytic mode for Scenario II. Firstly, we assume that the two networks are fully overlapped in the CAPs (), and we focus on the channel access periods only. The performance with different overlap ratios can be obtained after we get the fully overlapped performance. As we discussed previously in Scenario I the channel access operation is not affected by channel activities at other networks. But for Scenario II correct reception of frame transmissions in one network can be affected by the frame transmissions in the other network. If a frame from the tagged basic device transmitted to coordinator in one network does not collide with frames from the other devices in the same network, it is still subject to collide with frames from the other network. An illustration of the uncoordinated operations for Scenario II, is shown in Figure 5. We could reuse the Markov states from [12] and calculate the new channel busy probability and for NET1 and NET2 in Scenario II, respectively. The problem that remains to be solved is on the calculation of successful frame reception probability, which depends on the probability of transmissions from both networks.

The performance of NET1 under the impact of uncoordinated operation from NET2 is considered firstly. The impact of NET1 transmissions to NET2 performance can be analysed similarly. With the Markov chain states we can compute the transmission probability of NET2 as done for nonoverlapped part in Scenario I by (7). Now the probability of exact idle slots before one transmission in the active portion of NET2 can be derived, which is expressed by (identifier 2 means NET2) for and for :

For each transmission from NET2 following idle slots there is a probability that an independent transmission from NET1 will not collide with the transmission from NET2. It is noted that the probability is larger than zero only if idle slots from NET2 is larger than or equal to the transmission data length in NET1. An illustration of the collision of frames from NET1 with frames from NET2 is presented in Figure 6.

We can calculate for by

The average probability that a transmission from NET1 does not collide with transmissions from NET2 can be calculated by where is the transmission data length in NET2.

For Scenario II, the throughput of nonoverlapped part of each network can be calculated by (9) as done in Scenario I, for there is no interference from each other. Then we can calculate the throughput of overlapped part for NET1 in this scenario:

Similarly we can use the same way to calculate the throughput of overlapped part for NET2:

After the throughputs of nonoverlapped and overlapped part have been derived, we can calculate the throughputs for NET1 and NET2. For the different overlap ratio and sleep time, the throughputs for NET1 and NET2 in Scenario II can be calculated by The overall system throughput for Scenario II is calculated by .

Because of the only impact on the transmissions in each network for Scenario II is the outcomes of frame reception. The normalised energy consumptions for NET1 and NET2 in Scenario II can be calculated by using (10) in Scenario I with the new throughputs in Scenario II:

#### 5. Numerical Results and Performance Analysis

We consider an IEEE PHY at frequency band 2400–2483.5 MHz with O-QPSK modulation and data rate of 250 kbps. A discrete event simulator is used to investigate the performance of uncoordinated problem and verify the proposed analytic model. The symbol rate is 62500 symbols per second for the PHY and at most 3000 slots of data could be transmitted in one second. We set BO for each network is fixed 6, which means each superframe length BI is fixed 3072 slots for both NET1 and NET2. Then the CAP of each superframe is only decide by SOs. For example, if SO sets to 5, which means half of the superframe 1536 slots are active portion and the rest is inactive portion. We can vary different SOs for various sleep slots for both two networks to investigate the impact of sleep mode. Typical results are presented with default MAC parameters for NET1: , and . The MAC parameter in NET2 are varied to investigate the impact of uncoordinated operations from NET2. The overhead of the header in a data frame is 1.5 slots and the data length with MAC and PHY layer herder is . We assume that both networks transmit frames with the same data length . Each simulation results presented in the figures was obtained from the average of 20 simulations. In each simulation data frames are transmitted.

Figures 7(a)–7(d) give the normalised throughput and normalised energy consumption of Scenario I. Figures 8(a)–8(d) show the normalised throughput and normalised energy consumption of Scenario II.

##### 5.1. Analysis of Scenario I

Figure 7(a) shows the throughput of overall system and throughput of NET1 for Scenario I. Only 5 M2M devices are in NET2 and the MAC parameters of NET2 are as same as those in NET1. For , we have and the data length in one frame is 15 bytes. Similarly for , the data length is 55 bytes. Half of the slots in BI are in inactive portion with and CAPs of NET1 and NET2 are fully overlapped with . Consider the case of 20 M2M devices working in NET1. The throughput of NET1 is 0.03 for , which means that at most 30 data messages could be successfully delivered in one second in total NET1. Each M2M device in NET1 could deliver at most 1.5 data messages in one second with message size . This performance may be reasonably acceptable for M2M applications, for most of them do not need high data rate such as smart metering and environment monitoring. However, the throughput of NET1 decreases further when there are more M2M devices and the normal applications may not be effectively supported by the uncoordinated operation in Scenario I.

Figure 7(b) presents the throughput of NET1 with different SOs in Scenario I. Consider the case of 20 and 10 M2M devices in NET1 as examples. When the SO increased by one (not over maximum BO), the throughput is doubled with the condition overlap ratio . With the assumption of Scenario I, reducing the sleep time or using the nonsleep mode will dramatically increase the throughput of NET1, which will make it more suitable for most M2M application. For example, if we set for Scenario I, which means these two networks are working in nonsleep mode, the throughput of NET1 will be doubled than what Figure 7(a) shows, for the active slots in superframe BIs are doubled.

Figure 7(c) shows the relationship between throughput of NET1 and overlap ratio in Scenario I. We take and as examples. When , which means there is no interference between two networks and when , which means the CAPs are fully overlapped. With the increasing of from 0 to 1, the throughput of NET1 linearly drops. Consider the case of 10 M2M devices in NET1. The throughput of NET1 is 0.08 for and which means at most 80 data messages could be successfully transmitted in total in NET1. When the overlap ratio increases to and , the successfully transmitted data messages drop to about 60 and 40, respectively.

Figure 7(d) represents the energy consumption of NET1 for Scenario I. We consider the cases of with for three conditions , and . When , the is at most 0.7 mJ, which is the highest one compared to nearly 0.5 mJ for and about 0.4 mJ for . For Scenario I, it is observed that increasing the active slots in superframe and reducing the overlap ratio can both obtain higher throughputs. Reducing sleep time will not affect the normalised energy consumption, but will increase the total energy consumption, for more slots will be active in superframes. Taking 20 M2M devices with in NET1 as an example from Figure 7(d), the throughput will be doubled from 0.03 to 0.06 when SO increases from 5 to 6, which means 30 data messages will be increased to 60 data messages that could be successfully delivered in one second in total NET1 with message size . The normalised energy consumption is at most 0.7 mJ for this example with , and it will not change for different SOs. With the at most 10.5 mJ per second energy will be consumed in total of NET1, and when at most 21 mJ per second energy will be consumed in total of NET1. Compared to increase SOs, reducing the overlap ratio can also reduce the energy consumption to get higher throughputs.

##### 5.2. Analysis of Scenario II

Figure 8(a) shows that the throughput of NET1 in Scenario II with 5 basic devices in NET2. Two sets of initial backoff window ( and ) are used to study the impact of the slotted CSMA-CA parameters set for NET2 on the NET1 performance. It shows that for and , the throughput of NET1 drops below 0.04 even with only 5 devices in NET1. Results for throughput of overall system have been obtained but not resented here due to concern on the readability of the figure. With larger frame length , the NET1 throughput drops further. It is also observed that the analytic results match very well with the simulation results, which demonstrates the high accuracy of the proposed analytic mode. Consider the case of 10 M2M devices in the NET1. The throughput of NET1 is 0.015 for and 0.005 for , respectively. It means each M2M device in NET1 could successfully deliver at most 1.2 data messages in one second for and 0.25 data messages for , respectively. When there are more M2M devices the NET1, the throughput of NET1 drops further and the normal M2M applications could not be effectively supported by the 802.15.4 networks. The above analysis shows that for Scenario II, uncoordinated operation of 802.15.4 networks can significantly affect the effectiveness of the networks on supporting M2M applications.

It is observed that with increased random backoff window in NET2, the throughput of NET1 for Scenario II is largely improved. This can be explained by the fact that with large random backoff window for devices in NET2, there will be smaller collision probabilities between frames from NET1 and NET2. Increasing random backoff window may be an effective measure to improve the system performance in case of multiple uncoordinated 802.15.4 networks and hidden terminals. But it is noted that such improvement may be achieved at cost of increased message delivery delay due to the larger backoff windows. Compared to Scenario I, the throughput of NET1 is limited even with increased random backoff window in NET2.

Figure 8(b) gives the throughput of NET1 with different overlap ratio for Scenario II. The number of basic devices in NET2 is still 5 and in NET1 is 10 as an example. With the increasing of from 0 to 1, the throughput of NET1 linearly drops dramatically. When , the throughputs of NET1 for are about 0.045 and 0.055 with and , respectively. It means each M2M device could successfully transmit 4.5 data messages and 5.5 data message in one second, respectively. When increases to 1, they drop to 1.5 data messages and 3 data messages in one second, respectively. The throughputs of NET1 with drop quickly than with for both and . With larger frame length (), the NET1 throughput drops further with increasing and becomes lower than when is near 1.

Figures 8(c) and 8(d) represent the energy consumption of NET1 for Scenario II. It is observed that the uncoordinated operation of 802.15.4 networks could lead to significant increase of the energy consumption. With increasing number of M2M devices in NET1, the energy consumption of NET1 will increase dramatically and hardly support M2M application. For larger backoff window in NET2 (), the energy consumption of NET1 largely drops, for more data messages can be successfully transmitted without collision. It is still higher compared to Scenario I. The overlap ratio can affect the energy consumption significantly, with lower overlap ratio , the energy consumption can be largely improved. Compared to the measure of increasing random backoff window in NET2, the adaptive sleep mode which can decrease the overlap ratio may be a more effective way to improve the system performance of both throughput and energy consumption.

#### 6. Conclusion

Wireless M2M networks could play a critical role in the M2M technology. In this paper, we investigated the effectiveness of IEEE 802.15.4 networks in support of M2M communications. Two representative scenarios of closely deployed and uncoordinated IEEE 802.15.4 networks are studied. An analytic mode was proposed to understand the impact of uncoordinated operations and sleep mode on the overall system performance. Simulations demonstrate the high accuracy of the proposed analytical model. It was observed that the uncoordinated operations of 802.15.4 networks have significant impact on the M2M application performances. Reducing sleep time and overlap ratio can improve the overall networks performances. But by reducing sleep time approach the energy consumption may be increased due to longer active periods. On the other hand reducing sleeping overlap ratio in the channel access periods of networks can largely improve the throughput and decrease the energy consumption.

#### Acknowledgments

The work was supported by the UK Engineering and Physical Sciences Research Council (EPSRC) with Grant reference no. EP/1010157/1 and the National Natural Science Foundation of China (NSFC) under the Grant no. 61103177.

#### References

- R. Q. Hu, Y. Qian, H. H. Chen, and A. Jamalipour, “Recent progress in machine-to-machine communications,”
*IEEE Communications Magazine*, vol. 49, no. 4, pp. 24–26, 2011. View at Publisher · View at Google Scholar · View at Scopus - R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: the green, reliability, and security of emerging machine to machine communications,”
*IEEE Communications Magazine*, vol. 49, no. 4, pp. 28–35, 2011. View at Publisher · View at Google Scholar · View at Scopus - Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, “Toward intelligent machine-to-machine communications in smart grid,”
*IEEE Communications Magazine*, vol. 49, no. 4, pp. 60–65, 2011. View at Publisher · View at Google Scholar · View at Scopus - S. Y. Lien and K. C. Chen, “Massive access management for QoS guarantees in 3GPP machine-to-machine communications,”
*IEEE Communications Letters*, vol. 15, no. 3, pp. 311–313, 2011. View at Publisher · View at Google Scholar · View at Scopus - “IEEE standard for information technology- local and metropolitan area networks- specific requirements- part 15. 4: wireless medium access control (mac) and physical layer (phy) specifications for low rate wireless personal area networks (wpans),” IEEE Standards 802. 15. 4-2006 (Revision of IEEE Std 802. 15. 4-2003), vol. 7, pp. 1 –320, 2006.
- J. Zheng and M. Lee, “A comprehensive performance study of IEEE 802. 15. 4,”
*Sensor Network Operations*, pp. 218–237, 2004. - G. Anastasi, M. Conti, and M. Di Francesco, “A comprehensive analysis of the MAC unreliability problem in IEEE 802.15.4 wireless sensor networks,”
*IEEE Transactions on Industrial Informatics*, vol. 7, no. 1, pp. 52–65, 2011. View at Publisher · View at Google Scholar · View at Scopus - K. Yedavalli and B. Krishnamachari, “Enhancement of the IEEE 802.15.4 MAC protocol for scalable data collection in dense sensor networks,” in
*Proceedings of the Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (Wiopt'08)*, pp. 152–161, April 2008. View at Publisher · View at Google Scholar · View at Scopus - J. Mišić, S. Shafi, and V. B. Mišić, “Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic,”
*IEEE Transactions on Parallel and Distributed Systems*, vol. 17, no. 4, pp. 361–376, 2006. View at Publisher · View at Google Scholar · View at Scopus - I. Das and S. Roy, “Analysis of the contention access period of ieee 802. 15. 4 mac,” Tech. Rep. UWEETR-2006-0003, Department of Electrical Engineering, University of Washington, 2006.
- Z. Tao, S. Panwar, D. Gu, and J. Zhang, “Performance analysis and a proposed improvement for the IEEE 802.15.4 contention access period,” in
*Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC'06)*, pp. 1811–1818, April 2006. View at Scopus - J. He, Z. Tang, H. H. Chen, and S. Wang, “An accurate Markov model for slotted CSMA/CA algorithm in IEEE 802.15.4 networks,”
*IEEE Communications Letters*, vol. 12, no. 6, pp. 420–422, 2008. View at Publisher · View at Google Scholar · View at Scopus - S. Pollin, M. Ergen, S. C. Ergen et al., “Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer,”
*IEEE Transactions on Wireless Communications*, vol. 7, no. 9, pp. 3359–3371, 2008. View at Publisher · View at Google Scholar · View at Scopus - C. K. Singh, A. Kumar, and P. M. Ameer, “Performance evaluation of an IEEE 802.15.4 sensor network with a star topology,”
*Wireless Networks*, vol. 14, no. 4, pp. 543–568, 2008. View at Publisher · View at Google Scholar · View at Scopus - P. Park, P. Di Marco, P. Soldati, C. Fischione, and K. H. Johansson, “A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4,” in
*Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS '09)*, pp. 130–139, October 2009. View at Publisher · View at Google Scholar · View at Scopus - J. He, Z. Tang, H. H. Chen, and Q. Zhang, “An accurate and scalable analytical model for IEEE 802.15.4 slotted CSMA/CA networks,”
*IEEE Transactions on Wireless Communications*, vol. 8, no. 1, pp. 440–448, 2009. View at Publisher · View at Google Scholar · View at Scopus - T. R. Park, T. H. Kim, J. Y. Choi, S. Choi, and W. H. Kwon, “Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/CA,”
*Electronics Letters*, vol. 41, no. 18, pp. 1017–1019, 2005. View at Publisher · View at Google Scholar · View at Scopus