Next Article in Journal
Dynamic Context-Aware Event Recognition Based on Markov Logic Networks
Next Article in Special Issue
A Wellness Mobile Application for Smart Health: Pilot Study Design and Results
Previous Article in Journal
A Cubesat Payload for Exoplanet Detection
Previous Article in Special Issue
A Doppler Radar System for Sensing Physiological Parameters in Walking and Standing Positions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks

1
Department of Electronics Engineering, Incheon National University, Incheon 406-772, Korea
2
Department of Computer Science, Govt. Postgraduate Jahanzeb College, Saidu Sharif, Swat 19130, Khyber Pakhtunkhwa, Pakistan
3
Department of Information and Communication Engineering, Inha University, Incheon 402-751, Korea
4
Department of Computer and Software Technologies, University of Swat, Swat 19130, Khyber Pakhtunkhwa, Pakistan
5
Department of Computer Science and Engineering, Incheon National University, Incheon 406-772, Korea
6
Department of Information and Telecommunication Engineering, Incheon National University, Incheon 406-772, Korea
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(3), 492; https://doi.org/10.3390/s17030492
Submission received: 15 November 2016 / Revised: 20 February 2017 / Accepted: 24 February 2017 / Published: 2 March 2017
(This article belongs to the Special Issue Advances in Body Sensor Networks: Sensors, Systems, and Applications)

Abstract

:
The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of IEEE 802.15.6 Medium Access Control (MAC) protocols for the Wireless Body Area Network (WBAN) use an Alternative Binary Exponential Backoff (ABEB) procedure. The backoff algorithm plays an important role to avoid collision in wireless networks. The Binary Exponential Backoff (BEB) algorithm used in different standards does not obtain the optimum performance due to enormous Contention Window (CW) gaps induced from packet collisions. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision) and poor utilization of the channel due to the gap between the subsequent CW. To minimize the gap between subsequent CW sizes, we adopted the Prioritized Fibonacci Backoff (PFB) procedure. This procedure leads to a smooth and gradual increase in the CW size, after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly with little delay; while ABEB leads to irregular and fluctuated CW values, which eventually increase collision and waiting time before a re-transmission attempt. We analytically approach this problem by employing a Markov chain to design the PFB scheme for the CSMA/CA procedure of the IEEE 80.15.6 standard. The performance of the PFB algorithm is compared against the ABEB function of WBAN CSMA/CA. The results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure.

1. Introduction

Wireless Sensor Networks (WSNs) are supposed to be one of the emerging technologies of the modern era for their wide range of applications, from medical to sports, wild life and critical infrastructure monitoring, as well as military and industrial applications. In WSNs, the sensor nodes carry out distributed sensing tasks using embedded microprocessors and a tiny amount of memory [1]. The applications of WSNs are great, but typically, a WSN is meant to track and collect data through its sensor nodes. WSNs can be effectively used in healthcare monitoring systems to enhance the quality of healthcare services. For example, equipping patients with medical sensors is a fast way to monitor the patients without restricting their movements.
The rising costs of healthcare and the increase in continuous healthcare monitoring of the aging population throughout the world pose challenges for healthcare monitoring. A Wireless Body Area Network (WBAN), comprised of tiny and smart medical sensors (wearable or implanted) and a common hub, is capable of measuring, processing and forwarding important physiological data, like glucose level, heartbeats per minute, blood pressure, body temperature, oxygen level in blood and the number of breaths per minute, as well as recording, such as electrocardiograms and electromyograms. This enables health professionals to anticipate, examine and respond to critical and deleterious incidents timely [2]. The idea of a WBAN was introduced by Van Dam et al. in 2001 and since then has attracted greater research scope. The previous standards, such as IEEE 802.11, IEEE 802.11e, IEEE 802.15.4 and IEEE 802.15.3, are not appropriate for WBANs. The IEEE 802.15 Task Group 6 started to develop a communication standard in November 2007 for WBANs and was approved in February 2012, known as the IEEE 802.15.6 standard for WBANs. The standard provides short-range and low-power communication solutions.
The Medium Access Control (MAC) protocol is responsible for the access to the shared communication channel [3]. The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of the IEEE 802.15.6 MAC protocol for WBAN uses an Alternative Binary Exponential Backoff (ABEB) procedure, and hence, the protocol varies in key features from the conventional CSMA/CA procedures adopted for IEEE 802.11, IEEE802.11e and IEEE 802.15.4. To initiate the CSMA/CA operation of the IEEE 802.15.6 MAC protocol, a Contention Window (CW) is picked as: (a) the node shall set CWto C W m i n for each newly-arrived packet; (b) an even number of failures for the same packet can only double the CW; (c) if the new CW value exceeds C W m a x , the node will keep the CW at C W m a x . Each idle pCCATime will lead the contending nodes to a unit lessening of their backoff counter. Moreover, any transmission on the channel during pCCATime will lead the contending nodes to lock their backoff counters until it has been idle for pSIFS. Other locking/unlocking mechanisms are beyond the scope of this study. When the backoff counter reaches zero, the contending node starts transmission [4].
IEEE 802.15.6 CSMA/CA uses the ABEB scheme to compute the backoff delay for nodes. In the ABEB algorithm, the CW for a packet retransmission is doubled only for an even number of collisions. In contention-based MAC protocols, an efficient backoff algorithm is regarded to be one of researchers’ major areas of interest. In the literature, there are many backoff algorithms, but Binary Exponential Backoff (BEB) is regarded as a standard backoff algorithm in wireless communication systems. The BEB algorithms used in different standards do not obtain the optimum performance due to enormous CW gaps induced from packet collision. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision) and poor utilization of the channel due to the unbalanced and fluctuated subsequent CW sizes. To achieve better network performance in terms of low power consumption, minimum delay and high throughput, a backoff algorithm with a gradual increase in CW is more opportune for prioritized traffic in non-saturated wireless networks. Inherently, such a backoff procedure will decrease the expected waiting time and energy consumption, and will allow the contending node to access the medium with little delay and thus, increasing the throughput performance.
In this work, we present an analytical model for the CSMA/CA mechanism of IEEE 802.15.6 employing the proposed Prioritized Fibonacci Backoff (PFB) scheme under non-saturated conditions. In our proposed model, the node state is modeled with Discrete Time Markov Chain (DTMC), and the channel state is modeled taking both homogeneous and heterogeneous networks into consideration. We concentrate on the normalized throughput, mean frame service time and energy consumption performances of the IEEE 802.15.6 CSMA/CA protocol under the PFB scheme and compare the results with the basic ABEB scheme of IEEE 802.15.6 CSMA/CA. For the homogeneous scenario, we also show that the simulation results closely follow the numerical results.
The rest of this paper is structured as follows: Section 2 presents the related studies available in the literature. Section 3 reviews an overview of the IEEE 802.15.6 standard. Section 4 describes the framework of the analytical model and performance measures. The results and discussion are conferred in Section 5, and eventually, Section 6 concludes our research findings.

2. Related Studies

The Binary Exponential Backoff (BEB) [5,6,7,8,9,10,11,12,13,14,15,16,17] is used widely by IEEE 802.11, WSN-based IEEE 802.15.4 and IEEE 802.15.3c MAC protocols due to its simplicity. However, some researchers in their articles have adopted the FB procedure for the CSMA/CA procedure of the IEEE 802.11 and IEEE 802.15.4 MAC protocols [18,19,20]. Even so, the conventional FB procedures cannot provide the prioritized access to the channel for a variety of user classes. To the extent of our exploration, our study is the first one that estimates the performance of IEEE 802.15.6 CSMA/CA under a different prioritized backoff algorithm. However, many researchers have investigated the ABEB procedure of the CSMA/CA protocol of the IEEE 802.15.6 standards. Performance analysis in [21] shows the effect of different access phases on the prioritized ABEB procedure of the IEEE 802.15.6 MAC protocol. In [22], numerical formulas were used to predict the theoretical performance limits of IEEE 802.15.6-based MAC protocols. They assume a collision-free network with no user priorities. In [23,24], the authors study the performance of IEEE 802.15.6 CSMA/CA, only covered by saturation conditions. The results indicate that the channel access is widely exploited by the highest User Priority (UP) nodes, while the other nodes starve. In [25], the authors present an improved adaptive MAC protocol for WBANs, where a well-defined synchronization mechanism avoids collisions. The authors in [26] propose an analytical model to evaluate the performance of a contention-based IEEE 802.15.6 CSMA/CA mechanism under saturated conditions for heterogeneous WBAN scenarios. However, in most real-world IEEE 802.15.6 networks, the saturation assumption is not likely to hold, and the traffic is mostly unsaturated. In [27], the authors examine the device lifespan performance in the contention-free period. In [28], the authors introduce a prioritized ABEB-based CSMA/CA mechanism in the Contention Access Phase (CAP) period.
We present an analytical model for the CSMA/CA mechanism of IEEE 802.15.6 employing the proposed PFB scheme under non-saturated conditions. We have taken into account the non-saturation condition where a new packet is not set up when the current packet is under service. We concentrate on the channel utilization, latency and energy consumption performances of the IEEE 802.15.6 CSMA/CA protocol under the PFB scheme and compare the results with the basic ABEB scheme of IEEE 802.15.6 CSMA/CA.

3. An Overview of the IEEE 802.15.6 Standard

This section summarizes the basic attributes of the IEEE 802.15.6 Standard. We provide the insight of the IEEE 802.15.6 MAC and PHY layers. The standard defines different Physical (PHY) layers being supported by a single MAC layer, as illustrated in Figure 1. This section could be used to promptly figure out various attributes of the IEEE 802.15.6 standard and to analyze its potential for different applications of emerging body sensor networks. An absolute explanation of the PHY and MAC attributes of the IEEE 802.15.6 standard is available in [4].

3.1. IEEE 802.15.6 PHY Specifications

The IEEE 802.15.6 standard assists two mandatory PHYs (i.e., Human Body Communications (HBC) PHY and Ultra-Wideband (UWB) PHY) and one optional PHY (i.e., Narrowband (NB) PHY).

3.1.1. NB PHY Specifications

The NB PHY is responsible for the subsequent functions [4]:
(1)
Transceiver’s activation and deactivation;
(2)
Clear Channel Assessment (CCA);
(3)
Transmission and reception of data.
The NB PHY offers numerous kinds of channels (seven distinct frequency bands), modulation schemes and bit rates. The different bands are: 402–405 MHz, 420–450 MHz, 863–870 MHz, 902–928 MHz, 950–958 MHz, 2360–2400 MHz and 2400–2483.5 MHz [29]. The modulation parameters for these different bands are available in the IEEE 802.15.6 standard [4] and defined in Tables 29–35. Figure 2 shows the Physical Layer Protocol Data Unit (PPDU) structure in bits for the NB PHY.

3.1.2. HBC PHY Specifications

The HBC PHY uses Electric Field Communication (EFC) and is operative in two bands (16 MHz and 27 MHz) to support two operation modes, i.e., high QoS mode and default mode based on the application requirements. Figure 3 shows the PPDU structure for HBC PHY.

3.1.3. UWB PHY Specifications

The UWB PHY intends to actualize high performance, low complexity and power consumption, and operates in the low frequency band (Channels 0–2) and the high frequency band (Channel 3–10). As shown in Figure 4, the UWB PHY supports two operational modes, high Quality of Service (QoS) operational mode and default mode, where the first one is appointed for vital healthcare applications, and the second mode is used for medical and non-medical applications.

3.2. IEEE 802.15.6 MAC Specifications

In a WBAN network, the hubs and the nodes are formed into logical units, defined as Body Area Networks (BANs). A BAN may consist of only one hub and up to 64 nodes. WBAN supports one-hop and two-hop communications in a star topology. In a one-hop star topology, the exchange of frames takes place directly between the sensor nodes and the hub. In a two-hop star topology, relay-capable nodes can be used to exchange packets between the hub and the sensor nodes. A hub divides the time axis into multiple superframes. Each superframe is subdivided into allocation slots, being used for data transmission. The next sub-sections explain the communication modes, MAC format and access techniques, characterized in the IEEE 802.15.6 standard.

IEEE 802.15.6 Communication Modes

In IEEE 802.15.6, a hub can function in one of the subsequent three access modes;
(a)
Beacon mode with beacon period superframe boundaries;
(b)
Non-beacon mode with superframe;
(c)
Non-beacon mode without superframe.
In (a), the hub transmits a beacon on the medium at the beginning of each superframe to arrange time-referenced allocations. Figure 5 shows the superframe structure with the beacon period, which consists of various Access Phases (APs). A superframe incorporates Exclusive Access Phase 1 (EAP1) and Exclusive Access Phase 2 (EAP2) for highest priority nodes, two Random APs (RAP1 and RAP2) and a Contention Access Phase (CAP) for any kind of traffic, two Management AP (MAP) for scheduled uplink/downlink and scheduled/unscheduled bi-link allocation intervals and an optional B2 frame to announce a non-zero CAP period. Except RAP1, other APs may be assumed to be null. In (b), the hub transmits the superframe structure via Timed-Poll (T-Poll) frames and operates during MAP periods only in any superframe. In (c), the third access mode, a hub may provide Type I/II polled allocations for scheduled, unscheduled and improvised transfers. In the case of scheduled transfers, the nodes use their allocated time slots for data transmission, while in the case of unscheduled and improvised transfers, the nodes wait for a poll or post frame from the hub. Type I and Type II access phases are differentiated by the units of allocations. In Type I, the device requests allocation intervals in terms of time, while in Type II, the device requests allocation intervals in terms of the number of frames.

3.3. Priority Mapping

The User Priorities for accessing the medium are differentiated by eight different access categories. The type of payloads in the frame determine these prioritizing values. These traffic designations are typed as emergency or medical implant event reports, high priority medical data or network control, medical data or network control, Voice (VO), Video (VI), Excellent Effort (EE), Best Effort (BE) and Background (BK). These different data traffics are prioritized by the values of the minimum and maximum CW in the case of the CSMA/CA mechanism and Collision Probability (CP) in the slotted ALOHA case. These CW and CP bounds for CSMA/CA and slotted ALOHA, respectively, are depicted in Table 1.

3.4. IEEE 802.15.6 Access Mechanisms

Different access mechanisms are adopted by the IEEE 802.15.6 MAC protocol. These are divided into four categories; scheduled access, improvised and unscheduled access, random access and Medical Implant Communications Service (MICS) band access. The following sections briefly describe these access mechanisms.

3.4.1. Random Access Mechanism

The IEEE 802.15.6 employs two contention-based random access mechanisms for three different PHYs. CSMA/CA with the alternative binary exponential backoff procedure can be employed for NB PHY or UWB PHY. Prioritized slotted AlOHA can be a MAC choice for UWB/HBC PHY.

Slotted ALOHA Protocol

The IEEE 802.15.6 standard uses a particular kind of slotted Aloha as a MAC choice. In the slotted ALOHA protocol, the high and low priority traffic to access the channel are predefined by the UP values, as given in Table 1. The nodes seize contention, if z C P , where z is randomly chosen from the interval [0, 1]. To initiate the ALOHA operation of the IEEE 802.15.6 MAC protocol, a CP is picked as: (a) the node shall set CP to C P m a x for each newly-arrived packet; (b) an even number of failures for the same packet can only halve the CP; (c) if the new CP value is smaller than C P m i n , the node will keep the CP at C P m i n . Figure 6 illustrates an example of the slotted ALOHA operation of the IEEE 802.15.6 MAC protocol for a non-emergency node.

CSMA/CA Protocol

To initiate the CSMA/CA operation of the IEEE 802.15.6 MAC protocol, a contending node having a new packet for transmission shall maintain a CW to detect a new contended allocation, where CW ( C W m i n , C W m a x ) , and a backoff counter [ 1 , CW ] . A CW is picked as: (a) the node shall set CW to C W m i n for each newly-arrived packet; (b) an even number of failures for the same packet can only double the CW; (c) if the new CW value exceeds C W m a x , the node will keep the CW at C W m a x . After choosing the backoff counter value between [ 1 , C W m i n ] , the node starts its carrier sensing at the beginning of the next pCSMAslot to determine the current state of the channel. Each pCSMAslot has a fixed duration specified by pCSMASlotLength . The first portion of pCSMAslot corresponds to pCCATime (physical CCA) and is equal to a 63/symbol-rate in time length, while the latter portion of pCSMAslot is used by the contending node to transmit its frame to the transport medium when its backoff counter reaches zero. Each idle pCCATime will lead the contending nodes to countdown the backoff counter by one. Moreover, any transmission on the channel during pCCATime will lead the contending nodes to lock their backoff counters until they have been idle for pSIFS. Other locking/unlocking mechanisms are beyond the scope of this study. When the backoff counter reaches zero, the node then transmits. Figure 7 illustrates an example of the CSMA/CA operation of the IEEE 802.15.6 MAC protocol for a non-emergency node in the RAP period.

3.4.2. Improvised and Unscheduled Access Mechanism

A hub command (poll) or management/data frame request (post) to a node can use improvised access outside/inside the scheduled, scheduled bi-link and unscheduled bi-link allocations. The unscheduled bi-link allocation adopted by the hub may exchange frames with the nodes in every superframe (one-periodic) or in every m superframes (m-periodic). An m-periodic bi-link allocation allows nodes to sleep between m superframes and thus is appropriate for low-duty cycle nodes.

3.4.3. Scheduled and Scheduled-Polling Access Mechanisms

The scheduled access mechanism is used to acquire scheduled (uplink and downlink) allocations exclusively in the beacon or non-beacon mode with superframes. In addition, the scheduled polling can also adopt scheduled bi-link, polled and posted allocations, but not in non-beacon mode without superframes. All of these scheduled allocations (one-periodic or m-periodic) cannot be adopted at the same time in a single WBAN. The hub and nodes use these allocations to send/receive the management/data frames. All of the beacon periods are treated as a wakeup beacon by the nodes.

3.4.4. MICS Band Communication

In the MICS band, a hub shall operate with or without superframes. The hub may choose a new channel only when required, and an implant shall communicate as a node with a hub. The hub and the node may perform unconnected mutual discovery or connected mutual discovery before their exchange of data or management type frames.

4. Markov Model

To analyze the performance behavior of the proposed priority-based FB procedure for the IEEE 802.15.6 MAC protocol as shown in Figure 8, we develop a DTMC model as shown in Figure 9 by following Bianchi’s model [5], and compare the results with the ABEB procedure of IEEE 802.15.6 CSMA/CA under non-saturation conditions. We presume that no other packet is generated by a sensor node if it has a packet in service. The user classes, also called user priority of class i nodes, where i { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 } , are differentiated by C W m i n and C W m a x , as depicted in Table 2. The superframe structure of WBAN MAC comprises different access phases. However, we only consider activity in the RAP1 and assumed other optional APs to be null. We assume an ideal channel conditions, and a packet may not be received correctly only due to collisions. Our model considers no retry limit.

4.1. Solving the Discrete Time Markov Chain

The stochastic processes s ( t ) and b ( t ) depicted in Figure 9 can be modeled with a discrete time Markov chain having the following one-step transition probabilities among them:
P r ( ( i , k 1 ) | ( i , k ) ) = 1 , 1 k W i , f P r ( i + 1 , k ) | ( i , 0 ) = γ W ( i , f ) + 1 , 1 i m 1 , 1 k W ( i , f ) + 1 P r ( 1 , k ) | ( i , 0 ) = q . ( 1 γ ) . 1 W 1 , 1 i m , 1 k W 1 P r ( l | ( i , 0 ) ) = ( 1 γ ) ( 1 q ) , 1 i m P r ( l | l ) = 1 q P r ( ( 1 , k ) | l ) = q . 1 W 1 , 1 k W 1 P r ( ( m , k ) | ( m , 1 ) ) = γ W m , f , 1 k W m , f
The first Equation in (1) reflects the fact that, after each successful pCCAtime, the backoff counter is decremented. Upon an unsuccessful transmission, the node chooses another random backoff value uniformly distributed in the range 1,2,3,... W i + 1 , and this is shown in the second transition probability of Equation (1). The third case deals with the situation that after a successful transmission, another packet is generated, and the node takes a new backoff for the new packet. The forth case models the fact that after a successful transmission, a node contains no further packet for transmission and so enters the idle state. The node remains in the idle state until a new packet arrives; the node then takes a new random backoff value in the range 1,2,3,... W 1 (the first backoff stage); these are depicted in the fifth and sixth expressions. Finally, the last case of Equation (1) views the attribute that the CW size is not increased in a subsequent packet retransmission once the C W m a x value is achieved.
With b ( i , k ) and b ( l ) , we now show a closed-form solution for the Markov chain depicted in Figure 9. Let β f be the probability that a node using the PFB procedure for the IEEE 802.15.6 CSMA/CA transmits in a generic slot, regardless of the backoff stage. This probability is computed as:
β f = i = 1 m b ( i , 0 )
The stationary distributions k = 1 W 1 1 b ( 1 , k ) + b ( 1 , W 1 ) represent the topmost row of the Markov chain and are simplified as:
b ( 1 , k ) = W 1 k W 1 × ( 1 γ ) × q × i = 1 m b ( i , 0 ) × b ( l ) × q × W 1 k W 1 × b ( 1 , W 1 )
b ( 1 , W 1 ) = 1 W 1 × ( 1 γ ) × q × i = 1 m b ( i , 0 ) × b ( l ) × q × 1 W 1
k = 1 W 1 1 b ( 1 , k ) + b ( 1 , W 1 ) = ( 1 γ ) × β f × W 1 + 1 2
The stationary distributions k = 1 W ( m , f ) 1 b ( m , k ) + b ( m , W m , f ) , i = 2 m 1 k = 1 W ( i , f ) 1 b ( i , k ) and i = 2 m 1 b ( i , W i , f ) can be expressed as:
k = 1 W ( m , f ) 1 b ( m , k ) + b ( m , W m , f ) + i = 2 m 1 k = 1 W ( i , f ) 1 b ( i , k ) + i = 2 m 1 b ( i , W i , f ) = ( 1 γ ) β f 2 { i = 1 m 1 γ i , f ( W i + 1 + 1 ) + γ m , f ( W ( m , f ) + 1 ) }
Similarly, the sum of the remaining stationary distributions of the Markov chain is given by:
i = 1 m b ( i , 0 ) + b ( l ) = β f { 1 + γ + 1 q ( 1 q ) ( 1 γ ) }
The stationary distribution b ( l ) takes into consideration the situation where the queue of the node is empty and is waiting for a packet to arrive.
To find the normalized equation,
i = 1 m k = 1 W i , f b ( i , k ) + b ( l ) = 1
Let us sum the stationary distributions of (3)–(5) that give:
k = 1 W 1 1 b ( 1 , k ) + b ( 1 , W 1 ) + k = 1 W ( m , f ) 1 b ( m , k ) + b ( m , W m , f ) + i = 2 m 1 k = 1 W ( i , f ) 1 b ( i , k ) + i = 2 m 1 b ( i , W i , f ) + i = 1 m b ( i , 0 ) + b ( l ) = i = 1 m k = 1 W i , f b ( i , k ) + b ( l ) = 1
( 1 γ ) β f . ( W 1 + 1 ) 2 + ( 1 γ ) β f 2 { i = 1 m 1 γ i , f ( W ( i , f ) + 1 + 1 ) + γ m , f ( W m , f + 1 ) } + β f { 1 + γ + 1 q ( 1 q ) ( 1 γ ) } = 1
β f = 1 1 + γ + 1 q ( 1 q ) ( 1 γ ) + ( 1 γ ) i = 0 m 1 γ i , f W ( i , f ) + 1 2 + ( 1 γ ) γ m , f W m , f 2 + 1 γ ( m , f ) + 1 2
Let β b be the normalized normalized equation for the ABEB procedure mentioned in the IEEE 802.15.6 standard, and it can be computed as:
β b = 1 1 + γ + 1 q ( 1 q ) ( 1 γ ) + ( 1 γ ) i = 0 m 1 γ i , b W ( i , b ) + 1 2 + ( 1 γ ) γ m , b W m , b 2 + 1 γ ( m , b ) + 1 2

4.2. Performance Metrics (Homogeneous Scenario)

We deem a single-hop star-network WBAN with N sensor nodes. Let ( i , k ) represent two random processes s ( t ) and b ( t ) for the backoff stage and backoff time counter, respectively. Under non-saturation modes, the probability of packet availability is given by q = 1 e λ E s t a t e , where E s t a t e is the expected waiting time of a U P i node in each state of the Markov chain and λ is the Poisson packet arrival rate. We compute E s t a t e in order to convert the states into real time.
E s t a t e = ( 1 P t r ) × δ + P t r × ( 1 γ ) × T s + P t r × γ × T c
where δ represents the p C S M A s l o t duration, γ is the collision probability and P t r is the probability that at a minimum, one U P i node transmits in a given time slot and can be obtained as:
P t r = { 1 ( 1 β f ) N ( PFB Scheme ) 1 ( 1 β b ) N ( ABEB Scheme )
The collision probability γ can be expressed as follows:
γ = { 1 ( 1 β f ) N 1 ( PFB Scheme ) 1 ( 1 β b ) N 1 ( ABEB Scheme )
T s and T c represent the mean time-span of a busy channel due to an acknowledged and failed transmission, respectively. T s and T c are represented as:
T s = T ( M A C + P H Y ) o v e r h e a d + T P a y l o a d + T p S I F S + T A C K T c = T ( M A C + P H Y ) o v e r h e a d + T P a y l o a d
Furthermore, let P s be the success probability of a tagged node, and it can be obtained as:
P s = { N β f ( 1 β f ) N 1 ( PFB Scheme ) N β b ( 1 β b ) N 1 ( ABEB Scheme )
Let Θ be the normalized network throughput, described as the fraction of time being used to transmit the actual data bits successfully. The normalized system throughput can be stated as:
Θ = { P s , f × T p a y l o a d E s t a t e ( PFB Scheme ) P s , b × T p a y l o a d E s t a t e ( ABEB Scheme )
T p a y l o a d is the mean payload duration.
We are also interested in the calculation of the mean frame service time E [ T ] , which is defined as the time span between the events that the packet reaches at the head of the queue and the time when the receiver acknowledges the packet successfully. E [ T ] for the PFB and ABEB procedures adopted for IEEE 802.15.6 CSMA/CA can be expressed as:
E [ T ] = { γ 1 γ T c + T s + E s t a t e i = 0 m 1 γ i , f W f + 1 2 + E s t a t e γ m , f W m , f 2 ( 1 γ ) ( PFB Scheme ) γ 1 γ T c + T s + E s t a t e i = 0 m 1 γ i , b W b + 1 2 + E s t a t e γ m , b W m , b 2 ( 1 γ ) ( ABEB Scheme )
where W f and W b represent the number of backoff slots in a particular backoff stage for the Fibonacci backoff algorithm and ABEB procedure, respectively. W f can be computed as:
W f = [ P h i f ( p h i ) f ] / S q r t [ 5 ]
where P h i = 1 + S q r t [ 5 ] / 2 and p h i = 1 S q r t [ 5 ] / 2 . Whereas, for the ABEB procedure mentioned in the IEEE 802.15.6 standard, W b can be computed as:
W b = 2 b / 2 C W m i n
Energy is quite critical in WBANs, and therefore, we also calculate the energy consumption on a per-node per-packet basis. The expression E [ T ] in Equation (16) represents the time elapsed from the arrival of the packet until its successful delivery. Denoting by P t x , P r x , P b o and P s l e e p the power consumed by the transceiver of a node during transmission, reception, backoff and sleep, respectively, we derive an estimate of the energy consumption E A V G based on Equation (16) as follows:
E A V G = { 1 λ × P s l e e p + γ 1 γ × T c × P r x + T s × P t x + P b o × E s t a t e i = 0 m 1 γ i , f W f + 1 2 + P b o × E s t a t e γ m , f W ( m , f ) 2 ( 1 γ ) ( PFB Scheme ) 1 λ × P s l e e p + γ 1 γ × T c × P r x + T s × P t x + P b o × E s t a t e i = 0 m 1 γ i , b W b + 1 2 + P b o × E s t a t e γ m , b W ( m , b ) 2 ( 1 γ ) ( ABEB Scheme )
The values of β f and β b for the PFB scheme and the ABEB scheme, respectively, are derived using MATLAB to estimate the desired performance metrics.

4.3. Extension to Heterogeneous Scenario

Next, we will extend the performance measures of the analytical modeling for the heterogeneous scenario. The different U P i for WBAN, where i { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 } , are differentiated by C W m i n and C W m a x , as shown in Table 2. As compared to the other user classes, U P 7 , being an emergency data U P class, has been given an aggressive priority. U P 7 has two types of priorities: the first is a very small contention window size, and the second is a separate access phase. As explained in Section 4, here, we do not consider the second type of priority for U P 7 . The size of WBAN in terms of nodes can be computed as N = i = 0 7 n i , where n i is the number of nodes in a U P i . For our results, we examine three different U P i ’s with two nodes in each U P i . We denote β i , f : i { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 } as the probability of transmission by a U P i node using the PFB procedure to model the IEEE 802.15.6 MAC protocol. This probability can be expressed as:
β i , f = 1 1 + γ i + 1 q ( 1 q ) ( 1 γ i ) + ( 1 γ i ) j = 0 m 1 γ i j , f W i , ( j , f ) + 1 2 + ( 1 γ i ) . γ i m , f . W i , ( m , f ) 2 + 1 γ i ( m , f ) + 1 2
Let β b be the normalized equation for the ABEB procedure mentioned in the IEEE 802.15.6 standard, and it can be computed as:
β i , b = 1 1 + γ i + 1 q ( 1 q ) ( 1 γ i ) + ( 1 γ i ) i = 0 m 1 γ i i , b W i , ( j , b ) + 1 2 + ( 1 γ i ) . γ i m , b . W i , ( m , b ) 2 + 1 γ i ( m , b ) + 1 2
where γ i : i { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 } is the collision probability for a class i node and can be obtained as:
γ i = { 1 ( 1 β i , f ) n i 1 j = 0 , j i 7 ( 1 β j , f ) n j ( PFB Scheme ) 1 ( 1 β i , b ) n i 1 j = 0 , j i 7 ( 1 β j , b ) n j ( ABEB Scheme )
The expected waiting time of a U P i node in each state of the Markov chain is represented by E s t a t e , i . We compute E s t a t e , i in order to convert the Markov states into real time. E s t a t e , i can be calculated as:
E s t a t e , i = ( 1 P t r ) . δ + i = 0 7 P s , i . T s + T c ( 1 i = 0 7 P s , i )
where δ represents the p C S M A s l o t duration and P t r is the probability that at least one U P i node is transmitting in the given time slot and can be obtained as:
P t r = { 1 i = 0 7 ( 1 β i , f ) n i ( PFB Scheme ) 1 i = 0 7 ( 1 β i , b ) n i ( ABEB Scheme )
P ( s , f ) , i is the success probability by a U P i node using the PFB scheme and can be simplified as:
P ( s , f ) , i = n i β i , f ( 1 β i , f ) n i 1 j = 0 , j i 7 ( 1 β j , f ) n j
Similarly, let P ( s , b ) , i be the success probability of a U P i node using the ABEB scheme, and it can be obtained as:
P ( s , b ) , i = n i β i , b ( 1 β i , b ) n i 1 j = 0 , j i 7 ( 1 β j , b ) n j
The per-node throughput for a U P i is the fraction of time being used to transmit the actual data bits successfully. The per-class normalized throughput can be stated as:
Θ i = { P ( s , f ) , i × T p a y l o a d E s t a t e , i ( PFB Scheme ) P ( s , b ) , i × T p a y l o a d E s t a t e , i ( ABEB Scheme )
T p a y l o a d is the mean payload duration, and i = 0 , 1 , 2 . . . 7 .
In the case of the heterogeneous traffic scenarios, the mean frame service time of a node belonging to U P i can be obtained as:
E [ T i ] = { γ i 1 γ i T c + T s + E s t a t e , i j = 0 m 1 γ i j , f W i , ( j , f ) + 1 2 + E s t a t e , i γ i m i , f W i , ( m , f ) 2 ( 1 γ i ) ( PFB Scheme ) γ i 1 γ i T c + T s + E s t a t e , i j = 0 m 1 γ i j , b W i , ( j , b ) + 1 2 + E s t a t e , i γ i m i , b W i , ( m , b ) 2 ( 1 γ i ) ( ABEB Scheme )
where W i , f and W i , b represent the number of backoff slots in a particular backoff stage for the PFB algorithm and ABEB procedure, respectively. W i , f can be computed as:
W i , f = [ ( P h i ) f ( p h i ) f ] / S q r t [ 5 ]
where P h i = 1 + S q r t [ 5 ] / 2 and p h i = 1 S q r t [ 5 ] / 2 ; whereas, for an ABEB procedure mentioned in the IEEE 802.15.6 standard, W b can be computed as:
W i , b = 2 b / 2 C W i , m i n
In the case of the heterogeneous traffic scenarios, the energy consumption of a node belonging to U P i can be obtained as:
E A V G , i = { 1 λ × P s l e e p + γ i 1 γ i × T c × P r x + T s × P t x + P b o × E s t a t e , i j = 0 m 1 γ i j , f W i , ( j , f ) + 1 2 + P b o × E s t a t e , i γ i m i , f W i , ( m , f ) 2 ( 1 γ i ) ( PFB Scheme ) 1 λ × P s l e e p + γ i 1 γ i × T c × P r x + T s × P t x + P b o × E s t a t e , i j = 0 m 1 γ i j , b W i , ( j , b ) + 1 2 + P b o × E s t a t e , i γ i m i , b W i , ( m , b ) 2 ( 1 γ i ) ( ABEB Scheme )
The values of β i , f , γ i , f and β i , b , γ i , b for the PFB scheme and ABEB scheme respectively, are derived using MATLAB to estimate the desired performance metrics.

5. Results and Discussion

We have compared the results of the proposed user priority-based Fibonacci backoff scheme and alternative binary exponential backoff algorithm for the IEEE 802.15.6 MAC-based CSMA/CA protocol. The PHY-dependent MAC sublayer parameters pertaining to UWB PHY are specified in the IEEE 802.15.6 standard and are used to obtain our results. For estimating energy, we used the parameters considered in [30]. These parameters are summarized in Table 3.

5.1. Numerical and Simulation Results for the Homogeneous Scenario

For the homogeneous scenario, we consider that all of the nodes have the same user priority in the network, i.e., all of the nodes have the same C W m i n and C W m a x values. Here, we choose three different user priority classes. The C W m i n and C W m a x values for different user priorities and UWB PHY-dependent MAC sublayer parameters are summarized in Table 2 and Table 3, respectively. We consider the C W m i n and C W m a x values of the PFB scheme in the same pattern as the ABEB procedure. The payload size is assumed to be an average size of the largest payload allowed and is equal to 1020 bits. The arrival process of packets follows a Poisson process at rates of λ = 0.00075 packets/ μ s. Moreover, to verify the proposed scheme, we have compared the numerical results with a custom-made simulation program written in the C++ programming language. We run the simulator 30 times and then take the average. For each run, the simulation time is 50 s. The simulation closely follows both backoff procedures adopted for the CSMA/CA mechanism of the IEEE 802.15.6 standard. All of the results in this section use different markers to show the simulation data, and colored lines indicate the analytical results.
Figure 10 and Figure 11 show the normalized system throughput and the mean frame service time performance as a function of the number of nodes in the non-saturated homogeneous scenario, respectively. As shown in Figure 10, the PFB procedure performance metrics show an improvement over the ABEB scheme, as the network size increases. This is because we have reduced the gap between subsequent contention window sizes by adopting the PFB procedure, which subsequently reduces the waiting time, and the contending node can access the channel promptly. All of these results show that U P i nodes with lower C W m i n and C W m a x values can access the medium more often and, hence, can achieve a higher system throughput peak more quickly. As the number of nodes increases, we see that the throughput drastically drops for high priority nodes and slowly drops for low priority nodes, just before the saturation point. This drastic decline in the system throughput of a high priority user is due to the lower C W m i n and C W m a x values, which causes more contentions (as the number of nodes increase) and, hence, more collisions. In Figure 11, we see that the PFB procedure outperforms the ABEB procedure, as the PFB procedure leads to a smooth and gradual increase in the CW size after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly. From these results, we can optimize the C W m i n and C W m a x values to achieve better throughput with a reasonable delay.
Figure 12 shows the average energy consumption performance for the PEB and ABEB procedures, as a function of the number of nodes in the non-saturated homogeneous scenario. The average energy consumption is given by Equation (19) and calculated on a per-node per-packet basis. We see that the PFB procedure outperforms the ABEB procedure, as the PFB procedure leads to a smooth and gradual increase in the CW size after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly. Hence, the PFB decreases the expected waiting time and allows the nodes to access the medium promptly, thus improving the average energy consumption performance.

5.2. Numerical Results for the Heterogeneous Scenario

For the heterogeneous scenario, we consider three representative classes of users, where each class has two nodes. All of the classes have different C W m i n and C W m a x . The payload size is assumed to be the average size of the largest payload allowed and is equal to 1020 bits. The arrival process of packets follows a Poisson process at a rate λ. The C W m i n and C W m a x values for different user priorities and UWB PHY-dependent MAC sublayer parameters are summarized in Table 2 and Table 3, respectively. We consider the C W m i n and C W m a x values of the PFB scheme in the same pattern as the ABEB procedure.
Figure 13 shows the normalized per class throughput performance of different U P i nodes against the traffic load in the heterogeneous scenario. We plot the curves using different color lines and markers. All of these curves show that due to smaller values of the C W m i n and C W m a x values, high priority nodes are able to access the channel frequently. For a low arrival rate, the throughput performance gap among the user priorities is small, but as the arrival rate increases, the throughput performance gap also increases due to high traffic load. In Figure 13, the PFB procedure shows an improvement in the normalized per class throughput performance over the throughput performance of the ABEB procedure. This is due to the fact that after each collision, the PFB leads to a smooth and gradual increase in CW size, while ABEB leads to an irregular and fluctuating CW. Hence, the PFB decreases the expected waiting time and allows the U P i node to access the medium with little delay, thus increasing the throughput performance.
Figure 14 shows the head of line delay performance for PEB and ABEB procedures, as a function of traffic load in non-saturated heterogeneous scenario. The head of line delay performance is given by Equation (28). For a given U P i , we see that the mean frame service time rises with an uplift in the arrival rate. We see that U P i nodes with lower C W m i n and C W m a x values can access the medium more often, and hence, the delay is low. The mean frame service time increases quickly for low-priority classes than for high-priority classes as λ increases, because larger values of C W m i n and C W m a x introduce more average backoff time. From Figure 14, it is obvious that the proposed PFB procedure shows a reasonable difference in the delay performance over the ABEB procedure of the WBAN MAC protocol. This is due to the fact that after each collision, the PFB leads to a smooth and gradual increase in CW size, while ABEB leads to an irregular and fluctuating CW. Hence, the PFB decreases the expected waiting time and allows the U P i node to access the medium with little delay, thus increasing the mean frame service time performance.
Figure 15 shows the average energy consumption performance for the PEB and ABEB procedures, as a function of traffic load in the non-saturated heterogeneous scenario. The average energy consumption is given by Equation (31) and calculated on a per-node per-packet basis. We see that U P i nodes with lower C W m i n and C W m a x values can access the medium with a small backoff value, and hence, the average energy consumption is low. From Figure 15, it is obvious that the proposed PFB procedure shows a reasonable difference in the average energy consumption performance over the ABEB procedure of the WBAN MAC protocol. This is due to the fact that after each collision, the PFB leads to a smooth and gradual increase in CW size, while ABEB leads to an irregular and fluctuating CW. Hence, the PFB decreases the expected waiting time and allows the U P i node to access the medium promptly, thus improving the average energy consumption performance.

6. Conclusions

This article presents a performance comparison between the ABEB procedure of IEEE 802.15.6 CSMA/CA and the proposed PFB procedure adopted for WBAN CSMA/CA. We estimated the execution of the IEEE 802.15.6 CSMA/CA operation for both the ABEB and PFB procedures to forecast the normalized throughput, mean frame service time and energy consumption of the network by employing a Markov chain model. The numerical results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure. This is due to the fact that after each collision, the PFB leads to a smooth and gradual increase in CW size, while ABEB leads to an irregular and fluctuating CW. Hence, the PFB procedure leads to a decrease of the waiting time, and the contending node can access the channel promptly with little delay, thus increasing the performance in terms of normalized throughput, head of line delay and energy consumption. To the extent of our exploration, our study is the first one that anticipates the implementation of IEEE 802.15.6 CSMA/CA under a different prioritized backoff algorithm. Our results also show that a smaller priority gap between the U P s will decrease the performance gap between the classes. We intend to extend this work to all access phases of the superframe in a noisy channel environment. We plan to fine-tune the C W m i n and C W m a x values for various priority classes, which can improve different performance metrics. A similar framework for multi-hop wireless networks can also be considered.

Acknowledgments

The authors acknowledge the financial support of the Converging Research Program (2014) through the Incheon National University of Korea.

Author Contributions

Pervez Khan designed, performed the research and wrote the manuscript. Niamat Ullah and Farman Ali contributed to the basic concept of the system and evaluated our method. Sana Ullah and Youn-Sik Hong reviewed the manuscript and took care of the manuscript’s refinements. Ki-Young Lee and Hoon Kim gave some feedback as advisors and discussed some problems of our research. All of the authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Galzarano, S.; Fortino, G.; Liotta, A. A learning-based mac for energy efficient wireless sensor networks. In Proceedings of the International Conference on Internet and Distributed Computing Systems, Calabria, Italy, 22–24 September 2014; pp. 396–406.
  2. Fortino, G.; Giannantonio, R.; Gravina, R.; Kuryloski, P.; Jafari, R. Enabling effective programming and flexible management of efficient body sensor network applications. IEEE Trans. Hum.-Mach. Syst. 2013, 43, 115–133. [Google Scholar] [CrossRef]
  3. Galzarano, S.; Liotta, A.; Fortino, G. QL-MAC: A Q-learning based MAC for wireless sensor networks. In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Vietri sul Mare, Italy, 18–20 December 2013; pp. 267–275.
  4. Part 15.6: Wireless Body Area Networks, IEEE Standard for Local and Metropolitan Area Networks; IEEE Std 802.15.6; IEEE: New York, NY, USA, 2012.
  5. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  6. Park, C.G.; Han, D.H.; Ahn, S.J. Performance analysis of MAC layer protocols in the IEEE 802.11 wireless LAN. Telecommun. Syst. 2006, 33, 233–253. [Google Scholar] [CrossRef]
  7. Foh, C.H.; Tantra, J.W. Comments on IEEE 802. 11 saturation throughput analysis with freezing of backoff counters. IEEE Commun. Lett. 2005, 9, 130–132. [Google Scholar]
  8. Malone, D.; Duffy, K.; Leith, D. Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw. 2007, 15, 159–172. [Google Scholar] [CrossRef]
  9. Ling, X.; Liu, K.H.; Cheng, Y.; Shen, X.; Mark, J.W. A novel performance model for distributed prioritized MAC protocols. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’07), Washington, DC, USA, 26–30 November 2007; pp. 4692–4696.
  10. Villalón, J.; Cuenca, P.; Orozco-Barbosa, L. On the capabilities of IEEE 802.11 e for multimedia communications over heterogeneous 802.11/802.11 e WLANs. Telecommun. Syst. 2007, 36, 27–38. [Google Scholar] [CrossRef]
  11. Abu-Sharkh, O.M.; Tewfik, A.H. Toward accurate modeling of the IEEE 802.11 e EDCA under finite load and error-prone channel. IEEE Trans. Wirel. Commun. 2008, 7, 2560–2570. [Google Scholar] [CrossRef]
  12. Inan, I.; Keceli, F.; Ayanoglu, E. Analysis of the 802.11 e enhanced distributed channel access function. IEEE Trans. Commun. 2009, 57, 1753–1764. [Google Scholar] [CrossRef]
  13. Lauwens, B.; Scheers, B.; Van de Capelle, A. Performance analysis of unslotted CSMA/CA in wireless networks. Telecommun. Syst. 2010, 44, 109–123. [Google Scholar] [CrossRef]
  14. Pollin, S.; Ergen, M.; Ergen, S.; Bougard, B.; Der Perre, L.; Moerman, I.; Bahai, A.; Varaiya, P.; Catthoor, F. Performance analysis of slotted carrier sense IEEE 802.15. 4 medium access layer. IEEE Trans. Wirel. Commun. 2008, 7, 3359–3371. [Google Scholar] [CrossRef]
  15. Lee, S.Y.; Shin, Y.S.; Lee, K.W.; Ahn, J.S. Performance analysis of Extended Non-Overlapping Binary Exponential Backoff algorithm over IEEE 802.15. 4. Telecommun. Syst. 2014, 55, 39–46. [Google Scholar] [CrossRef]
  16. Ashrafuzzaman, K.; Kyung, S.K. On the performance analysis of the contention access period of IEEE 802.15. 4 MAC. IEEE Commun. Lett. 2011, 15, 986–988. [Google Scholar] [CrossRef]
  17. Pyo, C.W.; Harada, H. Throughput analysis and improvement of hybrid multiple access in IEEE 802.15. 3c mm-wave WPAN. IEEE J. Sel. Areas Commun. 2009, 27, 1414–1424. [Google Scholar]
  18. Shurman, M.M.; Al-Mistarihi, M.F.; Alomari, Z.A. MAC layer back-off algorithm for ad hoc networks. In Proceedings of the 36th International Convention on Information & Communication Technology Electronics & Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2013; pp. 446–451.
  19. Yassein, M.B.; Al Oqaily, O.; Min, G.; Mardini, W.; Khamayseh, Y.; Manaseer, S.S. Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc Network. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK, 29 June–1 July 2010; pp. 749–754.
  20. Tashtoush, Y.; Darwish, O.; Hayajneh, M. Fibonacci sequence based multipath load balancing approach for mobile ad hoc networks. Ad Hoc Netw. 2014, 16, 237–246. [Google Scholar] [CrossRef]
  21. Khan, P.; Ullah, N.; Alam, M.N.; Kwak, K.S. Performance analysis of WBAN MAC protocol under different access periods. Int. J. Distrib. Sens. Netw. 2015, 2015, 102052. [Google Scholar] [CrossRef]
  22. Ullah, S.; Kwak, K.S. Throughput and delay limits of IEEE 802.15. 6. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28–31 March 2011; pp. 174–178.
  23. Rashwand, S.; Misic, J. Performance evaluation of IEEE 802.15. 6 under non-saturation condition. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 5–9 December 2011; pp. 1–6.
  24. Rashwand, S.; Mišić, J.; Khazaei, H. IEEE 802.15. 6 under saturation: Some problems to be expected. J. Commun. Netw. 2011, 13, 142–148. [Google Scholar] [CrossRef]
  25. Ahmad, A.; Javaid, N.; Khan, Z.A.; Imran, M.; Alnuem, M. iA-MAC: Improved adaptive medium access control protocol for wireless body area networks. In Proceedings of the 14th International Symposium on Communications and Information Technologies (ISCIT), Incheon, Korea, 24–26 September 2014; pp. 156–160.
  26. Rashwand, S.; MišIć, J. Effects of access phases lengths on performance of IEEE 802.15. 6 CSMA/CA. Comput. Netw. 2012, 56, 2832–2846. [Google Scholar] [CrossRef]
  27. Tachtatzis, C.; Di Franco, F.; Tracey, D.C.; Timmons, N.F.; Morrison, J. An energy analysis of IEEE 802.15. 6 scheduled access modes. In Proceedings of the 2010 IEEE Globecom Workshops, Miami, FL, USA, 5–10 December 2010; pp. 1270–1275.
  28. Ullah, S.; Imran, M.; Alnuem, M. A hybrid and secure priority-guaranteed MAC protocol for wireless body area network. Int. J. Distrib. Sens. Netw. 2014, 2014, 481761. [Google Scholar] [CrossRef]
  29. Chávez-Santiago, R.; Sayrafian-Pour, K.; Khaleghi, A.; Takizawa, K.; Wang, J.; Balasingham, I.; Li, H.B. Propagation models for IEEE 802.15. 6 standardization of implant communication in body area networks. IEEE Commun. Mag. 2013, 51, 80–87. [Google Scholar] [CrossRef]
  30. Ullah, N.; Khan, P.; Kwak, K.S. A Very Low Power MAC (VLPM) protocol for wireless body area networks. Sensors 2011, 11, 3717–3737. [Google Scholar] [CrossRef] [PubMed]
Figure 1. IEEE 802.15.6 PHY and MAC layers.
Figure 1. IEEE 802.15.6 PHY and MAC layers.
Sensors 17 00492 g001
Figure 2. PPDU structure for NB PHY (the indicated lengths are in bits).
Figure 2. PPDU structure for NB PHY (the indicated lengths are in bits).
Sensors 17 00492 g002
Figure 3. PPDU structure for HBC PHY.
Figure 3. PPDU structure for HBC PHY.
Sensors 17 00492 g003
Figure 4. PPDU frame structure for UWB PHY.
Figure 4. PPDU frame structure for UWB PHY.
Sensors 17 00492 g004
Figure 5. Configuration of access phases with beacon intervals.
Figure 5. Configuration of access phases with beacon intervals.
Sensors 17 00492 g005
Figure 6. Slotted Aloha access illustration.
Figure 6. Slotted Aloha access illustration.
Sensors 17 00492 g006
Figure 7. The IEEE 802.15.6 CSMA/CA mechanism.
Figure 7. The IEEE 802.15.6 CSMA/CA mechanism.
Sensors 17 00492 g007
Figure 8. PFB-based IEEE 802.15.6 CSMA/CA procedure.
Figure 8. PFB-based IEEE 802.15.6 CSMA/CA procedure.
Sensors 17 00492 g008
Figure 9. DTMC for the non-saturation behavior of the PFB-based WBAN CSMA/CA protocol.
Figure 9. DTMC for the non-saturation behavior of the PFB-based WBAN CSMA/CA protocol.
Sensors 17 00492 g009
Figure 10. Normalized system throughput in the homogeneous case for different backoff algorithms.
Figure 10. Normalized system throughput in the homogeneous case for different backoff algorithms.
Sensors 17 00492 g010
Figure 11. Mean frame service time in the homogeneous case for different backoff algorithms.
Figure 11. Mean frame service time in the homogeneous case for different backoff algorithms.
Sensors 17 00492 g011
Figure 12. Energy consumption in the homogeneous case for different backoff algorithms.
Figure 12. Energy consumption in the homogeneous case for different backoff algorithms.
Sensors 17 00492 g012
Figure 13. Normalized per class throughput in the heterogeneous case for different backoff algorithms.
Figure 13. Normalized per class throughput in the heterogeneous case for different backoff algorithms.
Sensors 17 00492 g013
Figure 14. Mean frame service time of U P s in the heterogeneous case for different backoff algorithms.
Figure 14. Mean frame service time of U P s in the heterogeneous case for different backoff algorithms.
Sensors 17 00492 g014
Figure 15. Energy consumption of U P s in the heterogeneous case for for different backoff algorithms.
Figure 15. Energy consumption of U P s in the heterogeneous case for for different backoff algorithms.
Sensors 17 00492 g015
Table 1. CW bounds for the CSMA/CA, and CP limits for slotted Aloha of WBAN.
Table 1. CW bounds for the CSMA/CA, and CP limits for slotted Aloha of WBAN.
User PriorityTraffic DesignationCSMA/CASlotted Aloha
CW min CW max CP max CP min
7Emergency or medical event report141 1 4
6High priority medical data or control28 1 2 3 16
5Media data of network control48 3 8 3 16
4Voice (VO)416 3 8 1 8
3Video (VI)816 1 4 1 8
2Excellent Effort (EE)832 1 4 3 32
1Best Effort (BE)1632 1 8 3 32
0Background (BK)1664 1 8 1 16
Table 2. CW bounds for ABEB and PFB procedures of IEEE 802.15.6 CSMA/CA.
Table 2. CW bounds for ABEB and PFB procedures of IEEE 802.15.6 CSMA/CA.
User PriorityABEBPFB
CW min CW max CW min CW max
71415
62828
54838
4416313
3816813
2832821
116321321
016641334
Table 3. UWB PHY-dependent MAC sublayer parameters.
Table 3. UWB PHY-dependent MAC sublayer parameters.
ParameterValue
S l o t t i m e 292 μ s
p S I F S 75 μ s
p C C A 252 μ s
p C S M A M A C P H Y T i m e 40 μ s
M A C H e a d e r 56 bits
M A C F o o t e r 16 bits
P H Y H e a d e r 31 bits
P a y l o a d 1020 bits
P L C P H e a d e r ( d a t a r a t e ) 91.9 (kb/s)
P S D U ( d a t a r a t e ) 3159 (kb/s)
A c k T i m e 468.4 μ s
P t x 29.9 mW
P r x 24.5 mW
P b o 24.5 mW
P s l e e p 37 μ W

Share and Cite

MDPI and ACS Style

Khan, P.; Ullah, N.; Ali, F.; Ullah, S.; Hong, Y.-S.; Lee, K.-Y.; Kim, H. Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks. Sensors 2017, 17, 492. https://doi.org/10.3390/s17030492

AMA Style

Khan P, Ullah N, Ali F, Ullah S, Hong Y-S, Lee K-Y, Kim H. Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks. Sensors. 2017; 17(3):492. https://doi.org/10.3390/s17030492

Chicago/Turabian Style

Khan, Pervez, Niamat Ullah, Farman Ali, Sana Ullah, Youn-Sik Hong, Ki-Young Lee, and Hoon Kim. 2017. "Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks" Sensors 17, no. 3: 492. https://doi.org/10.3390/s17030492

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop