第 112 回 碩士學位論文 指導敎授 趙 成 來 무선 인체통신 네트워크를 위한 복합 우선순위 MAC 기법 Hybrid Priority Medium Access Control for Wireless Body Area Networks 中央大學校 大學院 컴퓨터공학 컴퓨터네트위크 專攻 董 冬 2010 年 2 月 무선 인체통신 네트워크를 위한 복합 우선순위 MAC 기법 Hybrid Priority Medium Access Control for Wireless Body Area Networks 이 論文을 碩士學位論文으로 提出함 2010 年 2 月 中央大學校 大學院 컴퓨터공학 컴퓨터네트위크 專攻 董 冬 董 冬의 碩士學位論文으로 認定함 審査委員長 ㊞ 審査委員 ㊞ 審査委員 ㊞ 中央大學校 大學院 2010 年 2 月 ACKNOWLEDGEMENT The work contained in this thesis would not have been possible without the support, encouragement and assistance of many people. I would firstly like to thank my principal supervisor, Prof. Sungrae Cho, for his commitment and support throughout the course of my research. His professional advice, assistance and guidance have been greatly appreciated. Prof. Cho has greatly contributed to my research and to the preparation of this thesis. Now, I would like to acknowledge and thank my parents and family. Their words of encouragements support and prayers have helped, especially through the number of more difficult and stressful moments of my research. I thank them for their understanding, love, patience and support. Without them my journey would have been formidable. A special acknowledgement goes to my mother, father and my girl friend Fan Wen Juan whose have inspired and motivated my work through endless words of encouragement and love. I also thank the many past and present seniors and juniors in my department, Mr. and Mr. , who gave me so many helps when I first came in Seoul and also take me as a younger brother. DONG DONG 2009 1 TABLE OF CONTENTS ABSTRACT ................................................................................................................. 7 1. INTRODUCTION .................................................................................................... 8 1.1. Motivation and Overview ........................................................................... 8 1.2. IEEE802.15.6 Standardized Trends .......................................................... 11 1.3. Thesis Organization .................................................................................. 14 2. RELATED WORKS ................................................................................................. 15 2.1. MAC Problem in Emergency Packet Transmission ............................... 15 2.1.1 Hidden node problem .............................................................................. 16 2.1.2 Retransmission problem and transmission confirms problem ...................... 17 2.2. Priority Medium Access Control Method Comparative Analysis ............ 18 2.2.1 Priority-pulses scheme for priority-ensured MAC........................................ 18 2.2.2 Preemption-EDCA priority MAC scheme ................................................... 21 2.3. Comparison of Similar Priority MAC Scheme ........................................ 23 2.4. Proformance metrics for hybrid priority MAC in WBAN ....................... 24 3. BASIC IDEA .......................................................................................................... 25 3.1. The Fixed Time Slot Beacon Priority Medium Access for WBAN ......... 25 3.2. How to Make the Priority Transmission? ................................................. 26 3.3. Priority Fixed Time Slot Beacon MAC Protocol ..................................... 28 2 3.3.1 Network topology ..................................................................................... 28 3.3.2 Architecture .............................................................................................. 36 3.3.3 Data transfer to a coordinator ..................................................................... 29 3.3.4 Data transfer from a coordinator ................................................................. 30 3.3.5 Error recovery ........................................................................................... 31 3.3.6 Urgent transmission................................................................................... 33 3.3.7 Protocol flow chart .................................................................................... 34 4. PERFORMANCE EVALUATION AND SIMULATION RESULTS..................................... 35 4.1. Performance Evaluation ........................................................................... 43 4.1.1 Over view of NS-2 .................................................................................... 43 4.1.2 Simulation environment and parameter ....................................................... 44 4.2. Simulation Results .................................................................................... 47 5. CONCLUSION AND FUTURE WORKS ..................................................................... 54 REFERENCES ............................................................................................................ 55 3 LIST OF TABLES Table 1. Characteristics of WBAN ......................................................................... 12 Table 2. Comparison of similar priority MAC protocols ....................................... 23 Table 3. Hardware environment ............................................................................. 45 Table 4. MAC Layer Parameters ............................................................................ 45 Table 5. Priority Data Parameters ........................................................................... 46 4 LIST OF FIGURES Fig. 1 Wireless Body Area Networks structure ……………………...8 Fig. 2 Some relize application in WBAN ……………………………9 Fig. 3 Candidate frequency bands for WBAN ………………………13 Fig. 4 Timeline of standardization activities of IEEE802.15.6.……..13 Fig. 5 A hidden node scenario ………………………………………..16 Fig. 6 Emergency packets and their accompanying priopulses………19 Fig. 7 Structure of a priopulse ……...………………………………...20 Fig. 8 CP-EDCA Timing Design ………...…………………………..22 Fig. 9 CP-EDCA ……………………………………………………25 Fig. 10 Priority transmission ………………………………………...26 Fig. 11 Beacon structure ……………….………….…………………..27 Fig. 12 Beacon size…………………..………….……………………..28 Fig. 13 BAN star topology ……….…......…………....……………...29 Fig. 14 Device architecture ..........……………………………………32 Fig. 15 Data transmission from device to coordinator..………….…..30 Fig. 16 Data transmission from coordinator to device …………….31 Fig. 17 Same urgent data retransmission can lead to collision ……32 Fig. 18 Other urgent data must wait random backoff time……...……..32 Fig. 19 Urgent data transmission …............................................39 5 Fig. 20 Device transmission flow chart ……………………….……34 Fig. 21 ………………………………..………….40 Fig. 22 Emergency data transmission …..……………………………40 Fig. 23 (a) Poll procedure for coordinator (b) Polling transmission flow chart ………………………………..……………………...42 Fig. 24 Priority data dropping probability by number of data nodes ….47 Fig. 25 Average throughput by packets size …………………...…..48 Fig. 26 Priority data dropping probability by Packets by packet size …49 Fig. 27 Average throughput by number of data nodes …………...……50 Fig. 28 Average Delay by packets size …………………..……………51 Fig. 29 Collision probability by number of senders …………………..52 6 Hybrid Priority Medium Access Control for Wireless Body Area Networks Computer Science and Engineering Graduate School, Chung-Ang University Seoul, S.Korea Supervised by Professor Sungrae Cho Abstract The last few 10 years a wireless body area network (WBAN) can provide a wide range of applications (e.p. non-medical service / Patient's urgent state monitoring system..). Because of the restriction by some hardware’s conditions. So we need to design the high-efficient MAC layer to improve the transmission efficiency of wireless body area networks. On the other hand, when the emergency situation appearing, a priority MAC mechanism can send the urgent information to terminal service at first and also can make sure that urgent information arrived. This thesis presents the Hybrid Priority MAC Mechanism for wireless body area networks using on-body device. Thus, when patients have an emergency situation allows adequate assistance time and medical treatment time for patients. The simulation based on NS-2, in the performance evaluation, our Hybrid Priority MAC has the good performance and usability. Therefore, my research in this area has high practical significance. 7 1. Introduction 1.1. Motivation and Overview The WBAN (Wireless Body Area Network) technology is still in its primitive stage and is being widely researched. This technology once accepted and adopted is expected to be a breakthrough invention in healthcare leading to concepts like telemedicine and mHealth becoming real [1]. Follows as the figure 1 we can see some application of WBAN. Fig 1. Wireless Body Area Networks structure. In the WBAN, each kind of application aspect, regarding patient's guardianship, disease's prevention and the treatment is most essential. The modern science's and technology's development causes the WBAN’s application becomes diversifies. The Smart wireless electrocardiography (ECG) patch, Body area network for wireless sleep staging, Body area network for monitoring autonomic nervous system responses and 8 Autonomous wireless EEG monitor has already obtained the practical application.[2] Fig 2. Some realize application in WBAN. WBAN is provides short range, low power and highly reliable wireless communication for use in close proximity to or inside body. Typical communication range is around 2 meters and which can be extended to 5 meters optionally. Various applications can be supported by WBAN. IEEE 802.15.6 is the task group for BAN. The performance of a Wireless Body Area Network (WBAN) to integration is required by miniaturized, real-time transmitted, intelligent, in-body and on-body sensor nodes to monitor body condition and the emergence of the urgent information. 9 In-body sensor can ocular get much information, because of the limitations of cost, it is unfavorable to popularize [3]. Therefore, some emergency information’s transmission has become the very essential question in WBAN. Because the In-body device has the cost, difficulty level, signal weak and so on insufficient characteristic. So the on-body monitoring device has many advantages (Easy to install, Real-time monitoring, low cost, etc..) to popularize.[4] Also In-body sensor node and on-body sensor node is used different channel to communicate with terminal server. In this paper, we proposed a new priority mac mechanism when used on-body as it only using one channel. How can priority send the urgent information first is an important issue. We synchronization monitoring a wide range of information using one On-body sensor node , When the patients has the emergency situation (Normally the sensor node must be required within 1 second corresponding priority and will priority send an emergency message, so patients can get adequate treatment time) using the priority MAC can send the emergency signal immediately and the emergency signal will be confirzd`1med again to received or not, If there is no emergency signal was received, sensor node will send an emergency signal again until they were confirmed. Thus, when patients have an emergency situation allows adequate assistance time and medical treatment time for patients. Therefore, research in this area has high practical significance. 10 1.2. IEEE802.15.6 Standardized Trends The standardization task group for wireless body area networks, IEEE802.15.6, has started its activity since December 2007. Although main focus of IEEE802.15.6 is laid on medical healthcare applications, some members are looking at nonmedical applications such as consumer electronics (CE) including entertainments. On one hand, there is a possibility that both medical and non-medical applications are able to be supported by a same PHY. On the other hand, requirements on MAC, security, and QoS for medical and non-medical applications would be different [5]. After intensive discussion on project authorized request (PAR) and five criteria (5C) in several consecutive meetings, the former study group summarized its uniqueness as shown in Table 1. Another hand, the selection of frequency bands for wireless BAN is another important issue. There are existing frequency regulations for medical applications. One of the regulations is wireless medical telemetry (WMT). The definition of the WMT regulated by Federal Communications Commission (FCC) is as follows.“ The measured physiological parameters and other patient related information are transmitted via RF communication between a patient-worn transmitter and a remote monitoring unit.” 11 Table 1 Characteristics of WBAN The Other 802 WBAN Standards MAC Layer Single Scalable MAC 15.3 and 15.4 MACs protocols with Reliable Delivery Power Extremely Low to Low Consumption protect Human Power Conventional Conventional or with Body Energy Source Power Source Scavenge Operation Frequency Medical Authorities approved ISM or UWB band Communication Bands Communication Air, Vicinity of Human Body, Air Medium and inside Human Body FCC defines three frequency bands for WMT as shown in figure 3. They are (1) 608-614 MHz, (2) 1395–1400 MHz, and (3) 1427-1432 MHz. However, ITU recommends different usage on these frequency bands. Therefore, other countries have different regulations from FCC. In Fig. 3, WMT bands in Japan are also shown. [6] A common problem for WMT and MIC is that bandwidth of a single channel is usually narrow in current regulations. That limits high data rate applications.[7] Until now, IEEE802.15.6 standardization task group is also carrying on a series of standardized work (e.g. PHY, MAC, QOS, Secure, and Device.Etc). Fig.4 shows the time line for BAN group in the near future. 12 Fig 3. Candidate frequency bands for WBAN. Fig 4. Timeline of standardization activities of IEEE802.15.6. Therefore, my research content has the very strong practical significance, Started from last year, I followed closely of the standardization work and Starts my research subject. I have referred to standardize the discussion document so the document has the very big promoter action regarding my aspect's research. 13 1.3. Thesis Organization This thesis consists of five sections. In section 1 presents the wireless body area networks standardized development and the application in various fields especially guard the application in medical treatment. We also introduced the composition of wireless body area networks. Section 2 presents the related work. We compared to several kinds of different priority medium access control mechanism. Under the different environments to them, we research them how to realize the priority transmission and their advantage and weakness. In wireless body area network, because of possessing special properties. We propose the requirements of some designs under the environments of WBAN and Performance Metrics for Hybrid Priority MAC in WABN. Section 3 provides the basic idea of this protocol, including 3 main parts. First we proposed some cores of this thesis’s design. At the section 2 detailed expositions how did we realized the priority transmission mechanism. Finally, we close combination the IEEE 802.15.6 standardized process and put forward the concrete MAC design plan. We consider the completion of priority MAC from many views about WBAN network topology, Architecture, Error recovery and so on. So prove the practicability of our design form these respects. The performance evaluation and simulation results are discussed in Section 4. We also introduce our simulation scenario and parameters in detail. Finally, the conclusion and future works of this thesis are given in Section 5. 14 2. Related Works In this section, we first explained some medium Access problem that often appearing in WBAN. These problems are all very important respect to design a priority MAC. And then we compared to several kinds of different priority medium access control mechanism about Priority-pulses MAC scheme, Preemption-EDCA priority medium access control scheme, IEEE 802.11e, Traffic based MAC scheme and Narrow-band MAC scheme. Under the different environments to them, we research them how to realize the priority transmission and their advantage and weakness. Finally we proposed Performance Metrics for Hybrid Priority MAC in WABN. 2.1. Medium Access Control Problem in Emergency Packet Transmission 2.1.1. Hidden node problem Just like the Wireless body area networks and other wireless networks has the same characteristic. The hidden node problem in WBAN is still one very important, and needs to solve question. Because if we must make the urgent signal fast transmission, hidden node problem is the question which must solve. The notorious hidden node problem deals with a configuration of three nodes, like A, B, and C in Figure 5, whereby B is within the transmission range of A and C, while C is outside the range of A. In a situation like this, C will not be able to detect the ongoing transmission of A to B by carrier 15 sensing and, consequently, it can inadvertently interfere with B’s reception of A’s packet. The transmission range of a node A is defined as the area inside which other nodes are able to correctly receive A’s packets. On the other hand, the carrier sense range of A is the area encompassing those nodes whose transmission A can perceive (carrier sense) while not necessarily being able to receive the transmitted packets. Fig 5. A hidden node scenario. Generally, it is unreasonable to assume that the two areas are always the same, e.g., the carrier sense range can be twice the transmission range [8]. Suppose that every node in Figure 5 has the same transmission range (represented by a solid circle). Node C is out of the transmission range of node A and thus would appear as a hidden node to A. However, if the carrier sense range of C is larger than the transmission range of A (see the dashed circle), C is hidden no more because it can sense the transmission 16 of A and thus avoid interfering with it. This mechanism for eliminating the hidden node problem has been described in [8]. Carrier detection is usually controlled by thresholds applied to the level of (actually or apparently) perceived signal. Low thresholds tend to be sensitive to many factors involving more than the distance between the nodes, e.g., the natural noise level in the neighborhood. While formally, increasing the carrier sense range is possible, low thresholds may trigger many false indications, which will result in unnecessary back-offs and reduced throughput, possibly below one that could be achieved by simply ignoring the hidden node problem altogether. To alleviate the hidden node problem, Karn [9] proposed a two-way handshake involving short packets whose exchange should precede the actual transmission. The sender starts by transmitting a Request-To-Send (RTS) packet. After receiving RTS, the intended recipient sends a Clear-To-Send (CTS) packet to the sender. Both packets specify the length of time needed to transmit the actual data packet. Any third party node receiving any of the two packets will know for how long it should refrain from transmission as to avoid interfering with the exchange in progress. This protocol has been standardized into the popular IEEE 802.11 family of access schemes. The complete exchange involves four packets: RTS/CTS/DATA/ACK, with the first pair taking care of the hidden nodes, and the final ACK providing for reliable delivery (triggering retransmissions on failures). 17 2.1.2. Retransmission Problem and Transmission Confirms Problem Retransmission has been adopted as one of the important scheme for improving transmission reliability in wireless body area networks. When the emergency situation appearing, in emergency information transmission processing, if appearing the delay or packet lost, we must be let the information retransmit by the priority MAC protocol. Then determined whether transmits successfully is a very essential aspect. So if we must solve retransmission problem that to first consider whether can determine transmits successfully or transmission confirms. Therefore these two problems are close related. 2.2. Priority Medium Access Control Method Comparative Analysis 2.2.1. Priority-pulses MAC scheme for priority-ensured medium access The basic approach of the proposed MAC scheme is to use “pulses” in a single control channel to achieve multiple goals. This scheme has proposed by “Jun Peng” .The “pulses” in this scheme are basically single-tone waves with pauses of random lengths. These New MAC protocols focus on providing statistical priority for unicast flows instead of strict priority for individual packets. With its novel pulse-based control mechanism, This MAC scheme realizes strict packet-level priority scheduling for emergency packets in a fully distributed way [10]. I will carry on the introduction to this mechanism. 18 Follows as figure 6 to introduce how to realize the priority transmission. Node A is the emergency message source, node B is a neighbor of node A, and node C is a hidden terminal to node A. The signals in the control and data channels are shown. When a node is using the data channel for disseminating emergency packets, it continuously transmits priopulses in the control channel, the node stops its priopulses only after its transmission of emergency packets is finished or other emergency message sources interrupt it. Priopulses not only ensure that an emergency packet receives the actual priority that it deserves for its level of emergency but also suppress the hidden terminals Fig 6. Emergency packets and their accompanying priopulses. when the emergency message is in transmission. Each priopulse consists of an active part of fixed length and a pause part of random length, as shown in Fig. 7. In the active part, single-frequency waves are transmitted in the control channel, while there is no wave transmitted in the pause part. The random pause part is further divided into two parts, i.e., a contention window of fixed size and a residual pause of random length. Moreover, the contention window is cut into equal-size subwindows. 19 Node A is the emergency message source, node B is a neighbor of node A, and node C is a hidden terminal to node A. When the emergency message must be transmit by node A, but node B is using the channel, so node A must be wait the one backoff time until the one priopulse is finished the active part. So node A can use the channel to transmit emergency message. Takes in the channel period, node C always idle the channel. Before but when node A prepares uses the channel, he essential waited for sub-windows backoff time to determine whether have a higher priority node. The Residual Random pause to solve the problem that is two same priority nodes which one is use the channel first. This new MAC mechanism's can succeed solution migration node priority problem, hidden node problem and can enhance the network transmission speed, reduces the network delay because of the priority competition. But this mechanism has the big network expenses and fit on the mobile nodes, therefore this new mechanism does not adapt in wireless body area networks. Because in WBAN basically is the relatively stationary position nodes. Fig 7. Structure of a priopulse. 20 2.2.2. Preemption-EDCA priority medium access control scheme Manikanden Balakrishnan [11] has proposed the priority MAC scheme that used channel service preemptions during random medium access. In the context of time-critical sensor applications, emergency traffic will have the privileges to interrupt the services of other routine traffic in the network to guarantee the lowest possible channel access latencies. This scheme design within the QoS framework of the popular 802.11e EDCA standard and demonstrate the importance of service preemptions for emergency reporting. The proposed Channel Preemptive-EDCA guarantees the lowest delay bounds and immunity to the presence of other lower priority traffic, for emergency frames, even under high network loads. The cost, however, is increased delays for routine traffic, which is acceptable during emergency sensor reporting. Fig 8. CP-EDCA Timing Design. Figure 8 depicts the timing relations, which are crucial for this preemption design. The basic concept behind this formulation is similar to the IFS design of 802.11 schemes, which uses the wait times to allow for 21 precedence in acquiring a free channel. For example, in 802.11e EDCA an on-going frame bursting sequence (Data-Ack-Data) is separated by SIFS, which implies that it takes the highest precedence irrespective of the frame priority [11]. Fig 9. CP-EDCA Follows as figure 9 detailed explanation CP-EDCA design mentality, guaranteeing medium access for emergency priority through TXOP preemptions. Emergency frame sequence is separated by the shortest wait time, new emergency frames start channel acquisition or contention if they sense the channel free for an EPAIFS period, which is smaller than NPSIFS. The data-ack sequence is never interrupted and can be achieved by setting the Network Allocation Vector to the end of ack transmission. 22 Although this service preemptions priority medium access scheme has solution the priority transmission problem. But there has the obvious shortcoming. First in wireless body area networks for longer time work the preemptions scheme will takes much memory and energy. Such words, the nodes operating time cannot achieve the long times working request. Second, this scheme can not to solve the hidden node problem in wireless body area networks. Preemptions by hidden nodes will be getting bad result for emergency information transmission owing to collisions. Third, because of channel errors on QoS guarantees, since frame errors and re-transmissions will be have a delay performance by this preemptions scheme. 2.3. Comparison of Similar Priority MAC Schemes Table 2 Comparison of Similar Priority MAC Protocols Priority Service Traffic-based Narrow-band Pulses MAC Preemption IEEE MAC(IEEE MAC (IEEE MAC(MILCOM 802.11e 802.15.6 (IEEE 802.15.6 VTS 07) 08) Presentation) Presentation) high high normal normal normal high low normal high high Acknowledgment yes yes yes yes yes Delay high normal normal normal low MAC Protocols Operations Energy Consumption Memory Consumption 23 Though to analysis, the above several kinds of priority MAC mechanism our hybrid priority MAC is quite simple structure and the energy consumption is low. Also can solution the urgent delay problem, acknowledgment problem and memory consumption problem. Although they other priority MAC will be possibly more perfect in the performance but our MAC even more being suitable in wireless body area networks. Below I will talk bout the performance metrics in our design. 2.4. Performance Metrics for Hybrid Priority MAC in WABN We defined performance metrics for hybrid priority MAC in WBAN as follows: The simplicity is an important part in my MAC design, because of the wireless body area networks emphasis is the simple usability and can provide the long time stable use. The simple reliable design can let the wireless nodes achieve the maximum efficiency. Low latency for urgent data also is aspect which must consider for WBAN priority MAC design. Recharging sensor node batteries can be inconvenient or impossible that is why wireless body area networks should function for as long as possible. Therefore protocols must be designed to be low energy efficient. [13] My protocol’s most important part is the guarantee urgent data priority transmission and confirms the urgent data transmission. Because of we must guarantee the patient can obtain the rescue in the shortest time, if the protocol lost or delay emergency information that means we can not use this protocol in wireless Body area networks. High reliability also will consider in our priority MAC protocol. 24 3. Basic Idea 3.1. The Fixed Time Beacon cycle Priority Medium Access for Wireless Body Area Network. My thesis proposed the priority medium access is based on the fixed time slot beacon cycle and the different priority level uses the different back-off time slot. In our beacon based access, Device sends the data to coordinator uses CSMA/CA. But the coordinator sends the data to device uses TDMA to provide the low energy consumption. Takes this kind of hybrid priority way, there are two reasons that we using the fixed time slot beacon cycle. First of all, because the emergency situation will not appear at any time. If the time slot of cycle is too long, then when taking place in emergency, it can't fast transmit the emergency information. This has caused priority transmission will be failed. Secondly, the energy consumption is a respect having to be considered in wireless body area networks. In order to make the wireless nodes work long times, we using the rational time slot beacon cycle to prevent the surplus energy consumption. These two above-mentioned points made me using the fixed time slot beacon cycle. Therefore I define the first question, now I will prove how to make the priority transmission. 3.2. How to Make the Priority Transmission? In this thesis the point is how to transmit emergency information fast that is to say how to realize the priority transmission. p 25 Fig 10. Priority transmission. Follows as the figure10 during the each time of the beacon cycle, we use interval of different backoff time slot to be sent the high priority data first. While the high priority data are sent, the general data must avoid making a backoff. This time slot is NIFS. It’s over to only reach the high priority data has transmission after receiving to ACK and confirm it and then the low priority data begin to send. The figure10 has recommended solving the priority transmission from microcosmic. Through the figure 11 I will introduce the polling data transmission course from macroscopic. Before each beacon cycle time plans to begin, the coordinator will be using the fixed cycle time slot to control the nodes which is urgent node and which is low priority node. The data produced by these different priority nodes will use different intervals within one cycle plans. After one beacon cycle plan finished, the coordinator will wait the fixed time slot and begin next beacon. Then follows as the figure 11 shows the each beacon structure. Each beacon includes the next beacon time Transmission time (Coordinator->Device) and Receive time (Empty Slot for each device 26 to access the slot in CSMA/CA). Transmission Time and Receive Time are exploited to save energy. Let the device Sleep and Transmission. Fig.11. Beacon structure How bout beacon cycle time slot? In our designs, the beacon cycle time slots are appears by the fixed form on a period of time. When two beacon time intervals are excessively long, there cannot guarantee that the urgent data transmits fast. When two beacon time slot intervals are excessively short, there will present the data collision. How can coordinate the size of beacon time slot is a key question. To investigate the maximum throughput (S) and the mean beacon period, we assume there is only one data frame in each queue all the time (saturation condition). The mean beacon period is defined as the mean time between two consecutive new beacon turns of a station. Where n is the number of stations in the list. The wireless link channels between the coordinator and devices are assumed to be Omni and independent of each other. Follows as the figure 13 shows the each beacon size and if traffic is too much, short Beacon cycle is not enough to cover traffic. So, Beacon cycle is adaptively adjusted depending on current traffic. 27 Fig.12. Beacon size 3.3. Fixed Beacon cycle Priority MAC Protocol. 3.3.1. Network topology To meet the application requirements, an IEEE 802.15 TG6 - Body Area Network (BAN) may operate in star topologies or extended star topologies. My priority MAC design is based on the star topology; however the proposed solution has a scope to expand it to extended star topology in future [1]. In a star topology, as shown in Figure 13, the communication session is established between an end device and a BAN Coordinator. For on-body communication, both coordinator and device can initiate or terminate the communication, additionally coordinator can route data from one device to another device. For implant communication, device can not initiate communication except in occurrence of an emergency event at device. In BAN, primarily, a device generates traffic related to one application. Coordinator may or may not generate traffic related to an application. 28 Fig 13. Ban star topology. 3.3.2. Architecture. Figure 16 illustrates the Architecture for WBAN device. An IEEE 802.15 TG6 device may contain PHY1 or PHY2 or both PHY1 and PHY2, which contains transceiver for signal transmission and reception. The PHY1 transceiver operates in a frequency band suitable for impl ant communication and PHY2 transceiver operates in a frequency band suitable for on-body communication. An IEEE 802.15 TG6 device also contains a MAC and LLC layer to access a channel of a selected frequency band for all kind of data transfer. [14] In our design we just only consider the situation of on-body communication and use the PHY-2. 29 Fig 14. Device architecture. 3.3.3. Data transfer to a coordinator. In our beacon based access, Device sends the data to coordinator uses CSMA/CA. In each beacon, provides the contention way to guarantee the urgent data to transmission first. Fig 15. Data transmission from device to coordinator. 3.3.4. Data transfer from a coordinator. In our beacon based access, Coordinator sends the data to device uses TDMA to provide the low energy consumption. 30 Fig 16. Data transmission from coordinator to device. 3.3.5. Error recovery. In order to provide reliable packet transmission the standard supports beacon based error recovery (coordinator driven) applicable only to upstream traffic with beacon based channel access. the beacon based error recovery is provided to for highly power constraint devices and does not allow retransmission of packet without any response received from the coordinator otherwise it can lead to the collision of same priority packet with one beacon cycle. The situation is shown in Figure 19. The beacon based error recovery is making us design a respect considered. In our mechanism if node has same urgent data that coordinator must receive. Then the node must wait for random backoff time slot that can be transmission. The situation is shown in Figure 20. 31 Fig 17. Same urgent data retransmission can lead to collision. Fig 18. Other urgent data transmission must wait random backoff time. 32 3.3.6. Urgent transmission. Emergency packet transmission is one of the most crucial requirements in any telemedicine systems. However, urgent messages have highly erratic nature; it has to be sent as soon as possible. The urgent data should not be delayed or denied due to dynamic availability of network resources. My thesis’s purport is to solve the urgent data priority transmit problem. We mention in section two of this chapter detailed how to solve this problem. So we just will show the main part of the fixed beacon cycle time slot priority MAC protocol. Fig 19. Urgent data transmission. Follows as figure 22 when the urgent data appearing, during the each time of the beacon, we use interval of different backoff time slot to be sent the 33 high priority data first. While the high priority data are sent, the general data must avoid making a backoff. This time slot is NIFS. It’s over to only reach the high priority data has transmission after receiving to ACK and confirm it and then the low priority data begin to send. Then the high priority node will be idle until the g node have already completed the RTS, CTS, DATA and ACK. At this time the next beacon time slot will be start. 3.3.7. Protocol flow chart. Now I will show slow chat of our fixed time slot priority poll mechanism. Follows as the figure 23 will prove how MAC worked from start to finishes. Fig 20. Device transmission flow chart. 34 4. Performance Evaluation and Simulation Results 4.1. Performance Evaluation In this section, for evaluating the benefits of our Hybrid Priority MAC, we compare the simulation results with traditional IEEE-802.15.4 and IEEE802.11e. We first implement the proposed IEEE 802.11e TKN MAC in NS2-2.28 version [18], And then, we have modify the IEEE-802.15.4 MAC protocol (this simulator made by SAMSUNG and CUNY [19]) to compare these protocols in different aspects. We in view of the priority transmission’s problem altogether have made five parts of Performance evaluation. These includes: Urgent/Normal data access delay, Average throughput, Average delay, Collision probability and Energy consumption. The simulations are done by assuming a star topology with the master node as the coordinator. Because the physical-layer of the BAN is still open to be designed, in our simulations the physical layer parameters are defined according to the IEEE 802.15.4 standard. 4.1.1. Overview of NS-2 NS-2 is a Net work Simulator, built with C++ and TCL, some standard algorithms are already implemented in this simulator. As every simulator, the main purpose is to simulate different networks, to test different protocols, and to find the limitations of each. It has been developed in the 35 California University, by LBL, Xerox PARC, UCB, and USC/ISI through the VINT project supported by DARPA. The NS-2 makes use of flat earth model in which it assumes that the environment is flat without any elevations or depressions. However the real world does have geographical features like valleys and mountains. NS2 fails to capture this model in it. Many researchers have proposed the additions of new models to NS2. Shadowing Model in NS2 attempts to capture the shadow effect of signals in real life, but does that inaccurately. NS2's shadowing model does not consider correlations: a real shadowing effect has strong correlations between two locations that are close to each other. Shadow fading should be modeled as a two dimensional log-normal random process with exponentially decaying spatial correlations. [15] 4.1.2. Simulation Environment and Parameter The simulation experiment environment is divided into hardware environment and software environment. Hardware environment is follows as the table 3. The IEEE 802.11e TKN model and CUNY 802.15.4 model were used in our simulation. We have used two kinds of modes to differentiate the accuracy of the simulation. We also having used the transmit nodes quantity and the size of data packets to comprehensive appraisal. In the nodes arrangement respect, we have used the mode by fixed position, because in common wireless body area networks the nodes distance is very near and the position is fixed. We have used the wireless channel. The Radio propagation model is Two-Ray ground model. Also the Antenna type is Omni-Antenna. We 36 have set up a wired node in centre. Because of the WBAN can not be more nodes [16], while using the nodes quantity model we just set the value is #3---#10. While using the size of data packets model we set the value is 10(Bytes), 20(Bytes), 40(Bytes), 60(Bytes), 80(Bytes), 100(Bytes) … 800(Bytes). Table 3 Hardware Environment CPU Inter Core 2 Duo 2.8 GHz RAM 4G OS Cygwin (Linux) NS-2 Version 2.28 802.11e TKN Module Module 802.15.4 CUNY LR-802.15.4 Module In MAC layer the parameters is follows as table 4. Table 4 MAC Layer Parameters Parameters Traffic Type Packet Size Data Interval Topology Routing Type Antenna BO value Value CBR 15 Bytes 0.001ms Star Topology AODV Omni 2 37 SO value Ifs Sifs Uifs Nifs Cwmin 2 16us 8us 6us 72us 16 Cwmax 1024 Urgent CW 7-15 Normal CW 31-1024 The urgent data and normal data parameters follows as in the priority model that we set up: Table 5 Priority Data Parameters Urgent data Normal data Prio 0 Prio 1 Prio 0 AIFS 2 Prio 1 AIFS 2 Prio 0 CW_MIN 7 Prio 1 CW_MIN 31 Prio 0 CW_MAX 15 Prio 1 CW_MAX 1024 According to different CW size, the data with high priority will get the least back-off time. 38 4.2. Simulation Results We have used the range of 10m*10m. Follows as the figure 24 shows the nodes and coordinator produced under NS-2. Fig 24. Coordinator and nodes in WBAN. For typical number of nodes used in WBAN [20]. In order to provide the urgent data priority transmission. We had performance evaluation for urgent data average access delay as show in figure7. We trough the number of data nodes to consider the urgent data average access delay between HP-MAC, IEEE-802.15.4, and IEEE-802.11e. The number of nodes from 2 to 18. Our HP-MAC can provide there are very low delay rates for urgent data. Through the increasing number of nodes, HP-MAC has smaller delay increase rate. It means HP-MAC can priority transmit the urgent data. 39 Urgent data average access delay (ms) 6 HP-MAC IEEE 802.15.4 HP-MAC (max value) IEEE 802.15.4 (max value) 5 4 3 2 1 0 2 4 6 8 10 12 Number of data nodes 14 16 18 8 Urgent data average access delay (ms) 7 6 5 4 3 2 HP-MAC IEEE 802.11e HP-MAC (max value) IEEE 802.11e (max value) 1 0 2 4 6 8 10 12 Number of data nodes 14 16 18 Fig 25. Urgent data access delay by number of data nodes. Because the normal data must wait long back-off time. Even though HP-MAC has higher delay when normal data transmission. HP-MAC can provide urgent data priority transmission. Until to analysis max delay for HP-MAC, HP-MAC has low difference for max delay that means 40 HP-MAC has low delay jitter. This situation appears in figure 8. In the standardized regulation of the IEEE-802.15.6, the delay of the normal data (e.p. ECG, Hearing. etc...) can't exceed 250ms. Through the increasing number of nodes, HP-MAC has lower increase rate too. This situation to prove our design is suitable for WBAN. 60 HP-MAC IEEE 802.15.4 HP-MAC (max value) IEEE 802.15.4 (max value) Normal data average access delay (ms) 50 40 30 20 10 0 2 4 6 8 10 12 Number of data nodes 14 16 18 2 Normal data average access delay (ms) 10 1 10 HP-MAC IEEE 802.11e HP-MAC (max value) IEEE 802.11e (max value) 0 10 2 4 6 8 10 12 Number of data nodes 14 16 18 Fig 26. Normal data access delay by number of data nodes 41 On one hand, follow as the figure 9 we trough the number of data nodes to consider the average delay between HP-MAC, IEEE-802.15.4 and IEEE-802.11e In order to appraise the performance of HP-MAC, We need to consider the whole performance. The number of nodes from 2 to 18. According to the simulation result, our HP-MAC and IEEE-802.15.4 are overall performance difference is small, because of this respect, though HP-MAC are big on the average delay, but HP-MAC can totally guarantee to urgent data transmit very fast. 30 HP-MAC IEEE 802.15.4 Average delay (ms) 25 20 15 10 5 0 2 4 6 8 10 12 Number of data nodes 14 16 18 14 16 18 50 HP-MAC IEEE 802.11e Aaverage delay (ms) 40 30 20 10 0 2 4 6 8 10 12 Number of data nodes 42 Fig 27. Average delay by number of data nodes On the other hand, follow as the figure 10 we trough the number of data nodes to consider the average throughput between HP-MAC and IEEE-802.15.4. The number of nodes from 2 to 18. When data nodes number is 4, our HP-MAC average throughput is 115kbps and the IEEE-802.15.4 MAC average throughput is 129 kbps. Until the nodes number rises to 18, IEEE-802.15.4 is still has higher throughput than HPMAC. Because in preceding simulation, though the influence of average delay, HP-MAC does not have preponderate, because in order to ensure the urgent data fast transmission, we can only sacrifice the whole performance for HP-MAC. 140 HP-MAC IEEE 802.15.4 130 Throughput (Kbps) 120 110 100 90 80 70 60 2 4 6 8 10 12 Number of nodes 14 16 18 Fig 28. Throughput by number of nodes 43 This part of simulation is about the urgent data and normal data’s collision probability analysis. The number of sender nodes from 5 to 30 and takes 5 nodes to increase. Follows as the figure 11 when the sender nodes number is 5, the collision probability of urgent frame using HP-MAC is %0.14, the collision probability of normal frame using HP-MAC is %0.51, and the collision probability of urgent frame using IEEE-802.15.4 is %0.21, and collision probability of urgent frame using IEEE-802.11e is %0.49. This indicated that our HP-MAC has the small collision probability to lead in priority transmission aspect. And along with number of nodes increasing, our HP-MAC collision probability scopeis smaller than 802.15.4 and 802.11e. This proves, HP-MAC has very strong reliability for urgent data transmission. The advantage of our scheme lies in ensuring the sending urgent quickly and safety. 1 Urgent Frame HP-MAC Urgent Frame IEEE 802.15.4 Urgent Frame IEEE 802.11e Normal Frame HP-MAC Normal Frame IEEE 802.15.4 Normal Frame IEEE 802.11e 0.9 Collision Probability 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 5 10 15 20 The number of the senders 25 Fig 29. Collision by number of senders 44 30 Energy efficiency is a very important measurement in wireless sensor networks [11]. For BAN, this is even critical, because the implanted medical sensor nodes might not be rechargeable. Hence, the energy efficiency enhancement becomes the key design target of the MAC protocol for BAN. In simulation, for typical number of nodes used in WBAN, with a high packet arrival rate, 10 packets per second, the number of nodes from 6 to 18 and takes 2 nodes to increase. Our HP-MAC can provide there are low energy consumption rates for data transmission about 0.392Uj per kilo bits. But the IEEE-802.15.4 increase tate is higher than HP-MAC. Through the increasing number of nodes, the IEEE-802.11e has highest energy increase rate. Because all nodes of IEEE-802.11e are real-time working, So 802.11e has very high energy consumption, this point is not suitable for WBAN. Consider from energy consumption, HP-MAC is very suitable for WBAN than IEEE-802.15.4 and IEEE-802.11e. 1.7 Average power consumption per kilo bits (μJ) 1.6 HP-MAC IEEE 802.15.4 IEEE 802.11e 1.5 1.4 1.3 1.2 1.1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 6 8 10 12 14 Number of nodes 16 18 Fig 30. Power consumption by number of nodes 45 Through to analysis of integral simulation experiment, when data quantity and nodes number relatively increase, our HP-MAC have certain shortcoming. Because our aim at the design a priority MAC for wireless body area networks, so in being suitable in the WBAN our priority mechanism obtained the good effect. Through the four parts, Priority data dropping probability, Average throughput, Average delay and Collision probability, the simulation experimental result proves our MAC mechanism to be able the faster transmission urgent information, and has certain usability in WBAN. 46 5. Conclusion and Future Works In this thesis we present the Hybrid Priority MAC mechanism for wireless body area networks using on-body device. Thus, when patients have an emergency situation allows adequate assistance time and medical treatment time for patients. The results from the simulation our Hybrid Priority MAC mechanism can effectively solve such as sent the urgent signal immediately and reduce the transmission delay. Through the hybrid form can effective suppression collision in wireless body area network. Through to analysis of integral simulation, when data quantity and nodes number relatively increase, our HP-MAC have certain shortcoming. (E.g. Delay Jitter, high-capacity data throughput weak …). But our priority MAC mechanism to be able the faster transmission urgent information, and has certain usability in WBAN. In future work the priority MAC for WBAN is still a hot topic and constantly have new device also use a different transmission mechanism. In WBAN most applications due to medical care, so it is necessary to use a MAC that has reliable to quickly send the urgent message. As a result of this research continued to deepen, it will have more extensive application of WBAN 47 6. References [1] IEEE 802.15.6 TG6 Work Group. [2] IMEC research center. [3] IEEE 802.15 WPAN WG homepage, http://www.ieee.org/15. [4] BAN project Authorization Request (PAR) draft, IEEE P802.15-07-05750-06. [5] BAN application matrix, IEEE 802.15-07-0735-00-0ban. [6] Huan-Bang Li; Takizawa, K.; Kohno, R.; “Trends and standardization of body area network (BAN) for medical healthcare” In Proc. EuWiT 2008. European Conference on 27-28 Oct. 2008. [7] A. W. Astrin, H.-B. Li, and R. Kohno, “SG BAN project draft 5C,” IEEE 802 15-06-0488/r7, July, 2007. [8] K. Xu, M. Gerla, and S. Bae. “How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks? ” In Proc.IEEE GlOBECOM, volume 1, pages 17–21, November 2002. 48 [9] P. Karn. “MACA–a new channel access method for packet radio”. In Proc. Computer Networking Conference on ARRL/CRRL Amateur Radio, pages 134–140, September 1990. [10] Jun Peng, Liang Cheng; “A Distributed MAC Scheme for Emergency Message Dissemination in Vehicular Ad Hoc Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007. [11] Balakrishnan, M.; Benhaddou, D.; Xiaojing Yuan; Gurkan, D.; “Service preemptions for guaranteed emergency medium access in Wireless Sensor Networks ” In Proc. IEEE Military Communications Conference, 2008. [12] Qaimkhani, I.A.; Hossain, E.; “Efficient silence suppression and call admission control through contention-free medium access for VoIP in WiFi networks” Communications Magazine, IEEE Volume 46, Issue 1, January 2008. [13] Hoefel, R.P.F.; “Dynamic time slot scheduling schemes for uplink polling MAC TDD DS-CDMA protocol with adaptive antennas” IEEE Electronics Letters Volume 38, Issue 19, 12 Sep 2002. [14] IEEE Standards Department, “Wireless LAN medium access control (MAC) and physical layer (PHY) specifications,” IEEE standard 802.11_1997, 1997. 49 [15] Network Simulation 2 (NS-2): http://www.isi.edu/nsnam/ns. [16] Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Thaddeus R. F. Fulford-Jones, and Matt Welsh., “Sensor Networks for Medical Care”, Harvard University Technical Report TR-08-05, April 2005. [17] Taekon Kim, Hyungkeun Lee, Jinhwan Koh, Kyung-suk Lhee., “A performance analysis of polling schemes for IEEE 802.11 MAC over the Gilbert–Elliot channel” International Journal of Electronics and Communications Volume 63, Issue 4, 3 April 2009. 50