An Admission Control Method Based on QoS Constraint of BSN Traffic Aggregation

In the body sensor networks (BSN), sensor nodes transmit data to remote receiving terminal via sink node. During the process of data aggregation, interference and self-similar character of wireless business have significant influence on traffic queue performance of sink node. To balance traffic quality of service (QoS) requirement and system present available resource and decide optimum resource distribution project. Hence, a complex function of sink node cache length, distributed channel rate and packet loss probability, and queue delay is built in this paper. Based on the function, by combining multiple target optimizing method and considering joint constraint of queue delay and packet loss probability, we proposed an admission control method based on traffic aggregation QoS constraint. In a BSN consisting of a large amount of sensor nodes, by admission control of sink node, reasonable acceptance of new nodes, and distribution sink node resource, the method we proposed can meet needs of important parameters in WSN design.


Introduction
Body sensor network, known as BSN, means traditional wireless sensor network, applied into body area monitoring. BSN is proposed to provide personal health monitor and long-distance medicine treatment [1,2]. It is widely used in many areas such as emergency response [3] and interactive controls [4]. BSN is usually made up of many tiny sensor nodes communicating with each other in a wireless way, same as WSN, which means wireless sensor network. But BSN is applied in a body area. So its structure is simple. Two features of BSN are that, on the one hand, kinds of sensor nodes are various and frequency of data collection is high which makes it hard to compensate for the lost data and, on the other hand, BSN lays on or in the body. As the person moves, the mobility of BSN brings interference to the data transmission [5]. So it needs to be able to handle interference in the changeable environment.
In BSN, there are usually a central node called sink node and several sensor nodes used to collect body information. Sink node aggregates data from sensor nodes and transmits the data to remote receiving terminal through wireless channel, after that, the data is sent to sever in the hospital at last. When a sensor node makes an access request, sink node should comprehensively consider attributes of aggregated traffic, link state, and judge whether the QoS index of aggregated traffic meets the requirements or not to ensure overall network transport performance in interference environment [6].
At the aspect of traffic transmission, IP network packet traffic shows intermittent "ON/OFF" character during data generation, which will lead to strong self-similar of business flow in the process of transmission and converging [7,8]. At the same time, we consider random intermittent feature of communication links in complex environment. These have influence on queue performance of business flow converging. Because there is long-range correlation of time length of ON/OFF state during transmitting data, selfsimilar characteristic is shown in data aggregation progress. Traffic's queuing performance of sink node will be affected significantly and QoS indexes such as packet loss rate and queuing delay decline [9].
Aiming at these problems, some papers suggest to set larger cache for self-similar traffic flow to absorb burst traffic  and reduce packet loss rate [10,11]. On this basis, some papers put forward the relationship between cache size and lower bound of limited bandwidth within the constraints of packet loss rate [12]. However, these methods consider only packet loss rate constraint but ignore queuing delay constraint. To solve the problems above, in this paper, we combine ON/OFF business model and good (available)/bad (unavailable) two-state-switch wireless channel model and analyze relationship between system resources (length of cache and effective bandwidth) and traffic QoS (queuing delay and average packet loss rate, APLR for shorten).
Then we put forward a corresponding admission control method which satisfies traffic QoS requirement based on multiobjective optimization method. In this paper, BSN data business model and channel model are built in Section 2. In Section 3, queue performance of data aggregation is analyzed according to simulation and mathematical derivation. In Section 4, we proposed a QoS constraint admission control algorithm faced to joint constraint of packet loss probability and delay. Simulation in Section 5 analyzes performance of algorithm that we proposed at the aspect of guaranteeing QoS needs. In the last section, we conclude that method we proposed can ensure queue delay and packet loss constraint of sink node effectively.

Data Traffic and Channel Model of BSN
At present it is widely agreed that self-similar characteristic exists in data flow of traditional IP network. Based on this character, we build traffic model of BSN single node, channel link model, and aggregation traffic model in this part.

Traffic Generation
Model of Single Node. The profiled scenarios are shown in Figure 1. Nodes of BSN form a star topology, in which sensor nodes collect information continually and transmit the data to sink node as soon as possible. The sink node aggregates information from each node and then sends data to the next destination. Besides, sink node manages sensor nodes and is in charge of the BSN, because the interference leads to burstiness of traffic for sensor nodes. Load of single sensor node is analyzed as follows.
Each node is assumed as an ON/OFF traffic source and its th ON state and OFF state duration is expressed as random variable and , respectively. According to actual measurement results from a large collection of papers, we assume that random processes { } and { } are independent of each other and follow Pareto type heavy-tailed distribution. ( ; 1 , 1 ) and ( ; 0 , 0 ) are cumulative distribution functions, where 1 , 0 and 1 , 0 are tail index and location parameter of { } and { } in Pareto distribution and 1 < 1 , 0 < 2.
It is pointed out in [13] that traffic flow ( ) generated by traffic source is self-similar if no data is created when source is in OFF state and date generated during th cycle when source is in ON state is sent at a constant rate which is independent of { } and { }. The self-similar parameter of random process { ( )} is = [3 − min( 0 , 1 )]/2 and satisfies ∈ (0.5, 1) which means 1 < min( 0 , 1 ) < 2. This illustrates that if one or both of { } and { } follow Pareto distribution, there is self-similarity after overlap.

Transmission Characteristic Analysis of Wireless
(1) Traffic data flow ( ) splits into two subprocedures after going through wireless link modeled above, which are good ( ) and bad ( ). For any given , ( ) change into good ( ) with a probability of ( = ), which is If traffic data flow ( ) is self-similar process, according to formula (2) and definition formula of self-similarity, we get The formula above meets the definition of self-similarity, from which we can draw a conclusion that if traffic flow generated by nodes is self-similar process, it remains selfsimilar after going through wireless link model and selfsimilar parameter that remain unchanged.
The main reason is that two-state wireless link model divides link into two states, "ON" and "OFF", so the traffic flow is split into two parts. It is proved that self-similar traffic flow remains self-similar after partition.

Convergent Characteristic Analysis of Traffic Data Flow.
Node needs to switch channels when communication between nodes is interrupted because of interference. If switchable channel is unavailable, node assumes the link is interrupted and keeps data in cache and waits for channel reconstruction. Therefore, for sink node, wireless link is divided into intermittent "ON" state and "OFF" states because of interference, making converging traffic flow shown as the aggregation of many fractured traffic flow. Number of nodes in subnet is assumed to be and traffic flow generated by each node is numbered as , = 1, 2, . . . , . Let ( ) be the probability of th traffic flow that is in transmission mode at time . Number of packets received by sink node at time can be expressed as follows: In formula (4), ( ) is subject to two factors: traffic generation probability of traffic source 1 /( 1 + 0 ) and available probability of communication link 1 /( 1 + 0 ). Two requirements are to be met in order to make th traffic flow in transmission mode at time : traffic source has data to send and communication link is available. From which we can get where 1 and 0 are mean duration of link available state and unavailable state, respectively, and 1 and 0 are mean duration of traffic ON state and OFF state. After scaling up time , aggregated traffic flow of cluster head node in the time range [0, ] is expressed as follows: It is pointed out in [14] that ( ) and fractal Brownian motion has similar statistical property and its statistical property is related to the mean duration of link available state and unavailable state when and are large enough: where ( ) is fractal Brownian motion with stationary increment; lim is variance factor which is finite positive constant; (⋅) is slow-varying function when → ∞; that is, lim →∞ ( ( )/ ( )) = 1 for any given > 0, According to formula (7), average value of { ( ), ≥ 0} for large and value is expressed as follows: The swings degree of { ( ), ≥ 0} benchmarked against its average value can be expressed as fractal Brownian motion transformed by low-order factor in the following formula: Based on the analysis mentioned above, we get that aggregated traffic flow received by sink node consists of two parts: average traffic volume after aggregating multiservice and swing degree compared with average value. Because of interference, the link is divided into intermit ON and OFF state and aggregated traffic flow further shows up as aggregation of multifragmented traffic flow. The variance of traffic flow after aggregating can be shown as a fractal Brownian motion, making it self-similar.

Analysis of Average Loss Packet Rate.
Assume that durations of wireless link in "good" state and "bad" state are independent of each other and the average durations are 1 and 0 , respectively. Furthermore, assume that the probability of wireless link in "good" state ( = ) is : According to the analysis mentioned before, aggregated traffic flow received by sink node consists of two parts: average value of aggregated traffic flow and swing degree based on average value, which are expressed as and ( ). Then the input traffic flow of sink node is shown as follows: As mentioned earlier, variance of aggregated traffic flow can be expressed by a fractal Brownian motion. Therefore, according to definition of fractal Brownian motion, we get ( ) = and ∼ (0, 1). In the meantime, according to large deviations principle, we get In queuing system, packet may be lost if buffer length is less than queue length ∞ . Therefore, packet loss rate can be expressed as = ( ∞ − )/ ∞ when network is stable and the probability distribution density function of packet loss rate is shown as follows: By calculating the mean of formula (13) and making integral approximation by using integration by parts and trapezoid formula, we further get average packet loss rate: where which is the mean value of traffic volume of independent traffic flow after aggregating can be expressed as = 1 /( 1 + 0 ) where 1 and 0 are mean duration of traffic source in ON state and OFF state. Fluctuating level satisfies = √ lim . Hence, according to formula (14), average packet loss rate of queuing system for sink node is concerned with number of traffic source , self-similarity degree of traffic flow , link state , channel rate , node buffer length , and other factors. Next, the influence of buffer queue length and channel rate on packet loss rate is studied by simulation.
It is assumed that aggregation traffic is stable at time , then traffic self-similarity parameter is related to tail index parameter of duration distribution in ON state and OFF state ( = [3 − min( 0 , 1 )]/2) and remains unchanged after transmission through two-state wireless link. After multitraffic flow aggregation, its parameter is the max of each traffic flow; = max( 1 , 2 , . . . , ). We assume that link interference intensity is stable at time and we can get and link interference intensity by detection. In the simulation, we consider the situation in which = 0.85 and = 0.5. Packet loss rate threshold is 10 −3 under the constraint of traffic QoS. With the hypothesis that the input traffic arrival rate is a constant and = 1500 Packet/s in this simulation, we study the relationship between APLR and buffer length and allocated channel rate , and can be expressed by queuing load / . The result is shown in Figure 2.
As is shown in Figure 2, we can jointly adjust buffer length and channel rate to assure packet loss rate to some level. Under the simulation condition we set, when packet loss rate threshold is 10 −3 , channel rate must exceed /0.85 ( is arrival rate of aggregated traffic and is 1500 Packet/s in simulation), and buffer length can be jointly adjusted according to the value of , but the minimum value of is 15 (Packets).
From above, there is an interinfluence multidimensional relation among packet loss rate and parameters such as channel rate and buffer length in sink node. To assure packet loss rate to some level, we can jointly adjust buffer length and channel rate . In other words, when aggregated traffic grows gradually and it makes required channel rate exceed the upper limit that the system can afford, buffer size needs to be enlarged further to ensure packet loss rate. However, as mentioned above, increasing buffer length blindly leads to the growth of queuing delay. To solve the problem, we will think International Journal of Distributed Sensor Networks 5 about the relationship between average queuing delay (AQD) of sink nodes and queuing parameters then.

Analysis of Average Queuing Delay.
Queue steady-state length of queuing system for sink nodes is = + ( ), where is fractal Brownian motion, is the probability of wireless link in "good" state, and = 1 /( 1 + 0 ) is average traffic arrival rate in which is the number of ON/OFF sources and 2 = 2 lim is variance factor.
For queuing length of aggregated traffic flow, we have where ∞ is queue steady-state length of queuing system. According to formula (15), the probability of queuing length larger than is With the request of certain buffer overflow probability (less than 10 −3 in general), if 0 < ≤ , probability distribution density of queuing length can be obtained approximately: By calculating the mean of formula (17) and making integral approximation by using trapezoid formula, we get average queuing length: According to Little's law and formula (18), network AQD is where is the mean value of traffic volume of independent traffic flow after aggregating and = 1 /( 1 + 0 ) in which 1 and 0 are mean duration of traffic source in ON state and OFF state. Fluctuating level satisfies = √ lim according to formula (9). Hence, according to formula (19), AQD of queuing system for sink node is concerned with the number of traffic source , self-similarity degree of traffic flow , link state , channel rate , node buffer length , and other factors.
Next, the influence of buffer queue length and channel rate on queuing delay is studied by simulation.
Being consistent with the simulation previous, it is assumed that aggregation traffic is stable at time , then traffic self-similarity parameter is related to tail index parameter of duration distribution in ON/OFF state ( = [3 − min( 0 , 1 )]/2). And remains unchanged after transmission through two-state wireless link. After multitraffic flow aggregation, its parameter is the max of each traffic flow, = max( 1 , 2 , . . . , ). We assume that link interference intensity is stable at time and can be obtained by detection. Thus, it is assumed that and link interference density parameter are given: = 0.85 and = 0.5. The average delay threshold is 30 ms. With the hypothesis that the input traffic arrival rate is constant, and = 1500 Packet/s in this simulation, we study the relationship between average queuing delay and buffer length and allocated channel rate . And can be denoted by queuing load / . The result is shown in Figure 3.
As is shown in Figure 3, we can jointly adjust buffer length and channel rate to assure queuing delay to some level. Under the constraint of queuing delay less than 30 ms, the joint value range of channel rate and buffer length has arch shape.
From above, there is an interinfluence multidimensional relation among queuing delay and parameters such as channel rate and buffer length in sink node. To meet queuing delay constraint, buffer length and channel rate need to be adjusted jointly. Hence, when aggregated traffic grows gradually, adjusting system parameter only considering packet loss rate probably changes the delay performance of queuing system seriously. To meet the whole QoS constraint of traffic, packet loss rate and queuing delay should be combined and buffer length and channel rate should be adjusted jointly. The multiple targets consist of minimum packet loss rate APLA, minimum queuing delay AQD, and minimum allocated channel rate . According to BSNs model we presented before and to guarantee data transmission and BSN application, parameters are analyzed for BSN communication. Generally, it is set that [15,16] average packet loss rate APLR ≤ 10 −3 and average queuing delay AQD ≤ 30 ms [17]. The multiple parameters are as follows: channel service rate with the constraint that ≤ 2500 (Packets/s) and buffer length with the constraint that ≤ 100 (Packets). The goal of the method is to find the final adjustable parameter set to optimize the whole target under the constraint of multiple input parameters and QoS criteria. In other words, we want to minimum the whole cost , which is defined as the combination function of queuing delay, packet loss rate, and allocating channel rate:

QoS Constraint of Aggregation Traffic Admission Control Method
The constraint set consists of upper limit and lower limit of buffer length and service rate: We define different values of buffer length and service rate in the constraint set as individual value in generic algorithm and define queuing delay, packet rate loss, and channel rate as target value of generic algorithm. In this way, we can search a series of Pareto optimal frontier solutions with generic algorithm. The algorithm flow is as follows.
Step 1. Do quick nondominated sorting for adjustable parameter set. Firstly, quickly sort the population by dominance relations, expressed as { 1 , 2 , . . . , }. The individual in population is denoted by and its data structure is { , } where stands for the number of individuals that can dominate and stands for the set of individuals that is dominated by . Individuals whose is 0 are stored in set 1 which is the collection of individuals that is not dominated in the first floor. Next, for each individual in 1 , search its dominating individual that satisfies − 1 = 0 in and store in 2 which is the collection of individuals that are not dominated after removing individuals in the first floor. Then, deal with each individual in 2 as above and get the third set 3 which is the collection of individuals that are not dominated after removing individuals in the first and second floor. Repeat the process above to do nondominated sort for multiple individuals.
Step 2. Build virtual fitness under multiobjective function. After nondominated sorting, to keep individual varieties, it is needed to calculate local crowding distance between each individual and its adjacent individuals at the same level. Step 3. Select operation for Pareto optimal solution. After Steps 1 and 2, each individual in group has two important properties: Pareto nondominated rank value rank and crowding distance distance . Based on these two properties, crowding selection operation can be carried out with the symbol "≻ ." If and only if rank ≤ rank and distance > distance , ≻ means individual is better than individual .
Step 4. Retention strategy for elites of Pareto optimal solutions: to ensure excellent individuals of the parents go directly into their offspring, offspring population is generated through selection operation in Step 3, and crossover operation and mutation operation and next generation with the competition of offspring population and parent population. Firstly, combine all individuals of parent and offspring as a new population: = ∪ . Next, repeat Steps 1, 2, and 3 for population until new parent population + 1 with the individual number of come into being. Then, restart selection, crossover, and mutation operation to make new offspring population formed. The crossover and mutation operation is as follows.
Crossover Operation. Firstly select a group of individuals for crossover operation and select an individual randomly to control constraint. After that, carry out crossover operation for the other − 1 remaining individuals. The concrete operation method is using simulating binary crossing operator to do crossover operation with formula (22) and judging the constraints in the meantime. Finally, new offspring individuals are generated: where , stands for the th offspring individual of the th individual; , stands for the th parent individual of the th individual; are samples formed by random numbers; and the density function is Define as a random number between (0, 1) and denote as index of cross-distribution; then is:  Mutation Operation. Firstly select a group of individuals for mutation operation and select an individual randomly to control constraint. After that, carry out mutation operation for the other − 1 remaining individuals. The concrete operation method is polynomial mutation method. Carry out mutation operation through formula (25) and new offspring individuals after mutation are generated in the end. Consider the following: where stands for the th offspring individual; stands for the th parent individual; / stands for upper/lower bound limit of the th parent individual; stands for deviation value of chromosome calculated through polynomial; its concrete representation is where stands for a random number range between (0, 1) and stands for mutation distribution index.
Step 5. Repeat the four steps above until the number of times reaches a specific threshold.
After the five steps above, optimal solutions of buffer length and channel service which satisfy ≤ 100 (Packets/s) and ≤ 2500 (Packets/s) are obtained targeting at minimizing average packet loss rate APLR, average queuing delay AQD, and allocated channel rate under the constraint that APLR ≤ 10 −3 and AQD ≤ 30 (ms). It can be expressed as { , } , ∈ (1, 2, . . . , ). The steps above are shown in Figure 4.
Select a time point as an example to inspect the result of queuing performance optimizing method. It is assumed that number of ON/OFF nodes in subnet is = 30, and average durations are 1 = 500 ms, 2 = 500 ms, respectively, and the shape parameters of ON/OFF model Pareto distribution   are 1.6 and 1.3, respectively, and location parameter is 2 and = 0.85 according to attribute of Pareto distribution. Let average interference density be = 0.5. Correspondingly, population number and iteration times in generic algorithm are 100 and 80. QoS constraint of traffic is average packet loss rate APLR ≤ 10 −3 and average queuing delay AQD ≤ 30 ms. Performance constraint for sink nodes is buffer length ≤ 100 (Packets/s) and channel rate ≤ 2500 (Packets/s). The simulation result is shown in Figure 5 and adjustable parameters for optimal solution in Figure 5 are shown in Table 1.
In Figure 5, a series of optimal frontier solutions obtained are shown as "•" in target space and their planar projection are shown as "∘" to demonstrate the solution more clearly. The solution satisfying QoS constraint in optimal solution set when the number of nodes is 30 is an adjustable parameter set ( = 82, = 843). When new users ask for access, we can get a series of optimal solutions according to algorithm above. There are two situations: (1) there are two or more than two solution sets that satisfy QoS constraint. We can select the solution with minimum bandwidth allocated according to minimizing bandwidth allocated principle. (2) The solution set satisfying QoS constraint is an empty set, which indicates that it is impossible to meet QoS constraint for current traffic by adjusting resources and user's request should be refused.

APLR and AQD Jointly Oriented Admission Control
Method. Sink nodes need admission control when new users request for access to judge whether users who request for access can use network resource available and whether the aggregated traffic after admission meets QoS constraint.
According to analysis above, IP packet traffic generated intermittently by traffic source shows self-similarity which is directly related to number of users admitted and interference intensity in aggregation nodes. This results in a relationship restrained by each other between AQD and APLR for queuing system performance.
Therefore, admission control method orienting QoS constraint of aggregation business should consider the above factors overall. Obtaining features of traffic flow by measuring aggregated traffic flow, we can judge whether overall QoS constraint of aggregated traffic after admission can be met under the condition of current resources. Admit new user if OQS constraint of aggregated traffic can be meet by adjusting system parameters and deny the user otherwise. The algorithm has a relatively low requirement for users. Users need only afford average traffic generation rate and peak rate of traffic flow.
After new user requests for access, the concrete description of admission control algorithm is as follows.
Initialization. System record the number of users admitted currently and average traffic generation probability and self-similarity parameters of history traffic , afforded by users. System can obtain current interference intensity by measuring and gathering.
Input. Input is the new user's request for access.
Step 1. Estimate self-similarity parameter of aggregated traffic after admission.
Step 2. Calculate average transmission rate of aggregated traffic input in current spectrum environment according to formula (8) and sudden variance factor of aggregated traffic according to formula (9).
Step 3. Calculate average packet loss rate of aggregated traffic after admission according to formula (14).
Step 4. Calculate AQD of aggregated traffic after admission according to formula (19).
Step 5. Calculate the optimal solution for buffer length and service rate under QoS constraint according to "queuing performance jointly optimizing method based on nondominated sorting genetic algorithm" proposed above.
Step 6. Judge whether there is solution satisfying QoS constraint in optimal solution set obtained in Step 5. If solution set is empty, it indicates that it is impossible to meet QoS constraint for current overall traffic by adjusting resources and user's request should be refused.
Step 7. If there is solution satisfying QoS constraint in optimal solution set obtained in Step 5, system will admit new user  and select solution with minimum service rate according to minimizing bandwidth allocated principle and configure corresponding buffer length and channel service rate .
Output. The result that user's request is admitted or not.

Simulation and Analysis
It is assumed that traffic sources are independent of each other, average duration of traffic for ON state and OFF state is 1 = 500 ms and 0 = 500 ms, respectively. Sending rate in ON state is V = 200 Packet/s and packet size is 256 Byte, which is equal to 200 kb/s. Three kinds of traffic sources are considered, their tail index of ON state duration is (1.7, 1.6, 1.5), respectively, and OFF state duration is (1.3, 1.4, 1.5). We assume that interference time 1 and noninterference time 0 follow exponential distribution whose average value is 10 s; that is, interference intensity is 0.5. The traffic QoS constraint is APLR ≤ 10 −3 and AQD ≤ 30ms. The performance constraint of cluster head nodes is ≤ 100 (Packets) and ≤ 2500 (Packets/s).
The topological structure of network in our simulation is shown in Figure 6. Assume each sensor node selects one kind of traffic out of three as traffic source and sends data to sink nod. Sink node receives packet data and transmits. To simplify the process, propagation delay is not taken into consideration in simulation.
Effective bandwidth allocation algorithm [10] and minimum bandwidth allocation algorithm [13] are selected to compare with the algorithm we proposed. The core idea of effective bandwidth allocation algorithm is to consider maximum effective bandwidth max satisfying traffic packet loss rate referencing system maximum buffer length according to self-similarity of traffic flow; max = + √ −2 ln , where is traffic arrival rate and is tail index of self-similar traffic flow. Core idea of minimum bandwidth allocation algorithm is considered lower bound of effective bandwidth for different buffer length based on effective bandwidth allocation algorithm, that is, the minimum channel service rate needed min , where   Figure 7 shows average packet loss rate performance when the traffic source nodes number differs. The average packet loss rate is controlled below threshold because three algorithms are all restrained by packet loss rate. Because effective bandwidth allocation algorithm allocates bandwidth according to upper limit of bandwidth, the maximum channel service rate afforded cannot meet requirement of aggregated traffic flow and requests of new traffic source are denied, making average packet loss rate stabilize at 10 −5 . Minimum bandwidth allocation algorithm takes lower bound of bandwidth demanded by traffic flow into consideration, increasing number of sensor nodes admissible to about 120. The algorithm we proposed takes influence of AQD into consideration fatherly. Therefore number of sensor nodes admissible is relatively small, about 110.
It is shown in Figure 8 that although the algorithm we proposed has less number of admissible sensor nodes compared with minimum bandwidth allocation algorithm, it meets requirement of AQD effectively. As shown in Figure 8,  at first number of sensor nodes is small, average arrival rate of aggregated traffic is relatively low, and system resources available is relatively rich, making channel service rate and buffer length allocated meeting the requirement of packet loss rate satisfy the constraint of delay. When number of traffic source exceeds 80, channel rate and buffer length need to be configured jointly. As minimum bandwidth allocation algorithm only considers constraint of packet loss rate, its AQD increases continuously and exceeds threshold. As a contrast, the algorithm presented in this paper ensures AQD of aggregated traffic flow after admission below constraint threshold, showing a stronger ability to ensure QoS, though the number of sensor nodes admissible is relatively small. It is noted that queuing delay of effective bandwidth allocation algorithm remains at very low level because it allocates system resources to each traffic flow as much as possible.
To further inspect admission control ability of three algorithms, number of admissible sensor nodes and bandwidth utilization ratio of aggregation nodes at different sending rate in ON state. The result is shown in Figures 9 and 10.
As is shown in Figure 9, admissible users numbers of three algorithms all decline when send rate of traffic source increases. For effective bandwidth allocation algorithm, because it allocates system resources to each traffic flow as much as possible, its sensor nodes number is the least. For minimum bandwidth allocation algorithm and algorithm proposed, because of dynamically adjusted system buffer length and channel service rate, their numbers of admissible sensor nodes are increased. The performance of the algorithm is worse because it considers AQD in the meantime. Figure 10 illustrates system bandwidth utilization ratio of three algorithms. Minimum bandwidth allocation algorithm has the highest bandwidth utilization ratio because it admits more traffic sources while that effective bandwidth allocation algorithm is the lowest because it allocates resources as much as possible. That of the algorithm proposed is lower than that of minimum bandwidth allocation algorithm because it considers the constraint of queuing delay.
Above all, effective bandwidth allocation algorithm allocates resources as much as possible and has least number  of admissible sensor nodes and lowest bandwidth utilization ratio while having relatively low packet loss rate and delay. Minimum bandwidth allocation algorithm allocates resources as little as possible and has most number of admissible users and highest bandwidth utilization ratio while having increased packet loss rate and queuing delay obviously. The algorithm proposed in this paper considers queuing delay at the same time to ensure AQD under constraint threshold at the price of less admissible users and lower bandwidth utilization ratio compared to minimum bandwidth allocation algorithm.
Besides, since the proposed admission control method is designed for BSN, which is a kind of wireless sensor network (WSN), energy of nodes is an important aspect to be considered [16]. On the one hand, in this method, the algorithm is applied on sink node only. Sensor node does not need to do extra calculation. It is possible to ensure energy supply of sink node and, for sensor nodes, there is no more energy cost. On the other hand, most energy is used for packet transmission in BSN. Calculation costs little energy compared with that of [18,19]. Therefore, applying proposed method in BSN, or in sink node of BSN more precisely, leads to only little extra energy cost and mainly of sink node, which can be solved by provide stronger power supply. This method is suitable for BSN.

Conclusion
Body sensor networks are usually made up of several tiny sensor nodes and a sink node. Nodes of BSN are organized in a star topology structure, communicating with each other in a wireless way. Information collected by sensor is collected and aggregated by sink node. Then sink node transmit the data to remote receiving terminal. In BSN, sensor data is various and its collection frequency and reliability need to be high.
To guarantee the data aggregating process to be rapid and reliable, we consider constraint of queuing delay and packet loss rate overall. An admission control method oriented on QoS constraint of aggregation business is put forward in this paper. Because of the self-similar character of sink node during traffic flow aggregation, the packet loss rate, queuing delay, buffer length, and service rate show a complicated relationship with each other during data aggregating and forwarding. To solve the problems above, in this paper, we use queuing theory and large deviation theory to study the influence that interference intensity has on packet loss rate and queuing delay under the condition of self-similar traffic flow. Function of cache , channel rate and packet loss rate, and queue delay is presented under different interference strength and different traffic self-similar parameter. According to this, combining NSGA-II multiple target optimizing method, we propose joint optimizing method of queue performance based on nondominated sorting genetic algorithm. On basis of optimal solution of cache length and service rate calculated under QoS constraint with the method proposed, an admission control method is designed, satisfying constraint of both queuing delay and packet loss rate. The simulation result, comparing with other methods, shows that the method we proposed can ensure constraint of queuing delay and packet loss rate of sink nodes effectively. Besides, by applying method proposed, number of users is up to about 110, near the number of minimum bandwidth allocation algorithm and is twice as much as that of effective bandwidth allocation algorithm. In a BSN consisting of a large amount of sensor nodes, the method we proposed can distribute sink node resource reasonably and guarantees quality of network service at the same time, which is a valuable reference contribution to BSN design.