• Tag-nodes which are fixed nodes used to point out
particular locations in the gallery and are able to
store information such as a list of mobiles that
have been in such areas.
• Mobile nodes are able to exchange information
with other fixed or mobile nodes. The chronol-
ogy of the contacts with tag-nodes can be used to
deduce the trail of the mobile nodes.
• Collector nodes are usually fixed nodes. When a
mobile node moves in its range, a collector can
download a copy of the gathered information.
This is a similar version of the data mule con-
cept (Bhadauria et al., 2011), where mobile nodes are
mules, tag-nodes are mirrors and the collector node is
a sink or a base station. Our objective is not to provide
a fine-grained localization system but to determine if
an entity is still in range or has been near a given lo-
cation (typically the coverage of a small-sized cell of
a particular tag-node).
2.2 Contact Definition
The three types of nodes broadcast periodically their
identity in order to signal their presence (Baouche
et al., 2009) (Baouche et al., 2011). This allows nodes
to detect that they are close to each other when they
are in range. We say that they are in contact. When
a node detects the fact that there is another node in
range, a data structure, called contact event, contain-
ing the addresses of the two nodes involved in the
contact, a sequence number and the interval during
which both partners are in range. During this interval
of time, nodes can exchange their knowledge (a set of
contact events) to contribute to the passing around of
the information needed by the application.
2.3 Risk of False Contact Estimation
We focus now on the number of false contacts due
to the overload of a cell. Let p be the probability of
missing one frame and N
t
be the number of frames
lost consecutively. If, for example, N
t
equals 3 (three
consecutive frames lost), the probability of false cre-
ation of contact event is p
3
(
1−p
n+1
1−p
) (to take into ac-
count the losses of 4, 5, 6,...,n consecutive frames).
This will be approximated by p
3
in the following.
Let us set the periodicity of beacon diffusion to
100 ms and let us suppose that it takes 100 s for a
mobile to cross the coverage of the cell of a tag-node.
During this time, 1000 frames must be received.
Let us assume now that we tolerate at most one
false contact creation per node while it crosses the
coverage of a cell. This can be approximated by
1000∗ p
3
≤ 1, that is to say p ≤ 10%.
This formula is used in order to define the num-
ber of mobiles that can move simultaneously within a
cell while keeping the false contact risk under a given
threshold.
3 EVALUATION
3.1 Evaluation and Simulation Process
In this section, we study the behavior of CSMA/CA
802.15.4 in a cell progressively loaded by broadcast
traffic with a data rate of 250 Kbps. All the re-
sults given here have been obtained using NS-2 (Is-
sariyakul and Hossain, 2008) simulator. Our ap-
proach is to consider the cell coverage of a given
node: a tag-node for example. From 1 to N
m
(N
m
=
100) mobile nodes are introduced within the cell cov-
erage with a signalling frequency of
1
T
, T ∈ [0, 1]
(T = 100 ms for the results given here). The offered
load in the coverage zone is
N
T
frames and each mo-
bile starts its activity in a time interval of [0, T].
The evaluation of the throughput is based on the
computation of the average traffic received by each
mobile node. This throughput is compared to the of-
fered load within the cell, that is to say: (N
m
+ 1) ∗ 10
frames/s, where N
m
is the number of mobiles.
These simulations have been carried out for dif-
ferent frame sizes: short (4 bytes) corresponding to a
beacon, medium (60 bytes) and long (116 bytes) cor-
responding to beacons used to carry contact events.
We used p = 10% to identify the capacity of a cell.
Our objectiveis to have real contact events rather than
false contact events created by link failures due to the
cell overload.
3.2 Throughput
The study of the throughput was carried out for the
different lengths of frames. The results of the study
are given on Fig. 1 and Fig. 2. Each figure is com-
posed of three curves:
• The average traffic received by a node as a func-
tion of the submitted load to the MAC layer (de-
noted by to the mac). We can observe that the sat-
uration of the medium (145 kbps, 28 mobiles) on
Fig. 1 (long frames) is reached for an offered load
greater than the maximum capacity of the medium
(G = 1 for 250 kbps). This is due to the role of
the MAC layer: a certain number of frames are
dropped at the MAC layer after successive unsuc-
SENSORNETS 2012 - International Conference on Sensor Networks
120