SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
T-TMAC: Energy Aware Sensor MAC Protocol for
            Health-care Monitoring
                             Youssouf Zatout1,2 , Eric Campo1,2 and Jean-François Llibre1,3
                  1 Universitéde Toulouse; UPS, INSA, INP, ISAE, UTM, F-31703 Blagnac, France
                       2 CNRS; LAAS; 7 Avenue du Colonel Roche, F-31077 Toulouse, France
                          3 CNRS; LAPLACE; 2 rue C. Camichel, F-31071 Toulouse, France

                                         {zatout,campo,llibre}@iut-blagnac.fr



   Abstract—Wireless sensor networks (WSN) have received           (particularly for intra body sensors). The ideal would be to
much attention during the last few years especially with regard    extend their lifetime for several months or even for few years,
to energy consumption. Many Medium Access Control (MAC)            to collect and relay medical data permanently to a management
protocols were proposed to minimize the energy consumption
in WSN, however they cannot be applied in all application          center or to a remote medical center (hospitals or doctors).
contexts. Healthcare monitoring is an important application           Many works were conducted to extend the lifetime of sensor
requiring adapted MAC protocol. This paper presents a new          nodes using techniques of recovering energy from ambient
MAC protocol, called T-TMAC, based on simple mechanisms            sources such as solar (photovoltaic) and vibrational energy
that organize data exchange and reduce collisions in many-to-one   [4]. However, the energy recovered (in home environment)
architecture. It includes maintenance mechanisms that permit
mobility management and topology reconfiguration, which are         stills limited and must be extended by other effective means.
needed for healthcare. We evaluated the performance of the            Furthermore, many energy conservation techniques reducing
protocol by analytical model. We propose also real prototyping     power consumption of sensors are proposed at each layer in
using Imote2 platforms. We studied the impact of position          the networking stack: from the physical layer and modulation
of nodes and sleep modes on energy and delay. The results          techniques, to the application layer and the development of
emphasize the interest of the protocol.
                                                                   specialized power-control tools [5]. In this paper we focus on
   Index Terms—Wireless Sensor Network (WSN), Healthcare           energy-efficient MAC layer. The rest of the paper is organized
Monitoring, MAC Protocol, Energy Saving, Performance Evalu-        as follows: related work is presented in Section II. We describe
ation.
                                                                   the protocol and its principle phases in Section III. We provide
                                                                   the analysis and the implementation of our protocol in sections
                      I. I NTRODUCTION                             IV and V. We conclude the paper in Section VI.
   Over the past decade, the aging of population has lead to
an increasing of the elderly [1]. Therefore the number of frail                  II. D ESIGN OF MAC P ROTOCOLS
or dependent people has grown steadily in the world. The              Reducing power consumption at the MAC layer can be very
deployment of new systems which reduce the hospitalization         significant [3, 5, 6, 7]. Approaches at this layer turn the wire-
costs by maintaining people at home is a real challenge.           less transceivers off when it is not necessary to transmit or to
Nowadays, new remotely managed systems and domestic                receive data. Several protocols based on this mechanism have
devices (sensors and actuators) are being developed [2, 3] to      been developed under IEEE-802.15.4 standard [8]. However,
facilitate and improve the quality of healthcare at home, and      this technique requires a mechanism that synchronizes sensors
to reduce the cost of this dependence.                             between each other and organizes data exchanges.
   Wireless sensor network (WSN) is a promissing technology           They are three main categories of MAC protocols: con-
for a wide range of potential applications including healthcare    tention based protocols such as: B-MAC, S-MAC and
monitoring [6]. In fact, they are characterized by their ease of   WiseMAC [9-11]; TDMA based protocols such as TRAMA
deployment and their self-organization, which is an advantage      [12], and Hybrid protocols such as Z-MAC [13]. In this paper,
for monitoring persons with risks and their living environment.    we present a MAC protocol that combines the strengths of
Their benefits for healthcare include: continuous recovery          slotted and contention channel access, while offsetting their
of physiological data, medication management, motions and          weaknesses for healthcare monitoring needs.
shocks detection (fall of a person), localization, diagnosis          In [14], we developed a possible runway based on the “event
and early intervention for various diseases, observation of the    driven” approach. Simulation results showed on the one hand
living environment (recording the activities), monitoring of       its advantages in terms of the early detection of anomalies
health status during training and sports, etc.                     and emergencies. On the other hand, they showed some limi-
   Wireless sensors are usually powered by batteries with          tations regarding to energy consumption. In [15], we presented
limited capacity and the autonomy varies widely following          a primary mobility aware protocol based on “sleep/active”
the use. Replacing / recharging the batteries by the elderly       mechanism. In this paper, we extend this approach by two
/ patients can be difficult (large number of sensors, etc.),        key elements: a) Improving maintenance mechanisms, b) Real
expensive (charging forgotten), and sometimes impossible           prototyping of the protocol.

                                             978-1-4673-1881-5/12/$31.00 ©2012 IEEE
III. T-TMAC P ROTOCOL D ESIGN                          B. Structure of T-TMAC
A. Assumptions and Network Architecture                                          To organize the data exchange between sensors in the
                                                                              three tier network we propose simple mechanisms that fit the
   We propose a heterogeneous and centralized WSN archi-                      application needs. The sensors of each level follow a dynamic
tecture described in Figure 1. The sensor nodes are organized                 scheduling (on / off). They wake up when needed and sleep
into groups: Medical (M ), Coordinator (C), Video (V ) and                    the rest of the time. The scheduling is organized level by level
Sink (S). The network architecture is composed of three                       as follows: in level 1 between Medical nodes (M ) and their
tiers (Each tier has its own characteristics and requirements):               associated Coordinator (C), in level 2 between Coordinators
(M, C), (C, V ) and (V, S). A sensor node may interact with                   (C) and Video (V ), and finally in level 3 between Video nodes
other nodes in inter-tiers or intra-tiers to achieve the common               (V ) and Sink (S).
goal (healthcare monitoring). This type of architecture offers                   1) T-TMAC Superframe: We consider an access method
many advantages in terms of capacity, coverage, and reliability               close to the IEEE-802.15.4 protocol with some modifications.
compared to single tier Ad hoc networks as described in [16].                 Indeed, we adapt the parameters setting of the Superframe
Medical nodes collect and relay physiological medical data                    according to the requirement of each tier taking into account
(temperature, ECG, etc.), and Video nodes collect and relay                   the sleep / active scheduling. In the first tier, the commu-
ambient data (image, humidity, etc.).                                         nications between (C) and (M ) nodes are organized into
                                                 M       M                    Superframes managed by the coordinator. The Superframes
                                             M               M
                                                                              are delimited by Beacons sent by the coordinator, within it
                                                     C
                                                                              provides information about synchronization, GTS (Guaranteed
       Wireless link
                                                     V
                                                                              Time Slot) allocation, etc. The first Superframe (Superframe 0)
       Mobility
                                         V                       V            may not contain CFP (Contention Free Period). In fact, there
   M   Medical node
                                                     S
                                                                              will be only CAP (Contention Access Period) for initialization
   C   Coordinator node                  V                       V

                                                     V
                                                                              (cf. section 2) where medical nodes compete to associate to the
   V   Video node
                                                                              Coordinator and reserve some GTSs (cf. section 4). The other
   S   Sink node
                                                                              Superframes (1 to n) contain only CFP period and remove the
                                                                     WBAN 2
                                                                              CAP. Figure 2 shows the parametrized Superframe.
                                WBAN 1


                                                                                        CFP                  CAP                  CFP                  CAP

Figure 1.    Global network architecture for healthcare monitoring at home
                                                                              B                                    ….   B


   We summarize below the main characteristics retained for                       GTS         Superframe 1                  GTS         Superframe n

this architecture: (i) Low density of sensors: the deployment                 Figure 2.       T-TMAC Superframes
area of the global network is relatively small; we are con-
ducting this study in the case of a house. (ii) The Wireless                     The number of reserved GTS depends on the type and the
Body Area Network (WBAN) has a cluster / star topology                        length of data. In the CAP period (called later “Reporting”
that consists of (M) and (C) nodes. (iii) Video nodes are                     period), the coordinator sends the collected data to (V ) node
stationary, while the WBAN nodes are mobile. (vi) Video                       to which it is associated. This later, reports data to the Sink.
nodes act as relay nodes (forwarding data received by (C)).                   During this period, medical nodes can turn off their radios
(vii) The traffic pattern is periodic: "many-to-one" (from the                 (sleep mode).
bottom to the top (M ) → (C) → (V ) → (S), managed                               2) Principle phases of the protocol:
by the Sink. The data flow is initiated by (M ) node. (v)                         Initialization: Its principle role is to synchronize the four
(C) node is associated with only one video node at a time                     groups of heterogeneous nodes between each other for mutual
following multi-hop transfer to reach the Sink. Thereafter, we                recognition, and to organize data transmission that will be used
propose the appropriate mechanism for mobility management.                    in the data collection phase. During this phase, the network
To enhance the lifetime of sensors, three principle assumptions               is created level by level according to a top-down messages
are considered.                                                               transfer from (S) to (M ). At the end of network creation,
   • Data aggregation: (C) node aggregates medical data                       collection phase begins in bottom-up sense from (M ) to (S)
of its WBAN, (V ) node can aggregate data from multiple                       with periodic data transfer.
Coordinators within range.                                                       Data Collection and topology reconfiguration: This phase
   • Power tuning: we propose to adjust the power transmission                takes place immediately after the topology creation. It rep-
(TPL: Transmission Power Level) of each sensor node in                        resents the crucial phase of the protocol. In one hand it
the architecture while maintaining hop-by-hop connectivity                    allows relaying medical data hop by hop to reach the Sink,
between: (M ), (C), (V ) and (S), as shown in Figure 1. This                  according to the schedule defined in the creation phase. In
leads not only to limit the over-consumption of energy but can                other hand, it includes mechanisms for topology maintenance
also leads to limit interferences between nodes [5].                          and reconfiguration (cf. section C).
   • Sleep / active schedule: nodes operate under activity /                     3) Organization of Data Exchange: Both phases operate
inactivity mode. (M ) and (V ) nodes can turn off their radio                 in different ways. Figure 3 describes for each data flow,
during sensing data.                                                          the different messages exchanged between active nodes per
level. Initially, the Sink node initiates the topology creation by                                              • Slots request by (M): the activity periods of (M ) nodes
sending "S_Beacon" message to Video (V ) node. This later                                                    may differ depending on the data size (temperature, fall
sends an association request message "ASC_RQ" to the Sink,                                                   detection, ECG, etc.). Indeed, if a medical node wants to
which accepts the request by sending "ASC_ACK" message.                                                      send more than one packet in an activity period, we propose
Thus, the node (V ) is associated with the Sink. Then, the                                                   that it sends a request to its associated Coordinator. In fact,
association between (V ) and (C) nodes begins. The node                                                      during initialization, (M ) nodes request a certain number of
(V ) sends "B_Beacon" message to node (C), followed by the                                                   slots (subsequently appointed GTS in Section 1) via ASC_RQ
exchange of "ASC_RQ" and "ASC_ACK" messages whose                                                            message. Then the response will be indicated in C_Beacon
finalize their association. Then the initialization of the WBAN                                               message (with the number of allocated slots), for use in the
network starts between (M ) and (C) nodes with the exchange                                                  collection phase. However, in Data collection phase, the re-
of "C_Beacon", "ASC_RQ" and "ASC_ACK" messages. After                                                        quest could be integrated in DATA message, and the response
setting up the WBAN network, the data collection begins.                                                     will be in the C_Beacon message (in the next cycle). This
The node (M ) collects data, builds the first data message                                                    mechanism responds to the dynamic behavior of network.
"DATA" and sends it to its associated Coordinator (C). Then                                                     • Reliability: to reduce collisions / transmission errors that
(C) responds with acknowledgment message "ACK". "DATA"                                                       could occur during the two phases, it is necessary to retransmit
message will be then relayed by (C) to (V ), and finally                                                      all messages (the number of retransmissions is parametrized)
relayed by (V ) to the Sink (S), with the exchange of "DATA"                                                 including Beacon messages (except acknowledgments). This
and "ACK" messages. As shown in Figure 3, after receiving                                                    leads to increase the reliability of the data exchange.
the "ACK" message, nodes can turn to sleep mode to save                                                         • Traffic model: we assume that the traffic model made in
energy.                                                                                                      the Data collection phase is periodic with the same period
                                                                                                             throughout the network. Each node (M ) is the origin of one
                                                                                                             or more data packets in each period (one data flow). (M )
                                Sink              V               C               M

                                       S_Beacon
                                       ASC_RQ
                                                                                                             nodes can also aggregate all medical data in one packet (the
                                       ASC_ACK

                                                      B_Beacon
                                                                                                             maximum size of PPDU in IEEE 802.15.4 is 127 bytes). To
            Topology creation
                 phase
                                                      ASC_RQ
                                                                                                             meet the energy needs of the sensors, the activity period should
                                                      ASC_ACK

                                                                      C_Beacon
                                                                                                             be optimized and reduced as much as possible.
                                                                      ASC_RQ

                                                                      ASC_ACK


                                                                      C_Beacon
                                                                        DATA
                                                                                        Start of data
                                                                                      collection of (M)      C. Complementary Mechanisms for Topology Maintenance
                                                                        ACK


                                                      B_Beacon
                                                                                                             We have improved the topology maintenance with new mech-
        Data collection and
       reconfiguration phase
                                                        DATA

                                                        ACK
                                                                                            DATA Reporting   anism. Sending Beacon messages periodically offers other ad-
                                       S_Beacon
                                                                                                             vantages that meet the application requirements. Particularly,
                                         DATA

                                         ACK
                                                                                                             they can be used for mobility management, re-allocation of
             Active mode
                                                                                                             new slots for WBANs, and topology re-configuration: addition
              Sleep mode

                                        Level 3         Level 2         Level 1
                                                                                                             of new sensor, and removal of a sensor (depleted battery,
                                                                                                             sensor breakdown, etc.). Actually, each level has a manager
Figure 3.     Principle mechanisms of the protocol
                                                                                                             node that takes decisions while an event occurs: (C) node for
                                                                                                             tier 1, (V ) node for tier 2 and (S) node for tier 3.
   • Medium access: to minimize collisions in the three tier                                                 The mobility of a person has an impact on communications
architecture we manage the medium access as follows: we                                                      of tier 1 and tier 2: (i) In tier 1, when 2 WBANs are situated
use “Data reporting” period to manage “inter-tier” interactions                                              in the same range, to reallocate new slots, the (C) node sends
between nodes belonging to different levels (nodes report data                                               C_Beacon message containing the new allocated slots. (ii)
(by level) as shown in Figure 3. However, it is necessary, to                                                In tier 2, the link between (C) and (V ) could be interrupted:
assign the appropriate access method to minimize collisions                                                  node (C) should re-associate with a new (V ) node (we can use
between nodes belonging to the same level. In fact, we propose                                               the initialization mechanism via the exchange of B_Beacon,
a hybrid access:                                                                                             ASC_RQ and ASC_ACK messages). Then the new (V ) node
   - Slotted access for M and C nodes (WBAN): it provides                                                    relays the received data to the Sink (via DATA and ACK
a guaranteed access and a reduced delay for medical data.                                                    messages).
   - Contention access for (C, V ) and (V, S): this is appropri-
ate for mobility.
   • Maintaining synchronization: during the data collection                                                   IV. D IMENSIONING AND P ERFORMANCE E VALUATION
phase, the network must operate under a regular schedule to
                                                                                                             A. Analytical Model
ensure the transit of the data between levels 1, 2, and 3 in
order to reach correctly the Sink. To this end, we propose that                                              The delay and energy consumption are the most important
Coordinator, Video and Sink nodes send periodically Beacon                                                   performance criteria for the application. Below we evaluate the
messages. These messages have a crucial role because they                                                    performance of the protocol in the two phases: initialization
permit to resynchronize nodes (to prevent the clock drift                                                    and data collection. We used three important parameters:
phenomenon) while keeping the data exchange hop by hop.                                                      network size, transmission interval and data size.
• Initialization phase analysis: The first association phase         Where Tslots is the slot duration and N (i) is the total number
between all medical nodes and the Coordinator is represented        of slots allocated to medical node (i). To calculate the energy
by the duration D :                                                 consumption in data collection we reuse the formula (7):
            D = TC_Beacon +
                                    nM
                                    i=1   DASC (i) (1)                EDC = erx · (TC_Beacon + TACK ) + etx · (TDAT A ) (9)

Where DASC (i) is the association duration of one node i and        • Other Superframes analysis: In the same way, we can
nM the number of medical nodes. Then, let DASC (i) is the           evaluate the upper tiers (C, V ) and (V, S). The principle
mean association time of node i with the (C) of its WBAN:           parameter that changes is the number of nodes per level
                                                                    (nC ,nV ). However, in data collection analysis, the Tcs duration
                                                                    must be added because (C) and (V ) nodes compete for the
         DASC (i) = Tcs + TASC_RQ + TASC_ACK (2)                    medium access.
   Tcs is a random duration before each node i sends its
“ASC_RQ”. To reduce collisions, each node initially senses the      B. Hardware Implementation
channel during a random duration Tcs uniformly distributed in       • Platforms used: we have implemented T-TMAC in Imote2
the interval [0, Tf ], where Tf is the maximum of the duration.     hardware platform. The Imote2 transceiver operates at ISM 2.4
For the sake of simplicity, we consider in a similar manner to
                                       T
                                                                    GHz frequency, 17.4 mA with (0 dBm) power output and it
[10] the mean value of Tcs : Tcs = 2f (3)                           allows data rates of up to 250 Kbps. The micro-controller runs
                                                                    at 13−416MHz. This device requires a supply voltage between
  •   When the other medical nodes hear the first “ASC_RQ”           3.2−4.5 Volts, and is powered by three 1.5V (AAA) batteries
      they must wait for a time equal to (TASC_RQ +                 in series. The sensing unit includes: temperature, acceleration
      TASC_ACK ) before starting to draw again a random             and humidity measurements. Two kinds of cards [14] may be
      duration Tcs .                                                embedded on Imote2 radio card: Sensing card and Video card.
  •   The number of reserved GTS (reserved by (M )) depends         • Protocol implementation: Figure 4 shows the implemented
      on the kind and the length of data.                           sensor network and Table 1 shows the measured real parameter
The association duration of the other nodes can be written as       values of the Imote2. Four important tasks are realized to build
follows:                                                            the network architecture and to test the network operations:
                                                                    power tuning, frames setting (S_Beacons, DATA, ACK, etc.),
                                                 Tf
            DASC (i)i=1 = DASC (i − 1) +        i+3                 WBAN implementation (aggregation functions for (C), slots
                                                       (4)
               +TASC_RQ + TASC_ACK                                  management) and Data forwarding.
  Energy consumption: To calculate the energy consumption
                                                                                 PARAMETER                           VALUE              U NIT
of the first node we can reuse the formula (2) by adding
                                                                          S_Beacon, B_Beacon                         11, 7              ms
consumption corresponding to each mode (reception or trans-
                                                                                  CBeacon                            12, 8              ms
mission), then we obtain:
                                                                                  TASC_RQ                   12, 2 (M ), 11, 7 (C, V )   ms
         EASC (i)i=1 = erx · (Tcs + TASC_ACK )                                   TASC_ACK                   11, 9 (M ), 11, 7 (C, V )   ms
                                               (5)
                          +etx · (TASC_RQ )                          TDAT A(M ) , TDAT A(C) , TData(V )     13, 7 (M ), 14, 9 (C, V )   ms
  To calculate the total energy consumed we add the amount                          TACK                    11, 9 (M ), 11, 7 (C, V )   ms
(erx ·TC_Beacon ) that corresponds to the receiving of the Coor-                     ST                     1083 (M 1), 450 (M 2)       ms
dinator Beacon (“C_Beacon”) and erx , etx are respectively the                       etx                        74, 2 (92 bytes)        mA
energy consumed when receiving and transmitting data. The                            erx                        97, 2 (92 bytes)        mA
energy consumption of the other nodes during the association                          el                       56, 4 (listening)        mA
phase can be written as follows:                                                     epx                               37               mA
                                                       T                          epx(sleep)                          500               µA
      EASC (i)i=1 =     erx · [DASC (i − 1) + i+3
                                                f
                                                     (6)                             esgx                    6, 4 (procOn : 43, 4)      mA
                      +TASC_ACK ] + etx · (TASC_RQ )
                                                                                    LED                        2 (procOn : 39)          mA
   As shown in Figure 3, in the reporting period, (C) sends            N umber of retransmissions                      3                 /O
the collected data to (V ) to which it is associated. During this      T x power (M1 , M2 , C1 , V1 , S)   −25, −25, −10, −10, −10      dBm
period, medical nodes may turn off their radios (sleep mode)                                          Table I
to save energy.                                                                            M EASURED PARAMETER VALUES
• Data collection phase analysis: It corresponds to the data
sending and differs from the association, because during this
time, medical nodes don’t have to compete for the medium                              V. R ESULTS AND DISCUSSION
access, however they have to send “DATA” messages larger               Figure 5 shows the prototyping results for initialization
than “ASC_RQ”.                                                      and data collection phases. The graph on the left side shows
                                                                    the current consumption during initialization of each node
          DDC = TC_Beacon + TDAT A + TACK (7)
                                                                    (M 1), (M 2), (C), (V ) and (S). We see that it increases de-
                                     nM
               DT otal = Tslots .    i=1   N (i) (8)                pending on the nodes position in the architecture. (M ) and (C)
nodes are the larger consumers of energy. This is due to the                                                                                                                                                                of energy saving. Our on-going work is focused on detailed
waiting time that these nodes spent to receive their appropriate                                                                                                                                                            modeling analysis and scenarii evaluation and on the compari-
Beacon message (B_Beacon for (C) and C_Beacon for (M 1)                                                                                                                                                                     son between T-TMAC and other MAC protocols such as IEEE
and (M 2) (as shown in Figure 3). The graph on right side                                                                                                                                                                   802.15.4. Other perspective of this work concerns extending
shows the current consumption of each node during data                                                                                                                                                                      the protocol with scalable slot allocation mechanism. This
collection phase, during 1 hour of operation, with Deep Sleep                                                                                                                                                               mechanism could be appropriate for large applications with
period of 20 seconds. The results show clearly the advantage                                                                                                                                                                dense number of nodes such as in the case of hospitals.
of the Deep sleep mode implemented on Imote2 platforms, to                                                                                                                                                                                                                                                                                                   Reel prototyping
                                                                                                                                                                                                                                                                                              Reel prototyping
save the energy of all nodes.                                                                                                                                                                                                                                                                 Analytical model                                               Analytical model




                                                                                                                                                                                                                                                                                                                 Current consumption during data
                                                                                                                                                                                                                            Current consumption during
                                                             Exchange of messages




                                                                                                                                                                                                                                                         initialization (mA)
                                                            between neighbor nodes




                                                                                                                                                                                                                                                                                                                          collection (mA)
                                                                                                                                                                               0x09      1) "Radio"card


                                                                                              Terminal Serial Dump                                                      Sink


                                                                     1) "Radio card"
                                                                                         1) "Radio" card
                                                                                         2) "Vidéo" card
                                                                                                                                                                 0x07                           0x08

                                                    Sniffer PC               Xsniffer
                                                                                                                                               V1                                   V2
                                                                                                                                                                                                                                                                               Type of node                                                        Type of node

                                                                  1) "Radio" card

                                                                                                        0x05                                                                                           0x06                 Figure 6.   Comparison of results obtained by the two methods: current
                                                                                                C1                                                                                               C2
                                                                                                                                                                                                                            consumption by each node during initialization and data collection phases

                                                      1) "Radio" card                                                                                                                                                                                                                          R EFERENCES
                                                      2) "Sensor" card                   0x01                                                                  0x02                      0x03                  0x04
                                                                                                                                                                                                                            [1] H. Alemdar and C. Ersoy,"Wireless Sensor Networks for Healthcare: A
                                                                                    M1                                               M2                                        M3                         M4                    Survey", Elsevier Computer Networks, Volume 54, Issue 15, pp. 2688-
                                                                                                                                                                                                                                2710, October 2010.
                                                                                             WBAN 1                                                                                         WBAN 2
                                                                                                                                                                                                                            [2] G.Z.Yang,"Body Sensor Networks", Springer-Verlag London, 2006.
                                                                                                                                                                                                                            [3] A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat
Figure 4.                                                        Implementation of the sensor network
                                                                                                                                                                                                                                monitoring: Application driver for wireless communications technology",
                                                                                                                                                                                                                                In Proc. ACM SIGCOMM Workshop on Data Communications, Latin
                                                                                                                                                                                                                                America and the Caribbean, April 2001.
                                                                  Consumption of each node in
                                                                                                                                                                                                          Sleep mode        [4] J.A. Paradiso and T. Starner, "Energy scavenging for mobile and wireless
                                                                  the network                                                                                                                             Deep Sleep mode
                                                                                                                                                                                                                                electronics", Pervasive Computing, Volume 4, Issue 1, pp. 18- 27, 2005.
                                                                                                                                                                                                                            [5] G. Anastasi, M. Conti, M-D Francesco and A. Passarella, "Energy
                                                                                                           Current consumption during data




                                                                                                                                                                                                                                conservation in wireless sensor networks : A survey", Ad Hoc Networks,
 Current consumption during




                                                                                                                                                                                                                                2009.
                              initialization (mA)




                                                                                                                                             collection (mA)




                                                                                                                                                                                                                            [6] I.F. Akyildiz, T. Melodia and K. Chowdhury, "A Survey on Wireless
                                                                                                                                                                                                                                Multimedia Sensor Networks", Elsevier Computer Networks Journal,
                                                                                                                                                                                                                                March 2007.
                                                                                                                                                                                                                            [7] S-K Chong, S. Krishnaswamy and S-W Loke, "A context-aware ap-
                                                                                                                                                                                                                                proach to conserving energy in wireless sensor networks", Third IEEE
                                                                                                                                                                                                                                International Conference on Pervasive Computing and Communications
                                                                                                                                                                                                                                Workshops, PerCom 2005 Workshops, pp. 401- 405, March 2005
                                                                         Type of node                                                                                                     Type of node                      [8] "Wireless Medium Access Control (MAC) and Physical Layer (PHY)
                                                                                                                                                                                                                                Specifications for Low-Rate Wireless Personal Area Networks (WPANs)",
                                                                                                                                                                                                                                IEEE Std. 802.15.4, 2006.
Figure 5.                                                        Prototyping results: initialization and data collection phases
                                                                                                                                                                                                                            [9] J. Polastre, J. Hill and D. Culler, "Versatile low power media access
                                                                                                                                                                                                                                for wireless sensor networks", In Proceedings of the 2nd international
   We estimated analytically the average energy consumption                                                                                                                                                                     conference on embedded networked Sensor Systems (SenSys’04), pp. 95-
(EASC ) in initialization and Data collection phases. Figure 6                                                                                                                                                                  107, New York, 2004.
                                                                                                                                                                                                                            [10] W. Ye, J. Heidemann and D. Estrin, "Medium access control with co-
shows the comparison between analytical and real prototyping                                                                                                                                                                    ordinated adaptive sleeping for wireless sensor networks", In IEEE/ACM
results, for one hour of operation of the network, with Deep                                                                                                                                                                    transactions on networking, vol. 12, no. 3, pp. 493-506, June 2004.
sleep of 20 seconds (180 cycles). We added in the analytical                                                                                                                                                                [11] A. El-Hoiydi, J.D. Decotignie, C.C. Enz and E. Leroux, "WiseMAC, an
                                                                                                                                                                                                                                ultra low power MAC protocol for the wiseNET wireless sensor network",
calculation the values assigned for data sensing ((M 1): tem-                                                                                                                                                                   SenSys 03, pp. 302-303, 2003.
perature and (M 2): all Data). We show that analytical results                                                                                                                                                              [12] V. Rajendran, K. Obraczka and J. J. Garcia-Luna-Aceves, "Energy
fit with the prototyping results.                                                                                                                                                                                                efficient collision-free medium access control for wireless sensor net-
                                                                                                                                                                                                                                works", In Proceedings of the 1st international conference on embedded
                                                                                                                                                                                                                                networked Sensor Systems, SenSys ’03, pp. 181-192, 2003.
                                                                                            VI. C ONCLUSION                                                                                                                 [13] I. Rhee, A. Warrier, M. Aia, J. Min and M.L. Sichitiu, "Z-MAC: a
                                                                                                                                                                                                                                hybrid MAC for wireless sensor networks", IEEE/ACM Transactions on
   In this paper a new MAC protocol for healthcare moni-                                                                                                                                                                        Networking, pp. 511-524, 2008.
toring is presented. Simple mechanisms based on sleep/active                                                                                                                                                                [14] Y. Zatout, E. Campo and J. Llibre, "WSN-HM: Energy-Efficient Wire-
                                                                                                                                                                                                                                less Sensor Network for Home Monitoring", ISSNIP 09, Melbourne,
schedule are proposed for energy efficiency. We showed the                                                                                                                                                                       Australia, 2009.
advantages of data aggregation and allocation of slots in a                                                                                                                                                                 [15] Y. Zatout, R. Kacimi, J-F. Llibre and E. Campo, "Mobility-aware
multi-tiers architecture. The performance evaluation has been                                                                                                                                                                   Protocol for Wireless Sensor Networks in Health-care Monitoring", Fifth
                                                                                                                                                                                                                                IEEE International Workshop on Personalized Networks, USA, 2011.
realized with an analytical model and with real prototyping on                                                                                                                                                              [16] S. Zhao and D. Raychaudhuri, "Multi tier Ad hoc Mesh Networks with
Imote2 platforms. The results fit very well. From all results,                                                                                                                                                                   Radio Forwarding Nodes", IEEE Global Telecommunications Conference,
it seems that T-TMAC protocol provide a significant amount                                                                                                                                                                       IEEE GLOBECOM 2007, Washington, USA, 2007.

Mais conteúdo relacionado

Mais procurados

Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
A survey of multimedia streaming in
A survey of multimedia streaming inA survey of multimedia streaming in
A survey of multimedia streaming inIJCNCJournal
 
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...Power System Operation
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
 
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networksambitlick
 
VFDM for single user
VFDM for single userVFDM for single user
VFDM for single userGaspard Ggas
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 

Mais procurados (18)

Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Main paper
Main paperMain paper
Main paper
 
A survey of multimedia streaming in
A survey of multimedia streaming inA survey of multimedia streaming in
A survey of multimedia streaming in
 
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
J011137479
J011137479J011137479
J011137479
 
Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...
 
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
 
Memory base
Memory baseMemory base
Memory base
 
A Time-Frequency Transform Based Fault Detectionand Classificationof STATCOM ...
A Time-Frequency Transform Based Fault Detectionand Classificationof STATCOM ...A Time-Frequency Transform Based Fault Detectionand Classificationof STATCOM ...
A Time-Frequency Transform Based Fault Detectionand Classificationof STATCOM ...
 
VFDM for single user
VFDM for single userVFDM for single user
VFDM for single user
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 

Destaque

Designer Sarees Collections - by ShaadiShoppe.com
Designer Sarees Collections - by ShaadiShoppe.comDesigner Sarees Collections - by ShaadiShoppe.com
Designer Sarees Collections - by ShaadiShoppe.comTauseef Azhar
 
VMware Contributing Code Hackathon - 7/13/2012
VMware Contributing Code Hackathon - 7/13/2012VMware Contributing Code Hackathon - 7/13/2012
VMware Contributing Code Hackathon - 7/13/2012joelmahoney
 
Презентация 1.12 - Система водоотведения
Презентация 1.12 - Система водоотведенияПрезентация 1.12 - Система водоотведения
Презентация 1.12 - Система водоотведенияIgor Golovin
 

Destaque (6)

The window
The windowThe window
The window
 
DiscoverBPS
DiscoverBPSDiscoverBPS
DiscoverBPS
 
Designer Sarees Collections - by ShaadiShoppe.com
Designer Sarees Collections - by ShaadiShoppe.comDesigner Sarees Collections - by ShaadiShoppe.com
Designer Sarees Collections - by ShaadiShoppe.com
 
Tramontozzi presentationpart2
Tramontozzi  presentationpart2Tramontozzi  presentationpart2
Tramontozzi presentationpart2
 
VMware Contributing Code Hackathon - 7/13/2012
VMware Contributing Code Hackathon - 7/13/2012VMware Contributing Code Hackathon - 7/13/2012
VMware Contributing Code Hackathon - 7/13/2012
 
Презентация 1.12 - Система водоотведения
Презентация 1.12 - Система водоотведенияПрезентация 1.12 - Система водоотведения
Презентация 1.12 - Система водоотведения
 

Semelhante a T tmac energy aware sensor mac protocol for

Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANijsrd.com
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...journalBEEI
 
Comp survey wireless_body_networks
Comp survey wireless_body_networksComp survey wireless_body_networks
Comp survey wireless_body_networksTracey Mc
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Nirmal Thaliyil
 
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET Journal
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANIRJET Journal
 
Wide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridWide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridAlaa Eladl
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYijwmn
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
 

Semelhante a T tmac energy aware sensor mac protocol for (20)

Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
I018135565
I018135565I018135565
I018135565
 
40120140503011
4012014050301140120140503011
40120140503011
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...
 
Comp survey wireless_body_networks
Comp survey wireless_body_networksComp survey wireless_body_networks
Comp survey wireless_body_networks
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
 
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
K016136062
K016136062K016136062
K016136062
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBAN
 
Wide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridWide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_grid
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
 
Vebek
VebekVebek
Vebek
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 

Último

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Último (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

T tmac energy aware sensor mac protocol for

  • 1. T-TMAC: Energy Aware Sensor MAC Protocol for Health-care Monitoring Youssouf Zatout1,2 , Eric Campo1,2 and Jean-François Llibre1,3 1 Universitéde Toulouse; UPS, INSA, INP, ISAE, UTM, F-31703 Blagnac, France 2 CNRS; LAAS; 7 Avenue du Colonel Roche, F-31077 Toulouse, France 3 CNRS; LAPLACE; 2 rue C. Camichel, F-31071 Toulouse, France {zatout,campo,llibre}@iut-blagnac.fr Abstract—Wireless sensor networks (WSN) have received (particularly for intra body sensors). The ideal would be to much attention during the last few years especially with regard extend their lifetime for several months or even for few years, to energy consumption. Many Medium Access Control (MAC) to collect and relay medical data permanently to a management protocols were proposed to minimize the energy consumption in WSN, however they cannot be applied in all application center or to a remote medical center (hospitals or doctors). contexts. Healthcare monitoring is an important application Many works were conducted to extend the lifetime of sensor requiring adapted MAC protocol. This paper presents a new nodes using techniques of recovering energy from ambient MAC protocol, called T-TMAC, based on simple mechanisms sources such as solar (photovoltaic) and vibrational energy that organize data exchange and reduce collisions in many-to-one [4]. However, the energy recovered (in home environment) architecture. It includes maintenance mechanisms that permit mobility management and topology reconfiguration, which are stills limited and must be extended by other effective means. needed for healthcare. We evaluated the performance of the Furthermore, many energy conservation techniques reducing protocol by analytical model. We propose also real prototyping power consumption of sensors are proposed at each layer in using Imote2 platforms. We studied the impact of position the networking stack: from the physical layer and modulation of nodes and sleep modes on energy and delay. The results techniques, to the application layer and the development of emphasize the interest of the protocol. specialized power-control tools [5]. In this paper we focus on Index Terms—Wireless Sensor Network (WSN), Healthcare energy-efficient MAC layer. The rest of the paper is organized Monitoring, MAC Protocol, Energy Saving, Performance Evalu- as follows: related work is presented in Section II. We describe ation. the protocol and its principle phases in Section III. We provide the analysis and the implementation of our protocol in sections I. I NTRODUCTION IV and V. We conclude the paper in Section VI. Over the past decade, the aging of population has lead to an increasing of the elderly [1]. Therefore the number of frail II. D ESIGN OF MAC P ROTOCOLS or dependent people has grown steadily in the world. The Reducing power consumption at the MAC layer can be very deployment of new systems which reduce the hospitalization significant [3, 5, 6, 7]. Approaches at this layer turn the wire- costs by maintaining people at home is a real challenge. less transceivers off when it is not necessary to transmit or to Nowadays, new remotely managed systems and domestic receive data. Several protocols based on this mechanism have devices (sensors and actuators) are being developed [2, 3] to been developed under IEEE-802.15.4 standard [8]. However, facilitate and improve the quality of healthcare at home, and this technique requires a mechanism that synchronizes sensors to reduce the cost of this dependence. between each other and organizes data exchanges. Wireless sensor network (WSN) is a promissing technology They are three main categories of MAC protocols: con- for a wide range of potential applications including healthcare tention based protocols such as: B-MAC, S-MAC and monitoring [6]. In fact, they are characterized by their ease of WiseMAC [9-11]; TDMA based protocols such as TRAMA deployment and their self-organization, which is an advantage [12], and Hybrid protocols such as Z-MAC [13]. In this paper, for monitoring persons with risks and their living environment. we present a MAC protocol that combines the strengths of Their benefits for healthcare include: continuous recovery slotted and contention channel access, while offsetting their of physiological data, medication management, motions and weaknesses for healthcare monitoring needs. shocks detection (fall of a person), localization, diagnosis In [14], we developed a possible runway based on the “event and early intervention for various diseases, observation of the driven” approach. Simulation results showed on the one hand living environment (recording the activities), monitoring of its advantages in terms of the early detection of anomalies health status during training and sports, etc. and emergencies. On the other hand, they showed some limi- Wireless sensors are usually powered by batteries with tations regarding to energy consumption. In [15], we presented limited capacity and the autonomy varies widely following a primary mobility aware protocol based on “sleep/active” the use. Replacing / recharging the batteries by the elderly mechanism. In this paper, we extend this approach by two / patients can be difficult (large number of sensors, etc.), key elements: a) Improving maintenance mechanisms, b) Real expensive (charging forgotten), and sometimes impossible prototyping of the protocol. 978-1-4673-1881-5/12/$31.00 ©2012 IEEE
  • 2. III. T-TMAC P ROTOCOL D ESIGN B. Structure of T-TMAC A. Assumptions and Network Architecture To organize the data exchange between sensors in the three tier network we propose simple mechanisms that fit the We propose a heterogeneous and centralized WSN archi- application needs. The sensors of each level follow a dynamic tecture described in Figure 1. The sensor nodes are organized scheduling (on / off). They wake up when needed and sleep into groups: Medical (M ), Coordinator (C), Video (V ) and the rest of the time. The scheduling is organized level by level Sink (S). The network architecture is composed of three as follows: in level 1 between Medical nodes (M ) and their tiers (Each tier has its own characteristics and requirements): associated Coordinator (C), in level 2 between Coordinators (M, C), (C, V ) and (V, S). A sensor node may interact with (C) and Video (V ), and finally in level 3 between Video nodes other nodes in inter-tiers or intra-tiers to achieve the common (V ) and Sink (S). goal (healthcare monitoring). This type of architecture offers 1) T-TMAC Superframe: We consider an access method many advantages in terms of capacity, coverage, and reliability close to the IEEE-802.15.4 protocol with some modifications. compared to single tier Ad hoc networks as described in [16]. Indeed, we adapt the parameters setting of the Superframe Medical nodes collect and relay physiological medical data according to the requirement of each tier taking into account (temperature, ECG, etc.), and Video nodes collect and relay the sleep / active scheduling. In the first tier, the commu- ambient data (image, humidity, etc.). nications between (C) and (M ) nodes are organized into M M Superframes managed by the coordinator. The Superframes M M are delimited by Beacons sent by the coordinator, within it C provides information about synchronization, GTS (Guaranteed Wireless link V Time Slot) allocation, etc. The first Superframe (Superframe 0) Mobility V V may not contain CFP (Contention Free Period). In fact, there M Medical node S will be only CAP (Contention Access Period) for initialization C Coordinator node V V V (cf. section 2) where medical nodes compete to associate to the V Video node Coordinator and reserve some GTSs (cf. section 4). The other S Sink node Superframes (1 to n) contain only CFP period and remove the WBAN 2 CAP. Figure 2 shows the parametrized Superframe. WBAN 1 CFP CAP CFP CAP Figure 1. Global network architecture for healthcare monitoring at home B …. B We summarize below the main characteristics retained for GTS Superframe 1 GTS Superframe n this architecture: (i) Low density of sensors: the deployment Figure 2. T-TMAC Superframes area of the global network is relatively small; we are con- ducting this study in the case of a house. (ii) The Wireless The number of reserved GTS depends on the type and the Body Area Network (WBAN) has a cluster / star topology length of data. In the CAP period (called later “Reporting” that consists of (M) and (C) nodes. (iii) Video nodes are period), the coordinator sends the collected data to (V ) node stationary, while the WBAN nodes are mobile. (vi) Video to which it is associated. This later, reports data to the Sink. nodes act as relay nodes (forwarding data received by (C)). During this period, medical nodes can turn off their radios (vii) The traffic pattern is periodic: "many-to-one" (from the (sleep mode). bottom to the top (M ) → (C) → (V ) → (S), managed 2) Principle phases of the protocol: by the Sink. The data flow is initiated by (M ) node. (v) Initialization: Its principle role is to synchronize the four (C) node is associated with only one video node at a time groups of heterogeneous nodes between each other for mutual following multi-hop transfer to reach the Sink. Thereafter, we recognition, and to organize data transmission that will be used propose the appropriate mechanism for mobility management. in the data collection phase. During this phase, the network To enhance the lifetime of sensors, three principle assumptions is created level by level according to a top-down messages are considered. transfer from (S) to (M ). At the end of network creation, • Data aggregation: (C) node aggregates medical data collection phase begins in bottom-up sense from (M ) to (S) of its WBAN, (V ) node can aggregate data from multiple with periodic data transfer. Coordinators within range. Data Collection and topology reconfiguration: This phase • Power tuning: we propose to adjust the power transmission takes place immediately after the topology creation. It rep- (TPL: Transmission Power Level) of each sensor node in resents the crucial phase of the protocol. In one hand it the architecture while maintaining hop-by-hop connectivity allows relaying medical data hop by hop to reach the Sink, between: (M ), (C), (V ) and (S), as shown in Figure 1. This according to the schedule defined in the creation phase. In leads not only to limit the over-consumption of energy but can other hand, it includes mechanisms for topology maintenance also leads to limit interferences between nodes [5]. and reconfiguration (cf. section C). • Sleep / active schedule: nodes operate under activity / 3) Organization of Data Exchange: Both phases operate inactivity mode. (M ) and (V ) nodes can turn off their radio in different ways. Figure 3 describes for each data flow, during sensing data. the different messages exchanged between active nodes per
  • 3. level. Initially, the Sink node initiates the topology creation by • Slots request by (M): the activity periods of (M ) nodes sending "S_Beacon" message to Video (V ) node. This later may differ depending on the data size (temperature, fall sends an association request message "ASC_RQ" to the Sink, detection, ECG, etc.). Indeed, if a medical node wants to which accepts the request by sending "ASC_ACK" message. send more than one packet in an activity period, we propose Thus, the node (V ) is associated with the Sink. Then, the that it sends a request to its associated Coordinator. In fact, association between (V ) and (C) nodes begins. The node during initialization, (M ) nodes request a certain number of (V ) sends "B_Beacon" message to node (C), followed by the slots (subsequently appointed GTS in Section 1) via ASC_RQ exchange of "ASC_RQ" and "ASC_ACK" messages whose message. Then the response will be indicated in C_Beacon finalize their association. Then the initialization of the WBAN message (with the number of allocated slots), for use in the network starts between (M ) and (C) nodes with the exchange collection phase. However, in Data collection phase, the re- of "C_Beacon", "ASC_RQ" and "ASC_ACK" messages. After quest could be integrated in DATA message, and the response setting up the WBAN network, the data collection begins. will be in the C_Beacon message (in the next cycle). This The node (M ) collects data, builds the first data message mechanism responds to the dynamic behavior of network. "DATA" and sends it to its associated Coordinator (C). Then • Reliability: to reduce collisions / transmission errors that (C) responds with acknowledgment message "ACK". "DATA" could occur during the two phases, it is necessary to retransmit message will be then relayed by (C) to (V ), and finally all messages (the number of retransmissions is parametrized) relayed by (V ) to the Sink (S), with the exchange of "DATA" including Beacon messages (except acknowledgments). This and "ACK" messages. As shown in Figure 3, after receiving leads to increase the reliability of the data exchange. the "ACK" message, nodes can turn to sleep mode to save • Traffic model: we assume that the traffic model made in energy. the Data collection phase is periodic with the same period throughout the network. Each node (M ) is the origin of one or more data packets in each period (one data flow). (M ) Sink V C M S_Beacon ASC_RQ nodes can also aggregate all medical data in one packet (the ASC_ACK B_Beacon maximum size of PPDU in IEEE 802.15.4 is 127 bytes). To Topology creation phase ASC_RQ meet the energy needs of the sensors, the activity period should ASC_ACK C_Beacon be optimized and reduced as much as possible. ASC_RQ ASC_ACK C_Beacon DATA Start of data collection of (M) C. Complementary Mechanisms for Topology Maintenance ACK B_Beacon We have improved the topology maintenance with new mech- Data collection and reconfiguration phase DATA ACK DATA Reporting anism. Sending Beacon messages periodically offers other ad- S_Beacon vantages that meet the application requirements. Particularly, DATA ACK they can be used for mobility management, re-allocation of Active mode new slots for WBANs, and topology re-configuration: addition Sleep mode Level 3 Level 2 Level 1 of new sensor, and removal of a sensor (depleted battery, sensor breakdown, etc.). Actually, each level has a manager Figure 3. Principle mechanisms of the protocol node that takes decisions while an event occurs: (C) node for tier 1, (V ) node for tier 2 and (S) node for tier 3. • Medium access: to minimize collisions in the three tier The mobility of a person has an impact on communications architecture we manage the medium access as follows: we of tier 1 and tier 2: (i) In tier 1, when 2 WBANs are situated use “Data reporting” period to manage “inter-tier” interactions in the same range, to reallocate new slots, the (C) node sends between nodes belonging to different levels (nodes report data C_Beacon message containing the new allocated slots. (ii) (by level) as shown in Figure 3. However, it is necessary, to In tier 2, the link between (C) and (V ) could be interrupted: assign the appropriate access method to minimize collisions node (C) should re-associate with a new (V ) node (we can use between nodes belonging to the same level. In fact, we propose the initialization mechanism via the exchange of B_Beacon, a hybrid access: ASC_RQ and ASC_ACK messages). Then the new (V ) node - Slotted access for M and C nodes (WBAN): it provides relays the received data to the Sink (via DATA and ACK a guaranteed access and a reduced delay for medical data. messages). - Contention access for (C, V ) and (V, S): this is appropri- ate for mobility. • Maintaining synchronization: during the data collection IV. D IMENSIONING AND P ERFORMANCE E VALUATION phase, the network must operate under a regular schedule to A. Analytical Model ensure the transit of the data between levels 1, 2, and 3 in order to reach correctly the Sink. To this end, we propose that The delay and energy consumption are the most important Coordinator, Video and Sink nodes send periodically Beacon performance criteria for the application. Below we evaluate the messages. These messages have a crucial role because they performance of the protocol in the two phases: initialization permit to resynchronize nodes (to prevent the clock drift and data collection. We used three important parameters: phenomenon) while keeping the data exchange hop by hop. network size, transmission interval and data size.
  • 4. • Initialization phase analysis: The first association phase Where Tslots is the slot duration and N (i) is the total number between all medical nodes and the Coordinator is represented of slots allocated to medical node (i). To calculate the energy by the duration D : consumption in data collection we reuse the formula (7): D = TC_Beacon + nM i=1 DASC (i) (1) EDC = erx · (TC_Beacon + TACK ) + etx · (TDAT A ) (9) Where DASC (i) is the association duration of one node i and • Other Superframes analysis: In the same way, we can nM the number of medical nodes. Then, let DASC (i) is the evaluate the upper tiers (C, V ) and (V, S). The principle mean association time of node i with the (C) of its WBAN: parameter that changes is the number of nodes per level (nC ,nV ). However, in data collection analysis, the Tcs duration must be added because (C) and (V ) nodes compete for the DASC (i) = Tcs + TASC_RQ + TASC_ACK (2) medium access. Tcs is a random duration before each node i sends its “ASC_RQ”. To reduce collisions, each node initially senses the B. Hardware Implementation channel during a random duration Tcs uniformly distributed in • Platforms used: we have implemented T-TMAC in Imote2 the interval [0, Tf ], where Tf is the maximum of the duration. hardware platform. The Imote2 transceiver operates at ISM 2.4 For the sake of simplicity, we consider in a similar manner to T GHz frequency, 17.4 mA with (0 dBm) power output and it [10] the mean value of Tcs : Tcs = 2f (3) allows data rates of up to 250 Kbps. The micro-controller runs at 13−416MHz. This device requires a supply voltage between • When the other medical nodes hear the first “ASC_RQ” 3.2−4.5 Volts, and is powered by three 1.5V (AAA) batteries they must wait for a time equal to (TASC_RQ + in series. The sensing unit includes: temperature, acceleration TASC_ACK ) before starting to draw again a random and humidity measurements. Two kinds of cards [14] may be duration Tcs . embedded on Imote2 radio card: Sensing card and Video card. • The number of reserved GTS (reserved by (M )) depends • Protocol implementation: Figure 4 shows the implemented on the kind and the length of data. sensor network and Table 1 shows the measured real parameter The association duration of the other nodes can be written as values of the Imote2. Four important tasks are realized to build follows: the network architecture and to test the network operations: power tuning, frames setting (S_Beacons, DATA, ACK, etc.), Tf DASC (i)i=1 = DASC (i − 1) + i+3 WBAN implementation (aggregation functions for (C), slots (4) +TASC_RQ + TASC_ACK management) and Data forwarding. Energy consumption: To calculate the energy consumption PARAMETER VALUE U NIT of the first node we can reuse the formula (2) by adding S_Beacon, B_Beacon 11, 7 ms consumption corresponding to each mode (reception or trans- CBeacon 12, 8 ms mission), then we obtain: TASC_RQ 12, 2 (M ), 11, 7 (C, V ) ms EASC (i)i=1 = erx · (Tcs + TASC_ACK ) TASC_ACK 11, 9 (M ), 11, 7 (C, V ) ms (5) +etx · (TASC_RQ ) TDAT A(M ) , TDAT A(C) , TData(V ) 13, 7 (M ), 14, 9 (C, V ) ms To calculate the total energy consumed we add the amount TACK 11, 9 (M ), 11, 7 (C, V ) ms (erx ·TC_Beacon ) that corresponds to the receiving of the Coor- ST 1083 (M 1), 450 (M 2) ms dinator Beacon (“C_Beacon”) and erx , etx are respectively the etx 74, 2 (92 bytes) mA energy consumed when receiving and transmitting data. The erx 97, 2 (92 bytes) mA energy consumption of the other nodes during the association el 56, 4 (listening) mA phase can be written as follows: epx 37 mA T epx(sleep) 500 µA EASC (i)i=1 = erx · [DASC (i − 1) + i+3 f (6) esgx 6, 4 (procOn : 43, 4) mA +TASC_ACK ] + etx · (TASC_RQ ) LED 2 (procOn : 39) mA As shown in Figure 3, in the reporting period, (C) sends N umber of retransmissions 3 /O the collected data to (V ) to which it is associated. During this T x power (M1 , M2 , C1 , V1 , S) −25, −25, −10, −10, −10 dBm period, medical nodes may turn off their radios (sleep mode) Table I to save energy. M EASURED PARAMETER VALUES • Data collection phase analysis: It corresponds to the data sending and differs from the association, because during this time, medical nodes don’t have to compete for the medium V. R ESULTS AND DISCUSSION access, however they have to send “DATA” messages larger Figure 5 shows the prototyping results for initialization than “ASC_RQ”. and data collection phases. The graph on the left side shows the current consumption during initialization of each node DDC = TC_Beacon + TDAT A + TACK (7) (M 1), (M 2), (C), (V ) and (S). We see that it increases de- nM DT otal = Tslots . i=1 N (i) (8) pending on the nodes position in the architecture. (M ) and (C)
  • 5. nodes are the larger consumers of energy. This is due to the of energy saving. Our on-going work is focused on detailed waiting time that these nodes spent to receive their appropriate modeling analysis and scenarii evaluation and on the compari- Beacon message (B_Beacon for (C) and C_Beacon for (M 1) son between T-TMAC and other MAC protocols such as IEEE and (M 2) (as shown in Figure 3). The graph on right side 802.15.4. Other perspective of this work concerns extending shows the current consumption of each node during data the protocol with scalable slot allocation mechanism. This collection phase, during 1 hour of operation, with Deep Sleep mechanism could be appropriate for large applications with period of 20 seconds. The results show clearly the advantage dense number of nodes such as in the case of hospitals. of the Deep sleep mode implemented on Imote2 platforms, to Reel prototyping Reel prototyping save the energy of all nodes. Analytical model Analytical model Current consumption during data Current consumption during Exchange of messages initialization (mA) between neighbor nodes collection (mA) 0x09 1) "Radio"card Terminal Serial Dump Sink 1) "Radio card" 1) "Radio" card 2) "Vidéo" card 0x07 0x08 Sniffer PC Xsniffer V1 V2 Type of node Type of node 1) "Radio" card 0x05 0x06 Figure 6. Comparison of results obtained by the two methods: current C1 C2 consumption by each node during initialization and data collection phases 1) "Radio" card R EFERENCES 2) "Sensor" card 0x01 0x02 0x03 0x04 [1] H. Alemdar and C. Ersoy,"Wireless Sensor Networks for Healthcare: A M1 M2 M3 M4 Survey", Elsevier Computer Networks, Volume 54, Issue 15, pp. 2688- 2710, October 2010. WBAN 1 WBAN 2 [2] G.Z.Yang,"Body Sensor Networks", Springer-Verlag London, 2006. [3] A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat Figure 4. Implementation of the sensor network monitoring: Application driver for wireless communications technology", In Proc. ACM SIGCOMM Workshop on Data Communications, Latin America and the Caribbean, April 2001. Consumption of each node in Sleep mode [4] J.A. Paradiso and T. Starner, "Energy scavenging for mobile and wireless the network Deep Sleep mode electronics", Pervasive Computing, Volume 4, Issue 1, pp. 18- 27, 2005. [5] G. Anastasi, M. Conti, M-D Francesco and A. Passarella, "Energy Current consumption during data conservation in wireless sensor networks : A survey", Ad Hoc Networks, Current consumption during 2009. initialization (mA) collection (mA) [6] I.F. Akyildiz, T. Melodia and K. Chowdhury, "A Survey on Wireless Multimedia Sensor Networks", Elsevier Computer Networks Journal, March 2007. [7] S-K Chong, S. Krishnaswamy and S-W Loke, "A context-aware ap- proach to conserving energy in wireless sensor networks", Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp. 401- 405, March 2005 Type of node Type of node [8] "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)", IEEE Std. 802.15.4, 2006. Figure 5. Prototyping results: initialization and data collection phases [9] J. Polastre, J. Hill and D. Culler, "Versatile low power media access for wireless sensor networks", In Proceedings of the 2nd international We estimated analytically the average energy consumption conference on embedded networked Sensor Systems (SenSys’04), pp. 95- (EASC ) in initialization and Data collection phases. Figure 6 107, New York, 2004. [10] W. Ye, J. Heidemann and D. Estrin, "Medium access control with co- shows the comparison between analytical and real prototyping ordinated adaptive sleeping for wireless sensor networks", In IEEE/ACM results, for one hour of operation of the network, with Deep transactions on networking, vol. 12, no. 3, pp. 493-506, June 2004. sleep of 20 seconds (180 cycles). We added in the analytical [11] A. El-Hoiydi, J.D. Decotignie, C.C. Enz and E. Leroux, "WiseMAC, an ultra low power MAC protocol for the wiseNET wireless sensor network", calculation the values assigned for data sensing ((M 1): tem- SenSys 03, pp. 302-303, 2003. perature and (M 2): all Data). We show that analytical results [12] V. Rajendran, K. Obraczka and J. J. Garcia-Luna-Aceves, "Energy fit with the prototyping results. efficient collision-free medium access control for wireless sensor net- works", In Proceedings of the 1st international conference on embedded networked Sensor Systems, SenSys ’03, pp. 181-192, 2003. VI. C ONCLUSION [13] I. Rhee, A. Warrier, M. Aia, J. Min and M.L. Sichitiu, "Z-MAC: a hybrid MAC for wireless sensor networks", IEEE/ACM Transactions on In this paper a new MAC protocol for healthcare moni- Networking, pp. 511-524, 2008. toring is presented. Simple mechanisms based on sleep/active [14] Y. Zatout, E. Campo and J. Llibre, "WSN-HM: Energy-Efficient Wire- less Sensor Network for Home Monitoring", ISSNIP 09, Melbourne, schedule are proposed for energy efficiency. We showed the Australia, 2009. advantages of data aggregation and allocation of slots in a [15] Y. Zatout, R. Kacimi, J-F. Llibre and E. Campo, "Mobility-aware multi-tiers architecture. The performance evaluation has been Protocol for Wireless Sensor Networks in Health-care Monitoring", Fifth IEEE International Workshop on Personalized Networks, USA, 2011. realized with an analytical model and with real prototyping on [16] S. Zhao and D. Raychaudhuri, "Multi tier Ad hoc Mesh Networks with Imote2 platforms. The results fit very well. From all results, Radio Forwarding Nodes", IEEE Global Telecommunications Conference, it seems that T-TMAC protocol provide a significant amount IEEE GLOBECOM 2007, Washington, USA, 2007.