Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA ()
1. Introduction
1.1. The Problem of WLAN in Hospitals
In almost hospitals, sickrooms and consultation rooms are respectively gathered at one place for convenience of patients. It may be good for patients and hospital sites, however, on the view point of wireless system, there is a problem. Since medical devices access the wireless local area network (WLAN) base station via wireless channel, the collision when more than one devices access the channel in the same time, will occurs depending on the number of devices and the number of data packets that be generated by every device in one second. Moreover, a lot of devices access the WLAN base station that is close to the consultation rooms (Wireless LAN 2 in Figure 1), whereas a few devices access the WLAN base station that is far from consultation rooms (Wireless LAN 1). The access of devices concentrates at Wireless LAN 2, consequently, the probability of collision increases, and then the throughput decreases, the delay increase. As a result the bandwidth efficiency decreases.
1.2. Aims and Motivations
Since many body functions are traditionally monitored and separated by a considerable period of time, it is hard for doctors to know what is really happening. This is the reason why the monitoring of movement and all body functions in daily life are essential. The delay of patients’ data as well as the collision of data packets may let doctors misunderstand and information data be lost by timeout. In order to decrease the delay and increase the throughput, the relay can be set to avoid the concentration of WLAN base station. As shown in Figure 1), some devices assess the wireless LAN 1 via the relay, therefore, the number of devices that access the wireless LAN 2 is reduced, and then the bandwidth efficiency is expected to be higher. However, the delay due to signal processing at relay should be considered. At scheme 1, all devices access the wireless LAN 2, whereas at scheme 2, the relay is set and devices access the channel via either wireless LAN 1 or 2. The performance of both schemes 1 and 2 is mathematically analyzed base on standard IEEE802.15.6. The throughput, delay and bandwidth efficiency of both schemes are numerically compared.
1.3. Related Works
According to an emergency of wireless body area network (WBAN), the standard IEEE802.15.6 was established in Feb. 2012 [1] . An overview of the standard and performance analyses of WBAN based on bandwidth efficiency and delay were represented in [2] - [4] . In these papers, however, the WBAN is assumed to consists of only one device that keeps transmitting a data packet. Packet arrival rates and collisions due to transmission of multiple devices in the same time weren’t considered. On the other hand, a Physical layer (PHY), Media Access Control (MAC) layer and network layer of WBAN were researched in [5] [6] . Furthermore, the control on MAC layer was analyzed to improve the performance of WBANs [7] [8] . The transmission of implanted devices was considered under conditions of low transmit power and low harmful influence on a human body [9] [10] . The performance of WBANs that has multiple devices and multiple user priorities were analyzed in both saturation [11] [13] [14] and non-saturation [12] . Additionally, WBANs were analyzed in further detail when a superframe with beacon mode and an access phases length were taken into consideration in [13] [14] , respectively. However, efficiencies of number of devices, packet arrival rates, packet sizes, etc. on the throughput of each device and the total throughput, the delay and the bandwidth efficiency of system hasn’t been discussed.
1.4. Organization of the Paper
The rest of paper is organized as follows. We introduce a brief of PHY and MAC layers of standard IEEE802.15.6
Figure 1. The wireless LAN system in a hospital.
in Section 2. The discrete time Markov chain is proposed and then the performance of both schemes 1 and 2 with CSMA/CA is analyzed in Section 3. The numerical evaluation of both schemes is described and compared in Section 4. Finally, Section 5 concludes the paper.
2. Brief of Standard IEEE802.15.6
A brief of the standard that related to our research is described in this section. The further detail of standard can be found in [1] [2] .
2.1. PHY Layer
The IEEE802.15.6 defines three different PHYs, i.e., human body communication (HBC), narrowband (NB) and ultra wideband (UWB). Furthermore, the NB is divided in several frequency bands and a data rate, symbol rate, etc. of every frequency band are different. We analyze the system in 2400 MHz - 2483.5 MHz band as an example, the analysis in different frequency band is similar. The physical protocol data unit (PPDU) of NB PHY is described in Figure 2. Components of PPDU are fixed, excepted the payload. Parameters of PHY layer are summarized in Table 1.
2.2. MAC Layer
The algorithm of CSMA/CA based on IEEE802.15.6 is described as follows. All devices set their backoff counter
to a random integer number uniformly distributed over the interval, where is a contention window within. The value of and varies depending on the user priorities (UPs). However, in this paper, the UP of all devices is assumed to be the same as zero-th UP. The extension for multiple UPs is straightforward.
As shown in Figure 3, a device starts decrementing its back off counter by one for each idle CSMA slot. When the back off counter reaches zero, the device transmits its packet. Once the channel is busy because of transmission of another device, the device locks the back off counter until the channel is idle. The transmission is failed if the device fails to receive an acknowledgement (ACK) due to a collision or being unable to decode. The is doubled for even number of failures until it reaches. The maximum number of back off stages is bound by a retry limit m. Once the number of retries exceeds the predefined retry limit m, the packet is discarded. When the transmission is successful, the W is set to. The W of zero-th UP is represented in Table 2.
3. Performance Analysis of WBANs
3.1. Discrete Time Markov Chain
At first, the performance of scheme 1 is analyzed. The scheme 1 consists of a single base station, the wireless LAN 2, and n devices in a star topology, D1, D2, ・・・, Dn (Figure 1). All devices can access the wireless LAN 2 directly, however, the wireless LAN 1 is out of them range. The discrete time Markov chain (DTMC) is proposed to calculate the access probability of each device in every time slot. The proposal DTMC of device i with empty state is described in Figure 4 and notations used in this section are listed in Table 3. A packet arrival rate of all devices is assumed the same and denoted by. Hence, , where denotes the Napier’s constant, denotes the probability that the device has a packet to transmit in duration time of Ts. The transmission failed probability and the idle probability of device I are respectively expressed as
(1)
here. The state transmission probabilities of DTMC method are represented as follows.
Figure 3. An example of operation of CSMA/CA and relationships of time durations.
Table 2. Contention window for every UP.
(2)
As shown in Figure 4, we have
(3)
Moreover, the stationary distribution can be calculated by using the state transition probability.
(4)
From above equations, the can be described as a function of, , , and, Furthermore, the access probability of every device can be calculated by solving equations.
(5)
3.2. System Throughput
The probability in which at least one device is sending a packet is called as transmission probability,.
(6)
The successful probability of device means that only device is transmitting on the medium under condition on the fact that at least one device is transmitting and is represented by. In addition, the coordinator can decode the packet correctly.
(7)
Let denote the total successful probability of all devices. Once the transmission is suc-
cessful, the device receives a ACK packet with no payload from the coordinator, whereas the device receives NACK packet or nothing after the timing to receive the ACK packet if the transmitted packet is collided or unable to decode. Consequently, the duration time to transmit a packet successfully, , is assumed to equal to the duration time of failed transmission, hereafter is called as the successful transmission time. The successful transmission time is the total duration time to transmit a packet, includes the duration time to transmit a data packet, interframe spacing, ACK packet and delay time.
(8)
Let, , , and denote the duration time to transmit a preamble, PHY header, MAC header, MAC body and FCS, respectively. Therefore, the duration time to transmit a data packet is given by
(9)
Since an immediate ACK/NACK carries no payload, its transmission time is represented as follows.
(10)
Finally, the throughput of device is described as
(11)
and the system throughput becomes
(12)
The throughput of scheme 2 is also represented by (12). However, several devices access the channel via the relay and the wireless LAN 1, therefore, the concentration at the wireless LAN 2 is avoided and the successful probability of all devices increases. As a result, the throughput of system is expected to increase.
3.3. Delay
The average access delay, defined as the time elapsed between the time instant when the frame is put into service and the instant of time the frame terminates a successful delivery. Under the assumption of no retry limits, this computation is straightforward. In fact, we may rely on the well known Little’s Result, which states that, for any queueing system, the average number of customers in the system is equal to the average experienced delay multiplied by the average customer departure rate. The application of Little’s result to our case yields:
(13)
The delay computation is more elaborate when a frame is discarded after reaching a predetermined maximum number of retries m. In fact, in such a case, a correct delay computation should take into account only the frames successfully delivered at the destination, while should exclude the contribution of frames dropped because of frame retry limit (indeed, the delay experienced by dropped frames would have no practical significance).
To determine the average delay in the finite retry case, we can still start from Little’s Result, but we need to replace in (13) with the average number of frames that will be successfully delivered. Thus, (13) can be rewritten by
(14)
here, denotes the probability that a randomly chosen frame will be successfully transmitted before the retransmission reaches the retry limit. Therefore, the is represented as follows.
(15)
For Scheme 2, the delay due to the multiple access at the wireless LAN 1 and 2 is similar to (14). However, the delay due to the capability of relay also should be considered. The delay due to the relay is calculated by
, here denote the set of devices that access the relay and the is the capability of relay. There-
fore, the average delay of information data that is transmitted via relay is represented as follows.
(16)
The delay of scheme 2 is the maximal delay of information data that is transmitted to wireless LAN 1 and 2.
3.4. Bandwidth Efficiency
In order to compare the system with and without relay, the bandwidth efficiency is adopted. The bandwidth efficiency of both schemes 1 and 2 is calculated as the ratio of total throughput of system and the total generated data. Notice that the total throughput of scheme 1 and 2 is different.
. (17)
4. Numerical Evaluation
The system model is the same as mentioned above and the parameters in Table 1 are used. The average distance between all devices and the wireless LAN 1 and 2 is respectively 500 m and 250 m. The relay is set at halfway between the devices and the wireless LAN 1. The delay of propagation is taken into account. The capability of relay is assumed to be 300 Mbps. The noise-free is also assumed. At first, the performance of scheme 1 is illustrated.
The throughput of scheme 1 base on lambda and the number of devices is described in Figure 5 and Figure 6, respectively. The generated data is the total data that is generated at all devices, however the generated data isn’t always successfully transmitted due to the collision and the time out. Therefore, the throughput of system is considerably smaller than the generated data, especially when the number of devices and/or the lambda are high. Moreover, the delay of scheme 1 also increase when the number of devices and/or the lambda increase (Figure 7). These are the reason the scheme 2 is taken into consideration as description in Section 1.2.
Figure 5. Throughput of scheme 1 based on lambda.
Figure 6. Throughput of scheme 1 based on the number of devices.
The comparison on the delay and the bandwidth efficiency of both schemes 1 and 2 is respectively described in Figure 8 and Figure 9, where the number of devices is fixed to be 10 and 40. For scheme 2, since the concentration at the wireless LAN 2 is avoided, the collision probability decreases. Therefore, the throughput of system increase and then the delay as well as the bandwidth efficiency increase and be higher than that of scheme 1, especially when the number of devices and/or the lambda are large. When the number of devices and the lambda are low, the difference of schemes 1 and 2 is small. Notice that the scheme 2 is more complicated due to the adding of relay and controlling the transmission of devices. It means that there are the trade off between the performance and the complication of scheme 2.
5. Conclusions
The wireless system in a hospital has been taken into consideration and the performance is analyzed based on the standard IEEE802.15.6. The DTMC method was proposed to calculate the access probability and then the collision probability, the successful probability, the throughput, the delay, the bandwidth efficiency of system have been theoretically calculated. The performance of system with and without relay is also numerically compared, the bandwidth efficiency of scheme 2 is higher while the delay is smaller than that of scheme 1 when the number of devices and/or the packet rate are large. However, the scheme 2 is more complicated due to the controlling transmission of devices and the adding of relay.
The devices were assumed to transmit the information data to either the wireless LAN 1 or the wireless LAN 2. However, the control method hasn’t been explained clearly. Moreover, the CSMA/CA was adopted, another access protocol [15] wasn’t taken into account leave them to our future works.