Internet DRAFT - draft-hongcs-6lo-bcwc
draft-hongcs-6lo-bcwc
6Lo Working Group Hong, Choong Seon
Internet-Draft Kyung Hee University
Intended status: Standards Track Al Ameen, M.
Expires: September 15, 2016 Kyung Hee University
Seung Il Moon
Kyung Hee University
April 19, 2016
Emergency Communication for Low Energy Body-Centric Wearable Networks
draft-hongcs-6lo-bcwc-00
Abstract
Wearable devices are among the core technologies for Internet of Things
(IoT). Recent advances in wireless communication devices have made it
possible to create a wearable network in and around the human body. Such
a network can be used for diverse applications such as monitoring human
body activities and personal entertainments. A typical wearable device
runs on battery power, which is limited and often non-rechargeable.
Therefore, a low energy operation environment is desirable. Emergency
traffic management is an important aspect of such a network. This
document describes how an out-of-bound external wake up based on
on-demand mechanism can work to successfully transmit emergency traffic
in a typical body-centric wearable network (BC-WN).
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as
"work in progress."
This Internet-Draft will expire on September 15, 2016.
Copyright Notice
Hong, et al. Expires Sept 15, 2016 [Page 1]
Internet-Draft Low Energy BN-WN April 2016
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . .. . . . . . 3
1.1. Terminology and Requirements Language . . . . . . . . . 3
2. Emergency Communication . . . . . . . . . . . . . . . . . . . . 3
2.1. Communication process . . . . . .. . . . . . . . . .. . 4
2.2. Data communication . . . . . . . . . . . . . . .. . . . 4
2.3. Network setup . . . . . . . . . . . . . . . . . . . . . 5
2.4. Packets . . . . . . . . . . . . . . . . . . . . . . . 6
3. Low Energy Operation . . . . . . . . . . . . . . . . . . . . . 7
3.1 On-demand communication with addressing . . . . . . . . . 7
3.2. MAC operation and back-off . . . . . . . . . . . . . . . .9
4. IANA Considerations . . . . . . .. . . . . . . . . . . . . . . 9
5. Security Considerations . . . . . . . . . . . . . . . . . . .10
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . .10
6.1. Normative References . . . . . . . . . . . . . . . . . . . . .10
6.2. Informative References . . . . . .. . . . . . . . . . . . . .10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . .. . . . 11
Hong, et al. Expires Sept 15, 2016 [Page 2]
Internet-Draft Low Energy BN-WN April 2016
1. Introduction
In recent times, the design and implementation of wearable systems
are on the rise. They are being actively used in both medical and
non-medical applications.
A network of such devices can be formed to monitor activities in and
around the human body. However, the devices usually have limited
processing, battery, and memory capacity. Energy efficiency and low
delay are among the major design issues. To save energy, a device is
put into sleep mode when not in use. This means the main radio is
turned off. It is turned on when there is a need for communication.
Managing this sleep and wake up mechanism is a delicate affair. It can
be managed through scheduling. Periodic scheduling of sleep/wake up is
easier to implement.
Emergency communication is an important aspect of such a wearable
network. If device wants to transmit emergency data to another device,
which is turned off, an on-demand scheme can be used to successfully
transmit it in an unscheduled mode. Since in such a scenario, a
device does not periodically wake up to check the medium for
packets, a sender can use an external trigger mechanism to wake up
a sleeping device to communicate.
RFC4944 [RFC4944] specifies the transmission of IPv6 over
IEEE802.15.4. The BC-WN in many respects has similar
characteristics to that of IEEE802.15.4. This document specifies
the details of a system to manage an emergency event in wearable
device communication in an efficient manner.
1.1. Terminology and Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
This document is in part inspired by [IEEE802-2011].
2. Emergency Communication
Emergency events can occur due to several reasons. It may happen in
any of the devices including the network controller. For example,
a device can sense abnormality in the sensing data. It can also sense
that the battery is dying. The Controller may face critical problems
during its operation. It may also require sudden data from a device,
which is currently in the sleep state. All of these can be classified
as an emergency or urgent task. The tasks can be medical health
related or non-medical in nature. The handling of the emergency event
is a very sensitive issue in a BAN. The delay must be as low as
possible to handle such situations.
Hong, et al. Expires Sept 15, 2016 [Page 3]
Internet-Draft Low Energy BN-WN April 2016
2.1. Communication Process
A wake up process is handled using the wake up radio. A two-stage
communication process is used as shown in Figure 1. In stage-1,
the wake up radio is switched on. Once the receiver node verifies
itself as the intended receiver, it transmits back an acknowledgment
to the sender using the same channel. In stage-2, the main radio
transceivers are triggered on for data communication.
+------------+ +------------+
| Sender | | Receiver |
+------------+ +------------+
| |
,| |
|| +------------------+ |
Stage-1 || | wake up radio | |
|| | process | |
|| +------------------+ |
`| |
| |
------------------------------
| |
| |
| +------------------+ |`
| |Data communication| || Stage -2
| | process | ||
| +------------------+ |,
| |
| |
| |
Figure 1: Communication process
2.2. Data communication
An example of the emergency communication process is shown in
Figure 2. In the first case, the case of an emergency wake up
command (emergency alarm) packet is depicted. This process is
completed in stage-1 itself. It can be used to notify about
emergency types, which the receiver (controller) can know by looking
into predefined information in the wake up packet.
Hong, et al. Expires Sept 15, 2016 [Page 4]
Internet-Draft Low Energy BN-WN April 2016
The emergency command is a short wake up frame (SWUF). The sender then
waits for the wake up acknowledgment (WACK) timeout period. It
retransmits the command if no WACK is received. The process continues
until successful. The second case depicts an on-demand data
communication process. In this case, the wake up process is followed
by the data communication process and ends with an acknowledgment(ACK).
+----------+ +--------+ +----------+ +--------+
|Controller| | Device | |Controller| | Device |
+----------+ +--------+ +----------+ +--------+
| | | |
| |<--Device Sleeping-->| |
| | | |
| |<--Device wakes up-->| |
|wake up radio| |wake up radio|
|<------------| |<------------|
| WACK | | WACK |
|------------>| |------------>|
| | | Data |
| | |<----------- |
| | | ACK |
| | |------------>|
| | | |
| | | |
(a) (b)
Figure 2: Communication (a) Without data, (b) with data
2.3 Network setup
A star topology is used as shown in Figure 3.
(Device a)----+ +----(Device x)
\ /
(Device b)------+( Controller )+-------(Device y)
/ \
(Device c)-----+ +----(Device z)
Figure 3: BC-WN Star topology
All the devices in the network MUST be equipped with antennae for the
wake up radio and data communication. A device is capable of both
receiving and sending the wake up radio signal. It remains in the
sleep state until either an event triggers it on or it is woken up
by external radio signal.
Hong, et al. Expires Sept 15, 2016 [Page 5]
Internet-Draft Low Energy BN-WN April 2016
2.4. Packets
A typical wake up packet uses the address of a node as shown in
Figure 4. The fields in the wake up packets are - frame header,
address, payload and frame check sequence (FCS) using the cyclic
redundancy code (CRC) algorithm. The frame header contains a preamble
and start frame delimiter (SFD). They help against miss and false
detection and provide synchronization. Node address or ID is used to
identify the intended receiver. The payload contains information
about the events.
+---------+---------+-----------+-------+
| Frame |Address | Payload | CRC |
| Header | | | |
+---------+---------+-----------+-------+
Figure 4: Wake up packet
Other MAC frames used are shown in Figure 5. A 'More Data' field
is used for multiple packets transmission. One bit is used
to depict simple yes/no for more data packets. The final packet size
depends on the payload field. The physical (PHY) layer packet
properties are similar to the IEEE802.15.4 channel model.
48 variable 26 bits
+---------+----------+-------+
| MAC | Payload | FCS |
| Header | | CRC) |
+---------+----------+-------+
(a)
16 8 16 1 7 bits
+---------+---------+----------+----------+----------+
| Frame |Sequence | Address | More Data|Reserved |
| Control |Number | | | |
+---------+---------+----------+----------+----------+
(b)
16 8 16 bits
+---------+---------+-------+
| Frame |Sequence | CRC |
| Header |Number | |
+---------+---------+-------+
(c)
Figure 5: MAC frames (a) MAC, (b) Header, (c) Acknowledgment
Hong, et al. Expires Sept 15, 2016 [Page 6]
Internet-Draft Low Energy BN-WN April 2016
3. Low Energy Operation
A BC-WN uses a low power wake up radio for prompt communication. There
is a lack of a satisfactory means to communicate immediately in
current protocols and delay is a major issue. This is also true in
the case of the IEEE15.4x standard protocols.
A wake up radio based system through the on-demand request can
significantly reduce the idle state energy consumption. A typical
wearable network has 1 to 10m coverage area. In addition, there is
only a very limited impact on latency because the corresponding device
wakes up immediately. Wake up radios operate at very low power mode.
The wake up radio based MAC takes advantage of a typical BC-WN
as follows:
- smaller network size in terms of devices compared to typical
sensor networks;
- limited communication range;
- a device can be easily triggered on by external wake up radio signal;
- wake up radio puts little extra cost in terms of power consumption.
3.1 On-demand communication with addressing
Addressing is an important factor in the wake up radio. It is used for
selective communication. A flow chart of a typical wake up radio based
system using addressing is shown in Figure 6. It is to be noted that
energy is consumed to decode a wake up packet to determine the
recipient. Addressing can reduce the waking up of all the nodes in the
neighborhood with a slight increase in the complexity.
Hong, et al. Expires Sept 15, 2016 [Page 7]
Internet-Draft Low Energy BN-WN April 2016
+----------------------+
+----------------->| Device sleeping |
| | (Main radio OFF) |
| +----------------------+
| |
| |
| v
| /\
| / \
| / \
| No /Packet\
|<--------------------------/detected\
| \ /
| \ /
| \ /
| \ /
| \/
| |Yes
| v
| +--------------------------+
| | |
| | Decode Wakeup Packet |
| | |
| +--------------------------+
| |
| v
| / \
| / \
| / \
| / \
| No /Broadcast\
| +-------------- \ Packet /
| | \ /
| v \ /
| / \ \ /
| / \ \ /
| / \ |
| No /Address\ |
+-------\ to me?/ |Yes
\ / |
\ / |
\ / v
| +----------------------------+
Yes| | |
+---->| Wake up the Main Radio |
| |
+----------------------------+
|
v
(End)
Figure 6: Flow chart of wake up radio with addressing
Hong, et al. Expires Sept 15, 2016 [Page 8]
Internet-Draft Low Energy BN-WN April 2016
3.2. MAC Operation and back-off
A slotted contention based mechanism is used for communication. An
example MAC operation is shown in Figure 7. A device with an emergency
event uses channel sensing to check the channel for activity. It also
uses the back-off mechanism to avoid the collision. It uses single
clear channel assessment (CCA) unlike the IEEE802.15.4.
+---------+---------+ +---------+---------+
| | WACK | | | WACK |
Controller | | | | | |
-----------------+---------+---------+---------+---------+------------>
+---------+ +---------+
|Collision| |Success |
| | | |
^ +---------+ +---------+
|
+---------+---------+--------+---------+---------+---------+
| Back-off| Wake up | | Back-off| Wake up | |
Device | Radio | | | Radio | | |
-------+---------+---------+--------+---------+---------------------->
Figure 7: MAC operation and back-off
Before attempting to transmit, a device utilizes the back-off
mechanism. It chooses the value from the range (0, B), where
the back-off window size (B) can be fixed or adapted as per the
application requirements. The value it chooses is called the back-off
counter. It is expressed in terms of slots. The counter value is
decremented one slot at a time. For example, if it chooses a back-off
value of 3, it waits for 3 slots before reattempting to transmit the
packet. Once the counter expires, it senses the channel. If the
channel is idle, it transmits the wake up radio packet. If it senses
the channel busy, it chooses a new value for the Counter and the
process is repeated.
4. IANA Considerations
There are no IANA considerations related to this document.
Hong, et al. Expires Sept 15, 2016 [Page 9]
Internet-Draft Low Energy BN-WN April 2016
5. Security Considerations
BC-WN has similar requirements of security as in the IEEE802.15.4.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler,
"Transmission of IPv6 Packets over IEEE 802.15.4
Networks", RFC 4944, September 2007.
6.2. Informative References
[IEEE802-2011]
Institute of Electrical and Electronics Engineers (IEEE),
IEEE Standard for Local and metropolitan area networks
Part 15.4:Low-Rate Wireless Personal Area Networks
LR-WPANs), 2011.
Hong, et al. Expires Sept 15, 2016 [Page 10]
Internet-Draft Low Energy BN-WN April 2016
Authors' Addresses
Choong Seon Hong
Computer Science and Engineering Department, Kyung Hee University
Yongin, South Korea
Phone: +82 (0)31 201 2532
Email: cshong@khu.ac.kr
Al Ameen, M.
Computer Science and Engineering Department, Kyung Hee University
Yongin, South Korea
Phone: +82 (0)31 201 2987
Email: ameen@khu.ac.kr
Seung Il Moon
Computer Science and Engineering Department, Kyung Hee University
Yongin, South Korea
Phone: +82 (0)31 201 2987
Email: moons85@khu.ac.kr
Hong, et al. Expires Sept 15, 2016 [Page 11]