Você está na página 1de 87

Wireless Body Area Networks

(WBAN)
Viswavardhanreddy K
2/18/2014 Viswa-Wireless and Mobile Networks 2
Topics to Cover
WBAN Network Architecture
WBAN Network Protocols
WBAN Technologies
WBAN Applications

WBAN: Network
Architecture
2/18/2014 Viswa-Wireless and Mobile Networks 4
Topics to Cover
Characteristics
Network Components
Network Architecture
Design Issues
2/18/2014 Viswa-Wireless and Mobile Networks 5
WBAN
A special type of sensor networks that has special
applications towards human health monitoring.
Consists of set of communicating mobile sensors
wearable on the human body and home server or
base station.
These sensors communicate through wireless
technologies, transmit data from the body to home
base station, from there data can be fwded to
hospitals, clinic or else where in real time.
Technology still in primitive stage
Sensors are small intelligent devices that can
communicate on wireless medium.
2/18/2014 Viswa-Wireless and Mobile Networks 6
WBAN Characteristics
Non-invasive & Proximity
Network proximity to human body.
Every node (sensor) transmits at extremely low power.
UWB (Ultra Wide Band) is the most suitable technology.
UWB radio share spectrum with existing narrow band
broadcasters without causing undue interference.
UWD sends and receives extremely short monocycle
pulses to enable very high bandwidth (more than 100Mbps)
over short distances.
Pulses are waveforms compressed in time.


2/18/2014 Viswa-Wireless and Mobile Networks 7
WBAN Characteristics
Energy Limitations
Sensors have limited energy resources, computational
power and memory.
Since difficult to charge or change frequently, sensor
require battery with long life.
Multihop Communication
Used to save power and energy
Node Density
It is the number of active nodes in a network to provide
better connectivity at a given time.
Optimum node density is maintained for efficient data
delivery.


2/18/2014 Viswa-Wireless and Mobile Networks 8
WBAN Characteristics
Cost effective
Efficient and cost effective solutions are necessary to gain
WBAN applications.
Node Communication
Generally simplex in nature i.e. sense and transmit to other
nodes.
Wave Propagation
Propagation of waves takes place on a very lossy medium
like human body. Hence waves get attenuated
considerably before reaching the receiver.
Heterogeneous Nodes
Nodes have different requirements in terms of data rates,
power consumption and reliability.


2/18/2014 Viswa-Wireless and Mobile Networks 9
Sensor Node
Access Point
Signal Conditioner
A/D Converter
Microcontroller
Transceiver
Personal Server GPS
Internet
Medical
Server
SENSOR NODE
Human
Body
WBAN Architecture
Tier-1: Several Sensor Nodes; Tier-2: Server, AP, Mobile with GPS
Tier-3: Medical Server and Internet
2/18/2014 Viswa-Wireless and Mobile Networks 10
WBAN Architecture Components
Sensor Nodes
Each node comprises of sensor for capturing data, signal
conditioner to shape the captured signal, analog to digital
converter to convert the captured signal to digital signal,
microcontroller for processing the data and transceiver for
transmission and reception of sensed signal in digital form.
Each sensor node responds to queries from the personal
server.
Must satisfy certain requirements like minimal weight,
miniature form-factor, low power consumption to prolonged
ubiquitous monitoring, standard based interface protocols
and patient specific calibration, tuning and customization.
2/18/2014 Viswa-Wireless and Mobile Networks 11
WBAN Architecture Components
Sensor Nodes (Continued)
Are implemented as tiny patches
Continuously collect and process raw information,
store them locally and send processed event
notification to tier-2 devices.
WBAN include number of physiological sensors
depending on end user applications like,
ECG sensor, EMG sensor, EEG sensor, blood pressure
sensor, etc.
2/18/2014 Viswa-Wireless and Mobile Networks 12
WBAN Architecture Components
Tier-2 Devices
Consist of Personal server, AP, GPS etc
This tier interfaces WBAN sensor nodes, provides
graphical user interface, and communicates with
services in tier-3 elements like medical server.
To communicate with tier-3 devices, tier-2 device
use either WLAN or Cellular mobile networks to
reach the internet access point.


2/18/2014 Viswa-Wireless and Mobile Networks 13
WBAN Architecture Components
Tier-3 Device (The Medical Server)
Important component of Tier-3 of WBAN architecture. Its
functions include
Maintaining medical records of registered users and
provide services to users and medical personnel.
User authentication and accepting health monitoring
session uploads
Format and insert these session data into corresponding
medical records
Analyze data patterns and recognize serious health
anomalies and trigger the emergency care unit.
Patients physician can access the data through internet
2/18/2014 Viswa-Wireless and Mobile Networks 14
WBAN Architecture Components
Network Configuration and Management
The network configuration encompasses following
tasks:
Sensor node registration (type & number)
Initialization (e.g. specify sampling frequency),
Customization (e.g. run user specific procedures)
Set up of secure communication
Once the network is configured Server manages
the network. Functions include like, taking care of
channel sharing, time synchronization, retrieval
and processing.


2/18/2014 Viswa-Wireless and Mobile Networks 15
Design Issues
Node Types
Motion and position sensors such as accelerometers,
health monitoring sensors and environment sensors.
Sampling rate for Sensor node
Human induced activity has a frequency between 0 and 18
or 30Hz. Sample rate of 10-100Hz is considered as
sufficient
Operating Power
Must be extremely power efficient
Sensors are battery operated and are required to last long
without any maintenance.
2/18/2014 Viswa-Wireless and Mobile Networks 16
Design Issues
Size and Weight of Sensors
Sensors are light weight and small form-factor
Size is determined by weight of the batteries.
Sensor node Identification and Association
Node is identified by device ID
Sensor Node Calibration
Two types of calibrations
Sensor calibration to accommodate sensor to sensor
variations
Sensor calibration that is required before starting new
monitoring session.
Both are sensor dependent
2/18/2014 Viswa-Wireless and Mobile Networks 17
Design Issues
Processing
Sensor signal processing has the potential to save
power.
Trade off between communication and processing
is required.
Social Issues
Include Privacy, security and legal aspects
All communications over WBAN and Internet need
to be encrypted.

WBAN: Network Protocols
2/18/2014 Viswa-Wireless and Mobile Networks 19
Physical Layer
Inductive coupling, RF Communication, Antennas, and
Modulation Techniques
Data Link Layer/MAC layer
S-MAC, T-MAC, WiseMAC, B-MAC, SCP-MAC
WASP, CFRT protocol
Network Layer
Fidelity Aware Routing, SPIN, Rumor Routing
TBF, LEACH, Span
Topics to cover
2/18/2014 Viswa-Wireless and Mobile Networks 20
Network Protocols
Protocols can be divided into intra-body communication and
extra body communication.
Intra-body communication protocol controls the information
handling between sensors or actuators and sink.
Extra-body communication protocol ensures communication
between sensor (sink) and external network.
Here we consider only intra-body communication protocols.
These protocols are in still early stage and address the issues
like minimizing the thermal effects
Some of the WBAN protocols operate at physical, data link
and network layer.
2/18/2014 Viswa-Wireless and Mobile Networks 21
Physical Layer Protocols
Inductive Coupling
An electromagnetic coupling to provide communication link
to implanted devices.
Such coupling is done by holding external coil very close to
human body that couples with a coil implanted in the body
near skin surface.
The implant is powered by this coupling hence no battery is
required for communication.
Data is transferred from implanted device by altering the
impedance of the implanted loop formed by inductive
coupling.
Electromagnetic induction is used when continuous long
term communication is required.

2/18/2014 Viswa-Wireless and Mobile Networks 22
Physical Layer Protocols
Inductive Coupling (Cont)
Baseband for electromagnetic communication is typically
13.56 or 28 MHz and its use is subject to regulation for
maximum Specific Absorption Rate.
SAR is the measure of rate at which RF energy is absorbed
by the body when exposed to RF electromagnetic field. It is
measured as the power absorbed per mass of tissue and
has units of watts per kg.
It achieves the best power transfer using large transmit and
receive coil.
This technique doesnt support high data rate and cannot
initiate a communication session from inside the body.
2/18/2014 Viswa-Wireless and Mobile Networks 23
Physical Layer Protocols
RF Communications
Increases the bandwidth and enables a two way
data link to be established.
Human body as a medium poses several wireless
transmission challenges. The body is composed
of various components that are not predictable
and change as the patients ages, gains or loss of
weight or even changes in posture.
Difficult to calculate in body performance of
communication system within a body.
2/18/2014 Viswa-Wireless and Mobile Networks 24
Physical Layer Protocols
Antennas
An in-body antenna requires tuning using an intelligent
transceiver and routine.
Size constraints dictate the choice of non-resonant
antenna.
A non-resonant antenna has lower gain, hence less
sensitive on receiving and radiate less of the power
generated by the transmitter.
A Patch antenna can be used when implanting is flat.
Patch antennas comprise a flat substrate coated on both
sides with a conductor. The substrate is alumina with
platinum coating both surfaces, Upper surface is active and
is connected to transceiver.

2/18/2014 Viswa-Wireless and Mobile Networks 25
Physical Layer Protocols
Modulation Techniques
IEEE 802.15.4 physical layer uses Spread Spectrum
techniques. It has two versions.
One operates in 868 MHz (Europe) and 915 MHz (US),
Industrial Scientific and Medical Band (ISM) Band, and
other operates in 2.4GHz global ISM band.
The lower frequency band utilizes BPSK (Binary Phase
Shift Keying) modulation to achieve data rates of 20kbps
(EU) over a single channel and 40 kbps (US) over 10
channels.
The higher frequency band utilizes O-QPSK modulation to
achieve data rates of 250kbps over 16 channels.
2/18/2014 Viswa-Wireless and Mobile Networks 26
Data Link Layer
MAC protocol controls the access to medium.
There are two main classes of MAC protocols are
available: Contention based and Contention Free
channel access
Contention based channel access: Most common methods
are Aloha and CSMA (Carrier Sense Multiple Access)
ALOHA
A node starts sending the packets as soon as it has
something to send.
High probability of collision with another node.
CSAMA (Carrier Sense Multiple Access)
Node listens to the channel for a time period, if the channel is
free during this time period, node starts sending the packet.
Otherwise differ sending for the later time.


2/18/2014 Viswa-Wireless and Mobile Networks 27
Data Link Layer
Contention Free Channel Access mechanism is
used in WBAN. There are three methods available
Polling
Master in the network e.g. BS or AP, individually asks each
sensor node (slave) to send an update of status.
Requires an incoming message and outgoing msg for each
sensor node.
Most precise but least time efficient way to request
information from sensor node.
Can support retransmission.
Used in Bluetooth IEEE 802.15.1
2/18/2014 Viswa-Wireless and Mobile Networks 28
Data Link Layer
Strobing
Master periodically broadcasts a request to all sensor
devices for status update.
Used in 802.15.4
Cyclic Broadcast
All sensor nodes are configured to automatically send
messages to the master on scheduled intervals, and these
intervals are scheduled in such a way that no conflict
occurs during the broadcast.
Requires very good clocks synchronization at the sensor
nodes.



2/18/2014 Viswa-Wireless and Mobile Networks 29
MAC Requirements For WBAN
For efficiency WBAN MAC protocol needs to
minimize the followings to avoid energy waste:
Idle listening
Refers to active listening to idle channel waiting for the
potential packet to arrive.
Overhearing
Refers to reception of packet, or part of packet, that is
destined to another node.
Collisions and protocol overhead
Two approaches exist for Contention Based:
Scheduling (CSMA Based)
Low power listening (Aloha Based)
2/18/2014 Viswa-Wireless and Mobile Networks 30
Scheduling MAC Protocols
These protocols (e.g. sensor MAC & timeout MAC)
adopt common sleep/wake-up schedules.
Nodes remain awake only for brief contention
periods to co-ordinate.
The scheduling allows nodes to operate in low duty
cycles (transceiver must be shut down most of the
time).
A sender can efficiently transmit. i.e. transmitter
wakes up and sends when receiver is listening.
Cost of co-ordination is minimal
Also take steps to reduce collisions from concurrent
transmission and overhearing of packets.


2/18/2014 Viswa-Wireless and Mobile Networks 31
S-MAC Protocol
This protocol tries to reduce energy consumption
from all resources: idle listening, collision,
overhearing and control overhead.
S-MAC consists of three major components:
Periodic Listen and Sleep
Collision and Overhearing Avoidance
Message Passing
Assumptions
Sensor networks to be composed of many small nodes
deployed in ad hoc fashion.
Most communication will be between peer nodes, rather
than a single base station.
Sensor networks to be dedicated to single application
2/18/2014 Viswa-Wireless and Mobile Networks 32
S-MAC Protocol
Periodic Listen and Sleep
Reduces listen time by letting node to go into
periodic sleep mode.
Basic Scheme
Each node goes to sleep for some time, and then wakes
up and listens to see if any other node wants to talk to it.
During sleep node turns off its radio and sets a timer to
awake itself later.
Duration of time for listening and sleeping can be
selected according to different application scenario.
For simplicity these values are same for all nodes.
2/18/2014 Viswa-Wireless and Mobile Networks 33
Listen Sleep
t
Listen Sleep
Basic Scheme
Requires Periodic synchronization among neighboring nodes
All time stamps exchanged are relative rather than absolute.
Listen period is significantly longer than clock drift or error.
All nodes are free to choose their own listen/sleep schedules.
To reduce control overhead, it is preferred to synchronize neighboring
nodes together. i.e. they listen at the same time and go to sleep at the
same time.
Nodes exchange their schedules, by broadcasting it to all its
immediate nhbrs.
Once nodes start data transmission, they do not follow their sleep
schedules until they finish transmission.


2/18/2014 Viswa-Wireless and Mobile Networks 34
S-MAC Protocol
Choosing and Maintaining Schedules
Before each node starts its periodic listen and sleep, it
needs to choose a schedule and exchange it with their
nhbrs.
Each node maintains a schedule table that stores the
schedule of all its known nhbrs.
Each node follows the following steps to choose its
schedule and establish its schedule table
The node first listens for a certain amount of time. If it
doesnt hear a schedule from another node, it randomly
chooses a time to go to sleep and immediately broadcasts
its schedule in a SYNC msg indication that it will go to
sleep after t secs. Such a node is called Synchronizer.


2/18/2014 Viswa-Wireless and Mobile Networks 35
S-MAC Protocol
If the node receives a schedule from a nhbr before
choosing its own schedule, it follows that schedule by
setting its schedule to the same. Such a node is called
follower. It then waits for random delay t
d
and broadcasts
this schedule indicating that it will sleep in t t
d
secs
.
If node receives a different schedule after it selects and
broadcast its own schedule, it adopts both schedules i.e. it
schedules itself to wakeup at times of both (nhbr and itself).
It broadcasts its own schedule before going to sleep.
Maintaining Synchronization
Updating schedule is accomplished by sending a SYNC
packet.
SYNC packet is very short and just includes address of
the sender and time of its next step.



2/18/2014 Viswa-Wireless and Mobile Networks 36
S-MAC
The next sleep time is relative to the moment that the
sender finishes transmitting SYNC packets, which
approximately when receiver gets the packet since the
propagation delays are short.
Receiver adjust their timer immediately after receiving
SYNC packet.
Listen Interval
In order for a node to receive both SYNC packet and
data packet, Listen Interval is divided into two parts:
First part is for receiving SYNC packet
Second is for receiving RTS packet.
Each part is further divided into many slots for carrier
sense.
2/18/2014 Viswa-Wireless and Mobile Networks 37
For SYNC
Listen
t
For RTS
Send data if CTS is received
Receiver
Sender 1
SYNC
t
Sleep
Sender 2
CS
RTS
CS
Sender 3
CS
SYNC
CS
RTS
Send data if CTS is received
t
t
Listen Interval Specifics
2/18/2014 Viswa-Wireless and Mobile Networks 38
S-MAC Protocol
Collision Avoidance
Collision Avoidance is done in two ways: Virtual and
Physical Carrier sense.
Virtual Carrier Sense:
There is a duration field in each transmitted packet, that
indicates how long the remaining transmission will be.
If a node receives packet destined to another node it knows
how long it has to keep silent. The node records this value in
an variable called NAV (Network allocation Vector) and sets
timer.
When a node has data to send it first looks at its NAV. If it
value is not zero, the node determines that medium is busy.


2/18/2014 Viswa-Wireless and Mobile Networks 39
S-MAC Protocol
Physical Carrier Sense
It is performed at the physical layer by listening to
channel for possible transmission.
Each node having data to send its senses the channel, if
it is free, then waits for random amount of time and
again checks the channel for freeness and if it is free it
start sending RTS otherwise defers its transmission.
Node who sends the RTS first wins the medium.
The randomized carrier sense is done for collision
avoidance.


2/18/2014 Viswa-Wireless and Mobile Networks 40
S-MAC Protocol
The medium is determined free if both virtual and
physical carrier sense indicates that is free.
All senders perform carrier sense before initiating
a transmission.
If a node fails to get the medium it does to sleep
and wakes up as per its schedule and listen
again.
Broadcast packets like SYNC are sent without
using RTS/CTS
Unicast follow the sequence: RTS/CTS/data/Ack
between the sender and receiver.
2/18/2014 Viswa-Wireless and Mobile Networks 41
S-MAC Protocol
Overhearing Avoidance
It is done through exchange of RTS/CTS packets
All immediate nhbrs of both the sender and receiver should
sleep after they hear RTS and CTS packet until the current
transmission is over.
Each node maintains the NAV to indicate the activity in its
nhbd.
When a node receives a packet destined to other nodes, it
updates its NAV by the duration field of the packet. A non
zero NAV value indicates there is an active transmission in
its nhbd.
Thus a node should sleep to avoid overhearing if its NAV is
not zero. It wakes up when its NAV becomes zero.
2/18/2014 Viswa-Wireless and Mobile Networks 42
Multihop Network Example
A B C D F E
A Multihop network where each node hear transmission from its immediate nhbr.
Suppose A is currently transmitting a data packet to B, which of the remaining
nodes go to sleep?
Remember collision happens at the receiver,
Node D: should go to sleep, since its transmission interferes with Bs reception.
Node E: Does not produce any interference hence need not go to sleep.
Node F: Does not produce any interference hence need not go to sleep.
Node C: It is two hop away from B and its transmission doesnt interfere with
Bs reception, hence it is free to transmit to its nhbrs like E. However, C is
unable to receive CTS or data from E since Es transmission collides with As
transmission at C. hence C transmission is simple waste of energy.

2/18/2014 Viswa-Wireless and Mobile Networks 43
S-MAC Protocol
Message Passing
A message is collection of meaningful interrelated units of
data. It can be long series of packets or a short packet.
Usually receiver needs to obtain all the data before it can
perform in-network data processing or aggregation.
Sender fragments the long msg into small fragments and
transmit them in burst. Only on RTS packet and one CTS
packet are used. They reserve the medium for transmitting
all the fragments.
Every time a data fragment is transmitted, the sender waits
for ACK from the receiver. If it fails to receive the ACK, it
will extend the reserved transmission for one more
fragment and re-transmit the current fragment immediately.


2/18/2014 Viswa-Wireless and Mobile Networks 44
S-MAC Protocol
The message passing scheme tries to put nodes
into sleep state as long as possible and hence
reduces switching overhead.
The purpose of using ACK after each data
fragment is to prevent hidden node problem.
New node joins at the receiver side during the
transmission.
If the sender extends the transmission time due to
fragment loss, sleeping nhbr will not be aware of
extension immediately. However, the node will learn it
from extended fragments and ACK when it wakes up.
2/18/2014 Viswa-Wireless and Mobile Networks 45
S-MAC Performance
Latency and throughput are problems but
adaptive listening improves it significantly.
Energy savings significant as
compared to non-sleeping
protocols
2/18/2014 Viswa-Wireless and Mobile Networks 46
Timeout-MAC Protocol
It is based on S-MAC protocol in which the active
period (i.e. listen period) is pre-empted and sensor
goes to sleep period if no activation event has
occurred for a time Ta.
The active event can be reception of data, start of
listen/sleep frame time etc.
Ta is the minimal amount of time idle listening per
frame. For each active period Ta is set.
Thus the idea of T-Mac is to reduce idle listening by
transmitting all msges in burst of variable length and
sleeping between the bursts.
Synchronization similar to S-MAC


2/18/2014 Viswa-Wireless and Mobile Networks 47
Timeout- MAC
TA setting for each active period
2/18/2014 Viswa-Wireless and Mobile Networks 48
Sleep
Sleep
Sleep Sleep
A
B
C
D
TA
TA
TA
TA
TA
TA
TA
TA
E
TA TA
Sleep Sleep
Sleep
T-MAC Scheme for five Multihop network
All the nodes A E set their timeout TA
Node A transmits an event
to B
B hears A within TA,
hence postpones TA
C hears B within TA, fails to
get the channel as TA
expires. D and E go to
sleep as TA expires.
After sleep all nodes set
TA for next active period.
C transmits to D and D in
turn transmit within TA.
Hence the event is finally
received by E
2/18/2014 Viswa-Wireless and Mobile Networks 49
T-MAC Performance
T-MAC saves energy compared to S-MAC
The early sleeping problem limits the maximum throughput
T-MAC has high latency compared to S-MAC

2/18/2014 Viswa-Wireless and Mobile Networks 50
Low Power Listening MAC protocols
Low Power Listening (LPL) protocols such as
Wireless Sensor MAC (WiseMAC) or Berkeley MAC
(B-MAC), allows a sleeping node to check channel
activity with very brief low power channel active
probes.
Nodes randomly poll the channel with pre-defined
polling period.
To wake up a receiver a sender uses a long
preamble before each packet which is at least the
length of polling period. Hence explicit co-ordination
among nodes is not required.
2/18/2014 Viswa-Wireless and Mobile Networks 51
Limitations of Scheduling and LPL MAC
Protocols
LPL protocols replace relatively long wake-up
interval in Scheduling MACs with a very short polling
time.
LPL protocols consume less energy than Scheduled
protocols in lightly loaded networks.
Scheduling protocols are limited by relatively long
wake-up intervals and the delay between schedules.
LPL based protocols are limited by increasing
transmit costs due to longer preambles.
2/18/2014 Viswa-Wireless and Mobile Networks 52
WiseMAC (Wireless Sensor MAC)
Developed for WiseNET Wireless Sensor
Networks.
It is based on CSMA with preamble sampling
technique to reduce power consumption during idle
listening.
The preamble sampling technique means regularly
sampling the medium to check for activity for a short
duration e.g. the duration of a modulation symbol.
This scheme not only reduces transmit and receive
power consumption but also reduces energy
wastage in overhearing.
It exploits the knowledge of sampling schedule of
nhbrs to use wake-up preamble of minimized size.
2/18/2014 Viswa-Wireless and Mobile Networks 53
WiseMAC
All nodes in a network sample the medium with the
same constant period T
w
independent of actual
traffic.
At the receiver, if the medium is found busy, receiver
continues to listen until
Either of data packet is received
Or the medium become idle.
At the transmitter, a wake-up preamble is
transmitted in front of every message to ensure that
the receiver will be awake when the data portion of
message arrives.

2/18/2014 Viswa-Wireless and Mobile Networks 54
WiseMAC
To minimize power consumption overhead
introduced by wake-up preamble the sensors learn
the offset between
Sampling schedules of their nhbrs and of their own.
Knowing the sampling schedule of the destination, sensor
nodes send msges just at right time with a wake-up
preamble minimized length T
p
.
Due to independent sampling schedule offset
(SSO), this also mitigates overhearing
This SSO information is obtained from each ack
packet, which contains remaining duration till next
preamble sampling.
2/18/2014 Viswa-Wireless and Mobile Networks 55
WiseMAC
Clocks running on sender and the receiver
can be inaccurate. Hence a clock drift can
accumulate between transmissions.
This clock drift is calculated as follows:
T
p
= min (4L, T
w
)
Where is the quartz oscillator clocks drift; L is
the time since the last update of the nhbrs wake
pattern; T
w
is the common basic cycle duration.
2/18/2014 Viswa-Wireless and Mobile Networks 56
Wait (T
W
)
T
W

T
P

T
C

Arrival
Data ACK
Data ACK
T
D

T
T

T
W

Transmit
Wake-up
Medium Idle
Wake-up Medium Busy Receive Msg
T
P
: Time for Wake-up Preamble
T
D
: Data packet duration
T
C
: Control Packet Duration
T
T
: Turn around time to switch
between sender and receiver


Sender
Receiver
WiseMAC Scheme
2/18/2014 Viswa-Wireless and Mobile Networks 57
Berkley MAC
A simple contention based MAC protocol, with low
duty cycle schedule.
Performs busy tone like signaling on the data
channel by using a very long msg preamble.
The preamble length is provided as a parameter to
the upper layer. This provides optimal trade off
between energy savings and latency or throughput.
Hence reconfigurable by upper layer.
Low power operation and effective collision
avoidance.


2/18/2014 Viswa-Wireless and Mobile Networks 58
Sleep Receive Receiver
Sleep
t
Preamble Sender Message
Sleep
B-MAC Scheme
When the channel access is required, the sender
generates a long message preamble to wake up the
receiver.
When the receiver hears a long message preamble, it
decides to stay on to receive the message.
2/18/2014 Viswa-Wireless and Mobile Networks 59
Berkeley MAC Features
Efficient at both low and high data rates.
Tolerant to changes on the network and scalable to
large number of nodes.
Simple implementation (Small Code)
Clear Channel Assessment (CCA) and Low Power
Listening (LPL) using preamble sampling.
Hidden node and multi packet mechanism not
provided, should be implemented, if needed by
higher layers.
2/18/2014 Viswa-Wireless and Mobile Networks 60
B-MAC Results
Performs better than other studied protocols
in most cases.
System model can be complicated for
application and routing protocol developers.
Protocol widely used because has good
results even with default parameters and
simple to implement with small code.
2/18/2014 Viswa-Wireless and Mobile Networks 61
Scheduled Channel Polling MAC
It combines the scheduling and channel polling .
Channel polling minimizes the cost of wake-up
checking for presence or absence of network
activity.
Puts the nodes into periodic sleep state when there
is no traffic and performs channel polling
periodically.
Synchronized polling results in very short wake-up
tone , to be sent to a node to wake-up.
Short wake-up tone reduces the overhead of
transmitting large preambles in LPL.
2/18/2014 Viswa-Wireless and Mobile Networks 62
Tx
tone
Receiver
Sleep
t
Sender
Tx Data
Sleep
Tx Data
t
CW1 CW2
Listen Listen
SCP-MAC Scheme
Synchronization of polling times of sender and receiver takes place.
When a sender has packet to send, it waits in sleep state until receiver
time to poll the channel. It performs CS within CW1 and then sends short
wake-up to activate the receiver.
After sender wakes up a receiver, it enters the CW2, if channel is still idle
then it starts sending data to the receiver without any contention


2/18/2014 Viswa-Wireless and Mobile Networks 63
SCP-MAC
Nodes randomly select a slot in fixed length
contention window to reduce collision.
Separating the contention phases for tone
and packet leads to lower collision probability
with shorter overall contention time.
2/18/2014 Viswa-Wireless and Mobile Networks 64
Wireless Autonomous Spanning Tree
Protocol (WASP)
Uses spanning tree for medium access co-ordination and traffic
routing.
Each node informs its children in which slot data is being sent by
using WASP scheme.
WASP scheme is a method of construction of a tree structure, in
a manner that the nodes only can hear their parents, siblings and
children.
The WASP scheme is unique for every node and is constructed
in sending node.
Each node uses WASP scheme to control the traffic of children
while requesting resources from its parents.
This minimizes the co-ordination overhead,
Every thing the node needs to know can be obtained by WASP
schemes coming from its parents and its children.
2/18/2014 Viswa-Wireless and Mobile Networks 65
WASP Scheme
In a WASP cycle each node is either allowed to
send its data and /or fwd the data received in the
previous cycle, to the next node.
At the beginning of the each cycle the sink sends its
WASP schemes to its children. This WASP scheme
informs the children, when they can send their
WASP schemes to their children.
Children respond to parents WASP scheme by
sending out their own WASP scheme in their
designated time slots.
Thus each node will know when it can send its data
without the need for central device for the purpose.
2/18/2014 Viswa-Wireless and Mobile Networks 66
WASP Scheme
2/18/2014 Viswa-Wireless and Mobile Networks 67
Collision Free Real Time (CFRT) Protocol
Divides the time into frames in which only one node
is allowed to transmit.
The scheduling order is derived by msg table stored
in each node and is identical for all nodes so that
each of them knows when it has right to send.
This table contains an entry for each node which is
allowed to transmit or receive in a frame.
Each entry specifies source and destination nodes,
message length and message period.
The table is application dependent and scheduling
order is programmed depending on the job that
must be performed by the body network.
2/18/2014 Viswa-Wireless and Mobile Networks 68
Network Layer
Important function of network layer is to route the
data.
Main features of WBAN routing:
Should be aware of the energy so as to minimize the total
transmission power.
Should take measures to against the batteries to get
deplete of hops that are close to sink. Since these nodes
are heavily involved in packet fwding as data are routed
towards sink.
Nodes are stationary and at the most 10-15 nodes are
deployed.
Nodes are distributed very close to sink node,



2/18/2014 Viswa-Wireless and Mobile Networks 69
Network Layer Protocols
WBAN Routing protocols are classified as
Data Centric Protocols (better suitable)
Query based in which sink node sends queries to other nodes
and waits for the data.
Data received at from various nodes are further processed at
sink and transmitted to remote monitoring center.
Hierarchical Protocols
Aim at clustering the nodes so that cluster heads can do some
aggregation of data to save energy.
Location Based Protocols
Utilize the position information to relay the data to the desired
regions than the whole network.
2/18/2014 Viswa-Wireless and Mobile Networks 70
Fidelity Aware Routing
Distributed Activation based on Predetermined
Routes (DAPR)
An energy aware routing protocol which maintains high
level QoS requirements (e.g. coverage) over long period of
time.
In this protocol, a node first finds the sub region within the
region of coverage that is most poorly covered.
The cost assigned to a node in that region is related to
combined energy of all nodes capable of redundantly
covering this poorly covered region.
Used in sensor deployment with high variation in density.
It requires nodes to acquire additional information from
other nodes.
2/18/2014 Viswa-Wireless and Mobile Networks 71
Sensor Protocol for Information via
Negotiation (SPIN)
Designed to enable data centric information
dissemination.
Operation sequence
Each node advertise its data to its nhbr through ADV
message.
Any node interested in receiving the data replies with
request (REQ) message.
The source node replies with transmission of actual data to
the requested node.
Received node then advertise this new data to its nhbrs.
The process continues.
Avoids three problems: implosion, overlap and
resource blindness
2/18/2014 Viswa-Wireless and Mobile Networks 72
Rumor Routing
It is designed for short lived and one shot queries.
When an event is detected by sensor, it probabilistically creates
an agent in the form of packet and fwds it throughout the network
in random manner.
Nodes through whom the agent is fwded maintain local state
information about the direction and distance.
When a node wishes to perform a query related to a given event,
it simply fwds the query packet in a random direction so that
query traverses random walk throughout the network.
Query will eventually reach a node with a path to the specified
event
If the multiple queries are unable to reach the event, querying
node may resort to flooding over entire network.
2/18/2014 Viswa-Wireless and Mobile Networks 73
Trajectory Based Fwding (TBF)
A useful a paradigm for geographic routing
TBF allows packet to follow a source
specified trajectory, increasing the flexibility
of overall fwding strategy.
For e.g. Multipath routing, it is achieved by
sending multiple copies of single packet
along separate geographic trajectories,
increasing resilience to localized failures or
congestion in certain part of the network.
2/18/2014 Viswa-Wireless and Mobile Networks 74
Low Energy Adaptive Clustering
Hierarchy (LEACH)
In LEACH, nodes are divided into clusters, each containing a
cluster head, whose role is more energy intensive than the rest of
nodes.
Nodes in a cluster rotate their roles between cluster head and
ordinary sensor node throughout the lifetime of the network.
At the beginning of each round, each sensor node makes an
independent decision through randomized algorithm about
whether or not to assume cluster head role.
Nodes that choose to be cluster heads announce their status to
the rest of the network.
Based on the received signal strength of these announcements,
sensor nodes join the cluster that requires the least power to
communicate with cluster head.

2/18/2014 Viswa-Wireless and Mobile Networks 75
LEACH
During the round, the ordinary nodes in each cluster send data to
respective cluster heads according to TDMA schedule.
Inter-cluster interference is reduced by using different spreading
codes in nhbring clusters.
The cluster head aggregates data received from all cluster
members and sends aggregated data to the base station.
The length of each round is chosen such that each node is
expected to be able to perform cluster head role once during its
lifetime.
LEACH-C uses simulating annealing to choose cluster heads for
a given round so that average transmission power between
sensors and their cluster head is minimized.
2/18/2014 Viswa-Wireless and Mobile Networks 76
Span
It is a topology control protocol that allows nodes that are
involved in routing backbone to sleep for extended periods of
time.
Certain nodes assign themselves the position of coordinator.
These coordinator nodes form a backbone of network, so that the
capacity of the backbone approaches the potential capacity of
entire network.
Periodically, other nodes initiate a procedure to decide if they
should become a coordinator. The criteria for this being minimum
distance between any two of the nodes nhbrs should not exceed
three hops.
Backoff delays are added to nodes coordinator announcements
to avoid simultaneous many nodes aspiration to become
coordinator.

WBAN Technologies
2/18/2014 Viswa-Wireless and Mobile Networks 78
Topics to Cover
Bluetooth
Zigbee
UWB
2/18/2014 Viswa-Wireless and Mobile Networks 79
Introduction
WBAN devices communicate through wireless
technologies, and transmit data from body to home
base station from where data can be fwded to the
hospital, clinic or elsewhere in real time.
Most widely used WBAN technologies include:
Bluetooth
Matured technology already integrated in cell phone and
PDAs
Wibree is the low power version of Bluetooth.
Zigbee
Emerging wireless standard for low data rate, very low power
applications with potential applications in home automation,
industrial control and personal health care.

2/18/2014 Viswa-Wireless and Mobile Networks 80
Bluetooth
Is a low tier, ad hoc, terrestrial wireless standard for
short range communication.
IEEE 802.15.1 has Bluetooth Specification
Is designed for small and low cost devices with low
power consumption.
Technology operates with three different classes of
devices on their range of communication: Class 1, 2
and 3 devices support 100m, 10m and 1m range
respectively.
WLAN operates in the same 2.4GHz frequency
band as Bluetooth, but uses different signaling
hence prevents interference.
2/18/2014 Viswa-Wireless and Mobile Networks 81
Bluetooth
Piconet is a small network of Bluetooth devices, in
which upto eight devices can actively participate.
Communication inside piconet occurs between a
unique master and slaves.
Upon connection establishment a slave synchronize
its time and frequency hopping to masters and
waits to be polled by the master to transmit.
Thus a master transmits a packet in a slot and slave
sends the data to master in next time slot.
2/18/2014 Viswa-Wireless and Mobile Networks 82
R
X

R
X

T
X

T
X

R
X

R
X

R
X

T
X

T
X

Master
Slave
T
X

Time Slot
t
t
Transmission between Master and Slave
2/18/2014 Viswa-Wireless and Mobile Networks 83
Zigbee
Is a low tier, ad hoc, terrestrial wireless standard.
A commercial standard developed on top of IEEE
802.15.4 standard that defines the PHY and MAC
layer.
It operates in the 68MHz, 915 MHz and 2.4 GHz
ISM bands
Zigbee devices transmit upto 250 kbps data rate
sufficient for typical WBAN applications.
IEEE 802.15.4 is designed for low cost, limited
battery, short range (upto 10m) and low rate
applications.

2/18/2014 Viswa-Wireless and Mobile Networks 84
Zigbee
Two variations of Technology exist
Slotted Channel Structure
Uses synchronization between devices enabled by
beacon exchanges
Slotted CSMA/CA
Data sending devices follows the sequence: receive the
beacon/contention period/CCA/send data
Un-slotted Channel Structure
Device that wishes to send data follows the sequence:
finds channel free/ wait for random period of
time/CCA/send data.
2/18/2014 Viswa-Wireless and Mobile Networks 85
FTP CP
CP
Beacon Beacon CCA
CP Contention Period
FTP Frame Transmission Period
CCA Clear Channel Assessment
Slotted Channel Structure 802.15.4
The PHY layer describes three different frequency bands
1 channel in 868-868.6 MHz band providing 20kbps
10 channels in the 902-928 MHz band providing 40 kbps each
16 channels in the 2400-24893 MHz band providing 250 kbps each
2/18/2014 Viswa-Wireless and Mobile Networks 86
Ultra Wide Band (UWB)
UWD radios emit, low power, high bandwidth
pulses deliver data rates comparable to wired
Ethernet (100 Mbps+)
Its high data rates and low power
consumption make it ideal for WBANs.
Still in early stages of deployment.
Thank You

Você também pode gostar