1. Introduction
Wireless Sensor Networks (WSNs) are supposed to be one of the emerging technologies of the modern era for their wide range of applications, from medical to sports, wild life and critical infrastructure monitoring, as well as military and industrial applications. In WSNs, the sensor nodes carry out distributed sensing tasks using embedded microprocessors and a tiny amount of memory [
1]. The applications of WSNs are great, but typically, a WSN is meant to track and collect data through its sensor nodes. WSNs can be effectively used in healthcare monitoring systems to enhance the quality of healthcare services. For example, equipping patients with medical sensors is a fast way to monitor the patients without restricting their movements.
The rising costs of healthcare and the increase in continuous healthcare monitoring of the aging population throughout the world pose challenges for healthcare monitoring. A Wireless Body Area Network (WBAN), comprised of tiny and smart medical sensors (wearable or implanted) and a common hub, is capable of measuring, processing and forwarding important physiological data, like glucose level, heartbeats per minute, blood pressure, body temperature, oxygen level in blood and the number of breaths per minute, as well as recording, such as electrocardiograms and electromyograms. This enables health professionals to anticipate, examine and respond to critical and deleterious incidents timely [
2]. The idea of a WBAN was introduced by Van Dam et al. in 2001 and since then has attracted greater research scope. The previous standards, such as IEEE 802.11, IEEE 802.11e, IEEE 802.15.4 and IEEE 802.15.3, are not appropriate for WBANs. The IEEE 802.15 Task Group 6 started to develop a communication standard in November 2007 for WBANs and was approved in February 2012, known as the IEEE 802.15.6 standard for WBANs. The standard provides short-range and low-power communication solutions.
The Medium Access Control (MAC) protocol is responsible for the access to the shared communication channel [
3]. The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of the IEEE 802.15.6 MAC protocol for WBAN uses an Alternative Binary Exponential Backoff (ABEB) procedure, and hence, the protocol varies in key features from the conventional CSMA/CA procedures adopted for IEEE 802.11, IEEE802.11e and IEEE 802.15.4. To initiate the CSMA/CA operation of the IEEE 802.15.6 MAC protocol, a Contention Window (CW) is picked as: (a) the node shall set CWto
for each newly-arrived packet; (b) an even number of failures for the same packet can only double the CW; (c) if the new CW value exceeds
, the node will keep the CW at
. Each idle pCCATime will lead the contending nodes to a unit lessening of their backoff counter. Moreover, any transmission on the channel during pCCATime will lead the contending nodes to lock their backoff counters until it has been idle for pSIFS. Other locking/unlocking mechanisms are beyond the scope of this study. When the backoff counter reaches zero, the contending node starts transmission [
4].
IEEE 802.15.6 CSMA/CA uses the ABEB scheme to compute the backoff delay for nodes. In the ABEB algorithm, the CW for a packet retransmission is doubled only for an even number of collisions. In contention-based MAC protocols, an efficient backoff algorithm is regarded to be one of researchers’ major areas of interest. In the literature, there are many backoff algorithms, but Binary Exponential Backoff (BEB) is regarded as a standard backoff algorithm in wireless communication systems. The BEB algorithms used in different standards do not obtain the optimum performance due to enormous CW gaps induced from packet collision. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision) and poor utilization of the channel due to the unbalanced and fluctuated subsequent CW sizes. To achieve better network performance in terms of low power consumption, minimum delay and high throughput, a backoff algorithm with a gradual increase in CW is more opportune for prioritized traffic in non-saturated wireless networks. Inherently, such a backoff procedure will decrease the expected waiting time and energy consumption, and will allow the contending node to access the medium with little delay and thus, increasing the throughput performance.
In this work, we present an analytical model for the CSMA/CA mechanism of IEEE 802.15.6 employing the proposed Prioritized Fibonacci Backoff (PFB) scheme under non-saturated conditions. In our proposed model, the node state is modeled with Discrete Time Markov Chain (DTMC), and the channel state is modeled taking both homogeneous and heterogeneous networks into consideration. We concentrate on the normalized throughput, mean frame service time and energy consumption performances of the IEEE 802.15.6 CSMA/CA protocol under the PFB scheme and compare the results with the basic ABEB scheme of IEEE 802.15.6 CSMA/CA. For the homogeneous scenario, we also show that the simulation results closely follow the numerical results.
The rest of this paper is structured as follows:
Section 2 presents the related studies available in the literature.
Section 3 reviews an overview of the IEEE 802.15.6 standard.
Section 4 describes the framework of the analytical model and performance measures. The results and discussion are conferred in
Section 5, and eventually,
Section 6 concludes our research findings.
2. Related Studies
The Binary Exponential Backoff (BEB) [
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17] is used widely by IEEE 802.11, WSN-based IEEE 802.15.4 and IEEE 802.15.3c MAC protocols due to its simplicity. However, some researchers in their articles have adopted the FB procedure for the CSMA/CA procedure of the IEEE 802.11 and IEEE 802.15.4 MAC protocols [
18,
19,
20]. Even so, the conventional FB procedures cannot provide the prioritized access to the channel for a variety of user classes. To the extent of our exploration, our study is the first one that estimates the performance of IEEE 802.15.6 CSMA/CA under a different prioritized backoff algorithm. However, many researchers have investigated the ABEB procedure of the CSMA/CA protocol of the IEEE 802.15.6 standards. Performance analysis in [
21] shows the effect of different access phases on the prioritized ABEB procedure of the IEEE 802.15.6 MAC protocol. In [
22], numerical formulas were used to predict the theoretical performance limits of IEEE 802.15.6-based MAC protocols. They assume a collision-free network with no user priorities. In [
23,
24], the authors study the performance of IEEE 802.15.6 CSMA/CA, only covered by saturation conditions. The results indicate that the channel access is widely exploited by the highest User Priority (UP) nodes, while the other nodes starve. In [
25], the authors present an improved adaptive MAC protocol for WBANs, where a well-defined synchronization mechanism avoids collisions. The authors in [
26] propose an analytical model to evaluate the performance of a contention-based IEEE 802.15.6 CSMA/CA mechanism under saturated conditions for heterogeneous WBAN scenarios. However, in most real-world IEEE 802.15.6 networks, the saturation assumption is not likely to hold, and the traffic is mostly unsaturated. In [
27], the authors examine the device lifespan performance in the contention-free period. In [
28], the authors introduce a prioritized ABEB-based CSMA/CA mechanism in the Contention Access Phase (CAP) period.
We present an analytical model for the CSMA/CA mechanism of IEEE 802.15.6 employing the proposed PFB scheme under non-saturated conditions. We have taken into account the non-saturation condition where a new packet is not set up when the current packet is under service. We concentrate on the channel utilization, latency and energy consumption performances of the IEEE 802.15.6 CSMA/CA protocol under the PFB scheme and compare the results with the basic ABEB scheme of IEEE 802.15.6 CSMA/CA.
3. An Overview of the IEEE 802.15.6 Standard
This section summarizes the basic attributes of the IEEE 802.15.6 Standard. We provide the insight of the IEEE 802.15.6 MAC and PHY layers. The standard defines different Physical (PHY) layers being supported by a single MAC layer, as illustrated in
Figure 1. This section could be used to promptly figure out various attributes of the IEEE 802.15.6 standard and to analyze its potential for different applications of emerging body sensor networks. An absolute explanation of the PHY and MAC attributes of the IEEE 802.15.6 standard is available in [
4].
3.1. IEEE 802.15.6 PHY Specifications
The IEEE 802.15.6 standard assists two mandatory PHYs (i.e., Human Body Communications (HBC) PHY and Ultra-Wideband (UWB) PHY) and one optional PHY (i.e., Narrowband (NB) PHY).
3.1.1. NB PHY Specifications
The NB PHY is responsible for the subsequent functions [
4]:
- (1)
Transceiver’s activation and deactivation;
- (2)
Clear Channel Assessment (CCA);
- (3)
Transmission and reception of data.
The NB PHY offers numerous kinds of channels (seven distinct frequency bands), modulation schemes and bit rates. The different bands are: 402–405 MHz, 420–450 MHz, 863–870 MHz, 902–928 MHz, 950–958 MHz, 2360–2400 MHz and 2400–2483.5 MHz [
29]. The modulation parameters for these different bands are available in the IEEE 802.15.6 standard [
4] and defined in Tables 29–35.
Figure 2 shows the Physical Layer Protocol Data Unit (PPDU) structure in bits for the NB PHY.
3.1.2. HBC PHY Specifications
The HBC PHY uses Electric Field Communication (EFC) and is operative in two bands (16 MHz and 27 MHz) to support two operation modes, i.e., high QoS mode and default mode based on the application requirements.
Figure 3 shows the PPDU structure for HBC PHY.
3.1.3. UWB PHY Specifications
The UWB PHY intends to actualize high performance, low complexity and power consumption, and operates in the low frequency band (Channels 0–2) and the high frequency band (Channel 3–10). As shown in
Figure 4, the UWB PHY supports two operational modes, high Quality of Service (QoS) operational mode and default mode, where the first one is appointed for vital healthcare applications, and the second mode is used for medical and non-medical applications.
3.2. IEEE 802.15.6 MAC Specifications
In a WBAN network, the hubs and the nodes are formed into logical units, defined as Body Area Networks (BANs). A BAN may consist of only one hub and up to 64 nodes. WBAN supports one-hop and two-hop communications in a star topology. In a one-hop star topology, the exchange of frames takes place directly between the sensor nodes and the hub. In a two-hop star topology, relay-capable nodes can be used to exchange packets between the hub and the sensor nodes. A hub divides the time axis into multiple superframes. Each superframe is subdivided into allocation slots, being used for data transmission. The next sub-sections explain the communication modes, MAC format and access techniques, characterized in the IEEE 802.15.6 standard.
IEEE 802.15.6 Communication Modes
In IEEE 802.15.6, a hub can function in one of the subsequent three access modes;
- (a)
Beacon mode with beacon period superframe boundaries;
- (b)
Non-beacon mode with superframe;
- (c)
Non-beacon mode without superframe.
In (a), the hub transmits a beacon on the medium at the beginning of each superframe to arrange time-referenced allocations.
Figure 5 shows the superframe structure with the beacon period, which consists of various Access Phases (APs). A superframe incorporates Exclusive Access Phase 1 (EAP1) and Exclusive Access Phase 2 (EAP2) for highest priority nodes, two Random APs (RAP1 and RAP2) and a Contention Access Phase (CAP) for any kind of traffic, two Management AP (MAP) for scheduled uplink/downlink and scheduled/unscheduled bi-link allocation intervals and an optional B2 frame to announce a non-zero CAP period. Except RAP1, other APs may be assumed to be null. In (b), the hub transmits the superframe structure via Timed-Poll (T-Poll) frames and operates during MAP periods only in any superframe. In (c), the third access mode, a hub may provide Type I/II polled allocations for scheduled, unscheduled and improvised transfers. In the case of scheduled transfers, the nodes use their allocated time slots for data transmission, while in the case of unscheduled and improvised transfers, the nodes wait for a poll or post frame from the hub. Type I and Type II access phases are differentiated by the units of allocations. In Type I, the device requests allocation intervals in terms of time, while in Type II, the device requests allocation intervals in terms of the number of frames.
3.3. Priority Mapping
The User Priorities for accessing the medium are differentiated by eight different access categories. The type of payloads in the frame determine these prioritizing values. These traffic designations are typed as emergency or medical implant event reports, high priority medical data or network control, medical data or network control, Voice (VO), Video (VI), Excellent Effort (EE), Best Effort (BE) and Background (BK). These different data traffics are prioritized by the values of the minimum and maximum CW in the case of the CSMA/CA mechanism and Collision Probability (CP) in the slotted ALOHA case. These CW and CP bounds for CSMA/CA and slotted ALOHA, respectively, are depicted in
Table 1.
3.4. IEEE 802.15.6 Access Mechanisms
Different access mechanisms are adopted by the IEEE 802.15.6 MAC protocol. These are divided into four categories; scheduled access, improvised and unscheduled access, random access and Medical Implant Communications Service (MICS) band access. The following sections briefly describe these access mechanisms.
3.4.1. Random Access Mechanism
The IEEE 802.15.6 employs two contention-based random access mechanisms for three different PHYs. CSMA/CA with the alternative binary exponential backoff procedure can be employed for NB PHY or UWB PHY. Prioritized slotted AlOHA can be a MAC choice for UWB/HBC PHY.
Slotted ALOHA Protocol
The IEEE 802.15.6 standard uses a particular kind of slotted Aloha as a MAC choice. In the slotted ALOHA protocol, the high and low priority traffic to access the channel are predefined by the UP values, as given in
Table 1. The nodes seize contention, if
, where
z is randomly chosen from the interval [0, 1]. To initiate the ALOHA operation of the IEEE 802.15.6 MAC protocol, a CP is picked as: (a) the node shall set CP to
for each newly-arrived packet; (b) an even number of failures for the same packet can only halve the CP; (c) if the new CP value is smaller than
, the node will keep the CP at
.
Figure 6 illustrates an example of the slotted ALOHA operation of the IEEE 802.15.6 MAC protocol for a non-emergency node.
CSMA/CA Protocol
To initiate the CSMA/CA operation of the IEEE 802.15.6 MAC protocol, a contending node having a new packet for transmission shall maintain a CW to detect a new contended allocation, where
, and a backoff counter
. A CW is picked as: (a) the node shall set CW to
for each newly-arrived packet; (b) an even number of failures for the same packet can only double the CW; (c) if the new CW value exceeds
, the node will keep the CW at
. After choosing the backoff counter value between
, the node starts its carrier sensing at the beginning of the next pCSMAslot to determine the current state of the channel. Each pCSMAslot has a fixed duration specified by pCSMASlotLength . The first portion of pCSMAslot corresponds to pCCATime (physical CCA) and is equal to a 63/symbol-rate in time length, while the latter portion of pCSMAslot is used by the contending node to transmit its frame to the transport medium when its backoff counter reaches zero. Each idle pCCATime will lead the contending nodes to countdown the backoff counter by one. Moreover, any transmission on the channel during pCCATime will lead the contending nodes to lock their backoff counters until they have been idle for pSIFS. Other locking/unlocking mechanisms are beyond the scope of this study. When the backoff counter reaches zero, the node then transmits.
Figure 7 illustrates an example of the CSMA/CA operation of the IEEE 802.15.6 MAC protocol for a non-emergency node in the RAP period.
3.4.2. Improvised and Unscheduled Access Mechanism
A hub command (poll) or management/data frame request (post) to a node can use improvised access outside/inside the scheduled, scheduled bi-link and unscheduled bi-link allocations. The unscheduled bi-link allocation adopted by the hub may exchange frames with the nodes in every superframe (one-periodic) or in every m superframes (m-periodic). An m-periodic bi-link allocation allows nodes to sleep between m superframes and thus is appropriate for low-duty cycle nodes.
3.4.3. Scheduled and Scheduled-Polling Access Mechanisms
The scheduled access mechanism is used to acquire scheduled (uplink and downlink) allocations exclusively in the beacon or non-beacon mode with superframes. In addition, the scheduled polling can also adopt scheduled bi-link, polled and posted allocations, but not in non-beacon mode without superframes. All of these scheduled allocations (one-periodic or m-periodic) cannot be adopted at the same time in a single WBAN. The hub and nodes use these allocations to send/receive the management/data frames. All of the beacon periods are treated as a wakeup beacon by the nodes.
3.4.4. MICS Band Communication
In the MICS band, a hub shall operate with or without superframes. The hub may choose a new channel only when required, and an implant shall communicate as a node with a hub. The hub and the node may perform unconnected mutual discovery or connected mutual discovery before their exchange of data or management type frames.
4. Markov Model
To analyze the performance behavior of the proposed priority-based FB procedure for the IEEE 802.15.6 MAC protocol as shown in
Figure 8, we develop a DTMC model as shown in
Figure 9 by following Bianchi’s model [
5], and compare the results with the ABEB procedure of IEEE 802.15.6 CSMA/CA under non-saturation conditions. We presume that no other packet is generated by a sensor node if it has a packet in service. The user classes, also called user priority of class
i nodes, where
, are differentiated by
and
, as depicted in
Table 2. The superframe structure of WBAN MAC comprises different access phases. However, we only consider activity in the RAP1 and assumed other optional APs to be null. We assume an ideal channel conditions, and a packet may not be received correctly only due to collisions. Our model considers no retry limit.
4.1. Solving the Discrete Time Markov Chain
The stochastic processes
and
depicted in
Figure 9 can be modeled with a discrete time Markov chain having the following one-step transition probabilities among them:
The first Equation in (
1) reflects the fact that, after each successful pCCAtime, the backoff counter is decremented. Upon an unsuccessful transmission, the node chooses another random backoff value uniformly distributed in the range 1,2,3,...
, and this is shown in the second transition probability of Equation (
1). The third case deals with the situation that after a successful transmission, another packet is generated, and the node takes a new backoff for the new packet. The forth case models the fact that after a successful transmission, a node contains no further packet for transmission and so enters the idle state. The node remains in the idle state until a new packet arrives; the node then takes a new random backoff value in the range 1,2,3,...
(the first backoff stage); these are depicted in the fifth and sixth expressions. Finally, the last case of Equation (
1) views the attribute that the CW size is not increased in a subsequent packet retransmission once the
value is achieved.
With
and
, we now show a closed-form solution for the Markov chain depicted in
Figure 9. Let
be the probability that a node using the PFB procedure for the IEEE 802.15.6 CSMA/CA transmits in a generic slot, regardless of the backoff stage. This probability is computed as:
The stationary distributions
represent the topmost row of the Markov chain and are simplified as:
The stationary distributions
,
and
can be expressed as:
Similarly, the sum of the remaining stationary distributions of the Markov chain is given by:
The stationary distribution takes into consideration the situation where the queue of the node is empty and is waiting for a packet to arrive.
To find the normalized equation,
Let us sum the stationary distributions of (
3)–(
5) that give:
Let
be the normalized normalized equation for the ABEB procedure mentioned in the IEEE 802.15.6 standard, and it can be computed as:
4.2. Performance Metrics (Homogeneous Scenario)
We deem a single-hop star-network WBAN with
N sensor nodes. Let
represent two random processes
and
for the backoff stage and backoff time counter, respectively. Under non-saturation modes, the probability of packet availability is given by
, where
is the expected waiting time of a
node in each state of the Markov chain and
λ is the Poisson packet arrival rate. We compute
in order to convert the states into real time.
where
δ represents the
duration,
γ is the collision probability and
is the probability that at a minimum, one
node transmits in a given time slot and can be obtained as:
The collision probability
γ can be expressed as follows:
and
represent the mean time-span of a busy channel due to an acknowledged and failed transmission, respectively.
and
are represented as:
Furthermore, let
be the success probability of a tagged node, and it can be obtained as:
Let Θ be the normalized network throughput, described as the fraction of time being used to transmit the actual data bits successfully. The normalized system throughput can be stated as:
is the mean payload duration.
We are also interested in the calculation of the mean frame service time
, which is defined as the time span between the events that the packet reaches at the head of the queue and the time when the receiver acknowledges the packet successfully.
for the PFB and ABEB procedures adopted for IEEE 802.15.6 CSMA/CA can be expressed as:
where
and
represent the number of backoff slots in a particular backoff stage for the Fibonacci backoff algorithm and ABEB procedure, respectively.
can be computed as:
where
and
. Whereas, for the ABEB procedure mentioned in the IEEE 802.15.6 standard,
can be computed as:
Energy is quite critical in WBANs, and therefore, we also calculate the energy consumption on a per-node per-packet basis. The expression
in Equation (
16) represents the time elapsed from the arrival of the packet until its successful delivery. Denoting by
,
,
and
the power consumed by the transceiver of a node during transmission, reception, backoff and sleep, respectively, we derive an estimate of the energy consumption
based on Equation (
16) as follows:
The values of and for the PFB scheme and the ABEB scheme, respectively, are derived using MATLAB to estimate the desired performance metrics.
4.3. Extension to Heterogeneous Scenario
Next, we will extend the performance measures of the analytical modeling for the heterogeneous scenario. The different
for WBAN, where
, are differentiated by
and
, as shown in
Table 2. As compared to the other user classes,
, being an emergency data
class, has been given an aggressive priority.
has two types of priorities: the first is a very small contention window size, and the second is a separate access phase. As explained in
Section 4, here, we do not consider the second type of priority for
. The size of WBAN in terms of nodes can be computed as
, where
is the number of nodes in a
. For our results, we examine three different
’s with two nodes in each
. We denote
:
as the probability of transmission by a
node using the PFB procedure to model the IEEE 802.15.6 MAC protocol. This probability can be expressed as:
Let
be the normalized equation for the ABEB procedure mentioned in the IEEE 802.15.6 standard, and it can be computed as:
where
:
is the collision probability for a class
i node and can be obtained as:
The expected waiting time of a
node in each state of the Markov chain is represented by
. We compute
in order to convert the Markov states into real time.
can be calculated as:
where
δ represents the
duration and
is the probability that at least one
node is transmitting in the given time slot and can be obtained as:
is the success probability by a
node using the PFB scheme and can be simplified as:
Similarly, let
be the success probability of a
node using the ABEB scheme, and it can be obtained as:
The per-node throughput for a
is the fraction of time being used to transmit the actual data bits successfully. The per-class normalized throughput can be stated as:
is the mean payload duration, and
.
In the case of the heterogeneous traffic scenarios, the mean frame service time of a node belonging to
can be obtained as:
where
and
represent the number of backoff slots in a particular backoff stage for the PFB algorithm and ABEB procedure, respectively.
can be computed as:
where
and
; whereas, for an ABEB procedure mentioned in the IEEE 802.15.6 standard,
can be computed as:
In the case of the heterogeneous traffic scenarios, the energy consumption of a node belonging to
can be obtained as:
The values of , and , for the PFB scheme and ABEB scheme respectively, are derived using MATLAB to estimate the desired performance metrics.
6. Conclusions
This article presents a performance comparison between the ABEB procedure of IEEE 802.15.6 CSMA/CA and the proposed PFB procedure adopted for WBAN CSMA/CA. We estimated the execution of the IEEE 802.15.6 CSMA/CA operation for both the ABEB and PFB procedures to forecast the normalized throughput, mean frame service time and energy consumption of the network by employing a Markov chain model. The numerical results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure. This is due to the fact that after each collision, the PFB leads to a smooth and gradual increase in CW size, while ABEB leads to an irregular and fluctuating CW. Hence, the PFB procedure leads to a decrease of the waiting time, and the contending node can access the channel promptly with little delay, thus increasing the performance in terms of normalized throughput, head of line delay and energy consumption. To the extent of our exploration, our study is the first one that anticipates the implementation of IEEE 802.15.6 CSMA/CA under a different prioritized backoff algorithm. Our results also show that a smaller priority gap between the will decrease the performance gap between the classes. We intend to extend this work to all access phases of the superframe in a noisy channel environment. We plan to fine-tune the and values for various priority classes, which can improve different performance metrics. A similar framework for multi-hop wireless networks can also be considered.