Professional Documents
Culture Documents
MAC Layer Performance of The IEEE 802157 Visible L
MAC Layer Performance of The IEEE 802157 Visible L
MAC Layer Performance of The IEEE 802157 Visible L
net/publication/291384776
CITATIONS READS
12 2,649
3 authors:
Murat Uysal
Ozyegin University
407 PUBLICATIONS 13,254 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Parvaneh Shams on 30 April 2018.
RESEARCH ARTICLE
ABSTRACT
Visible light communications (VLC) is a high-speed wireless communication technology that has recently emerged. VLC
uses the illumination infrastructure to meet broadband needs of bandwidth-hungry devices. Its high data rate, immunity
to electromagnetic interference, ability to operate in an unlicensed band and high reuse factor position VLC as a strong
alternative to existing communication technologies. The physical and medium access control (MAC) layers of VLC have
been standardised in IEEE 802.15.7. Yet, theoretical performance bounds of the MAC layer have not been explored in
detail so far. In this paper, we derive Markov-based performance bounds for the MAC layer of IEEE 802.15.7. We provide a
thorough study of throughput, delay, power consumption, collision probability, transmission probability, access probability
and packet discard probability using analytical analysis and simulations. Copyright © 2016 John Wiley & Sons, Ltd.
*Correspondence
M. Uysal, Department of Electrical and Electronics Engineering, Ozyegin University, Istanbul 34794, Turkey.
E-mail: murat.uysal@ozyegin.edu.tr
are investigated based on a Markov chain model. However, for network performance metrics including throughput,
this model lacks the time parameters such as packet length delay, power consumption, collision probability, transmis-
and backoff duration. Furthermore, it is only for a special sion probability, access probability and packet discard
case of backoff stage numbers and does not provide good probability. The derived expressions are further validated
scalability. We have evaluated a limited set of performance via simulations.
metrics in our preliminary study [17]. This paper is organised as follows: In Section 2, we
In this paper, we present a comprehensive performance introduce the IEEE 802.15.7 MAC protocol and describe
evaluation of throughput, delay, power consumption, the MAC functionality to provide a background for the fol-
collision probability, transmission probability, access prob- lowing sections. In Section 3, we present the Markov chain
ability and packet discard probability based on Markov model and introduce the main expressions. Section 4 is
modelling. We consider beacon-enabled mode with devoted to the system hypothesis, study of these assump-
CSMA/CA in 802.15.7 MAC layer. Although the IEEE tions and applicability. This section discusses performance
802.15.7 standard provides the option to use beaconless metrics, provides numerical results of outage analysis and
modes and it also allows operation without CSMA/CA, compares them with simulation results. Section 5, evalu-
such modes become useful for light traffic loads and when ates the performance of the proposed scheme and presents
hidden node problem is not observed frequently. Beacon- simulation results. Finally, Section 6 concludes our paper.
enabled mode with CSMA/CA allows for accommodating
dense traffic and dense node deployment. For this reason, 2. IEEE 802.15.7 MAC
we primarily focus on modelling the beacon-enabled mode
with CSMA/CA in saturated environments. We model The IEEE 802.15.7 standard supports three network
the CSMA/CA mechanism of IEEE 802.15.7 standard topologies as illustrated in Figure 1. In the peer-to-peer
with a Markov chain and derive closed-form expressions topology, one of the two devices in an association acts as
Figure 2. The superframe structure of IEEE 802.15.7 [8]. CAP, contention access period; CFP, contention-free period; GTS, guaranteed
time slot.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
the coordinator. In the star topology, the communication is used in networks that either require synchronisation or sup-
established between devices and a single central controller port for low-latency devices. If the network does not need
referred to as the coordinator. In the broadcast topology, synchronisation or support for low-latency devices, it can
the device can transmit a signal to other devices with- select to turn off the beacon for normal transfers. However,
out being associated to any device or having any devices the beacon is still required for network discovery.
associated to them. The communication in this mode is As mentioned before, the standard uses four types of
unidirectional, and the destination address is not required. channel access mechanism, depending on the network con-
The standard allows the optional use of a superframe figuration. These are beacon-enabled or non-beacon modes
structure (Figure 2). The format of the superframe is with the option of whether having or not CSMA/CA. In
defined by the coordinator. The coordinator can dedicate beacon-enabled mode, nodes use the slotted random chan-
some slots of the superframe to applications with certain nel access mechanism where the backoff slots are aligned
quality of service requirements. These are called ‘guar- with the start of the beacon transmission. A device that
anteed time slots’ and form the contention-free period has data to transmit first locates the boundary of the next
(CFP). All contention-based transactions must be com- backoff slot, then waits for a random number of backoff
pleted before the CFP begins. Therefore, the CFP always slots and senses whether the channel is idle or not. If the
appears at the end of the superframe immediately follow- channel is idle, the device begins transmitting on the next
ing the contention access period [15]. The superframe is available backoff slot boundary. It is also possible that car-
bounded by beacons sent by the coordinator. Beacons are rier sense mechanism is not active because it is optional.
Figure 3. Random access flow chart with four modes: non-beacon mode without CSMA/CA; non-beacon mode with CSMA/CA;
beacon-enabled mode without CSMA/CA; and beacon-enabled mode with CSMA/CA. CCA, clear channel assessment; ACK,
acknowledgement.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
In that case, the node starts transmission right after back- In an unslotted system, the transmission, or CCA if active,
off. A successful reception and validation of a data or will start immediately.
MAC command frame can be optionally confirmed with an The network can operate in either acknowledged (ACK)
acknowledgement. Acknowledgement and beacon frames or unacknowledged modes [18]. In ACK mode, a packet
are sent without using a random access mechanism. Non- transmitted after a successful channel access procedure can
beacon-enabled network uses an unslotted random channel either be received successfully or experience a collision. In
access mechanism where each time a device wishes to the NO_ACK mode regardless of whether the transmission
transmit data, it first waits for a random backoff period is successful or ends in collision, ACK will not be received
and then transmits its data frame. The same carrier sense by the sending node, and thus, the node immediately con-
principles are applied with CSMA/CA. tinues the CSMA/CA procedure on a new packet [13]. In
In Figure 3, we present the flow chart of CSMA/CA the ACK mode, a successful transmission is accompanied
mechanism with beacon-enabled mode. Before a new by the reception of an ACK, which has a fixed length of
packet transmission, the node maintains two variables [8]: backoff periods. The ACK is fed back to the sender node
NB and BE, which are initialised as 0 and macMinBE, after a minimum time, which allows the node to switch
respectively. NB is the number of times the backoff pro- from transmission mode to reception mode. The ACK is
cedure has been repeated while attempting the current expected by the sender node to be received before a fixed
transmission. BE is the backoff exponent, which is related maximum time of macAckWaitDuration. If the ACK is
to how many backoff periods a device shall wait before not correctly received after this time, then a collision is
attempting to access a channel. BE is initialised with a declared [15].
value of macMinBE. The node waits for a random number
of backoff periods specified by the backoff value. Then, it 3. PERFORMANCE ANALYSIS
performs the clear channel assessment (CCA) to sense the
3.1. Markov model
channel, and if it is idle, transmission stage starts. The basic
time unit adopted here is the backoff period, that is, a time
Markov models have been used in modelling medium
slot of length UnitBackoffPeriod. A time slot is defined as access in IEEE 802.15.4 [17, 19, 20]. In this paper, the
the minimum time needed to send the smallest data to a behaviour of the IEEE 802.15.7 node is modelled by a
device, and it is fixed. The number of slots in a VLC MAC two-dimensional discrete time Markov chain, which rep-
frame is communicated in the MAC header. Thus, a single resents different states of the node. The state of two-
device or user can have access to more than a single slot for dimensional Markov chain is described by two random
sustained data transfer in the frame, if there are slots avail- variables .s.t/, c.t// at a given time slot t, as shown
able. The frame type and the number of slots are indicated in Figure 3. s.t/ respectively represents the transmission
in the MAC header. stage, the ACK stage and the backoff CCA stage for s .t/ 2
If CCA is active, the node senses the channel for certain fM C 1, : : : , 2M C 1g, s .t/ 2 f2M C 2, : : : , 3M C 2g and
amount of symbols. If the channel is busy, BE and NB are s .t/ 2 f0, : : : , Mg. Depending on the value of s.t/, c.t/
both incremented by one where the maximum value for acquires different significance as follows (Table I).
BE is macMaxBE. Their number of backoff is limited to
macMaxRABackoff. If the value of NB is less than or equal If s .t/ 2 f0, : : : , Mg, the node can be either in
to macMaxRABackoff, the access algorithm will perform a backoff state or in CCA mode. If the node is in back-
random backoff as shown in Figure 3. If the value of NB is off state, c.t/ can take any value in the range of
greater than macMaxRABackoff, the access algorithm will f0, : : : , Wi 1g, depending on the value of backoff
terminate with a channel access failure status. counter, which is selected randomly.
For slotted access, the MAC sublayer will first initialise If the node is in CCA mode, the minimum of c .t/ is
NB and BE and then locate the boundary of the next backoff zero while its maximum value is Wi 1. Here, Wi D
period. This sublayer also delays for a random number of 2minfmacMinBECi,macMaxBEg is the size of the backoff
backoff periods in the range 0 to 2BE 1 and then requests window at backoff stage s .t/ D i 2 f0, : : : , Mg. In
that the PHY layer performs a transmission or optionally a this case, if 1 6 c .t/ 6 WM 1, it determines the
CCA. In a slotted random access method, the transmission, value of backoff counter, while c .t/ D 0 corresponds
or CCA if active, will start on a backoff period boundary. to the CCA state.
c(t)
L A : : : 1 0 1, : : : , LA LA C 1, : : : , Lp 1 Lp , : : : , WM 1
0, : : : , M – CCA Backoff
s(t) M C 1, : : : , 2M C 1 – Transmit –
2M C 2, : : : , 3M C 2 ACK not received c .t / ACK received – –
ACK, acknowledgement; CCA, clear channel assessment.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
Figure 4. Markov model for slotted CSMA/CA per single transmission attempt. CCA, clear channel assessment; ACK,
acknowledgement.
If s .t/ 2 fM C 1, : : : , 2M C 1g, that is, the node is in RX mode, in order to receive ACK. If the ACK is received
transmission state, the value of s .t/ M 1 deter- during MacMaxAckWait (with probability Pco denoting the
mines the backoff stage of the node. In this case, c .t/ probability that the transmission of a given node ends up
determines the number of slots of the packet, which in a collision), the node sets NB and BE to their default
have been already transmitted. values and waits for a new packet arrival. If the ACK
If s .t/ 2 f2M C 2, : : : , 3M C 2g, that is, the node is is not received during MacMaxAckWait (with probability
in ACK state, the value of s .t/ 2M 2 determines 1 Pco ), the nodes assumes packet collision and goes to
the backoff stage of the node. In this case, c .t/ D 0 the next backoff stage. If the backoff stage exceeds NB, the
determines transceiver switch state (i.e. switching the node discards the packet. It should be noted that the value
transceiver of the node from TX mode to RX mode). of ˛ is the same for different backoff state levels. In real-
If 1 6 c .t/ 6 LA , the node is receiving the ACK, ity, it depends on the backoff stage where N nodes perform
and c .t/ determines the number of slots of the ACK, the sensing.
which have been already received. The ACK duration
is assumed to be LA .
3.2. Calculation of state probabilities
If LA 6 c .t/ 6 1, the node is not receiving the
ACK, and c .t/ determines the number of slots, which Let bi,k D limt!1 P fs .t/ D i, ‹c .t/ D kg denote the
the node has already waited for the ACK. probability of being in state fs.t/ D i, c.t/ D kg. In a net-
work consisting of N nodes, the probability that a given
When a new packet arrives, the node goes to the first node spends a randomly picked slot performing CCA is
backoff stage, denoted by s .t/ D
0. The node
can pick any defined as
value randomly in the range of 0, 2BE 1 D .0, Wi 1/ XM
as illustrated in Markov model (Figure 4). If the channel 'D bi,0 (1)
is idle, and the CCA state is successful, the node enters iD0
the transmission state. Because the probability of back- The probability that the transmission of a given node ends
off counter taking any value within 0, 2BE 1 is equally up in a collision is given by
likely, the new packet enters each of these states with
probability 1=W0 where W0 D 2BE . When the counter Pco D 1 .1 '/N1 (2)
reaches zero (i.e. c .t/ D 0), the node senses the chan- The probability of channel access failure at each backoff
nel. If it is sensed idle (with probability 1 ˛ because stage is
the probability of sensing the channel busy is denoted by
y D .1 ˛/Pco C ˛ (3)
˛), the node starts transmission; otherwise, it goes to the
next backoff stage (i.e. s .t/ D 1). After packet transmis- In the following, we write all state probabilities in terms of
sion, the node switches its transceiver from TX mode to the probability of being in the first backoff stage (i.e. b0,0 ).
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
Specifically, the probability of being in each of the CCA which can be written in terms of b0,0 as
states (i.e. bi,0 / is related to b0,0 as
bi,0 D .˛ C .1 ˛/Pco /i b0,0 16i6M (4) bk,j D .1 ˛/.Pco /.˛ C .1 ˛/Pco /k2M2 b0,0
(10)
On the other hand, the probability of being in each trans- 2M C 2 6 k 6 3M C 1, LA 6 j 6 1
mission state that is related to the probability of being in
the CCA state of the same backoff stage (i.e. bkM1,0 ) is So far, we have related all state probabilities to the state
given by probability of b0,0 . Total probability of the Markov model
bk,j D .1 ˛/bkM1,0 states must be equal to 1; therefore, we have
(5)
M C 1 6 k 6 2M C 1, 0 6 j 6 Lp 1 X WX
3MC2 i 1 M W
X Xi 1
bi,k D bi,k
which can be further related to b0,0 as
iD0 kDLA iD0 kD0
(11)
bk,j D .1 ˛/.˛ C .1 ˛/Pco /kM1 b0,0 p 1
X LX
2MC1 3MC2
X LA
X
(6) C bk,j C bk,j D 1
M C 1 6 k 6 2M C 1, 0 6 j 6 Lp 1
kDMC1 jD0 2MC2 jDLA
The probability of being in ACK state is related to
the probability of being in transceive switch state (i.e. This expression consists of three parts. The first term on the
bkM1,0 ) as right side is relevant to backoff and CCA states of the node.
The second and third terms correspond to transmission and
bk,j D .1 Pco /bkM1,0 ACK states, respectively. Replacing (3), (5), (7) and (9) in
(7)
2M C 1 6 k 6 3M C 1, 1 6 j 6 LA (11), we have
p 1
X WX
3MC2 i 1 M W
X Xi 1
.Wi k/yi X LX
2MC1 3MC2
X X LA
bi,k D b0,0 C .1 ˛/ykM1 b0,0 C .1 ˛/ .1 Pco /yk2M2 b0,0
Wi
iD0 kDLA iD0 kD0 kDMC1 jD0 2MC2 jD1
3MC2
X 1
X 3MC2
X
C .1 ˛/ Pco yk2M2 b0,0 C yk2M2 .1 ˛/tAck
2MC2 jDLA 2MC2
M
X
Wi C 1
D b0,0 yi C .1 ˛/ yi Lp C LA .1 Pco / C tAck C LA Pco
2
iD0 (12)
Setting (12) equal to 1 yields
1
b0,0 D h
1.2y/MC1 1yMC1 1
i (13)
2aMinBE1 12y C 1y 2 C .1 ˛/ Lp C LA .1 Pco / C tAck C LA Pco
bk,j D .1 ˛/.1 Pco /.˛ C .1 ˛/Pco /k2M2 b0,0 In order to derive network state, another equation is
2M C 1 6 k 6 3M C 1, 1 6 j 6 LA needed, which is acquired by considering the interactions
(8) between N nodes. Henceforth, we use the notation (Table
The probability of being in no-ACK state is related to the II), introduced in [18], to refer the events that take place.
probability of being in transceive switch state as By taking into account the interactions among N nodes, ˛
can be expressed as the probability of at least one transmis-
bk,j D Pco bkM1,0
(9) sion, when without loss of ˇgenerality, N th node performs
2M C 2 6 k 6 3M C 2, LA 6 j 6 1 CCA, that is, ˛ D Pr.Tx>1 ˇCfNg /
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
This expression can be written as the union of the The third term in (17) corresponds to the probabil-
transmission probability of other nodes as ity of union of other nodes being in transmission state,
while node k where k D 1 is transmitting and node
N2
X N1 p where p D N is in CCA state. If there are two or
˛ D Pr Tx>1 jCfNg D
nC1 more transmissions in a particular slot, the transmissions
nD0
(15)
must start at the same slot, because devices that trans-
nC1
Pr [ Txfkg jCfNg mit later would detect earlier transmissions and would
kD1
not start transmitting. Starting transmission at the same
which can be further rewritten as time slot moreover requires being in the CCA state
at the same time. Thus, the conditional probability is
X
N2
N1
equivalent to
˛D Pr Txf1g
nC1
nD0 (16) !
nC1
[
nC1
Pr [ Txfkg jTxf1g , CfNg Pr Txfkg jTxf1g , CfNg
kD1 kD1
! (20)
nC1
[
By using the total probability theorem, we can write the
D Pr Cfkg jCf1g , CfNg
second term in (16) as
kD1
Pr Txf1g D Pr Txf1g jTx1 Pr .Tx1 /
(17) The probability that n nodes simultaneously perform
C Pr Txf1g jTx>2 .Pr .Tx>2 / CCA where n D Œ1, : : : , N 2 and node k where
k D 1 and node p where p D N are in CCA state
which can be written in terms of the collision probability is the probability that N 2 nodes are in one of the
Pco as CCA states and remaining N 2 n nodes are not in
2 CCA state:
p 1
X LX
2MC1
Pr Txf1g D .1Pco / 4 Pr .s D i, c D jjTx1 / nC1
!
[
iDMC1 jD0 Pr Cfkg jCf1g , CfNg
3 (21)
3MC2
X LA
X kD1
C Pr .s D i, c D jjTx1 /5 D ' .1 '/N2n
n
iD2MC2 jD0
2 3
p 1
X LX
2MC1
C Pco 4 Pr.s D i, c D jjTx>2 /5 Replacing (18) and (21) in (17), we have
iDMC1 jD0
(18)
N2
X
N1
˛D ' nC1 .1 '/N2n .1 ˛/ Lp C .1 Pco / .LA C tAck /
nC1
nD0 (22)
h i
D .1 ˛/ Lp C .1 Pco / .LA C tAck / 1 .1 '/N1
which yields
Using (4)–(10), we can rewrite (18) as
" # 1
N1
˛
' D 1 1
Pr Txf1g D .1 ˛/ '. Lp C .1 Pco / .LA C tAck / .1 ˛/ Lp C .1 Pco / .LA C tAck /
(19) (23)
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
3
(22) and (23) are solved numerically to derive network 3MC2
X LA
X
state and determine ˛ and ' values. Using these values of C Pr .s D i, c D jjTx1 /5
˛ and ', network metrics can be evaluated as explained in iD2MC2 jD0
next section. 2 3
p 1
X LX
2MC1
C Pco 4 Pr .s D i, c D jjTx>2 /5
4. PERFORMANCE METRICS
iDMC1 jD0
D .1 Pco / Lp . .1˛/ ' C .LA CtAck / .1 ˛/'
4.1. Throughput C Pco Lp .1 ˛/ '
D .1 ˛/ ' Lp C .1 Pco / .LA C tAck /
The per node throughput S0 is defined as the fraction of
(26)
time that a node spends in successful transmission. On
the other hand, the network throughput S is defined as The network transmission probability is the probability
the fraction of time that the network spends in success- that one or more nodes are transmitting in the network.
ful transmission, that is, the fraction of time in which This probability is equal to the probability of at least one
exactly one node is transmitting. A node would have a node is transmitting in the network. Therefore, we have
successful transmission in time t, if it is the only node per-
˚
forming CCA in some time slot in the range t0 2 Œt Ptx0 D Pr Tx>f1g
.Lp C LA / C tAck , t 1, and finds the channel idle. The N1 nC1
!
X N [
probability of a node being only one performing CCA is D Pr Txfkg
nC1
'.1 '/N1 . Furthermore, the probability of sensing the nD0 kD1
channel idle is .1 ˛/. If both conditions are met, the node N1 nC1
!
X N [
holds the channel for Lp C LA slots. Then, the per node D Pr Txfkg
nC1
throughput is nD0 kD1
N1 nC1
!
˚ X N [
S0 D Lp C LA Pr t0 2 Lp C LA C tAck , D nC1 Pr.Txf1g / Pr Txfkg
nD0 kD1
t 1 : Cf1g \ CF1 (24)
N1
X N
D Lp C LA '.1 '/N1 .1 ˛/ D nC1 ' nC1 .1 '/N1n .1 ˛/
nD0
Because all of the network nodes are similar, the network Lp C .1 Pco / .LA C tAck /
throughput is N times the throughput of each network
D ' .1 '/N1 .1˛/ Lp C.1 Pco / .LA C tAck /
node, that is,
n
N1
X
N
'
nC1
S D NS0 D N Lp C LA ' .1 '/N1 .1 ˛/ (25) 1'
nD0
D .1 ˛/ Lp C.1Pco / .LA CtAck / 1 .1 '/N
(27)
4.2. Transmission probability
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
E .delay \ TX : suc/
D D E .DelayjTX : suc/ D
Pr .TX : suc/
M
1 X
D PrfDelayjTX : suc at stage igPrfsuc at stage ig
1 Pd
iD0
M
(" i ! i
(33)
1 X X Wk 1 X i k ik
D C k ..1 ˛/ Pco / ˛ k Lp C tack C LA
1 Pd 2
iD0 kD0 kD0
# )
C Lp C tack C LA Œ.1 ˛/ .1 Pco / yi
transmitting, one or more other nodes are also transmit- The probability of successful transmission .Pr.TX : suc//
ting. This probability can be considered as the complement is equal to the fraction of packets that are not discarded.
of the case in which only one node is transmitting, while Total probability is used to express TX : suc in terms of
we know that at least one node is transmitting. It is .TX : suc at stage i/ for i D 0 : M. In the last line of
defined as (33), the first term shows the average number of slots spent
Pr fTx1 \ Tx>1 g performing backoff in stage i for a packet that is success-
Pco D Pr fTx>2 jTx1 g D 1 (30) fully transmitted; the second term shows the average time
Pr.Tx>1 /
spent in unsuccessful attempts prior to i, and the third term
demonstrates required time for a successful packet trans-
N The
probability of one node transmitting is equal to
times the probability of one specific node transmitting, mission. A packet has i possible transmission attempts;
1
which is determined by using the Markov model. In fact, therefore, it can be transmitted successfully after colliding
the probability of the node being in a transmission or ACK in up to i attempts.
states is Lp C tAck C LA '.1 ˛/, and the probability
of not transmitting by other nodes is .1 '/N1 . Hence, 4.6. Power consumption
we have
˚ Average power consumption for each node is the power
Pr fTx1 g NPr Txf1g spent to transmit packets successfully and unsuccessfully,
Pco D 1 D1
Pr.Tx>1 / Pr.Tx0 / which is given by
N LA C Lp C tAck '.1 '/N1 .1 ˛/
D 1
.1 ˛/ Lp C.1Pco / .LA CtAck / 1.1'/N P D E .P jTX : suc / Pr .TX : suc/
(34)
(31) C E .P jTX : discard / Pr .TX : discard/
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
(" # )
P
M P P
i i
P
i wk 2 i
kD0 2 Pidle C tcca Prx C k ..1 ˛/Pco /k ˛ ik k U .1 ˛/ .1 Pco / yi (35)
iD0 kD0 kD0
PTX:suc D
PDelay C PTx:suc yMC1
Similarly, the average power consumed for a discarded on the backoff stage. This difference is particularly notice-
packet is equal to the average number of slots spent able between the first backoff stage .i D 0/ and the rest
in M C 1 backoff stage multiplied by packet discard of the backoff stages. This can be explained by observing
probability and power consumed in this mode, plus the that a node in the first backoff stage on average draws a
average time spent in CCA multiplied by packet discard smaller backoff value than other nodes, which are compet-
probability and power consumed in this mode, plus the ing with it. Additionally, as explained in [20], although the
average unsuccessful transmissions in previous M stage probability of a node being in the first backoff stage is not
multiplied by packet discard probability and power con- small (a node goes through the first backoff stage once per
sumed in this mode, plus the average power spent in every attempt), the joint probability of two nodes being in
the stage M C 1 multiplied by collision probability and the first backoff stage is very small. This means that a node
the probability that the node reaches the stage M C 1. in the first backoff stage is given better opportunities than
Again, in order to normalise the power, it is divided nodes in any other stage. Thus, it is very likely for it to
by the total time spent for discard procedure. Therefore, find the channel idle. Figure 5 shows the simulation results
we have obtained for ˛ in different backoff stages. In order to derive
" #
P
M
wk 2 P
M
2 Pidle C .M C 1/Prx C .M k Mk k
k /..1 ˛/Pco / ˛ U/yMC1 C U .1 ˛/ Pco yM
kD0 kD0
PTX:discard D (36)
PDelay C PTx:discard yMC1
Thus, the total power consumption iPtotal D PTX:discard the probability of sensing the channel busy via simulation,
CPTX:suc s. the number of times, which a node senses the channel busy,
is divided by total number of times, which the node senses
the channel.
4.7. Sensing probabilities for different
backoff stages
5. SIMULATION RESULTS AND
Let ˛i denote the probability of sensing the channel busy DISCUSSIONS
during the ith CCA stage. As earlier mentioned, in the
Markov chain model (Figure 4), it was assumed that ˛i D In this section, we present a simulation study using MAT-
˛ for all i 2 f0, : : : , Mg. This greatly simplifies the analy- LAB to assess the main network parameters (throughput,
sis. However, as shown in Figure 5, ˛ is in fact dependent delay, power consumption, collision probability and packet
discard probability) and confirm our analytical findings.
We consider beacon-enabled mode with CSMA/CA and
use the parameters presented in Table III, which are spec-
ified in the IEEE 802.15.7 standard [8]. In Figures 6–11,
we depict both derived expressions and simulation results.
In general, we observe that analytic results are in good
Constant Value
aBaseSlotDuration 60
aNumSuperframeSlots 16
aUnitBackoffPeriod 20
macBeaconOrder 15
MAC layer macMaxBE 5
macMinBE 3
macNumAcks 3
Beacon length 30 (0.5 slot)
macMaxCSMABackoffs 0–5
Figure 5. Probability of sensing clear channel assessment busy
Number of nodes 2–15
.˛/ for different backoff stages.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
agreement with simulation results. However, there is some bility increases, and throughput and per node transmission
noticeable difference particularly for small network sizes. probability drops, which is expected because the growth in
There are several reasons for this behaviour. First, through- network size impacts access to shared medium.
put is calculated over the length of simulation. For less We also evaluated power consumption and delay for
number of nodes, their backoff periods naturally have more varying network size. The average power consumption,
impact on the calculations because of the relatively low
number of nodes and limited simulation duration.
The number of nodes .N/ is one of the key parame-
ters of network scalability of the VLC system. In Figure 6,
we analyse the impact of N on the per node throughput,
which is the fraction of time that a node spends in suc-
cessful transmission. Here, N ranges from 2 to 15. As it
can be seen, networks with low number of nodes achieve
a high per node throughput. Beyond eight nodes, the per
node throughput drops below 50%. It is also observed that
there is relatively less match between analytical and sim-
ulation findings for network size below six nodes. There
are several reasons for this behaviour. First, throughput is
calculated over the length of simulation. For less number
of nodes, their backoff periods naturally have more impact
on the calculations because of the relatively low number
of nodes and limited simulation duration. In addition, we Figure 7. Per node transmission probability under varying net-
present the per node throughput where the averaged results work size.
involves more samples for the denser networks. Figure 7
presents the per node transmission probability, which is
the fraction of nodes that attempts transmission at a ran-
dom time. This includes both successful and unsuccessful
transmission attempts. In simulations, transmission prob-
ability increases as the number of nodes increase. This is
due to unsuccessful attempts in a congested network. Sim-
ilar to per node throughput, relatively low number of nodes
impacts the averaged results in simulations. A small devi-
ation is observed between analytic and simulation studies.
The average collision probability and packet drop are
shown in Figures 8 and 9, respectively. The increase in col-
lision probability as the number of nodes increases agrees
with our results on throughput and per node transmission
probability. Similarly, increasing number of nodes causes
discard probability to increase significantly. As a result,
we observe that as the collisions increase, discard proba- Figure 8. Collision probability under varying network size.
Figure 6. Per node throughput under varying network size. Figure 9. Packet drop probability under varying network size.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
ACKNOWLEDGEMENTS
Figure 10. Power consumption (in unit transmission power) This work is carried out as an activity of ‘Centre of
under varying network size. Excellence in Optical Wireless Communication Technolo-
gies (OKATEM)’ funded by Istanbul Development Agency
(ISTKA) under Innovative Istanbul Financial Support Pro-
gram, 2015. The statements made herein are solely the
responsibility of the authors and do not reflect the views of
ISTKA and/or T.R. Ministry of Development.
REFERENCES
1. Kavehrad M. Sustainable energy-efficient wireless appli-
cations using light. IEEE Communications Magazine
December 2010; 48(12): 66–73.
2. Arnon S, Barry J, Karagiannidis GK, Schober R, Uysal
M. Visible-light Communications, in Advanced Optical
Wireless Communication, 1st ed. Cambridge University
Press: NY, USA, 2012, 353–368.
Figure 11. End-to-end delay (in time slot unit) under varying 3. Tsonev D, Chun H, Rajbhandari S, McKendry JJD,
network size. Videv S, Gu E, Haji M, Watson S, Kelly AE, Faulkner G,
Dawson MD, Haas H, Brien DO. A 3-Gb/s single-LED
shown in Figure 10, decreases with increasing network OFDM-based wireless VLC. IEEE Photonics Technol-
size. The reason for this behaviour is the average waiting ogy Letters 2014; 26(7): 637–640.
time increase when collisions occur, because as the offered 4. Cossu G, Khalid AM, Choudhury P, Corsini R, Cia-
traffic increases, nodes spend more time in backoff state ramella E. 3.4 Gbit/s visible optical wireless transmis-
rather than transmission state. Because transmission incurs sion based on RGB LED. Optics Express 2012; 26:
more energy consumption than the idle backoff stage, B501–B506.
nodes consume less power as the size of the network grows. 5. Uysal M, Nouri H. Optical wireless communications –
Finally, Figure 11 shows network delay that grows with
an emerging technology. In Invited Paper, 16th Inter-
increasing network size. The reason for such behaviour is
national Conference on Transparent Optical Networks
twofold. First, as the number of nodes increase, offered
load increases. Second, increasing number of collisions (ICTON), Graz, Austria, 2014; 1–7.
and increasing backoff durations incur additional delay. 6. Komine T, Nakagawa M. Fundamental analysis for
visible-light communication system using LED lights.
IEEE Transactions on Consumer Electronics 2004; 50:
6. CONCLUSIONS
100–107.
In this paper, we discussed the behaviour of performance 7. O’Brien D, Zeng L, Le-Minh H, Faulkner G, Bouchet
metrics of IEEE 802.15.7 beacon-enabled mode and slotted O, Randel S, Walewski J, Rabadan Borges JA, Langer
CSMA/CA mechanism. We used a generalised approach K-D, Grubor J, Lee K, Tae Won E. Visible light com-
that is based on the Markov chain model to analyse net- munication. In Short-Range Wireless Communications:
work performance and provide the mathematical model Emerging Technologies and Applications, Kraemer R,
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal
Katz M (eds). Wiley Publishing: New Jersey, USA, In Fourth International Conference on Ubiquitous
2009; 329–342. and Future Networks (ICUFN), Seoul, Korea, 2012;
8. 802.15.7 IEEE standard for local and metropolitan area 136–702.
networks. Part 15.7: Short Range Wireless Optical Com- 15. Musa A, Baba MD, Mansor MA. Analysis of the
munication Using Visible Light, 2011. contention access period (CAP) model for the IEEE
9. Sarbazi E, Uysal M. PHY layer performance evaluation 802.15.7 visible light communication. International
of the IEEE 802.15.7 visible light communication stan- Journal of Computer and Communication Engineering
dard. In International Workshop on OWC– IWOW, New 2013; 2(5): 621–624.
Castle, UK, 2013. 16. Le NT, Choi S, Jang YM. Cooperative MAC protocol
10. Popoola WO, Poves E, Haas H. Error performance of for LED–ID systems. IEEE Transactions on Vehicular
generalised space shift keying for indoor visible light Technology 2010; 59(8): 3917–3932.
communications. IEEE Transactions on Communica- 17. Shams P, Narmanlioglu O, Uysal M, Erol-Kantarci M.
tions 2013; 61(5): 1968–1976. Markov-based performance analysis of medium access
11. Komine T, Lee JH, Haruyama S, Nakagawa M. Adaptive in visible light communications. In 17th International
equalization system for visible light wireless communi- Conference on Transparent Optical Networks (ICTON),
cation utilizing multiple white LED lighting equipment. Budapest, 2015; 1-4.
IEEE Transactions on Wireless Communications 2009; 18. Faridi A, Palattella M, Lozano A, Dohler M, Boggia G,
8(6): 2892–2900. Grieco L, Camarda P. Comprehensive evaluation of the
12. Fan J, Rong Z, Lajos H. Resource allocation under IEEE 802.15.4 MAC layer performance with retransmis-
delay-guarantee constraints for heterogeneous visible- sions. IEEE Transactions on Vehicular Technology 2010;
light and RF femtocell. IEEE Transactions on Wireless 59(8): 3917–3932.
Communications 2015; 14(2): 1020–1034. 19. Bianchi G. Performance analysis of the IEEE 802.11 dis-
13. Hwang J, Do T, Yoo M. Performance analysis on MAC tributed coordination function. IEEE Journal on Selected
protocol based on beacon enabled visible personal area Areas in Communications 2000; 18(3): 535–547.
networks. In Fifth International Conference on Pro- 20. Park P, Di Marco P, Fischione C, Johansson KH.
ceedings of Ubiquitous and Future Networks (ICUFN), Modeling and optimization of the IEEE 802.15.4 pro-
Danang, Vietnam, 2013; 384–388. tocol for reliable and timely communications. IEEE
14. Huynh VV, Jang YM. Multi-parameters Based Transactions Parallel Distributed Systems 2013; 24(3):
CSMA/CA for Priority in visible light communication. 550–564.
Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett