Power-efficient mechanisms play an important role in the performance of a good MAC protocol. These mechanisms are categorized into Low-power Listening (LPL), Scheduled Contention, and TDMA mechanisms. The following sections briefly explain each mechanism with examples.
4.1. Low-power Listening (LPL) Mechanism
In a Low-power Listening (LPL) mechanism, nodes wake up for a short duration to check the channel activity without receiving any data. If the channel is idle the nodes go into sleep mode, otherwise they stay on the channel to receive the data. This is also called channel polling. The LPL is performed on regular basis regardless of synchronization among nodes. The sender sends a long preamble before each message in order to detect the polling at the receiving end.
The WiseMAC [
18] protocol is based on the LPL mechanism. In this protocol, a non-persistent CSMA and a preamble sampling technique is used to reduce idle listening. The preamble is used to alert the receiving node of a packet arrival. All the nodes in a network sample the medium periodically. If a node samples a busy medium, it continues to listen until it receives data or the medium becomes idle.
Figure 5 shows the WiseMAC concept.
In a WBAN, the LPL mechanism has several advantages and disadvantages. The periodic sampling is efficient for high-traffic nodes and performs well under variable traffic conditions. However, it is ineffective for low-traffic nodes, especially in-body nodes, where periodic sampling is not preferred due to strict power constraints. Since the WBAN topology is a star topology and most of the traffic is uplink, using LPL mechanism is not an optimal solution to support both in-body and on-body communication simultaneously.
4.2. Scheduled-Contention Mechanism
In a scheduled-contention mechanism, scheduled and contention based schemes are combined to incur scalability and collision avoidance. In this mechanism, the nodes adapt a common schedule for data communication. The schedules are exchanged periodically during a synchronization period. If two neighbouring nodes reside in two different clusters, they keep the schedules of both clusters, which results in extra energy consumption.
The S-MAC [
19] protocol is a good example of a scheduled-contention mechanism. S-MAC is a power-efficient and a contention-based MAC protocol designed for multi-hop Wireless Sensor Networks (WSNs). In this protocol, the low duty cycle mode is default operation of all nodes. This protocol introduces the concept of coordinated sleeping among neighbouring nodes. The node is active when it has data to send otherwise its radio is completely turned off. The energy is reduced from all the sources of energy waste,
i.e., idle listening, collision, overhearing and control overhead. A complete cycle of listen and sleep is called frame. Each frame begins with a wake up period, which is used by nodes to exchange control information. The wakeup period is usually followed by a sleep period. If a node has data to send while in the sleep mode, it must defer its transmission until the next wakeup slot. The state of the channel is determined using physical and virtual carrier sense mechanism. For each unicast frame transmission, Request to Send/Clear to Send (RTS/CTS) mechanism is followed. Broadcast frames are sent without using RTS/CTS mechanism. If a node fails to access the medium, it turns off its radio until the Network Allocation Vector (NAV) is zero. Nodes maintain synchronization by sending SYNCH packet. The size of SYNCH packet is very short and includes information about next sleep period. The listen period of a node is divided into two parts when both SYNCH and data packets are received at the same time.
Figure 6 illustrates the timing relationship between receive and different senders. Sender 1 sends a SYNCH packet only. Sender 2 sends a unicast data packet only. Sender 3 sends both a SYNCH and a data packet.
A scheduled-contention mechanism reduces idle listening using sleep schedules and performs well for multi-hop WSNs. However, considering this mechanism for a WBAN reveals several problems for low-power in-body/on-body nodes such as pacemakers and defibrillator nodes/implants, which are not required to wake up periodically in order to exchange their schedules with other nodes. Furthermore, scheduled-contention mechanism may perform well for on-body applications but it does not provide reliable solutions to handle sporadic events including emergency and on-demand events. Handling sporadic events (emergency) require new innovative solutions that allow in-body/on-body nodes to update the coordinator within strictly limited amount of time.
4.3. TDMA Mechanism
In a TDMA mechanism, the channel is bounded by a superframe structure that consists of a number of time slots allocated by a base-station or a coordinator. The time slots are allocated according to the traffic requirements, i.e., a node gets a time slot whenever it has data to send or receive. Otherwise, it goes into sleep mode. Although it performs well in terms of power consumption but consumes extra energy due to frequent synchronization.
The PB-TDMA protocol is based on the TDMA mechanism. In this protocol, the nodes are assigned specified slots for collision-free data transmission. These slots are repeated in fixed cycle. A complete cycle of these slots is called a frame. In the PB-TDMA protocol, each TDMA frame contains a preamble and a data transmission slot as illustrated in
Figure 7. A node always listens to the channel during preamble and transmits in a data transmission slot. The preamble contains a dedicated subslot for every node. These subslots are used to activate the destination node by broadcasting the destination node ID of outgoing packet. After receiving the preamble, the destination node identifies the source node. Each node turns off its radio when it has no data to transmit. This mechanism avoids unnecessary power consumption of sensor nodes. The radio is turned on when the node finds its ID in the preamble or when the node has data to transmit.
As discussed in Section 2, the CSMA/CA protocol is not a reliable protocol for a WBAN due to unreliable CCA, traffic correlation, and heavy collision problems. The alternative is to adapt a TDMA protocol that can solve the aforementioned problems in a power-efficient manner. However, traditional TDMA protocols such as PB-TDMA have several problems, i.e., preamble overhearing and limitation of handling sporadic events. Solving these problems (including many others) towards a WBAN can accommodate the heterogeneous WBAN traffic in a power-efficient manner. Furthermore, new techniques are required to solve the sporadic events problems in a reliable way.
4.4. Comparison of LPL, Scheduled-contention and TDMA Mechanisms for a WBAN
Table 6 presents the characteristics of the LPL, schedule-contention, and TDMA mechanisms for a WBAN [
20]. The table shows that LPL and scheduled-contention are unable to accommodate the heterogeneous WBAN traffic including sporadic events. Although it is possible to develop new MAC protocols based on these mechanisms, they will not be able to satisfy all the requirements. For example, LPL mechanisms may perform well in case of periodic traffic but they are unable to accommodate aperiodic (unpredictable sporadic events) traffic and low duty cycle nodes. Furthermore, the scheduled-contention mechanisms are unable to cover in-body nodes, which do not require frequent synchronization or exchange of their schedules. The TDMA mechanisms provide good solutions to the variable WBAN traffic. The slots can be assigned according to the traffic volume of a node. Although in traditional TDMA protocols, nodes are required to synchronize at the beginning of each superframe boundary, but this approach can be optimized for nodes that do not require frequent synchronization. One way is to skip the synchronization control packets such as the beacon. The control packets (beacons) can be received when the low duty cycle nodes have data to send or receive. A detailed comparison of MAC protocols based on LPL, scheduled-contention, and TDMA mechanisms for a WBAN is given in
Table 7 (the protocols are not explained here due to space limitation problems, but they are available in the existing literature. The table is a result of a comprehensive study of the existing protocols in the context of a WBAN).
From the following table, it can be seen that LPL-based protocols such as WiseMAC and BMAC [
21] protocols are good for high traffic applications while STEM [
22] performs well for low traffic applications. Furthermore, STEM can also accommodate the sporadic events by using a separate control channel. However, increase in the traffic load decreases the probability of handling sporadic events. Schedule-contention protocols such as SMAC and TMAC [
23] are suitable for high traffic applications, PMAC [
24] for delay sensitive applications, and DMAC [
25] for priority-based applications (where the nodes have different priorities). As mentioned earlier, TDMA-based protocols can easily accommodate the heterogeneous WBAN traffic since they are adaptable to the traffic load,
i.e., slots can be assigned according to the traffic volume. However, traditional TDMA-based protocols such as FLAMA [
26], LEACH [
27], and HEED [
28] are unable to satisfy the WBAN requirements as mentioned in the above table. In addition, all of the existing MAC protocols are designed for a single channel only,
i.e., they do not operate on Multi-PHYs simultaneously. The MAC transparency has been a hot topic for the MAC designers since different bands have different characteristics in terms of data rate, number of sub-channels in a particular frequency band/channel, and data prioritization. A good MAC protocol for a WBAN should enable reliable operation on MICS, ISM, and UWB etc bands simultaneously. With regards to MICS band, the FCC has imposed several restrictions [
29]. According to the FCC:
“Within 5 seconds prior to initiating a communications session, circuitry associated with a medical implant programmer/control transmitter must monitor the channel (sub-channel) or channels (sub-channels) the MICS system devices intend to occupy for a minimum of 10 milliseconds per channel.”
In other words, the coordinator must perform Listen-before-talking (LBT) criteria prior to a MICS communication session. The sub-channels are solely assigned by the coordinator,
i.e., the implants cannot initiate a communication session except in case of an emergency event. Furthermore, the implants are not allowed to perform LBT which creates problems to handle emergency events. Sending an emergency data regardless of LBT may result in heavy collision since the selected sub-channel may have data from another implant. The LBT restriction prevents MAC designers to develop a reliable mechanism for emergency traffic. One of the solutions is to use a wakeup radio or a control sub-channel dedicated temporarily to emergency traffic since the FCC does not allow the permanent dedication of a sub-channel in MICS band. The sub-channel information can be updated using control frames such as the beacon frame.
Figure 8 illustrates an example of a control sub-channel used to send emergency data. It shows that five nodes (1, 2, 5, 7 and 8) are transmitting normal data and one node (3) is transmitting emergency data. The remaining nodes (4, 6 and 9) are in sleep mode. Normal transmission requires beacon to allocate resources. While in emergency case, nodes are not required to wait for the beacon. The communication is initiated by the implants and a control sub-channel can be used to send the emergency data/command as given in the figure.