DOI QR코드

DOI QR Code

Adaptive GTS allocation scheme with applications for real-time Wireless Body Area Sensor Networks

  • Zhang, Xiaoli (School of Information and Communication Engineering, Inha University) ;
  • Jin, Yongnu (School of Information and Communication Engineering, Inha University) ;
  • Kwak, Kyung Sup (School of Information and Communication Engineering, Inha University)
  • Received : 2014.07.29
  • Accepted : 2015.03.20
  • Published : 2015.05.31

Abstract

The IEEE 802.15.4 standard not only provides a maximum of seven guaranteed time slots (GTSs) for allocation within a superframe to support time-critical traffic, but also achieves ultralow complexity, cost, and power in low-rate and short-distance wireless personal area networks (WPANs). Real-time wireless body area sensor networks (WBASNs), as a special purpose WPAN, can perfectly use the IEEE 802. 15. 4 standard for its wireless connection. In this paper, we propose an adaptive GTS allocation scheme for real-time WBASN data transmissions with different priorities in consideration of low latency, fairness, and bandwidth utilization. The proposed GTS allocation scheme combines a weight-based priority assignment algorithm with an innovative starvation avoidance scheme. Simulation results show that the proposed method significantly outperforms the existing GTS implementation for the traditional IEEE 802.15.4 in terms of average delay, contention free period bandwidth utilization, and fairness.

Keywords

1. Introduction

With recent improvement in system-on-chip designs, microelectronics and integrated circuits, wireless communication, and intelligent low-power sensors [1], wireless personal area networks (WPANs) are attracting increasing research attention from both academic and industrial areas. The wireless body area sensor network (WBASN) is a special WPAN with applications in health-care [2], military, sports training, and other value-added areas [3]. The main requirements of WBASNs are low-rate, short-distance, and low-cost. Among some well-known specifications, the IEEE 802.15.4 standard, which targets ultralow costs, complexity, and power for low-rate wireless connectivity among inexpensive portable moving devices [4], is recognized as one of the most promising options for the short-transmission-range WBASNs.

Fig. 1 shows a superframe structure adopted by the IEEE 802.15.4 beacon-enabled mode [5]. The protocol provides guarantees for real-time data transmission by utilizing the guaranteed time slot (GTS) mechanism in the contention free period (CFP) of the beacon-enabled mode. The GTS allocation is especially attractive for the applications in time-sensitive WBASNs because it can improve the reliability and performance of data transmissions due to scheduled transmissions. However, the fixed first-come first-served (FCFS) scheduling policy [5-6] may not satisfy the time constraints on time-sensitive transactions with delay deadlines very well, especially in medical and manufacturing sensor networks that monitor emergency events [7]. The issue is further exacerbated when the abuse of dedicated resources leads to the exclusion of other data deliveries and some devices are starved with low data transmission frequencies due to a fixed timer and an inflexible de-allocation problem [8-10].

Fig. 1.Superframe structure for the IEEE 802.15.4 scheme.

Considerable research efforts have been recently devoted to evaluating the performance of both carrier sense multiple access with collision avoidance (CSMA/CA) and GTS mechanisms of the IEEE 802.15.4 protocol [14-17]. In [18], researchers proposed an implicit GTS allocation mechanism henceforth referred to as the iGAME algorithm. This algorithm not only supports higher bandwidth utilization, but also allows GTS sharing among many devices in a round-robin fashion. However, the iGAME does not guarantee delay requirements well and starvation is never addressed. In [19], an explicit GTS scheduling algorithm was proposed to guarantee the delay constraints in scenarios where all seven GTS slots were occupied by networked devices. However, this algorithm operated under too many constraints. In [20], an algorithm was developed called the earliest delay constraint with minimum GTS. This proposal dealt with assigning a minimum number of GTSs to as many transactions as possible in every beacon interval. Although it satisfied the delay-sensitive transactions well, it went unmentioned how well it reduced GTS starvation leading to the possibility that the overhead required more energy consumption. Huang et al. [11] utilized a classification phase and a GTS scheduling phase in an AGA scheme. The main advantage to this algorithm is that it considers latency and fairness during GTS allocation. However, this proposal failed to consider any mechanism to improve the bandwidth utilization of GTS-allocated devices. Other protocols aiming at throughput improvement were presented in [21-23].

This paper focuses on the GTS allocation mechanism in IEEE 802.15.4 and without introducing any extra overhead proposes an adaptive GTS allocation scheme considering low latency and fairness [5]. In our proposed scheme, devices are divided into three traffic patterns and are followed the rule presented in a state transition diagram. For devices in normal traffic, differentiated services are provided and a weight-based priority assignment algorithm (WPAA) is designed. This WPAA assigns the priorities of devices in a dynamic fashion considering their recent GTS-usage feedbacks. In this way, devices that require more attention from the coordinator are assigned higher priority to access GTS resources. Additionally, we propose a clock-ring starvation avoidance mechanism (CRSAM) to manage lower priority devices, which are at risk of starvation due to insufficient GTSs for data transmissions over a long period. A careful performance evaluation of our proposed scheme is given by comparing it to the existing IEEE 802.15.4 MAC through simulations in terms of average packet delay, CFP bandwidth utilization, and fairness.

This paper is divided into four sections. In Section 2, we describe the basic principles of our proposed scheme. The mathematical analysis and simulation results are given in Section 3. Finally, Section 4 offers conclusions.

 

2. Adaptive GTS allocation scheme

The objective in this section is to present our basic principles and design algorithms for the IEEE 802.15.4-based WBASNS, considering low latency, bandwidth utilization, and fairness. A typical body area network (BAN) [12] consists of a number of inexpensive, lightweight, and miniature sensor platforms, each featuring one or more physiological sensors. These sensors can be located anywhere on the body as tiny intelligent patches, integrated into clothing, implanted below the skin, or deeply embedded in tissues. A typical BAN consists of a few devices (called BAN nodes or BNs) with the option to add more devices as required. The central device, called a BAN network controller (BNC or Hub), is used to manage and coordinate the BAN. Fig. 2 shows a typical BAN architecture.

Fig. 2.Star-shaped topology of a BAN.

Data from these sensors is collected periodically. Emergency data, however, is generated suddenly and requires immediate transmission. Hence, relatively limited GTS resources should be assigned to needy devices with continuous data transmission. By contrast, previously allocated but unused GTSs should be reassigned in time.

For convenience, we define a CSMA/CA hit, a CSMA/CA miss, a GTS hit and a GTS miss as follows:

It is obvious that a CSMA/CA hit or a GTS hit represent more recent traffic for a certain device, whereas a CSMA/CA miss or a GTS miss indicate comparatively light traffic. Consequently, the recent data transmission behavior of devices can be well known through the occurrence of CSMA/CA hits/misses and GTS hits/misses. Here, we define ‘H’ to refer an event that CSMA/CA hit or GTS hit or both happen, while ‘M’ represents that both CSMA/CA miss and GTS miss happen. Therefore, ‘H’ is an union of CSMA/CA hit and GTS hit, and ‘M’ is an intersection of CSMA/CA miss and GTS miss as the following two equations.

where ∪ is the union or sum logical operation and ∩ is intersection or product logical operation. Since and , from (1) and (2), it can be easily proved that . In this way, the recent data transmission behavior of devices can be recorded by the coordinator and based on the previous and current transmission condition of a device, the following WPAA in the Section 2.3.1 can be applied.

2.1. Device Classification

Devices are classified into three traffic patterns: emergency, pseudo-emergency, and normal traffic. Furthermore, we rename a hit/miss (including both CSMA/CA hit/miss and GTS hit/miss) in emergency cases as E-hit/E-miss, and E’-hit/ E’-miss in pseudo-emergency traffic. Accordingly, a hit/miss in normal traffic is represented by N-hit/N-miss.

Emergency traffic represents the highest priority level, bringing about an emergency message or an alarm. Such traffic is initiated by devices in the event of an emergency, and it is entirely unpredictable. When an emergency occurs, time-critical data is transmitted immediately, privileging it over the less-critical data.

Pseudo-emergency traffic is initiated by devices, which might be starved due to low data-transmission frequencies. In Section 2.3.2, we propose a CRSAM to prevent devices in light traffic from starvation. With the CRSAM, a parameter Qn is defined to state the liveliness of a device’s clock. When Qn reaches 0—that is, at the moment the clock expires—the device will send this information to the coordinator and attempt to access the channel. Because this kind of traffic does not issue a real emergency event, the priority level is lower than that of actual emergency traffic but higher than that of normal traffic.

Normal traffic means that there are neither time restrictions for transmission nor exceptional phenomena for any data. Normal traffic patterns are initiated by devices under normal circumstances and send routine health information to the coordinator. This kind of traffic is generated heavily on a periodic basis and should be handled carefully.

2.2. State Transition

During the CAP, devices, which want to request new GTS allocations, send GTS request command to the BAN coordinator, and this request command changes the traffic pattern information. The state transition of devices with heterogeneous traffic patterns is scheduled as shown in Fig. 3, where emergency traffic, pseudo-emergency traffic, and normal traffic are represented by SE, SPE, and SN, respectively. Notably, a new state, S0—an interim state between SN and SE—is introduced with some interesting properties. For example, devices residing in the SE state with the occasional transmission interruption have a second chance before being downgraded to the normal traffic level state, at which temporarily unstable transmission device behavior is more tolerable.

Fig. 3.State transition diagram.

The order of traffic levels for these states is SE > SPE > S0 > SN. Initially, all devices are placed in the SN state. At the end of each superframe, the coordinator examines the GTS usage for all devices before deciding which state each device subsequently transitions toward. The transition follows the solid and dashed lines in Fig. 3. Solid lines represent the occurrence of a CSMA/CA or GTS hit, while dashed lines signify a CSMA/CA or GTS miss. In accordance with the rules in the state transition diagram, devices with more time-critical events are prioritized for data transmission.

The details for state and priority maintenance are described as follows:

2.3. Service Differentiation

Generally, emergency data is generated with a small probability; while most data transmissions belong to normal traffic, and pseudo emergency traffic can be regarded as a special case of normal traffic. Therefore, the provided differentiated services are discussed as follows.

Emergency data transmissions are improbable, GTS resource allocation is comparatively sufficient for this kind of event. It has the highest priority level for GTS allocation.

For the devices in normal traffic, their recent data transmission behavior can be known through the occurrence of N-hits and N-misses. An N-hit represents more recent traffic for a certain device, while an N-miss indicates relatively light traffic. Therefore, priorities of normal traffic are set dynamically according to the transmission feedback. Our scheme provides a parent-child-based tree-structure algorithm for updating the priority numbers, named as the WPAA (described in the following section). Through the WPAA, we assign higher priority to devices with more recent traffic having a higher likelihood of transmitting data in the subsequent superframe.

Finally, for devices in pseudo-traffic, we propose a starvation avoidance mechanism to reestablish service attention to lower-priority devices. Details for this mechanism, known as the CRSAM, are provided in Section 2.3.2.

2.3.1. A Weight-based Priority Assignment Algorithm

Although the coordinator can roughly monitor the recent transmission behavior of the devices, it is not effective given limited GTS resources (there are only seven). Thus, we propose a WPAA to dynamically assign the specific priority number to each device by the coordinator according to the recent transmission feedback. Hence, GTS resources can be allocated to more needy devices with consecutive transmissions.

Assume that device n maintains the following parameters at the beginning of the current superframe. PRIni-1 and PRIni are the weight-based priorities in depth (i - 1) and in depth i of the tree structure (see Fig. 4), respectively. Provided that each device receives the beacon at the beginning of the current superframe, the weight-based priority of device n, i.e., PRIni , will be updated as follows:

Fig. 4.Tree structure for the WPAA. For each node, the red numbers denote its weight value, and the yellow circles illustrates the condition of a certain device n, in which M/H represents an occurrence of an N-miss and an N-hit, respectively.

PRIn0 can be obtained from past transmission feedback. Alternatively, PRIni can be deduced from earlier PRIni-1 because a recursive sequence is implicit in the principle of mathematical induction [9].

Wci is derived as follows:

where Wpi and Wci are the nodes’ weight values in depth i of the tree structure (see Fig. 4) under the previous and current condition, respectively. cpi and cci are the previous and current condition mapped to a parent node and a child node (as in Fig. 4), respectively. In other words, the weight of a child node is twice that of its parent node if the current condition is the same as the previous condition (HH/MM). Otherwise (HM / MH), it is equivalent to its parent node’s opposite number. Notice that |Wp1| = |Wc1| = 1 is a given condition.

For example, consider PRI18 = PRI28 = 20 , cp9 = H and Wp9 = +8 for Device 1 and Device 2. Suppose there is an N-hit for Device 1 and an N-miss for Device 2 in the current superframe. Thus, cc9 = H for Device 1, and cc9 = M for Device 2. The weight-based priorities are obtained as follows:

In the above case, Device 1 and Device 2 have the same previous weight-based priority. When there is an N-hit/N-miss in the current superframe, the priorities for the two devices are changed to different values: (+16) for Device 1 in the case of an N-hit, and (-8) for Device 2 given an N-miss. The reason is that devices with continual N-hits, indicating consecutive transmissions, is given a higher priority, while devices with temporarily unstable transmission behavior, is assigned a lower priority.

Fig. 4 presents the tree structure for the WPAA process in a superframe. It is obvious that the devices with high-frequency sending are favored by our algorithm, while devices that are idle for a period of time will be downgraded dramatically by the coordinator, and the unused GTS resources will be reclaimed immediately by the devices with heavy traffic. Therefore, with this approach, devices use GTS resources more efficiently.

2.3.2. A Clock-Ring Starvation Avoidance Mechanism

By using the WPAA method, devices with more frequent data transmissions will have a higher probability of obtaining GTS allocation in the following superframe, while devices with relatively light recent traffic will be less likely to gain GTS resources. Although the effective utilization of GTSs is considerably improved, the starvation problem for devices with low traffic requires our urgent attention. To address this issue, we propose an innovative starvation avoidance scheme, named as CRSAM.

A device n maintains a table as follows:

where NHn is the N-hit number for device n in the current superframe, and Qn is a threshold value derived as follows:

where NHmax is the N-hit number for the device with the highest priority. That is, it is the maximum value among all devices’ N-hit numbers in the current superframe.

Algorithm 1 describes the design and implementation of the CRSAM. Whenever a change occurs on a certain device in low traffic, the value of Qn changes correspondingly. Parameter NC is TRUE if an N-hit occurs. Otherwise, NC is FALSE. If NC is TRUE, then NHn increases by one and Qn changes based on Formula (7). If NC is FALSE, then NHn maintains the same value and Qn is reduced by one. When the value of Qn is below or equal to the normal boundary 0, the E’-hit will be initiated and the traffic state will follow the state transition diagram (described in Fig. 3).

As mentioned in Section 2.1, a device will not attempt to access the channel when Qn is alive. However, the clock rings when Qn reaches 0. By this method, the device reports the coordinator that it fails to access the channel for a relatively long period and wants to request GTS allocation. The coordinator then checks whether there are resources available in the current superframe for this pseudo-emergency because emergency events are given the highest priority. Under normal circumstances (that is, when the maximum length of seven time slots has not been reached), the device is momentarily provided with GTS allocation. Once the data transmission is completed, GTS resources are reallocated to high traffic devices. When resources are not available, the device must wait until the next superframe. Therefore, starvation can be avoided in low-priority devices with the CRSAM.

 

3. Performance Evaluations

3.1. Mathematical Analysis

Traffic is modeled using a Poisson process with an arrival rate λ and a service rate μs and a single queue with a finite buffer is employed. Additionally, a new packet is blocked if it founds that the queue is full. In this work, we assume that the offered load ( ρ ) is less than one. Two traffic types generated by devices are considered: heavy traffic and light traffic. λh and λl represent the arrival rates for heavy-traffic and light-traffic devices, respectively. Let Ph denote the probability of heavy-traffic devices and Pl represent the probability of light-traffic devices. Hence, the arrival rate λ is given as:

The term Tx is the time taken to transmit a packet of size x, and TACK is the time taken for the acknowledgement (ACK) transmission.

where LPHY is the length of the PHY header in bytes, LMAC_HDR is the length of the MAC header in bytes, Laddress is the length of the MAC address, LMAC_FTR is the length of the MAC footer in bytes, and R is the raw data rate in bits per second (bps). Thus, TACK in (9) can be calculated as:

The average delay for the traditional 802.15.4 MAC protocol (D15.4) and the proposed scheme (Dps) can be obtained from the following expressions:

where Wq is the per-packet queue-waiting time in terms of the number of packets in the queue, TBeacon is a beacon duration, TBO is the duration of the back-off period, TIFS is the general IFS time for packets of size x, TSD is a superframe duration, and Tps is the time taken for priority assignment with the proposed scheme. Notice that a node performs a clear channel assessment (CCA) twice during the back-off procedure in the beacon-enabled IEEE 802.15.4. The back-off duration can thus be expressed as

The term BOslots refers to the average number of slots to which the node deferred its transmission. TBO_slot is the slot duration, and TCCA is the time required for the CCA.

The per-packet queue-waiting time (Wq) in terms of the number of packets in the queue can be calculated as

Let qn be the number of packets in the queue, and pb be the blocked probability. Additionally, k is the buffer capacity with a queue of k length packets. Obviously, the number of packets in the queue affects the packet delay qn , which is given by:

The blocked probability ( pb ), the offered load ( ρ ), and the queue utilization ( σq ) are defined as follows:

We then calculate the throughput in terms of packets successfully delivered. The average throughput can be expressed as

The CFP bandwidth utilization is obtained by:

Furthermore, a fairness index F for the packet average delay is used to measure the fairness among different traffic-type devices for our scheme. F is defined in [13] as

where N is the total number of devices in the network and Di is the average packet delay for the packets generated by device i .

3.2. Simulation Setup

We considered two scenarios, with 10 nodes and 20 nodes are firmly fixed on a human body. The nodes are connected to the coordinator in a star topology and only uplink traffic is considered. Generally, the packet inter-arrival period, LD —in normal traffic is constant. For emergency and pseudo-emergency traffic, by contrast, the packet inter-arrival period, LP , follows an exponential distribution (1/ LP follows the Poisson distribution). In the simulation, each node has two traffic generators—i.e., a Poisson (emergency and pseudo-emergency) traffic generator, and a Deterministic (normal) traffic generator, where one generator can be used at a time according to the traffic pattern. The Poisson and deterministic traffics are generated from the following equations:

where p represents the probability, which is uniformly distributed in the interval [0, 1].

First, a uniform generator is used to calculate a random number RN, then LD is generated ( i times) as a function of RN . Generally, each node has a unique RN , and thus a different LD .

Our simulations are based on the parameters shown in Table 1.

Table 1.Simulation parameters

The simulation flow diagram for the coordinator is depicted in Fig. 6, where the simulation flow chart of emergency response (ER) and pseudo-emergency response (PER) are drawn in Fig. 7 and Fig. 8, respectively. For normal traffic, the coordinator checks the traffic pattern and decides which node to transmit. If more than one node has the same traffic pattern, but with different priorities, resources are allocated to a high-priority node. However, if more than one node has the same traffic pattern as well as the same priority, then resources are allocated to a node having the maximum data volume. The remaining nodes wait until the high priority nodes complete their transmission and are subsequently served based on their priorities. For pseudo-emergency traffic, the coordinator first checks whether any emergency interrupts. If no emergency interrupts, resources are then the coordinator will check the available GTS numbers. If there are sufficient GTS resource, the resources are allocated to the nodes. Otherwise, the nodes wait until the emergency event is handled or the sources are available. Emergency traffic is generally considered to interrupt the normal operation of the coordinator. All processes cease when an emergency event occurs, and resources will be reallocated to the emergency node.

Fig. 6.Simulation flowchart for the coordinator.

Fig. 7.Simulation flowchart of Emergency response

Fig. 8.Simulation flowchart of Pseudo-emergency response.

We run the simulation 100 times and the averaged values are recorded.

3.3. Simulation Results

Fig. 9 illustrates the effect of the GTS data payload with an average delay—the green, red, and blue lines representing the conventional 802.15.4 scheme, our proposed scheme, and the simulation results for our proposed scheme, respectively. We observe that the average delay for the proposed scheme is far less than that of the 802.15.4 scheme, regardless of the payload size. The average packet delay increases as the payload size increases. The reason is that a bigger payload size requires more time for data transmission under both schemes. Furthermore, we observe that the proposed scheme performs adequately with an average delay for all payload sizes under investigation. Compared with the traditional 802.15.4 scheme, our scheme improves by approximately 120 ms. Since the proposed scheme meets the delay requirement well, the proposed scheme is much more favorable for WBASN time-sensitive applications.

Fig. 9.Effect of the payload with an average delay.

Our evaluation of GTS bandwidth utilization is also considered between the original 802.15.4 scheme and the proposed scheme under different traffic loads. From Fig. 10, we can see that the bandwidth utilization for both schemes increases as the packet payload increases in both low- and high-traffic environments. Because each device makes use of a higher proportion of the available GTS resources, and this makes the CFP bandwidth utilization correspondingly improved. Our proposed scheme increases sharply when the payload size is small. The main reason for this is that our proposed scheme incurs only some overhead before increasing slightly as the payload size becomes large. Under the 802.15.4 scheme, bandwidth utilization increases in small iterations as the payload size grows, where the overhead takes up a large proportion. Additionally, both schemes perform better in heavy traffic than in light traffic, because the unused GTSs are efficiently allocated to the devices, which are high-frequency transmitting. In general, CFP bandwidth utilization for our proposed scheme outperforms that of the traditional 802.15.4 scheme by 6% –28% in both light traffic and heavy traffic of all payload sizes.

Fig. 10.Effect of the payload on CFP bandwidth utilization with different traffic loads.

Based on Formula (22), it is clear that 0 ≤ F ≤ 1, and the effect of the packet payload on the fairness of GTS resource allocation for both our proposed scheme and the conventional 802.15.4 scheme is illustrated in Fig. 11. We observed that the experimental results for the proposed scheme are superior to those of the traditional IEEE 802.15.4 for most curves, regardless how many devices are tested (N=10 or N=20). When the payload size becomes very large, we can achieve around 80% enhancement in terms of fairness. Note that F decreases as the payload increases under the conventional 802.15.4 scheme, implying that the inflexible FCFS policy aggravates the unfair situation when workload becomes heavy. However, the fairness of our proposed scheme increases as the payload goes up due to the flexibility of our scheduling policy. That is, our proposed scheme is equipped with the capacity to provide fairer transmissions among different kinds of devices.

Fig. 11.Effect of the payload on fairness with different numbers of nodes.

 

4. Conclusion

We have proposed an adaptive and real-time GTS-allocation scheme for WBASNs to improve the performance of the GTS mechanism for IEEE 802.15.4 WBANs in beacon-enabled mode. First, devices are classified into three distinct traffic patterns and strictly follow the rules developed in the state transition diagram. Based on the proposed WPAA, devices in normal traffic are dynamically assigned priority and provided with services. Devices in pseudo-emergency traffic are provided services by using a CRSAM that prevents the starvation of such devices in light traffic. Our scheme has been designed according to the existing IEEE 802.15.4 MAC protocol, with which IEEE 802.15.4 devices can implement the service without modification. Performance evaluations have been conducted through mathematical analysis and the experimental simulations. The simulations have demonstrated that our proposed scheme offers a significant improvement to network performance in terms of average delay, CFP bandwidth utilization, and fairness.

It is worth exploring how our proposed scheme performs in a real scenario applied to a working system. We are planning to apply the mechanism to a specific healthcare system and test its performance. Furthermore, additional quantitative comparisons with existing approaches are essential, and we fully intend to pursue this objective.