MAC Layer Performance of The IEEE 802157 Visible L

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/291384776

MAC layer performance of the IEEE 802.15.7 visible light communication


standard

Article  in  Transactions on Emerging Telecommunications Technologies · May 2016


DOI: 10.1002/ett.3015

CITATIONS READS

12 2,649

3 authors:

Parvaneh Shams Melike Erol Kantarci


Istanbul Aydin University University of Ottawa
14 PUBLICATIONS   32 CITATIONS    174 PUBLICATIONS   4,652 CITATIONS   

SEE PROFILE SEE PROFILE

Murat Uysal
Ozyegin University
407 PUBLICATIONS   13,254 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Underwater Visible Light Communications View project

Energy Efficiency View project

All content following this page was uploaded by Parvaneh Shams on 30 April 2018.

The user has requested enhancement of the downloaded file.


TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
Trans. Emerging Tel. Tech. (2016)
Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/ett.3015

RESEARCH ARTICLE

MAC layer performance of the IEEE 802.15.7 visible


light communication standard
Parvaneh Shams1 , Melike Erol-Kantarci2 and Murat Uysal1*
1 Department of Electrical and Electronics Engineering, Ozyegin University, Istanbul 34794, Turkey
2 Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY 13699, USA

ABSTRACT
Visible light communications (VLC) is a high-speed wireless communication technology that has recently emerged. VLC
uses the illumination infrastructure to meet broadband needs of bandwidth-hungry devices. Its high data rate, immunity
to electromagnetic interference, ability to operate in an unlicensed band and high reuse factor position VLC as a strong
alternative to existing communication technologies. The physical and medium access control (MAC) layers of VLC have
been standardised in IEEE 802.15.7. Yet, theoretical performance bounds of the MAC layer have not been explored in
detail so far. In this paper, we derive Markov-based performance bounds for the MAC layer of IEEE 802.15.7. We provide a
thorough study of throughput, delay, power consumption, collision probability, transmission probability, access probability
and packet discard probability using analytical analysis and simulations. Copyright © 2016 John Wiley & Sons, Ltd.

*Correspondence
M. Uysal, Department of Electrical and Electronics Engineering, Ozyegin University, Istanbul 34794, Turkey.
E-mail: murat.uysal@ozyegin.edu.tr

Received 19 July 2015; Revised 5 November 2015; Accepted 10 December 2015

1. INTRODUCTION the order of tens to hundreds of kb/s. PHY II is intended


for indoor usage with moderate data rates in the order
Visible light communication (VLC) [1, 2] uses light- of tens of Mb/s. PHY III is designed for VLC systems
emitting diode (LED)-based illumination infrastructure for with multiple light sources and detectors. It uses colour
communication purposes. LEDs can be modulated at very shift keying and supports data rates in the order of tens of
high speeds without noticeable effect to human percep- Mb/s or higher. The MAC layer acts as an interface to the
tion. Recent experimental VLC studies [3, 4] have in PHY layer and involves tasks such as beacon management,
fact demonstrated data speeds more than 3 Gb/s. VLC channel access, guaranteed time slot management, frame
offers inherent advantages over radio frequency counter- validation, acknowledged frame delivery, association and
parts, such as immunity to electromagnetic interference, disassociation of the device. The IEEE 802.15.7 MAC pro-
operation in unlicensed visible light band (390–740 nm) tocol uses four types of channel access methods, namely,
and high degree of spatial confinement allowing a high (1) non-beacon mode without CSMA/CA; (2) non-beacon
reuse factor. Potential applications of VLC [5–9] include mode with CSMA/CA; (3) beacon-enabled mode without
a wide range of short-range and medium-range communi- CSMA/CA; (4) beacon-enabled mode with CSMA/CA.
cation applications including wireless local, personal and A comprehensive PHY performance evaluation of the
body area networks, vehicular networks and machine-to- IEEE 802.15.7 is presented in [9], and there are sev-
machine communication among many others. eral studies focusing on modulation [10, 11] and resource
The Institute of Electrical and Electronics Engineers allocation [12]. IEEE 802.15.7 MAC layer performance
(IEEE) recognised the potential of this emerging tech- was not explored in depth except some sporadic works
nology and introduced the IEEE Standard 802.15.7 [8], [13–17]. In [13], the performance of beacon-enabled mode
which was approved in June 2011. This standard defines a of 802.15.7 in terms of throughput and delay is studied
physical layer (PHY) and medium access control (MAC) through computer simulations. The focus in [14] and [16]
layer for VLC and promises data rates sufficient to sup- is on the modification of MAC layer to introduce prior-
port audio and video multimedia services. It supports three ity mechanism and cooperative communication rather than
PHY types, namely, PHY I, PHY II and PHY III. PHY a thorough performance evaluation of the original stan-
I is designed for outdoor usage with low data rates in dard. In [15], throughput and packet discard probability

Copyright © 2016 John Wiley & Sons, Ltd.


P. Shams, M. Erol-Kantarci and M. Uysal

are investigated based on a Markov chain model. However, for network performance metrics including throughput,
this model lacks the time parameters such as packet length delay, power consumption, collision probability, transmis-
and backoff duration. Furthermore, it is only for a special sion probability, access probability and packet discard
case of backoff stage numbers and does not provide good probability. The derived expressions are further validated
scalability. We have evaluated a limited set of performance via simulations.
metrics in our preliminary study [17]. This paper is organised as follows: In Section 2, we
In this paper, we present a comprehensive performance introduce the IEEE 802.15.7 MAC protocol and describe
evaluation of throughput, delay, power consumption, the MAC functionality to provide a background for the fol-
collision probability, transmission probability, access prob- lowing sections. In Section 3, we present the Markov chain
ability and packet discard probability based on Markov model and introduce the main expressions. Section 4 is
modelling. We consider beacon-enabled mode with devoted to the system hypothesis, study of these assump-
CSMA/CA in 802.15.7 MAC layer. Although the IEEE tions and applicability. This section discusses performance
802.15.7 standard provides the option to use beaconless metrics, provides numerical results of outage analysis and
modes and it also allows operation without CSMA/CA, compares them with simulation results. Section 5, evalu-
such modes become useful for light traffic loads and when ates the performance of the proposed scheme and presents
hidden node problem is not observed frequently. Beacon- simulation results. Finally, Section 6 concludes our paper.
enabled mode with CSMA/CA allows for accommodating
dense traffic and dense node deployment. For this reason, 2. IEEE 802.15.7 MAC
we primarily focus on modelling the beacon-enabled mode
with CSMA/CA in saturated environments. We model The IEEE 802.15.7 standard supports three network
the CSMA/CA mechanism of IEEE 802.15.7 standard topologies as illustrated in Figure 1. In the peer-to-peer
with a Markov chain and derive closed-form expressions topology, one of the two devices in an association acts as

Figure 1. Supported medium access control topologies in IEEE 802.15.7 [8].

Figure 2. The superframe structure of IEEE 802.15.7 [8]. CAP, contention access period; CFP, contention-free period; GTS, guaranteed
time slot.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

the coordinator. In the star topology, the communication is used in networks that either require synchronisation or sup-
established between devices and a single central controller port for low-latency devices. If the network does not need
referred to as the coordinator. In the broadcast topology, synchronisation or support for low-latency devices, it can
the device can transmit a signal to other devices with- select to turn off the beacon for normal transfers. However,
out being associated to any device or having any devices the beacon is still required for network discovery.
associated to them. The communication in this mode is As mentioned before, the standard uses four types of
unidirectional, and the destination address is not required. channel access mechanism, depending on the network con-
The standard allows the optional use of a superframe figuration. These are beacon-enabled or non-beacon modes
structure (Figure 2). The format of the superframe is with the option of whether having or not CSMA/CA. In
defined by the coordinator. The coordinator can dedicate beacon-enabled mode, nodes use the slotted random chan-
some slots of the superframe to applications with certain nel access mechanism where the backoff slots are aligned
quality of service requirements. These are called ‘guar- with the start of the beacon transmission. A device that
anteed time slots’ and form the contention-free period has data to transmit first locates the boundary of the next
(CFP). All contention-based transactions must be com- backoff slot, then waits for a random number of backoff
pleted before the CFP begins. Therefore, the CFP always slots and senses whether the channel is idle or not. If the
appears at the end of the superframe immediately follow- channel is idle, the device begins transmitting on the next
ing the contention access period [15]. The superframe is available backoff slot boundary. It is also possible that car-
bounded by beacons sent by the coordinator. Beacons are rier sense mechanism is not active because it is optional.

Figure 3. Random access flow chart with four modes: non-beacon mode without CSMA/CA; non-beacon mode with CSMA/CA;
beacon-enabled mode without CSMA/CA; and beacon-enabled mode with CSMA/CA. CCA, clear channel assessment; ACK,
acknowledgement.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

In that case, the node starts transmission right after back- In an unslotted system, the transmission, or CCA if active,
off. A successful reception and validation of a data or will start immediately.
MAC command frame can be optionally confirmed with an The network can operate in either acknowledged (ACK)
acknowledgement. Acknowledgement and beacon frames or unacknowledged modes [18]. In ACK mode, a packet
are sent without using a random access mechanism. Non- transmitted after a successful channel access procedure can
beacon-enabled network uses an unslotted random channel either be received successfully or experience a collision. In
access mechanism where each time a device wishes to the NO_ACK mode regardless of whether the transmission
transmit data, it first waits for a random backoff period is successful or ends in collision, ACK will not be received
and then transmits its data frame. The same carrier sense by the sending node, and thus, the node immediately con-
principles are applied with CSMA/CA. tinues the CSMA/CA procedure on a new packet [13]. In
In Figure 3, we present the flow chart of CSMA/CA the ACK mode, a successful transmission is accompanied
mechanism with beacon-enabled mode. Before a new by the reception of an ACK, which has a fixed length of
packet transmission, the node maintains two variables [8]: backoff periods. The ACK is fed back to the sender node
NB and BE, which are initialised as 0 and macMinBE, after a minimum time, which allows the node to switch
respectively. NB is the number of times the backoff pro- from transmission mode to reception mode. The ACK is
cedure has been repeated while attempting the current expected by the sender node to be received before a fixed
transmission. BE is the backoff exponent, which is related maximum time of macAckWaitDuration. If the ACK is
to how many backoff periods a device shall wait before not correctly received after this time, then a collision is
attempting to access a channel. BE is initialised with a declared [15].
value of macMinBE. The node waits for a random number
of backoff periods specified by the backoff value. Then, it 3. PERFORMANCE ANALYSIS
performs the clear channel assessment (CCA) to sense the
3.1. Markov model
channel, and if it is idle, transmission stage starts. The basic
time unit adopted here is the backoff period, that is, a time
Markov models have been used in modelling medium
slot of length UnitBackoffPeriod. A time slot is defined as access in IEEE 802.15.4 [17, 19, 20]. In this paper, the
the minimum time needed to send the smallest data to a behaviour of the IEEE 802.15.7 node is modelled by a
device, and it is fixed. The number of slots in a VLC MAC two-dimensional discrete time Markov chain, which rep-
frame is communicated in the MAC header. Thus, a single resents different states of the node. The state of two-
device or user can have access to more than a single slot for dimensional Markov chain is described by two random
sustained data transfer in the frame, if there are slots avail- variables .s.t/, c.t// at a given time slot t, as shown
able. The frame type and the number of slots are indicated in Figure 3. s.t/ respectively represents the transmission
in the MAC header. stage, the ACK stage and the backoff CCA stage for s .t/ 2
If CCA is active, the node senses the channel for certain fM C 1, : : : , 2M C 1g, s .t/ 2 f2M C 2, : : : , 3M C 2g and
amount of symbols. If the channel is busy, BE and NB are s .t/ 2 f0, : : : , Mg. Depending on the value of s.t/, c.t/
both incremented by one where the maximum value for acquires different significance as follows (Table I).
BE is macMaxBE. Their number of backoff is limited to
macMaxRABackoff. If the value of NB is less than or equal  If s .t/ 2 f0, : : : , Mg, the node can be either in
to macMaxRABackoff, the access algorithm will perform a backoff state or in CCA mode. If the node is in back-
random backoff as shown in Figure 3. If the value of NB is off state, c.t/ can take any value in the range of
greater than macMaxRABackoff, the access algorithm will f0, : : : , Wi  1g, depending on the value of backoff
terminate with a channel access failure status. counter, which is selected randomly.
For slotted access, the MAC sublayer will first initialise  If the node is in CCA mode, the minimum of c .t/ is
NB and BE and then locate the boundary of the next backoff zero while its maximum value is Wi  1. Here, Wi D
period. This sublayer also delays for a random number of 2minfmacMinBECi,macMaxBEg is the size of the backoff
backoff periods in the range 0 to 2BE  1 and then requests window at backoff stage s .t/ D i 2 f0, : : : , Mg. In
that the PHY layer performs a transmission or optionally a this case, if 1 6 c .t/ 6 WM  1, it determines the
CCA. In a slotted random access method, the transmission, value of backoff counter, while c .t/ D 0 corresponds
or CCA if active, will start on a backoff period boundary. to the CCA state.

Table I. Markov chain states.

c(t)
L A : : :  1 0 1, : : : , LA LA C 1, : : : , Lp  1 Lp , : : : , WM  1

0, : : : , M – CCA Backoff
s(t) M C 1, : : : , 2M C 1 – Transmit –
2M C 2, : : : , 3M C 2 ACK not received c .t / ACK received – –
ACK, acknowledgement; CCA, clear channel assessment.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

Figure 4. Markov model for slotted CSMA/CA per single transmission attempt. CCA, clear channel assessment; ACK,
acknowledgement.

 If s .t/ 2 fM C 1, : : : , 2M C 1g, that is, the node is in RX mode, in order to receive ACK. If the ACK is received
transmission state, the value of s .t/  M  1 deter- during MacMaxAckWait (with probability Pco denoting the
mines the backoff stage of the node. In this case, c .t/ probability that the transmission of a given node ends up
determines the number of slots of the packet, which in a collision), the node sets NB and BE to their default
have been already transmitted. values and waits for a new packet arrival. If the ACK
 If s .t/ 2 f2M C 2, : : : , 3M C 2g, that is, the node is is not received during MacMaxAckWait (with probability
in ACK state, the value of s .t/  2M  2 determines 1  Pco ), the nodes assumes packet collision and goes to
the backoff stage of the node. In this case, c .t/ D 0 the next backoff stage. If the backoff stage exceeds NB, the
determines transceiver switch state (i.e. switching the node discards the packet. It should be noted that the value
transceiver of the node from TX mode to RX mode). of ˛ is the same for different backoff state levels. In real-
If 1 6 c .t/ 6 LA , the node is receiving the ACK, ity, it depends on the backoff stage where N nodes perform
and c .t/ determines the number of slots of the ACK, the sensing.
which have been already received. The ACK duration
is assumed to be LA .
3.2. Calculation of state probabilities
 If LA 6 c .t/ 6 1, the node is not receiving the
ACK, and c .t/ determines the number of slots, which Let bi,k D limt!1 P fs .t/ D i, ‹c .t/ D kg denote the
the node has already waited for the ACK. probability of being in state fs.t/ D i, c.t/ D kg. In a net-
work consisting of N nodes, the probability that a given
When a new packet arrives, the node goes to the first node spends a randomly picked slot performing CCA is
backoff stage, denoted by s .t/ D
 0. The node
 can pick any defined as
value randomly in the range of 0, 2BE  1 D .0, Wi  1/ XM
as illustrated in Markov model (Figure 4). If the channel 'D bi,0 (1)
is idle, and the CCA state is successful, the node enters iD0
the transmission state. Because the probability of back- The probability that the transmission of a given node ends
off counter taking any value within 0, 2BE  1 is equally up in a collision is given by
likely, the new packet enters each of these states with
probability 1=W0 where W0 D 2BE . When the counter Pco D 1  .1  '/N1 (2)
reaches zero (i.e. c .t/ D 0), the node senses the chan- The probability of channel access failure at each backoff
nel. If it is sensed idle (with probability 1  ˛ because stage is
the probability of sensing the channel busy is denoted by
y D .1  ˛/Pco C ˛ (3)
˛), the node starts transmission; otherwise, it goes to the
next backoff stage (i.e. s .t/ D 1). After packet transmis- In the following, we write all state probabilities in terms of
sion, the node switches its transceiver from TX mode to the probability of being in the first backoff stage (i.e. b0,0 ).

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

Specifically, the probability of being in each of the CCA which can be written in terms of b0,0 as
states (i.e. bi,0 / is related to b0,0 as
bi,0 D .˛ C .1  ˛/Pco /i b0,0 16i6M (4) bk,j D .1  ˛/.Pco /.˛ C .1  ˛/Pco /k2M2 b0,0
(10)
On the other hand, the probability of being in each trans- 2M C 2 6 k 6 3M C 1, LA 6 j 6 1
mission state that is related to the probability of being in
the CCA state of the same backoff stage (i.e. bkM1,0 ) is So far, we have related all state probabilities to the state
given by probability of b0,0 . Total probability of the Markov model
bk,j D .1  ˛/bkM1,0 states must be equal to 1; therefore, we have
(5)
M C 1 6 k 6 2M C 1, 0 6 j 6 Lp  1 X WX
3MC2 i 1 M W
X Xi 1

bi,k D bi,k
which can be further related to b0,0 as
iD0 kDLA iD0 kD0
(11)
bk,j D .1  ˛/.˛ C .1  ˛/Pco /kM1 b0,0 p 1
X LX
2MC1 3MC2
X LA
X
(6) C bk,j C bk,j D 1
M C 1 6 k 6 2M C 1, 0 6 j 6 Lp 1
kDMC1 jD0 2MC2 jDLA
The probability of being in ACK state is related to
the probability of being in transceive switch state (i.e. This expression consists of three parts. The first term on the
bkM1,0 ) as right side is relevant to backoff and CCA states of the node.
The second and third terms correspond to transmission and
bk,j D .1  Pco /bkM1,0 ACK states, respectively. Replacing (3), (5), (7) and (9) in
(7)
2M C 1 6 k 6 3M C 1, 1 6 j 6 LA (11), we have

p 1
X WX
3MC2 i 1 M W
X Xi 1
.Wi  k/yi X LX
2MC1 3MC2
X X LA
bi,k D b0,0 C .1  ˛/ykM1 b0,0 C .1  ˛/ .1  Pco /yk2M2 b0,0
Wi
iD0 kDLA iD0 kD0 kDMC1 jD0 2MC2 jD1
3MC2
X 1
X 3MC2
X
C .1  ˛/ Pco yk2M2 b0,0 C yk2M2 .1  ˛/tAck
2MC2 jDLA 2MC2
M
X  
Wi C 1  
D b0,0 yi  C .1  ˛/ yi  Lp C LA .1  Pco / C tAck C LA Pco
2
iD0 (12)
Setting (12) equal to 1 yields

1
b0,0 D    h
1.2y/MC1 1yMC1 1
 i (13)
2aMinBE1  12y C 1y  2 C .1  ˛/ Lp C LA .1  Pco / C tAck C LA Pco

which can be further related to b0,0 as Replacing (1) in (13), we obtain


M
X M
X 1  yMC1
'D bi,0 D yi b0,0 D b0,0
1y
iD0 iD0
(14)
1  yMC1
D    h
1.2y/MC1 1yMC1  i
.1  y/ 2aMinBE1  12y C 1y  12 C .1  ˛/ Lp C LA .1  Pco / C tack C LA Pco

bk,j D .1  ˛/.1  Pco /.˛ C .1  ˛/Pco /k2M2 b0,0 In order to derive network state, another equation is
2M C 1 6 k 6 3M C 1, 1 6 j 6 LA needed, which is acquired by considering the interactions
(8) between N nodes. Henceforth, we use the notation (Table
The probability of being in no-ACK state is related to the II), introduced in [18], to refer the events that take place.
probability of being in transceive switch state as By taking into account the interactions among N nodes, ˛
can be expressed as the probability of at least one transmis-
bk,j D Pco bkM1,0
(9) sion, when without loss of ˇgenerality, N th node performs
2M C 2 6 k 6 3M C 2, LA 6 j 6 1 CCA, that is, ˛ D Pr.Tx>1 ˇCfNg /

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

Table II. Notation of events.

Notation Event description

C  fN g The event that at least node with index N is transmitting


C  fi g The event that at least node with index i (the index of the node) is in CCA mode
Tx > i This notation illustrates the event that at least i nodes are transmitting
Tx  fi g The event that at least node with index i (the index of the node) is transmitting
Txi This exactly i nodes are transmitting, and N  i are not transmitting

This expression can be written as the union of the The third term in (17) corresponds to the probabil-
transmission probability of other nodes as ity of union of other nodes being in transmission state,
while node k where k D 1 is transmitting and node


  N2
X N1 p where p D N is in CCA state. If there are two or
˛ D Pr Tx>1 jCfNg D
nC1 more transmissions in a particular slot, the transmissions

nD0
(15)
must start at the same slot, because devices that trans-
nC1
 Pr [ Txfkg jCfNg mit later would detect earlier transmissions and would
kD1
not start transmitting. Starting transmission at the same
which can be further rewritten as time slot moreover requires being in the CCA state
at the same time. Thus, the conditional probability is
X

N2
N1

  equivalent to
˛D Pr Txf1g
nC1
nD0 (16) !

nC1
[
nC1
 Pr [ Txfkg jTxf1g , CfNg Pr Txfkg jTxf1g , CfNg
kD1 kD1
! (20)
nC1
[
By using the total probability theorem, we can write the
D Pr Cfkg jCf1g , CfNg
second term in (16) as
kD1
   
Pr Txf1g D Pr Txf1g jTx1  Pr .Tx1 /
  (17) The probability that n nodes simultaneously perform
C Pr Txf1g jTx>2 .Pr .Tx>2 / CCA where n D Œ1, : : : , N  2 and node k where
k D 1 and node p where p D N are in CCA state
which can be written in terms of the collision probability is the probability that N  2 nodes are in one of the
Pco as CCA states and remaining N  2  n nodes are not in
2 CCA state:
p 1
  X LX
2MC1
Pr Txf1g D .1Pco / 4 Pr .s D i, c D jjTx1 / nC1
!
[
iDMC1 jD0 Pr Cfkg jCf1g , CfNg
3 (21)
3MC2
X LA
X kD1
C Pr .s D i, c D jjTx1 /5 D ' .1  '/N2n
n
iD2MC2 jD0
2 3
p 1
X LX
2MC1
C Pco  4 Pr.s D i, c D jjTx>2 /5 Replacing (18) and (21) in (17), we have
iDMC1 jD0
(18)

N2
X

N1
˛D ' nC1 .1  '/N2n .1  ˛/ Lp C .1  Pco /  .LA C tAck /
nC1
nD0 (22)
h i
D .1  ˛/ Lp C .1  Pco /  .LA C tAck / 1  .1  '/N1

which yields
Using (4)–(10), we can rewrite (18) as
" # 1
N1
˛
  ' D 1 1 
Pr Txf1g D .1  ˛/ '. Lp C .1  Pco /  .LA C tAck / .1  ˛/ Lp C .1  Pco /  .LA C tAck /
(19) (23)

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

3
(22) and (23) are solved numerically to derive network 3MC2
X LA
X
state and determine ˛ and ' values. Using these values of C Pr .s D i, c D jjTx1 /5
˛ and ', network metrics can be evaluated as explained in iD2MC2 jD0
next section. 2 3
p 1
X LX
2MC1
C Pco  4 Pr .s D i, c D jjTx>2 /5
4. PERFORMANCE METRICS
iDMC1 jD0

D .1 Pco /  Lp . .1˛/ ' C .LA CtAck /  .1  ˛/'

4.1. Throughput C Pco  Lp  .1  ˛/ '

D .1  ˛/ '  Lp C .1  Pco /  .LA C tAck /
The per node throughput S0 is defined as the fraction of
(26)
time that a node spends in successful transmission. On
the other hand, the network throughput S is defined as The network transmission probability is the probability
the fraction of time that the network spends in success- that one or more nodes are transmitting in the network.
ful transmission, that is, the fraction of time in which This probability is equal to the probability of at least one
exactly one node is transmitting. A node would have a node is transmitting in the network. Therefore, we have
successful transmission in time t, if it is the only node per-
˚ 
forming CCA in some time slot in the range t0 2 Œt  Ptx0 D Pr Tx>f1g
.Lp C LA / C tAck , t  1, and finds the channel idle. The N1 nC1
!
X N  [
probability of a node being only one performing CCA is D  Pr Txfkg
nC1
'.1  '/N1 . Furthermore, the probability of sensing the nD0 kD1
channel idle is .1  ˛/. If both conditions are met, the node N1 nC1
!
X N  [
holds the channel for Lp C LA slots. Then, the per node D  Pr Txfkg
nC1
throughput is nD0 kD1
N1 nC1
!
  ˚   X N  [
S0 D Lp C LA  Pr t0  2 Lp C LA C tAck , D nC1  Pr.Txf1g /  Pr Txfkg
 nD0 kD1
t  1 : Cf1g \ CF1 (24)
  N1
X N 
D Lp C LA '.1  '/N1 .1  ˛/ D nC1  ' nC1 .1  '/N1n .1  ˛/
nD0

Because all of the network nodes are similar, the network Lp C .1  Pco /  .LA C tAck /
throughput is N times the throughput of each network
D ' .1 '/N1 .1˛/ Lp C.1  Pco /  .LA C tAck /
node, that is,
n
N1
X
N
 '
  nC1 
S D NS0 D N Lp C LA ' .1  '/N1 .1  ˛/ (25) 1'
nD0

D .1  ˛/ Lp C.1Pco /  .LA CtAck / 1 .1 '/N
(27)
4.2. Transmission probability

The per node transmission probability corresponds to 4.3. Collision probability


fraction of nodes that attempt transmission at a ran-
dom time. This probability can be inspected in two dif- The per node collision probability is considered as the
ferent cases. First, the successful transmission, which probability that at a given time in which a given node
results in ACK, and unsuccessful transmission, which is is transmitting, one or more other nodes are transmitting,
not followed by ACK. Because of symmetry, this prob- too. This is possible only if these nodes perform CCA
ability is the same for all network nodes. Using the simultaneously, that is,
Markov chain model, this probability can be calculated  ˇ   ˇ 
as follows: Pco D Pr Tx>2 ˇTxf1g D Pr C>2 ˇCf1g \ CF
(28)
˚  This probability can be considered as the complement of
Ptx0 D Pr Txf1g
˚  the case, where only one node is in CCA state and is
D Pr Txf1g jTx1 .Pr .Tx1 / given by
˚ 
C Pr Txf1g jTx>2  Pr.Tx>2 / ˚ 
2 Pr C>2 jCf1g \ CF D 1  .1  '/N1 (29)
p 1
X LX
2MC1
D .1  Pco /  4 Pr .s D i, c D jjTx1 /
The network collision probability is defined as the prob-
iDMC1 jD0
ability that in a given time that at least one node is

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

E .delay \ TX : suc/
D D E .DelayjTX : suc/ D
Pr .TX : suc/
M
1 X
D PrfDelayjTX : suc at stage igPrfsuc at stage ig
1  Pd
iD0
M
(" i ! i
(33)
1 X X Wk  1 X i  k ik
 
D C k ..1  ˛/ Pco / ˛ k Lp C tack C LA
1  Pd 2
iD0 kD0 kD0
# )
 
C Lp C tack C LA Œ.1  ˛/ .1  Pco / yi 

transmitting, one or more other nodes are also transmit- The probability of successful transmission .Pr.TX : suc//
ting. This probability can be considered as the complement is equal to the fraction of packets that are not discarded.
of the case in which only one node is transmitting, while Total probability is used to express TX : suc in terms of
we know that at least one node is transmitting. It is .TX : suc at stage i/ for i D 0 : M. In the last line of
defined as (33), the first term shows the average number of slots spent
Pr fTx1 \ Tx>1 g performing backoff in stage i for a packet that is success-
Pco D Pr fTx>2 jTx1 g D 1 (30) fully transmitted; the second term shows the average time
Pr.Tx>1 /
spent in unsuccessful attempts prior to i, and the third term
demonstrates required time for a successful packet trans-
N The
 probability of one node transmitting is equal to
times the probability of one specific node transmitting, mission. A packet has i possible transmission attempts;
1
which is determined by using the Markov model. In fact, therefore, it can be transmitted successfully after colliding
the probability of the node being in a transmission or ACK in up to i attempts.

states is Lp C tAck C LA '.1  ˛/, and the probability
of not transmitting by other nodes is .1  '/N1 . Hence, 4.6. Power consumption
we have
˚  Average power consumption for each node is the power
Pr fTx1 g NPr Txf1g spent to transmit packets successfully and unsuccessfully,
Pco D 1  D1
Pr.Tx>1 / Pr.Tx0 / which is given by
 
N LA C Lp C tAck '.1  '/N1 .1  ˛/
D 1
.1 ˛/ Lp C.1Pco / .LA CtAck / 1.1'/N P D E .P jTX : suc / Pr .TX : suc/
(34)
(31) C E .P jTX : discard / Pr .TX : discard/

4.4. Packet discard probability


The consumed power depends on whether a node is idle,
Packet discard probability is the fraction of generated pack- receiving or transmitting. The transceiver is idle when the
ets that are not transmitted successfully. A combination of node is in backoff state. It is in reception mode when
channel access failure and collision can cause a packet to the node is either performing CCA or waiting for or
be discarded. In the following equation, i determines the receiving an ACK, and it is in transmission mode only
number of channel access failures, and M C 1  i deter- when the node is transmitting a packet. The node uses
mines the number of collisions. Changing i from 0 to M C1 Pidle , Prx and Ptx , respectively, for idle, receiving and
takes into account the different combinations that lead to transmitting modes.
packet discard. Hence, packet discard probability can be The power consumption for successful transmis-
calculated as sion is the average number of slots spent in backoff
X   multiplied by average power consumed in idle mode,
MC1 MC1
Pd D iD0 i ˛ i .Pco .1  ˛//MC1i plus the average number of slots that the node
(32)
spends in CCA multiplied by average power con-
D .˛ C .1  ˛/Pco /MC1 D yMC1
sumed in reception mode, plus the average power
4.5. Delay consumed
 in previous  unsuccessful transmissions
Lp Ptx C tack Pidle C LA Prx plus the power required 
Delay for a successfully transmitted packet is considered for successful transmission Lp Ptx C tack Pidle C LA Prx .
as the total number of time slots required from the time In order to normalise the power, it is divided by
that packet reaches the head of the line until the ACK is the total time spent for successful transmission,
received successfully. which yields

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

(" # )
P
M P  P
i i  
P
i wk 2 i
kD0 2 Pidle C tcca Prx C k ..1  ˛/Pco /k ˛ ik k  U .1  ˛/ .1  Pco / yi (35)
iD0 kD0 kD0
PTX:suc D
PDelay C PTx:suc  yMC1

Similarly, the average power consumed for a discarded on the backoff stage. This difference is particularly notice-
packet is equal to the average number of slots spent able between the first backoff stage .i D 0/ and the rest
in M C 1 backoff stage multiplied by packet discard of the backoff stages. This can be explained by observing
probability and power consumed in this mode, plus the that a node in the first backoff stage on average draws a
average time spent in CCA multiplied by packet discard smaller backoff value than other nodes, which are compet-
probability and power consumed in this mode, plus the ing with it. Additionally, as explained in [20], although the
average unsuccessful transmissions in previous M stage probability of a node being in the first backoff stage is not
multiplied by packet discard probability and power con- small (a node goes through the first backoff stage once per
sumed in this mode, plus the average power spent in every attempt), the joint probability of two nodes being in
the stage M C 1 multiplied by collision probability and the first backoff stage is very small. This means that a node
the probability that the node reaches the stage M C 1. in the first backoff stage is given better opportunities than
Again, in order to normalise the power, it is divided nodes in any other stage. Thus, it is very likely for it to
by the total time spent for discard procedure. Therefore, find the channel idle. Figure 5 shows the simulation results
we have obtained for ˛ in different backoff stages. In order to derive
" #
P
M
wk 2 P
M
2 Pidle C .M C 1/Prx C .M k Mk k
k /..1  ˛/Pco / ˛  U/yMC1 C U .1  ˛/ Pco yM
kD0 kD0
PTX:discard D (36)
PDelay C PTx:discard  yMC1

Thus, the total power consumption iPtotal D PTX:discard the probability of sensing the channel busy via simulation,
CPTX:suc s. the number of times, which a node senses the channel busy,
is divided by total number of times, which the node senses
the channel.
4.7. Sensing probabilities for different
backoff stages
5. SIMULATION RESULTS AND
Let ˛i denote the probability of sensing the channel busy DISCUSSIONS
during the ith CCA stage. As earlier mentioned, in the
Markov chain model (Figure 4), it was assumed that ˛i D In this section, we present a simulation study using MAT-
˛ for all i 2 f0, : : : , Mg. This greatly simplifies the analy- LAB to assess the main network parameters (throughput,
sis. However, as shown in Figure 5, ˛ is in fact dependent delay, power consumption, collision probability and packet
discard probability) and confirm our analytical findings.
We consider beacon-enabled mode with CSMA/CA and
use the parameters presented in Table III, which are spec-
ified in the IEEE 802.15.7 standard [8]. In Figures 6–11,
we depict both derived expressions and simulation results.
In general, we observe that analytic results are in good

Table III. MAC sublayer parameter setting [8].

Constant Value

aBaseSlotDuration 60
aNumSuperframeSlots 16
aUnitBackoffPeriod 20
macBeaconOrder 15
MAC layer macMaxBE 5
macMinBE 3
macNumAcks 3
Beacon length 30 (0.5 slot)
macMaxCSMABackoffs 0–5
Figure 5. Probability of sensing clear channel assessment busy
Number of nodes 2–15
.˛/ for different backoff stages.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

agreement with simulation results. However, there is some bility increases, and throughput and per node transmission
noticeable difference particularly for small network sizes. probability drops, which is expected because the growth in
There are several reasons for this behaviour. First, through- network size impacts access to shared medium.
put is calculated over the length of simulation. For less We also evaluated power consumption and delay for
number of nodes, their backoff periods naturally have more varying network size. The average power consumption,
impact on the calculations because of the relatively low
number of nodes and limited simulation duration.
The number of nodes .N/ is one of the key parame-
ters of network scalability of the VLC system. In Figure 6,
we analyse the impact of N on the per node throughput,
which is the fraction of time that a node spends in suc-
cessful transmission. Here, N ranges from 2 to 15. As it
can be seen, networks with low number of nodes achieve
a high per node throughput. Beyond eight nodes, the per
node throughput drops below 50%. It is also observed that
there is relatively less match between analytical and sim-
ulation findings for network size below six nodes. There
are several reasons for this behaviour. First, throughput is
calculated over the length of simulation. For less number
of nodes, their backoff periods naturally have more impact
on the calculations because of the relatively low number
of nodes and limited simulation duration. In addition, we Figure 7. Per node transmission probability under varying net-
present the per node throughput where the averaged results work size.
involves more samples for the denser networks. Figure 7
presents the per node transmission probability, which is
the fraction of nodes that attempts transmission at a ran-
dom time. This includes both successful and unsuccessful
transmission attempts. In simulations, transmission prob-
ability increases as the number of nodes increase. This is
due to unsuccessful attempts in a congested network. Sim-
ilar to per node throughput, relatively low number of nodes
impacts the averaged results in simulations. A small devi-
ation is observed between analytic and simulation studies.
The average collision probability and packet drop are
shown in Figures 8 and 9, respectively. The increase in col-
lision probability as the number of nodes increases agrees
with our results on throughput and per node transmission
probability. Similarly, increasing number of nodes causes
discard probability to increase significantly. As a result,
we observe that as the collisions increase, discard proba- Figure 8. Collision probability under varying network size.

Figure 6. Per node throughput under varying network size. Figure 9. Packet drop probability under varying network size.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

that considers the slotted CSMA/CA mechanism with


beacon-enabled mode in saturation environment. The key
network parameters are throughput, transmission probabil-
ity, delay, packet drop and collision probability that show
the network performance. From the numerical results, it
indicates that the probability of sensing the channel free
can significantly vary from one backoff stage to another.
Likewise, it has been shown that the probability of sensing
the channel free is dependent of the number of nodes that
are sensing it. The implications of these assumptions have
been discussed, and their impact on the characterisation of
the various networking metrics has been assessed.

ACKNOWLEDGEMENTS
Figure 10. Power consumption (in unit transmission power) This work is carried out as an activity of ‘Centre of
under varying network size. Excellence in Optical Wireless Communication Technolo-
gies (OKATEM)’ funded by Istanbul Development Agency
(ISTKA) under Innovative Istanbul Financial Support Pro-
gram, 2015. The statements made herein are solely the
responsibility of the authors and do not reflect the views of
ISTKA and/or T.R. Ministry of Development.

REFERENCES
1. Kavehrad M. Sustainable energy-efficient wireless appli-
cations using light. IEEE Communications Magazine
December 2010; 48(12): 66–73.
2. Arnon S, Barry J, Karagiannidis GK, Schober R, Uysal
M. Visible-light Communications, in Advanced Optical
Wireless Communication, 1st ed. Cambridge University
Press: NY, USA, 2012, 353–368.
Figure 11. End-to-end delay (in time slot unit) under varying 3. Tsonev D, Chun H, Rajbhandari S, McKendry JJD,
network size. Videv S, Gu E, Haji M, Watson S, Kelly AE, Faulkner G,
Dawson MD, Haas H, Brien DO. A 3-Gb/s single-LED
shown in Figure 10, decreases with increasing network OFDM-based wireless VLC. IEEE Photonics Technol-
size. The reason for this behaviour is the average waiting ogy Letters 2014; 26(7): 637–640.
time increase when collisions occur, because as the offered 4. Cossu G, Khalid AM, Choudhury P, Corsini R, Cia-
traffic increases, nodes spend more time in backoff state ramella E. 3.4 Gbit/s visible optical wireless transmis-
rather than transmission state. Because transmission incurs sion based on RGB LED. Optics Express 2012; 26:
more energy consumption than the idle backoff stage, B501–B506.
nodes consume less power as the size of the network grows. 5. Uysal M, Nouri H. Optical wireless communications –
Finally, Figure 11 shows network delay that grows with
an emerging technology. In Invited Paper, 16th Inter-
increasing network size. The reason for such behaviour is
national Conference on Transparent Optical Networks
twofold. First, as the number of nodes increase, offered
load increases. Second, increasing number of collisions (ICTON), Graz, Austria, 2014; 1–7.
and increasing backoff durations incur additional delay. 6. Komine T, Nakagawa M. Fundamental analysis for
visible-light communication system using LED lights.
IEEE Transactions on Consumer Electronics 2004; 50:
6. CONCLUSIONS
100–107.
In this paper, we discussed the behaviour of performance 7. O’Brien D, Zeng L, Le-Minh H, Faulkner G, Bouchet
metrics of IEEE 802.15.7 beacon-enabled mode and slotted O, Randel S, Walewski J, Rabadan Borges JA, Langer
CSMA/CA mechanism. We used a generalised approach K-D, Grubor J, Lee K, Tae Won E. Visible light com-
that is based on the Markov chain model to analyse net- munication. In Short-Range Wireless Communications:
work performance and provide the mathematical model Emerging Technologies and Applications, Kraemer R,

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett
P. Shams, M. Erol-Kantarci and M. Uysal

Katz M (eds). Wiley Publishing: New Jersey, USA, In Fourth International Conference on Ubiquitous
2009; 329–342. and Future Networks (ICUFN), Seoul, Korea, 2012;
8. 802.15.7 IEEE standard for local and metropolitan area 136–702.
networks. Part 15.7: Short Range Wireless Optical Com- 15. Musa A, Baba MD, Mansor MA. Analysis of the
munication Using Visible Light, 2011. contention access period (CAP) model for the IEEE
9. Sarbazi E, Uysal M. PHY layer performance evaluation 802.15.7 visible light communication. International
of the IEEE 802.15.7 visible light communication stan- Journal of Computer and Communication Engineering
dard. In International Workshop on OWC– IWOW, New 2013; 2(5): 621–624.
Castle, UK, 2013. 16. Le NT, Choi S, Jang YM. Cooperative MAC protocol
10. Popoola WO, Poves E, Haas H. Error performance of for LED–ID systems. IEEE Transactions on Vehicular
generalised space shift keying for indoor visible light Technology 2010; 59(8): 3917–3932.
communications. IEEE Transactions on Communica- 17. Shams P, Narmanlioglu O, Uysal M, Erol-Kantarci M.
tions 2013; 61(5): 1968–1976. Markov-based performance analysis of medium access
11. Komine T, Lee JH, Haruyama S, Nakagawa M. Adaptive in visible light communications. In 17th International
equalization system for visible light wireless communi- Conference on Transparent Optical Networks (ICTON),
cation utilizing multiple white LED lighting equipment. Budapest, 2015; 1-4.
IEEE Transactions on Wireless Communications 2009; 18. Faridi A, Palattella M, Lozano A, Dohler M, Boggia G,
8(6): 2892–2900. Grieco L, Camarda P. Comprehensive evaluation of the
12. Fan J, Rong Z, Lajos H. Resource allocation under IEEE 802.15.4 MAC layer performance with retransmis-
delay-guarantee constraints for heterogeneous visible- sions. IEEE Transactions on Vehicular Technology 2010;
light and RF femtocell. IEEE Transactions on Wireless 59(8): 3917–3932.
Communications 2015; 14(2): 1020–1034. 19. Bianchi G. Performance analysis of the IEEE 802.11 dis-
13. Hwang J, Do T, Yoo M. Performance analysis on MAC tributed coordination function. IEEE Journal on Selected
protocol based on beacon enabled visible personal area Areas in Communications 2000; 18(3): 535–547.
networks. In Fifth International Conference on Pro- 20. Park P, Di Marco P, Fischione C, Johansson KH.
ceedings of Ubiquitous and Future Networks (ICUFN), Modeling and optimization of the IEEE 802.15.4 pro-
Danang, Vietnam, 2013; 384–388. tocol for reliable and timely communications. IEEE
14. Huynh VV, Jang YM. Multi-parameters Based Transactions Parallel Distributed Systems 2013; 24(3):
CSMA/CA for Priority in visible light communication. 550–564.

Trans. Emerging Tel. Tech. (2016) © 2016 John Wiley & Sons, Ltd.
DOI: 10.1002/ett

View publication stats

You might also like