1. Introduction
Wireless Body Area Network (WBAN) is a network of tiny wireless medical sensors which may be attached to the body surface or implanted into the tissues. These medical sensors are capable of measuring significant physiological parameters like heartbeat, blood pressure, body and skin temperature, oxygen saturation, respiration rate, electrocardiograms, and other parameters. A WBAN has shown to be adequate for sending patient’s information to a remote server or physician to maintain optimum health status. This technology is expected to reduce the amount of time doctors require to identify the problem, the amount of paper work required and eliminates the duplication of patient records [1]. This technology can be exploited also in many other fields, including fitness monitoring, gaming, military services, and wearable computing etc. An abstract view of medical WBAN is shown in Fig. 1.
Fig. 1.Abstract view of WBAN [1]
The currently available standards such as IEEE 802.11, IEEE 802.11e, IEEE 802.15.4, and IEEE 802.15.3 are not appropriate for WBAN since they do not support the combination of reliability, low power, high data rate, and QoS. Therefore, to fulfill the requirements of WBAN, the IEEE 802.15 Working Group formed Task Group 6 (TG6) in November 2007 to develop a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. The IEEE 802.15.6 standard settled in 2012 [2] calls attention to the importance of the emergence of WBAN.
All the nodes and the hubs in the network are structured into logical sets, referred to as Body Area Networks (BANs) and coordinated by their respective hubs for medium access and power management. In every BAN there is a hub whereas the number of nodes in a BAN may range from 0 to 64. There are 8 different access categories which indicate the user priorities for accessing the medium.
WBAN employs either Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) or slotted Aloha to access the medium. Ultra-Wide Band physical layer (UWB PHY) employs slotted Aloha as medium access protocol. The UWB PHY specification is designed to offer robust performance for WBANs and to provide safe power levels for the human body and low interference to other devices.
A particular variety of slotted Aloha is adopted in IEEE 802.15.6 standard. This is different from the traditional one in the sense that it is designed to deal with rather limited number of users attempting to resolve contention through reduction of the retransmission probability in a distinct way.
In this paper, we focus on the performance evaluation of slotted aloha scheme proposed in IEEE 802.15.6 in the assumption of ideal channel conditions and finite number of nodes. We develop a markov chain based analytic model in non-saturated conditions.
The paper is outlined as follows. After a brief review of related work in section 2, the slotted aloha of WBAN is reviewed in section 3. The Markov model is introduced and solved in section 4. The section 5 validates the model by comparing the analytical results with that obtained by simulation. Concluding remarks are in section 6.
2. Related Works
Very few studies reported in the literature to analyze the random access mechanism of IEEE 802.15.6 MAC. However, with regards to the MAC protocols for WBAN, various studies exist such as [3][4][5][6][7][8][9]. Analysis of the CSMA/CA protocol can be found in many papers based on various standards such as IEEE 802.11 [10][11][12][13] and IEEE 802.15.4 [14][15][16]. The CSMA/CA of IEEE 802.15.6 have been analyzed in [17][18][19].
The seminal paper [10] found the saturation throughput of IEEE 802.11 distributed coordination function. In saturated condition, it is assumed that each node always has a packet waiting to be transmitted. Our paper in [20] presented the saturation throughput analysis of 802.15.6 slotted Aloha. But networks do not typically operate in saturated conditions. In this paper, we extend our saturated model for a non-saturated one. We assume that nodes do not know the number of transmitting nodes a particular slot a priori, and know only whether or not their transmission succeeded after the fact.
The Aloha protocol [21] is a fully decentralized medium access protocol that does not perform carrier sensing. The subsequent slotted Aloha protocol [22] was introduced to improve utilization of the shared medium by synchronizing the transmission of the devices in within time slots. However, IEEE 802.15.6 incorporated some unique features in slotted aloha which are different from the traditional one. In this work, we focus on the performance of stable slotted aloha for the WBAN, where only finite numbers of users access the medium simultaneously. An analysis of generalized slotted-Aloha protocols can be found in [23]. Recent work using Game Theory to analyze the Aloha protocol can be found in [24][25].
3. WBAN and Slotted Aloha Access
The UWB PHY specification is designed to offer robust performance for WBANs and to deliver a large scope for implementation opportunities for high performance, robustness, low complexity, and ultra low power operation. This PHY employs slotted Aloha as medium ac-cess protocol which is described in this section.
The IEEE 802.15.6 standard defines eight user priorities, UPi, i = 0,...,7. These users are differentiated by the maximum and minimum contention probability (CP) as shown in Table 1.
Table 1.Contention probability (CP) thresholds for slotted aloha access
To obtain a new contended allocation for the transmission or retransmission of a packet a node shall set its CP as follows.
The CP value is not changed when it gets the value of CPmin at the m-th retry. The value of m can be found as
The node shall have obtained a contended allocation delimited by the current aloha slot if z ≤ CP or shall not have otherwise, where z is a value the node has newly drawn at random from the interval [0,1]. It may be noted that each Aloha slot is of equal length.
4. Markov Model for WBAN Slotted Aloha
An analytical model for slotted Aloha in WBAN is presented in this section for non-saturated case. A single-hop wireless network consisting of N nodes are considered. It is assumed that all the nodes in the network have same payload size.
The Discrete Time Markov Chain (DTMC) as shown in Fig. 2 is modeled after the states that a node can be in while attempting to transmit the packets. The decreasing probability of transmission and the division of the time into sequence of well-defined slots as stated in the standard are keys to the formulation of the model. {l,0,1,2,…,m} are the states of a node. For the tagged node, that happens to be in state k, event probabilities are denoted as:
p(k,l): remains idle in the current slot without attempting to transmit
p(k,s): transmits successfully in the current slot
p(k,c): transmits in the current slot that ends up in collision
Fig. 2.Discrete time Markov chain for the nodes
Other per node quantities are:
l: the idle state when a given node does not have a packet to contend with.
q: If packets arrive at the MAC in a Poisson manner with rate λ (per node), then the probability of no arrivals in a slot is e-λ. Thus, the probability that a packet is available by the tagged node in the given slot is q=1-e-λ. Consequently, the probability that there is no packet available is 1 - q.
The one-step transition probabilities of the DTMC are:
The equation (2) depicts following cases:
The first case is for state 0 where either another packet transmits after a successful transmission or remains idle in the current slot without attempting to transmit. Upon an unsuccessful transmission, the node moves to state (k+1) to obtain a new contended allocation for the retransmission as shown in the second transition. The third case shows that after a successful transmission the node has packet to transmit and hence enters at the state 0. The node remains idle in the current slot without attempting to transmit which is shown in fourth case. The fifth equation reflects an idle or failure event when it reaches to the state m. The transition probability P(l|l) shows a node remains in the idle state as it has no packet to transmit. The seventh case depicts that after a successful transmission the node has no packet to transmit, and hence enters the idle state. The last case expresses that a new packet has arrived for transmission.
We select one tagged node from a user class and analyze according to our proposed model. Let α be the probability that the tagged node transmits in a generic slot regardless of the fate of that transmission.
The standard specifies that at alternative number of attempts with the same packet, the probability of transmission is halved. If the first transmission attempt is made for a given packet with the base probability(CPmax), attempt in state k is made with probability
The collision probablity β, is the probablity that the tagged node encounters a collision in a time slot if at least one of the remaining (N - 1) nodes transmits, which can be expressed as
Success of a transmission or collision by the tagged node in an arbitrary slot depends on the activities of the rest of the (N - 1) nodes in that slot; this yields the probabilites of successful and collided transmission as follow respectively
With stationary state probabilities represented by πk (k = l,0,1,2,...,m), the balance equations are, as depicted in the Fig. 2, given by
The normalization relation is
Rearranging (8) and writing in term of π0
Similarly, writing (12) and (14) in term of π0 as follows
Putting πl,πk and πm from above equations in (15) produces
The main quantity of interest is α and it can be expressed as
Finally, after some algebra, (22) gives
Equations (4) and (23) form a nonlinear system with two unknowns β and α which can be solved using numerical techniques. Then these can be used to estimate the desired performance metrics such as throughput. The normalized system throughput is:
5. Model Validation
The pair of non-linear simultaneous equations (4) and (23) are solved for fixed point using MATLAB. A custom made simulator using C++ programming language is used to validate the model. We took the parameters of the default mode that employs impulse UWB (IR-UWB) as stated in the standard.
We consider a homogeneous group of nodes where all the nodes are of same user priority, i.e. all of the nodes have same CPmax, CPmin and other relevant parameters. We show the results for UP0, UP3 and UP5. The analytical results coincide with the simulations results.
Fig. 3 shows the normalized non-saturated system throughput for UP0 given by Equation (24) as a function of λ for three different network sizes where N is equal to 10, 20 and 30. It can be observed that the throughput increases up to a certain point as λ increases and the throughput starts decreasing and saturated after that point. The throughput drastically decreases for larger N and slowly decreases for the smaller N before the saturation point. The throughput for larger network size increases more sharply than for smaller netwrok size. Generally, the peak throughput occur prior to saturation which are reflected in the cases when the values of N are equal to 20 and 30.
Fig. 3.Non-saturated system throughput of UP0for different network sizes
Fig. 4 shows the normalized non-saturated system throughput for three different user priorities; UP0, UP3 and UP5. The network size is kept fixed at N is equal to 5 to compare throughput among these users. The higher user priorities show higher throughput as it has greater CPmax and CPmin as compare to the lower priority users. The throughput are almost same for all these users when arrival rates are below 20 packets/sec. It means that the higher priority users give higher throughput for higher arrival rates.
Fig. 4.Non-saturated system throughput of UP0, UP3 and UP5 [N = 5]
Fig. 5 and Fig. 6 show the transmission and collision probabilities for these three users respectively. The network size is taken 5 for comparison. As expected, the transmission probabilities are higher for higher user priorities. In both figures, the gap of transmission and collision probabilities increases between the higher and the lower priority users as λ increases. However, the difference are lower for the lower arrival rates. These probabilities explain the trends of throughput curves of different users in Fig. 4.
Fig. 5.Transmission probabilities [N = 5]
Fig. 6.Collision probabilities [N = 5]
It can be observed that the throughput strongly depends on system parameters, mainly network size, CPmax and CPmin. We have shown only three users to show the results. However, any other user priority classes can be easily incorporated in our model.
5. Conclusion
We have proposed an analytical model to compute the throughput of slotted Aloha protocol for WBAN in non-saturated conditions for different user priority classes. The simulation results validate the analytical results. The analytical model presented in this paper can be employed to quantitatively determine the protocol parameters in certain application scenarios. The model is simple and can be extended for related protocol variants and for the heterogeneous users.
References
- P. Khan, N. Ullah, S. Ullah, and K. S. Kwak, "Seamless interworking architecture for WBAN in heterogeneous wireless networks with QoS guarantees," J. Med. Syst., vol. 35, no. 5, pp. 1313-21, Oct. 2011. https://doi.org/10.1007/s10916-011-9756-4
- "IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks," pp. 1-271, 2012.
- C. Li, H.-B. Li, and R. Kohno, "Performance Evaluation of IEEE 802.15.4 for Wireless Body Area Network (WBAN)," in Proc. of 2009 IEEE International Conference on Communications Workshops, 2009, pp. 1-5.
- S. Ullah and K. S. Kwak, "An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network," J. Med. Syst., vol. 36, no. 3, pp. 1021-30, Jun. 2012. https://doi.org/10.1007/s10916-010-9564-2
- H. Li and J. Tan, "An Ultra-low-power Medium Access Control Protocol for Body Sensor Network," in Proc. of Conf. IEEE Eng. Med. Biol. Soc., vol. 3, pp. 2451-4, Jan. 2005.
- H. Li and J. Tan, "Heartbeat-driven medium-access control for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 44-51, Jan. 2010. https://doi.org/10.1109/TITB.2009.2028136
- C. LI, H.-B. LI, and R. KOHNO, "Reservation-Based Dynamic TDMA Protocol for Medical Body Area Networks," IEICE Trans. Commun., vol. E92-B, no. 2, pp. 387-395, 2009. https://doi.org/10.1587/transcom.E92.B.387
- S. Marinkovic, C. Spagnol, and E. Popovici, "Energy-Efficient TDMA-Based MAC Protocol for Wireless Body Area Networks," in Proc. of 2009 Third International Conference on Sensor Technologies and Applications, 2009, pp. 604-609.
- N. Ullah, P. Khan, and K. S. Kwak, "A very low power MAC (VLPM) protocol for Wireless Body Area Networks," Sensors (Basel)., vol. 11, no. 4, pp. 3717-37, Jan. 2011. https://doi.org/10.3390/s110403717
- G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2000. https://doi.org/10.1109/49.840210
- J. W. Tantra, "Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters," IEEE Commun. Lett., vol. 9, no. 2, pp. 130-132, Feb. 2005. https://doi.org/10.1109/LCOMM.2005.02008
- T. O. KIM, K. J. KIM, and B. D. CHOI, "Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition," IEICE TRANSACTIONS on Communications, vol. E91-B, no. 4. The Institute of Electronics, Information and Communication Engineers, pp. 1122-1131, 01-Apr-2008. https://doi.org/10.1093/ietcom/e91-b.4.1122
- T. O. Kim, Y. Chang, Y.-T. Kim, and B. D. Choi, Management of Convergence Networks and Services, vol. 4238. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 162-169, 2006.
- S. Pollin, M. Ergen, S. Ergen, B. Bougard, L. Der Perre, I. Moerman, A. Bahai, P. Varaiya, and F. Catthoor, "Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer," IEEE Trans. Wirel. Commun., vol. 7, no. 9, pp. 3359-3371, Sep. 2008. https://doi.org/10.1109/TWC.2008.060057
- K. Ashrafuzzaman and K. S. Kwak, "On the Performance Analysis of the Contention Access Period of IEEE 802.15.4 MAC," IEEE Commun. Lett., vol. 15, no. 9, pp. 986-988, Sep. 2011. https://doi.org/10.1109/LCOMM.2011.071211.111271
- T. O. Kim, J. S. Park, K. J. Kim, and B. D. Choi, "Analytical model of IEEE 802.15.4 non-beacon mode with download traffic by the piggyback method," pp. 435-444, Sep. 2007.
- S. Rashwand and J. Misic, "Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA," Comput. Networks, vol. 56, no. 12, pp. 2832-2846, Aug. 2012. https://doi.org/10.1016/j.comnet.2012.04.023
- S. Rashwand, J. Misic, and H. Khazaei, "IEEE 802.15.6 under saturation: Some problems to be expected," J. Commun. Networks, vol. 13, no. 2, pp. 142-148, Apr. 2011. https://doi.org/10.1109/JCN.2011.6157413
- S. Rashwand, J. Misic, and H. Khazaei, "Performance analysis of IEEE 802.15.6 under saturation condition and error-prone channel," in Proc. of 2011 IEEE Wireless Communications and Networking Conference, 2011, pp. 1167-1172.
- M. S. Chowdhury, K. Ashrafuzzaman and K. S. Kwak, "Saturation Throughput Analysis of IEEE 802.15.6 Slotted Aloha in Heterogeneous Conditions, " Wireless Communications Letters, IEEE, March 2014.
- L. Kleinrock and F. Tobagi, "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics," IEEE Trans. Commun., vol. 23, no. 12, pp. 1400-1416, Dec. 1975. https://doi.org/10.1109/TCOM.1975.1092768
- L. G. Roberts, "ALOHA packet system with and without slots and capture," ACM SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp. 28-42, Apr. 1975. https://doi.org/10.1145/1024916.1024920
- R. T. B. Ma, V. Misra, and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Trans. Netw., vol. 17, no. 3, pp. 936-949, Jun. 2009. https://doi.org/10.1109/TNET.2008.925633
- V. M. Richard T. B. M, "Generalized Slotted-Aloha in Cooperative, Competitive and Adversarial Environments." .
- R. T. B. Ma, V. Misra, and D. Rubenstein, "Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments," in Proc. of 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), pp. 62-62, 2006.
Cited by
- Performance Analysis of WBAN MAC Protocol under Different Access Periods vol.11, pp.10, 2014, https://doi.org/10.1155/2015/102052
- WBAN MAC Protocols- Non-Saturation Modeling and Performance Analysis vol.11, pp.3, 2014, https://doi.org/10.3837/tiis.2017.03.012
- Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic vol.163, pp.None, 2020, https://doi.org/10.1016/j.jnca.2020.102651
- A Review of MAC Layer for Wireless Body Area Network vol.41, pp.6, 2021, https://doi.org/10.1007/s40846-021-00669-1
- A Review of MAC Layer for Wireless Body Area Network vol.41, pp.6, 2021, https://doi.org/10.1007/s40846-021-00669-1