4th International ICST Conference on Wireless Internet

Research Article

Risk-Aware Beacon Scheduling for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks

Download390 downloads
  • @INPROCEEDINGS{10.4108/ICST.WICON2008.4788,
        author={Li-Hsing Yen and Yee Wei Law and Marimuthu Palaniswami},
        title={Risk-Aware Beacon Scheduling for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks},
        proceedings={4th International ICST Conference on Wireless Internet},
        publisher={ICST},
        proceedings_a={WICON},
        year={2010},
        month={5},
        keywords={ZigBee/IEEE 802.15.4 beacon scheduling},
        doi={10.4108/ICST.WICON2008.4788}
    }
    
  • Li-Hsing Yen
    Yee Wei Law
    Marimuthu Palaniswami
    Year: 2010
    Risk-Aware Beacon Scheduling for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks
    WICON
    ICST
    DOI: 10.4108/ICST.WICON2008.4788
Li-Hsing Yen1,*, Yee Wei Law2,*, Marimuthu Palaniswami2,*
  • 1: Dept. Computer Science & Information Eng., National University of Kaohsiung, Kaohsiung, Taiwan 811, R.O.C.
  • 2: Dept. Electrical & Electronic Eng. The University of Melbourne Parkville, Victoria 3052, Australia
*Contact email: lhyen@nuk.edu.tw, ywlaw@ee.unimelb.edu.au, swami@ee.unimelb.edu.au

Abstract

In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet deliv- ery latency from the end devices to the ZigBee coordina- tor at the root of the tree. Traditionally, beacon sched- ules are chosen such that a ZR does not reuse the beacon slots already claimed by its neighbors, or the neighbors of its neighbors. We observe however that beacon slots can be reused judiciously, especially when the risk of beacon col- lision caused by such reuse is low. The advantage of such reuse is that packet delivery latency can be reduced. We formalize our observation by proposing a node pair classi¯- cation scheme, that classi¯es pairs of nodes that are at most two hops apart. Based on this scheme, we can easily assess the risk of slot reuse by a node pair. If the risk is high, slot reuse is disallowed; otherwise, slot reuse is allowed. This forms the essence of our ZigBee-compliant, distributed, risk- aware, probabilistic beacon scheduling algorithm. Simulation results con¯rm that our algorithm produces a lower latency compared to if a more conventional slot reuse rule is used.