SlideShare a Scribd company logo
05.12.12 Daniele Antonioli 606082 1
Wireless Sensor Networks
Lab Work #3
MAC Protocol
Point to point
Non Beacon Enable Network
05.12.12 Daniele Antonioli 606082 2
Outline
● Check the randomness of the access to the
channel by varying BEmin
● Evaluate the throughput by varying the Payload
of the packets transmitted
05.12.12 Daniele Antonioli 606082 3
Non Beacon Enable Network
05.12.12 Daniele Antonioli 606082 4
Non Beacon Enable Network
Unslotted CSMA/CA Protocol
05.12.12 Daniele Antonioli 606082 5
Theoretical Results
Bemin ; Average Delay
Payload ; #ReTx ; Plost
05.12.12 Daniele Antonioli 606082 6
Experiment
05.12.12 Daniele Antonioli 606082 7
How to transmit 50 consecutive
packets
case stateDataTx:
App_Tx();
if (count<50)
{count++;
gState = stateDataTx;
}
else
gState = stateListen;
// TS_SendEvent(gAppTaskID_c, gAppEvtDummyEvent_c);
break;
05.12.12 Daniele Antonioli 606082 8
How to change the Payload
static void App_Tx(void)
{
if( (mcPendingPackets < mDefaultValueOfMaxPendingDataPackets_c) && (mpPacket == NULL) )
...................................................
mpPacket->msgData.dataReq.pMsdu = "oooo";
mpPacket->msgType = gMcpsDataReq_c;
/* Create the header using coordinator information gained during
the scan procedure. Also use the short address we were assigned
by the coordinator during association. */
FLib_MemCpy(mpPacket->msgData.dataReq.dstAddr, mCoordInfo.coordAddress, 8);
FLib_MemCpy(mpPacket->msgData.dataReq.srcAddr, maMyAddress, 8);
FLib_MemCpy(mpPacket->msgData.dataReq.dstPanId, mCoordInfo.coordPanId, 2);
FLib_MemCpy(mpPacket->msgData.dataReq.srcPanId, mCoordInfo.coordPanId, 2);
mpPacket->msgData.dataReq.dstAddrMode = mCoordInfo.coordAddrMode;
mpPacket->msgData.dataReq.srcAddrMode = mAddrMode;
mpPacket->msgData.dataReq.msduLength = 4;
......................
}
}
05.12.12 Daniele Antonioli 606082 9
How to change MAC parameter
BEmin
case stateSetParam:
UartUtil_Print("Setto BEmin", gAllowToBlock_d);
uint8_t param1[1];
*param1=0;
App_SetMacPib_Example(gMPibMinBe_c,param1);
uint8_t param[1];
mlmeMessage_t mlmeGet;
mlmeGet.msgType=gMlmeGetReq_c;
mlmeGet.msgData.getReq.pibAttribute=gMPibMinBe_c;
mlmeGet.msgData.getReq.pibAttributeValue=param;
MSG_Send(NWK_MLME, &mlmeGet);
UartUtil_Print("Getto BEmin", gAllowToBlock_d);
UartUtil_PrintHex(param, 1, 0);
gState=stateDataTx;
TS_SendEvent(gAppTaskID_c,gAppEvtDummyEvent_c);
break;
05.12.12 Daniele Antonioli 606082 10
How to change MAC parameter
BEmin
uint8_t App_SetMacPib_Example(uint8_t attribute, uint8_t
*pValue)
{
mlmeMessage_t mlmeSet;
/* Create and execute the Set request */
mlmeSet.msgType = gMlmeSetReq_c;
mlmeSet.msgData.setReq.pibAttribute = attribute;
mlmeSet.msgData.setReq.pibAttributeValue = pValue;
return MSG_Send(NWK_MLME, &mlmeSet);
}
05.12.12 Daniele Antonioli 606082 11
How to verify BEmin's change
05.12.12 Daniele Antonioli 606082 12
How to verify BEmin's change
05.12.12 Daniele Antonioli 606082 13
Measured Results
● Delays Statistics
● Throughput Statistics
05.12.12 Daniele Antonioli 606082 14
Delays Statistics
05.12.12 Daniele Antonioli 606082 15
Delays Statistics
05.12.12 Daniele Antonioli 606082 16
Delays Comparison
● Bemin=0;
● Average
Delay=1263[μsec];
● Max
Variation=38[μsec].
● Bemin=3;
● Average Delay=
1372[μsec];
● Max
Variation=200[μsec].
Averages Difference = 109[μsec]
Min Sniffer Uncertainty = ±360[μsec]
05.12.12 Daniele Antonioli 606082 17
Throughput Statistics
Payload = 4B
Data = 16B
Payload = 17B
Data = 29B
Payload = 48B
Data = 64B
# ReTx = 0/50 # ReTx = 0/50 # ReTx = 27/50
# PkLoss = 0 # PkLoss = 0 # PkLoss = 3
Payload = 4B
Data = 16B
Payload = 17B
Data = 29B
Payload = 48B
Data = 64B
# ReTx = 0/50 # ReTx = 0/50 # ReTx = 27/50
# PkLoss = 0 # PkLoss = 0 # PkLoss = 2

More Related Content

Similar to Wireless Sensor Networks: MAC protocol of a point-to-point NBE network

Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OSBluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
Austin Blackstone
 
Interface gsm with 8051 microcontroller (at89 c51)
Interface gsm with 8051 microcontroller (at89 c51)Interface gsm with 8051 microcontroller (at89 c51)
Interface gsm with 8051 microcontroller (at89 c51)mdkousik
 
Check Point Cluster Setup R75
Check Point Cluster Setup R75Check Point Cluster Setup R75
Check Point Cluster Setup R75
Manuel Castro
 
Extractions and performance monitoring
Extractions and performance monitoringExtractions and performance monitoring
Extractions and performance monitoringJNTU University
 
Error ontologies and altarica transformation aadl meeting florida jan 24-27
Error ontologies and altarica transformation   aadl meeting florida jan 24-27Error ontologies and altarica transformation   aadl meeting florida jan 24-27
Error ontologies and altarica transformation aadl meeting florida jan 24-27Vangelis Vassiliadis
 
Aug Xml Net Forum Dynamics Integration
Aug Xml Net Forum Dynamics IntegrationAug Xml Net Forum Dynamics Integration
Aug Xml Net Forum Dynamics Integration
MariAnne Woehrle
 
20090315 Comet
20090315 Comet20090315 Comet
20090315 Comet
Eduardo Pelegri-Llopart
 
Didactum SNMP Manual
Didactum SNMP ManualDidactum SNMP Manual
Didactum SNMP Manual
Didactum
 
Recharge_report_Automation
Recharge_report_AutomationRecharge_report_Automation
Recharge_report_AutomationKIIT
 
GMock framework
GMock frameworkGMock framework
GMock framework
corehard_by
 
Advanced Postgres Monitoring
Advanced Postgres MonitoringAdvanced Postgres Monitoring
Advanced Postgres MonitoringDenish Patel
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
azhar557
 
Ping to Pong
Ping to PongPing to Pong
Ping to Pong
Matt Provost
 
Api Kết nối gửi và nhận SMS
Api Kết nối gửi và nhận SMSApi Kết nối gửi và nhận SMS
Api Kết nối gửi và nhận SMS
Tongdai360
 
Knock knock! Who's there? Doze. - Yonatan Levin
Knock knock! Who's there? Doze. - Yonatan Levin Knock knock! Who's there? Doze. - Yonatan Levin
Knock knock! Who's there? Doze. - Yonatan Levin
DroidConTLV
 
Demanding scripting
Demanding scriptingDemanding scripting
Demanding scripting
Pauli Wahlberg
 
How to resolve irat kpi issue in huawei
How to resolve irat kpi issue in huaweiHow to resolve irat kpi issue in huawei
How to resolve irat kpi issue in huawei
ehsan roustaei
 
Commisioning.pptx
Commisioning.pptxCommisioning.pptx
Commisioning.pptx
MdAlamgirHossain790134
 

Similar to Wireless Sensor Networks: MAC protocol of a point-to-point NBE network (20)

Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OSBluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
Bluetooth World 2018 - Intro to Bluetooth Low Energy with Mbed OS
 
Interface gsm with 8051 microcontroller (at89 c51)
Interface gsm with 8051 microcontroller (at89 c51)Interface gsm with 8051 microcontroller (at89 c51)
Interface gsm with 8051 microcontroller (at89 c51)
 
Check Point Cluster Setup R75
Check Point Cluster Setup R75Check Point Cluster Setup R75
Check Point Cluster Setup R75
 
Extractions and performance monitoring
Extractions and performance monitoringExtractions and performance monitoring
Extractions and performance monitoring
 
Error ontologies and altarica transformation aadl meeting florida jan 24-27
Error ontologies and altarica transformation   aadl meeting florida jan 24-27Error ontologies and altarica transformation   aadl meeting florida jan 24-27
Error ontologies and altarica transformation aadl meeting florida jan 24-27
 
Aug Xml Net Forum Dynamics Integration
Aug Xml Net Forum Dynamics IntegrationAug Xml Net Forum Dynamics Integration
Aug Xml Net Forum Dynamics Integration
 
20090315 Comet
20090315 Comet20090315 Comet
20090315 Comet
 
Didactum SNMP Manual
Didactum SNMP ManualDidactum SNMP Manual
Didactum SNMP Manual
 
Recharge_report_Automation
Recharge_report_AutomationRecharge_report_Automation
Recharge_report_Automation
 
GMock framework
GMock frameworkGMock framework
GMock framework
 
Intro
IntroIntro
Intro
 
Advanced Postgres Monitoring
Advanced Postgres MonitoringAdvanced Postgres Monitoring
Advanced Postgres Monitoring
 
merged
mergedmerged
merged
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Ping to Pong
Ping to PongPing to Pong
Ping to Pong
 
Api Kết nối gửi và nhận SMS
Api Kết nối gửi và nhận SMSApi Kết nối gửi và nhận SMS
Api Kết nối gửi và nhận SMS
 
Knock knock! Who's there? Doze. - Yonatan Levin
Knock knock! Who's there? Doze. - Yonatan Levin Knock knock! Who's there? Doze. - Yonatan Levin
Knock knock! Who's there? Doze. - Yonatan Levin
 
Demanding scripting
Demanding scriptingDemanding scripting
Demanding scripting
 
How to resolve irat kpi issue in huawei
How to resolve irat kpi issue in huaweiHow to resolve irat kpi issue in huawei
How to resolve irat kpi issue in huawei
 
Commisioning.pptx
Commisioning.pptxCommisioning.pptx
Commisioning.pptx
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Wireless Sensor Networks: MAC protocol of a point-to-point NBE network

  • 1. 05.12.12 Daniele Antonioli 606082 1 Wireless Sensor Networks Lab Work #3 MAC Protocol Point to point Non Beacon Enable Network
  • 2. 05.12.12 Daniele Antonioli 606082 2 Outline ● Check the randomness of the access to the channel by varying BEmin ● Evaluate the throughput by varying the Payload of the packets transmitted
  • 3. 05.12.12 Daniele Antonioli 606082 3 Non Beacon Enable Network
  • 4. 05.12.12 Daniele Antonioli 606082 4 Non Beacon Enable Network Unslotted CSMA/CA Protocol
  • 5. 05.12.12 Daniele Antonioli 606082 5 Theoretical Results Bemin ; Average Delay Payload ; #ReTx ; Plost
  • 6. 05.12.12 Daniele Antonioli 606082 6 Experiment
  • 7. 05.12.12 Daniele Antonioli 606082 7 How to transmit 50 consecutive packets case stateDataTx: App_Tx(); if (count<50) {count++; gState = stateDataTx; } else gState = stateListen; // TS_SendEvent(gAppTaskID_c, gAppEvtDummyEvent_c); break;
  • 8. 05.12.12 Daniele Antonioli 606082 8 How to change the Payload static void App_Tx(void) { if( (mcPendingPackets < mDefaultValueOfMaxPendingDataPackets_c) && (mpPacket == NULL) ) ................................................... mpPacket->msgData.dataReq.pMsdu = "oooo"; mpPacket->msgType = gMcpsDataReq_c; /* Create the header using coordinator information gained during the scan procedure. Also use the short address we were assigned by the coordinator during association. */ FLib_MemCpy(mpPacket->msgData.dataReq.dstAddr, mCoordInfo.coordAddress, 8); FLib_MemCpy(mpPacket->msgData.dataReq.srcAddr, maMyAddress, 8); FLib_MemCpy(mpPacket->msgData.dataReq.dstPanId, mCoordInfo.coordPanId, 2); FLib_MemCpy(mpPacket->msgData.dataReq.srcPanId, mCoordInfo.coordPanId, 2); mpPacket->msgData.dataReq.dstAddrMode = mCoordInfo.coordAddrMode; mpPacket->msgData.dataReq.srcAddrMode = mAddrMode; mpPacket->msgData.dataReq.msduLength = 4; ...................... } }
  • 9. 05.12.12 Daniele Antonioli 606082 9 How to change MAC parameter BEmin case stateSetParam: UartUtil_Print("Setto BEmin", gAllowToBlock_d); uint8_t param1[1]; *param1=0; App_SetMacPib_Example(gMPibMinBe_c,param1); uint8_t param[1]; mlmeMessage_t mlmeGet; mlmeGet.msgType=gMlmeGetReq_c; mlmeGet.msgData.getReq.pibAttribute=gMPibMinBe_c; mlmeGet.msgData.getReq.pibAttributeValue=param; MSG_Send(NWK_MLME, &mlmeGet); UartUtil_Print("Getto BEmin", gAllowToBlock_d); UartUtil_PrintHex(param, 1, 0); gState=stateDataTx; TS_SendEvent(gAppTaskID_c,gAppEvtDummyEvent_c); break;
  • 10. 05.12.12 Daniele Antonioli 606082 10 How to change MAC parameter BEmin uint8_t App_SetMacPib_Example(uint8_t attribute, uint8_t *pValue) { mlmeMessage_t mlmeSet; /* Create and execute the Set request */ mlmeSet.msgType = gMlmeSetReq_c; mlmeSet.msgData.setReq.pibAttribute = attribute; mlmeSet.msgData.setReq.pibAttributeValue = pValue; return MSG_Send(NWK_MLME, &mlmeSet); }
  • 11. 05.12.12 Daniele Antonioli 606082 11 How to verify BEmin's change
  • 12. 05.12.12 Daniele Antonioli 606082 12 How to verify BEmin's change
  • 13. 05.12.12 Daniele Antonioli 606082 13 Measured Results ● Delays Statistics ● Throughput Statistics
  • 14. 05.12.12 Daniele Antonioli 606082 14 Delays Statistics
  • 15. 05.12.12 Daniele Antonioli 606082 15 Delays Statistics
  • 16. 05.12.12 Daniele Antonioli 606082 16 Delays Comparison ● Bemin=0; ● Average Delay=1263[μsec]; ● Max Variation=38[μsec]. ● Bemin=3; ● Average Delay= 1372[μsec]; ● Max Variation=200[μsec]. Averages Difference = 109[μsec] Min Sniffer Uncertainty = ±360[μsec]
  • 17. 05.12.12 Daniele Antonioli 606082 17 Throughput Statistics Payload = 4B Data = 16B Payload = 17B Data = 29B Payload = 48B Data = 64B # ReTx = 0/50 # ReTx = 0/50 # ReTx = 27/50 # PkLoss = 0 # PkLoss = 0 # PkLoss = 3 Payload = 4B Data = 16B Payload = 17B Data = 29B Payload = 48B Data = 64B # ReTx = 0/50 # ReTx = 0/50 # ReTx = 27/50 # PkLoss = 0 # PkLoss = 0 # PkLoss = 2