such as electrocardiogram (ECG), photoplethysmo-
gram (PPG), electroencephalography (EEG), pulse
rate, blood flow, pressure and temperature; to one
or more collection points. These information will be
transmitted wirelessly to an external processing unit.
This device will instantly transmit all information in
real time to the doctors throughout the world.
Figure 1: WBAN : Wireless Body Area Networks.
For the realization of the international standard-
ization for WBAN, a study group of IEEE called
IEEE 802.15.6, has been launched in November 2007
to work on the WBAN standardization. This last es-
tablished the first draft of the communicationstandard
of WBANs in April 2010, optimized for low power
devices and operation on, in or around the human
body (Ullah and Ullah, 2010). The approved version
of the IEEE 802.15.6 standard was ratified in Febru-
ary 2012. The purpose of this group is to establish
a communication standard optimized for low power,
high reliability.
3 ERROR CONTROL CODING
(ECC)
In general, the error control mechanisms can be cate-
gorized into two main approaches:
• Automatic Repeat reQuest (ARQ): The main
idea is that the transmitter after sending the packet
waits for a specific time (time out) to receive an
acknowledgment. If it receives positive acknowl-
edgment (ACK), it sends the next packet, while
if it receives negative acknowledgment (NAC) or
timed out before receiving any acknowledgment,
then it retransmits the same packet. The process
keeps repeating until the transmitter receives an
ACK, or a specific number of retransmission is
reached.
• Forward Error Correction (FEC): In FEC
source node encodes data using some error cor-
recting code which lets the receiver node to cor-
rect errors in data packet if it existed. Thus, mak-
ing retransmission outdated. Error control cod-
ing also provides coding gain, which lowers re-
quired transmitting power for specific bit error
rate (BER). Several codes have been investigated
for error correction in WSN, including fountain
codes, turbo codes, BCH codes and LDPC codes.
In our study, we considered FEC schemes employ-
ing fountain codes due to its low encoding/decoding
complexity, and its adaptation with all channels, con-
trast to other families (such as LDPC which is dedi-
cated just for erasure channels).
3.1 Fountain Code
The main idea of a Digital Fountain (DF) is analogous
to the case of a water fountain. To fill a drink at the
fountain (Figure 2) we focus only on the amount of
water needed to fill the glass without considering the
scheduling water drops or those that fall outside of
the glass. This idea leads to the achievement of codes
with that characteristic.
Figure 2: Analogy code fountain with filling a glass with a
water fountain.
Fountain codes (Mitzenmacher and Rege, 1998)
are universal i.e they are simultaneously near optimal
for every erasure channel. Regardless of the statis-
tics of the erasure events on the channel, we can send
as many encoded packets as are needed in order for
the decoder to recover the source data. It follows that
such codes are optimal for any channel because it is
only necessary to receive enough symbols to decode
with high probability the source information. There
are three main category of fountain codes: Random
Linear Fountain (RLF)(MacKay and David, 2005),
Luby Transform (LT), and Raptor codes(Shokrollahi,
2006). In this work, we consider an LT code because
of its lower decoding complexity.
3.2 Luby Transform (LT)
LT codes proposed by Luby (Luby, 2002) in 1998,
they are the first practical realization of Fountain