Annals of Telecommunications

, Volume 71, Issue 9–10, pp 517–526 | Cite as

Implementation and performance evaluation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS

  • Hamadoun Tall
  • Gerard Chalhoub
  • Michel Misson


In the wireless sensor networks domain, one of the most used standards is IEEE 802.15.4. This standard has been made available on many low power operating systems such as TinyOS and Contiki OS. It is crucial for the implementation to be compliant with the specifications of the standard. In the case of Contiki OS, the provided version of the main medium access algorithm, unslotted Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA), presents many flaws. In this paper, we discuss the implementation of the provided CSMA/CA algorithm and we point out to the parts that do not respect the standard specifications. We also propose and implement a compliant version of this algorithm and show through simulation the correctness of the implementation.


IEEE 802.15.4 CSMA/CA Wireless Sensor Networks Performance evaluation Contiki Cooja 



This research was conducted with the support of the European Regional Development Fund (FEDER) program of 2014–2020, the region council of Auvergne, and the Digital Trust Chair of the University of Auvergne.


  1. 1.
    LAN/MAN Standard Committee (2006) Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer(PHY) specifications for low-rate wireless personal area networks. IEEE 802.15.4. StdGoogle Scholar
  2. 2.
    Aliance Z (2008) Zigbee specifications. Zigbee Standard Organisation, San RamonGoogle Scholar
  3. 3.
    Dunkels A, Grönvall B, Voigt T (2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks, pp 455–462Google Scholar
  4. 4.
    Farooq MO, Kunz T (2015) Contiki-based. IEEE 802.15. 4 Channel capacity estimation and suitability of its CSMA-CA MAC layer protocol for real-time multimedia applications. Mobile Information SystemsGoogle Scholar
  5. 5.
    Hamadoun T, Gerard C, Michel M (2015) Implementation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS. Int J Eng Res Technol 4(04):71–75CrossRefGoogle Scholar
  6. 6.
    Pellegrino L, Vieira T, Teixeira A, André P, Monteiro P (2007) Simulation of integrated optic devices based on BPM. Ann Telecommun 62(5–6):653–662Google Scholar
  7. 7.
    de Deus MA, Carvalho PH, Leite JP (2015) Internet capacity: optimizing autonomous system inbound traffic using specialist knowledge as support for decision-making. Ann Telecommun 70(7–8):331–343CrossRefGoogle Scholar
  8. 8.
    Debbat F, Bendimerad FT (2006) Simulated annealing method coupled with tabu search method for adaptive array antennas optimization problems. Ann Telecommun 61(11–12):1403–1421CrossRefGoogle Scholar
  9. 9.
    Kumar A, Namboothiri PG, Deshpande S, Vidhyadharan S, Sivalingam KM, Murty SAVS (2012) Testbed based throughput analysis in a Wireless Sensor Network. In: Communications national conference, pp 1–5Google Scholar
  10. 10.
    Edwards J, Demers F, St-Hilaire M, Kunz T (2011) Comparison of ns2. 34’s ZigBee/802.15. 4 implementation to Memsic’s IRIS Motes. In: 7th international wireless communications and mobile computing conference, pp 986–991Google Scholar
  11. 11.
    Dunkels A (2007) Rime—a lightweight layered communication stack for sensor networks. In: Proceedings of the European conference on wireless sensor networks (EWSN), Poster/Demo session, DelftGoogle Scholar
  12. 12.
    Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: 31st IEEE conference on local computer networks, proceedings, pp 641–648Google Scholar
  13. 13.
    Golomb SW (1971) Mathematical models: uses and limitations. IEEE Trans Reliab 20(3):130–131MathSciNetCrossRefGoogle Scholar
  14. 14.
    Jurcik P, Koubâa A, Alves M, Tovar E, Hanzalek Z (2007) A simulation model for the IEEE 802.15. 4 protocol: delay/throughput evaluation of the GTS mechanism. In: 15th international symposium on modeling, analysis, and simulation of computer and telecommunication systems. MASCOTS’07, pp 109–116Google Scholar
  15. 15.
    Fan S, Li J, Sun H, Wang R (2010) Throughput analysis of GTS allocation in beacon enabled IEEE 802.15. 4. In: 3rd IEEE international conference on computer science and information technology, vol 4, pp 561–565Google Scholar
  16. 16.
    Lee TJ, Lee HR, Chung MY (2006) MAC throughput limit analysis of slotted CSMA/CA in IEEE 802.15. 4 WPAN. IEEE Commun Lett 10(7):561–563CrossRefGoogle Scholar
  17. 17.
    Wen H, Lin C, Chen ZJ, Yin H, He T, Dutkiewicz E (2009) An improved Markov model for IEEE 802.15. 4 slotted CSMA/CA mechanism. J Comput Sci Technol 24(3):495–504CrossRefGoogle Scholar
  18. 18.
    Zheng J, Lee JM (2006) A comprehensive performance study of IEEE 802.15.4. Sensor Network Operations. IEEE Press, pp 218–237Google Scholar
  19. 19.
    Kim KS, Kazovsky LG (2003) Design and performance evaluation of scheduling algorithms for unslotted CSMA/CA with backoff MAC protocol in multiple-access WDM ring networks. Inf Sci 149(1):135–149CrossRefGoogle Scholar
  20. 20.
    Lee N, Levis P (2003) Tossim: a simulator for tinyos networks. UC Berkeley, Tech. Rep. 1.0Google Scholar
  21. 21.
    Levis P, Madden S, Polastre J, Szewczyk R, Whitehouse K, Woo A, Culler D (2005) TinyOS: an operating system for sensor networks. In: Ambient intelligence, pp 115–148Google Scholar
  22. 22.
    Hauer JH (2009) TKN15. 4: an IEEE 802.15. 4 MAC implementation for TinyOSGoogle Scholar
  23. 23.
    Flora J, Bonnet P (2006) Never mind the standard here is the TinyOS 802.15. 4 stack. Department of Computer Science, University of Copenhagen, Tech. Rep.Google Scholar
  24. 24.
    Despaux F, Song YQ, Lahmadi A (2013) On the gap between mathematical modelling and measurement analysis for performance evaluation of the 802.15.4 mac protocol. In: RTN-12th international workshop on real-time networksGoogle Scholar
  25. 25.
    Misic J, Misic V (2008) Wireless personal area networks: performance, interconnection, and security with IEEE 802.15. 4. WileyGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer-Verlag France 2016

Authors and Affiliations

  1. 1.Université d’AuvergneAubièreFrance

Personalised recommendations