50120140501017
Upcoming SlideShare
Loading in...5
×
 

50120140501017

on

  • 235 views

 

Statistics

Views

Total Views
235
Slideshare-icon Views on SlideShare
235
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    50120140501017 50120140501017 Document Transcript

    • International Journal of Computer Engineering and Technology (IJCET), ISSN 0976INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 1, January (2014), pp. 153-161 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME LOCATION BASED STORE AND FORWARD PACKET ROUTING ALGORITHM FOR WIRELESS BODY AREA NETWORKS: A SURVEY Shivam Wadhwa1, Kusum Dangi2 1 2 Dept of Computer Science and Engineering, ITM University Gurgaon, India Dept of Electronics and Communication Engineering, ITM University Gurgaon, India ABSTRACT The increasing use of wireless networks and the constant miniaturization of electrical devices have empowered the development of Wireless Body Area Networks (WBANs). WBAN is an application of Wireless Sensor network that is used in health monitoring. Wireless sensor nodes are either placed inside or on the body and transmit the data in form of packets .Packet Routing is very crucial technique in WBAN. Packet Routing is used to send the data which is being monitored by various sensor nodes implanted on the body. In this paper we discuss about location based store-and forward packet routing algorithm for WBAN with general body postures. Keyword: Communication Architecture, Location Based Routing, Packet Routing, QoS, WBAN, WPAN. 1. INTRODUCTION WBAN consists of tiny sensors attached or implanted in the body which are capable of establishing a wireless communication link. The on body sensors continuously monitor the human physiological changes occurring periodically. This physiological data is in form of packets that are to be sent to the destination. In this paper we will discuss about various aspects of WBAN and on-body store-and forward packet routing algorithm for WBAN. 2. WIRELESS BODY AREA NETWORK: OVERVIEW WBAN technology came into existence around 1995 with the idea of using Wireless personal area network (WPAN) which help in communication on or around the human body[1,2]. 153
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 2.1 Types of Devices (Wireless) Sensor node: A Sensor node is a device whose function is, gathering and responding to any kind of physiological change, happening in the human body and reports this data with wireless means. (Wireless) Actuator node: Its function is to act according to the data received from the sensors. (Wireless) Personal Device (PD): Its function is to inform the patient about all the information gathered from the sensors and actuators. 3. WBAN COMMUNICATION ARCHITECTURE WBAN posse’s three tier communication architecture Figure1: Three tier communication architecture In fig.1, a three-tier architecture based on a BAN communication system is shown. The figure shows that all the sensors send their data to the personal server and finally the data is streamed to a medical practioner. The whole communication takes place in three-tier: 3.1 Tier1-communication In Tier-1, the communication occurs around 2 metres of the human body which comprises of two actions first is the communication between the body sensors and the other is the communication between the body sensors and portable personal server. 3.2 Tier2-communication In Tier -2, the communication occurs between the personal server and the access points. The basic functionality of this tier is interconnecting various BANs with various networks. 154
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 3.3 Tier3-communication In Tier-3, the communication is intended for metropolitan areas. It is used to bridge the network for inter- BAN and beyond- BAN communication. 4. SENSORS USED IN WBAN Accelerometer/Gyroscope: Accelerometer sensor is used to monitor the various body positions like walking, sitting, standing. . The accelerometer-based posture monitoring for BANs are used to measure the vibration happening in the human body and also acceleration due to gravity. Gyroscope uses the principle of conservation of angular momentum to measure or maintain the body orientation. Blood glucose: The amount of glucose circulating in the blood is called as blood glucose. It is also called as blood sugar. Glucose is measured by extracting blood from the finger and then applying it to a test strip composed of chemicals sensitive to the glucose in blood sample. An optical meter (glucometer) is used to analyze the blood sample and gives a numerical glucose reading. Blood pressure: The blood pressure sensor uses the principle of oscilimetric to measure the blood pressure of the body. CO2 gas sensor: This sensor is used to measure the changes in carbon-dioxide happening in the human body. ECG sensor: ECG is also known as electro cardio gram that is used to record the electric activity of the heart which is helpful in diagnosing a heart disease. ECG signal is obtained by placing several electrodes on the skin (e.g., arms, and chest), and then measuring potential differences between these electrodes. EEG sensor: Electro encephalogram sensor is used to measure the electrical activity happening inside the brain. It is done by attaching tiny electrodes to the human’s scalp at multiple locations. The information that is sensed by the electrodes is forwarded to an amplifier for producing a pattern of tracings. EMG sensor: EMG sensor is used to measure the electric signals produced by the muscles. Nerve conduction is usually done to measure the electrical activity in muscles as nerves control the muscles in the body. Temperature and Humidity sensor: The temperature and humidity sensors are used to measure the temperature and humidity of the environment around the human body. 5. PACKET ROUTING IN WBAN Packet routing is important aspect in Wireless body area network .A number of small sensors as discussed above strategically placed on human body can create a Wireless Body Area Network which can monitor vital signs and collect the data in the form of packets. This data movement across such sensors can be point to point or multi-point. In this section we will discuss on-body packet routing issues in case of various body postures [3]. 155
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Goal of packet routing: The goal of this discussion is to develop on-body store and forward packet routing and minimising end-to-end packet delay by dynamically choosing routes on which the storage delay is low. The main goals of this packet routing are: 1.) end-to-end delay, 2.) packet loss, and 3.) transmission energy consumption. In fig.2, various sensors are placed on the human body that will transmit the data to a sink node which in turn will send the data to the sink node which in turn communicates with the out of body server. Two store and forward routing algorithms have been developed based on location based routing protocol. 5.1 Relative Location based Forwarding (RLOCF) The main logic of packet forwarding in RLOCF is that a node forwards a packet to other neighbouring nodes that are known to be closer to the sink node. The main logic behind this forwarding algorithm is to give information to every node about the relative distances between all other neighbouring nodes in the network and the sink node. It can be easily implemented on typical on-body networks (as shown in Fig.2) containing only a few nodes. The packet forwarding logic in RLOCF can be formally stated as follows. For an M-node body sensor network, a sorted list [n1, n2, ni,. .,nM] is created based on the distances of the individual nodes from the sink node (e.g. node-6 in Fig. 1). Node n1 represents the sink, and the nodes are placed in the list such that: d(n1) =0 or 1 and d(ni) ≤d (ni+1) , i = 1, 2, 3, …,M1, where the quantity d(ni) represents the distance of node ni from the sink node n1.Based on the known sensor placement locations and the usual body configurations, the quantities d(ni) are first estimated manually and then the above sorted list is created. Figure 2: Body Area Sensor Network 156
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME RLOCF packet forwarding logic at node-i for (j = 1; j ≤ i-1; j++){ if ( Li,j = 1){ // if link Li,j is now connected Forward the packet to node-j; Break; } } if (the packet is not forwarded) Buffer it at node-I; // Execute the above logic every time nodei receives a // new packet to be forwarded OR it has buffered // packets AND a new link Li,k (for all k = 1, 2, …, M // except k = i is formed In the Figure2, node-6 is considered as the sink, the sorted list can be evaluated as [6, 7, 4, 5, 1, 2, 3 ]. The packet forwarding logic for node-i is to forward a packet to node-j, where node nj is the first currently connected node in the sub-list [n1, n2, ni-1] in that order. In other words, the packet is forwarded to a node which is nearest to the sink node among all the currently connected nodes that are closer to the sink than node-i itself. If there is no single node that is closer to the sink is c connected, node-i continues buffering the packet till the connectivity status changes, which is when the above logic is again executed for finding an appropriate node to which the packet can be forwarded. Relative LOCation based Forwarding (RLOCF) logic gives an option of multiple possible next hops. The advantage of the above forwarding logic is that in addition to ensuring that a packet is always forwarded closer to sink node, it can enjoy the phenomenon of expedited forwarding when nodes that are very close to the sink are directly in touch with a forwarding node This feature improves both packet delivery delay and hop-count performance of the routing. Relative Location based Forwarding (RLOCF) logic has been described for a multi-point-topoint application in which all the nodes present on the body send their packets to a single sink node. The same logic can be further expanded for multi-point-to-multi-point applications. In multi-pointto-multi-point applications case, instead of a single list, each node maintains M-1 separate lists for each other node.. The same forwarding logic can then be applied using the appropriate list for the node which a packet is destined towards. 5.2 On-body Store and Flood Routing (OBSFR) A modified flooding protocol has been implemented i.e. the On-body Store and Flood Routing to determine the best case delay performance. . In the case of flooding mechanism multiple copies of a single packet are dispatched and they reach the destination via multiple routes and the first arrived copy to reach destination indicates the minimum possible end-to-end delay that can be achieved by RLOCF. 157
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Mechanism: In this flooding mechanism a packet carries a unique identifier {source_id. seq_no.} and also carries a list of node-ids that indicates its path from the source node. When a node-i receives a packet for the first time (detected from its unique identifier), the pack is buffered there till it encounters at least one node which is not present in the list of node-ids found in the packet. When it encounters such a node the packet is handed over to that node and is deleted from its own buffer. If the packet is subsequently received by the same node-i then it will be ignored. The main benefit of this flooding protocol. The main benefit of using this approach is reducing the number of packet drops. Now let us assume a situation in conventional flooding (i.e. without using the list of node-ids) node-i broadcasts the packet to node-j which already had that packet and it already had broad cast forwarded the same packet then it simply will discard it after receiving from the node-i. If node-i and j are forming a network partition that does not contain the destination address then that packet is dropped from the partition. The OBSFR mechanism for a multipoint-to-point implementation is summarized in the pseudo-code in the following algorithm: OBSFR logic: Process followed at node-i that forward packets to sink-d while (true){ for(all buffered packets to be forwarded to node-d){ for (all node j [ j∈vN, j ≠ i ]){ if ( Lti,j = 1 and j∉list of node _ ids in packet ){ // j is a neighbor of i, and the packet did not vist node-j before Broadcast the packet; Remove it from node-i’s buffer Break; // done with this packet forwarding } else Continue buffering the packet at node-i; } } } Process for node-i after receiving a packet { if ( the packet was not received before) if (this is not the destination) Buffer the packet in for further forwarding; else Discard the packet; // it was received before } In the modified flooding that used the list of node-ids, However, with the modified flooding that uses the list of node-ids, node –i will broad cast the packet to all nodes that are not present in the list of node-ids carried by the packet so node –j will not receive this packet as it is not present in that list. So the buffering continues till it is not able to find such a node. This improves the chance the packet is forwarded to the nodes that are out of this partition. Hence, it reduces the overall packet loss probability. But this technique is applicable only to network having lesser nodes and not for those networks that contains large number of nodes. 158
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Partition Packet Saturation: In the above flooding modification there exists a partition packet saturation in which due to some scenario a packet may have a chance to get lost. Consider a scenario that node-i receives a packet and it is into a partition with two other nodes p and q such all of them is inter-connected. Now node-i broadcasts the packet to other nodes p and q as they are not present in the list of node-ids of the packet and delete it from its own buffer. Now, the nodes p and q broadcast the packet to each other and as they are not appearing in each other copy of the packet i.e node q does not appear in the list of p’s copy and node p does not appear in the list of q’s copy of the packet. After forwarding the packet they will delete from their own buffer, eventually causing the packet to be dropped from the partition and it will not be able to reach its destination Goal of On-body Store and Flood Routing: Inspite of all this On-body Store and Flood Routing (OBSFR) ensures the successful flooding of the packet to reach the destination with minimum packet delivery delay. But the transmission energy cost of OBSFR is significantly larger as compared to RLOCF. 6. RADIO TECHNOLOGIES To have communication possible between the various nodes radio technologies are used. In this section there is a list of radio technologies are used for BANs and WPANs such as Bluetooth, Bluetooth Low Energy (Wibree) and ZigBee (IEEE 802.15.4.)[4,5,6]. 6.1 Bluetooth For short range wireless communication Bluetooth technology was designed which was further used for connecting various portable devices. These devices support data and voice application. The current Bluetooth standard in operation is version 2.0 that supports data rate of 3Mbit/s. 6.2 Bluetooth low energy technology In 2004 Nokia introduced a new technology for providing ultra-low power consumption and cost which was popularly known as Bluetooth Low End Extension (LEE), and which was later recognised by the name of Wibree. It was designed to connect small devices to mobile terminals wirelessly. This technology provides a data rate of 1 Mbps and uses a simpler protocol stack and focus on shortrange, star-configured networks. 6.3 ZigBee( IEEE 802.15.4) After the existence of Bluetooth and Wibree a new radio standard was introduced known as Zigbee (IEEE 802.15.4) that supports low power consumption and is a cost-effective technology. Zigbee operates in two modes: (1) beacon enabled and (2) non-beacon enabled modes. (1)Beacon enabled mode: In a beacon enabled mode, a structure of super frame is used which is divided into two portions: active and inactive. During the inactive portion, devices enter a low-power mode. During the active portion it has two periods’ contention access period (CAP) and contention free period (CFP). If any device wants to communicate during the CAP period it competes the other devices using a slotted CSMA/CA mechanism, while in the CFP it has no contentions and has guaranteed time slots. (2)Non –beacon enabled mode: This mode is used if a coordinator does not prefer to use the beacon-enabled mode, so it will turn off the transmissions and it will use unspotted CSMA/CA algorithm. 159
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 7. QUALITY OF SERVICE IN WBAN The sensor nodes and human body should be compatible so that no adverse effects or reaction should occur. Quality of service is sometimes supported by prioritized QoS. Prioritized QoS first categorizes the services into different Access Classes (ACs), like real time, non real time, best effort, etc. Different priority is assigned to each of the access classes. Higher the priority is, higher will be the chance to access the channel .However, once the priority is set, it remains unchanged on this approach. In WBAN the level of criticality of QOS parameters vary from application to application depending upon the situation. In normal day life ECG reading is given more preference over the body temperature so is assigned a higher priority. But in abnormal situation when the body temperature is high the priority needs to be interchanged. 8. APPLICATION OF WBAN Wireless body area network are a great boon to the modern science and technology. Due its large number of application such as: 8.1 Medical usage Hospitals and health care have been the two areas where this technology has been developed and had a great impact. This technology has a great application in monitoring the patient’s health condition continuously over a period of time. Several nodes are placed at the most appropriate position of the human body which actually test its specific parameter. Doctors could really make diagnosis based on the information gathered over a period of time. 8.2 Sports usage Wireless body area network has a great use in the life of a sportsperson who are young, who exercise a lot and who need to have accurate and constant information about their training progress. In this nodes placed at different area of the body could give different type of information. The sensors may be the heart sensor, temperature sensor etc. that perform their corresponding function. 8.3 Other usage There are various areas that could use WBAN technology such as it is used as a modern solution on the areas of war conflicts. It is possible that the commercial standard will give it more possibilities and performance. 9. CONCLUSION AND FUTURE SCOPE From this paper we can conclude that WBAN is a promising technology that can have a great impact on health care in the future. In this paper we have discussed about what is wireless body area network, what are the devices involved in WBAN, BAN communication architecture, sensors used on human body, packet routing, quality of service, applications of Wireless body area network. Despite advances in the above areas there are many challenges that need to be addressed such as energy efficient communication protocol, interoperability between BANs and design of successful applications. Packet routing uses the mechanism of forwarding the packet based on relative node distances from on-body sink node. It is proposed that with the help of successful leveraging of the node location, it could provide better routing delay performance. 160
    • International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Khan, J.; Yuce, M.; Karami, F.,” Performance Evaluation of a Wireless Body Area Sensor Network for Remote Patient Monitoring”, 30th Annual International IEEE EMBS Conference, 2008. Ali,Q. ; Abdulmaowjod, A. ; Mohammed, H. ,”Simulation & Performance Study of Wireless Sensor Network (WSN) Using MATLAB”, 1st International Conference on Energy, Power and Control (EPC-IQ),2010. Quwaider, M. ; Biswas, S., “On-body Packet Routing Algorithms for Body Sensor Networks”, First International Conference on Networks & Communications, 2009. Latre, B. ; Braem, B. ; Moerman, I. ; Blondia, C.; Demeester, P. “A Survey on Wireless Body Area Networks”.2011 Chen, M. ; Gonzalez, S. ; Vasilakos, A. ; Cao, H. ; Leung, V. ,” Body Area Networks: A Survey”, Mobile Netw Appl (2011). Rahim, A. ; Javaid, N. ; Aslam, M. ; Rahman, Z. ; Qasim, U. ; Khan, Z. ,” A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks”, http://arxiv.org/abs/1208.2351v1,2012. Basavaraj S. Mathapati, Siddarama. R. Patil and V. D. Mytri, “Power Control with Energy Efficient and Reliable Routing MAC Protocol for Wireless Sensor Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 223 - 231, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 22 - 31, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 161