Transmitting Sensor Data Through Ad Hoc Networks: A Fast and

Transcription

Transmitting Sensor Data Through Ad Hoc Networks: A Fast and
1
Transmitting Sensor Data Through Ad Hoc
Networks: A Fast and Reliable Approach
Eng. Luis Marrone
Universidad Nacional de La Plata
Email: [email protected]
Lic. Fabio Bruschetti
Universidad Nacional de San Martín
Email: [email protected]
Eng. Daniel Alberto Priano
Universidad Nacional de San Martín
Email: [email protected]
Mg. María Claudia Abeledo
Universidad Nacional de San Martín
Email: [email protected]
Abstract-- In the present document we considered the unexpected
problem of transferring sensible and critical information like
health data from sites where there is no adequate physical
communications infrastructure. We propose an efficient,
affordable, easy and reliable alternative to allow experts and
professionals to get patient data in about a few seconds through
Internet for decision taking. We combine current smart devices to
collect and process analog to digital data, have built-in storage
and communications capabilities with ad hoc networks to
transport collected data. The addition of simple custom software
components to control data flow, free software tools and add-ins
all running on personal computers with minimum hardware
requirements and public Internet access to networked computing
systems, will allow expert supervision and control to be physically
virtualized at low costs, high impact and fast response.
Index Terms-- Ad hoc networks, Communication equipment,
Data acquisition, Prognostics and health management, Rural
areas, Sensors, Wireless networks.
I
I. INTRODUCTION
n many scenarios such as emergency sites, operation’s
disaster and rescues, and isolated remote areas where there
is no possibility of developing physical connectivity
infrastructure, wireless communication services would bring
enormous benefits to them [1]. Communication with and
between communities of low density and low economic level
is one of the most difficult issue to solve by any government,
specially in underdeveloped countries where most government
resources attend social, political, economic problems [2, 3].
On the other hand, private companies do not always see
This work was supported in part by San Martín National University
(UNSAM) and 508RT0355, TRIComFor-CyTED project-UNLP.

business opportunities in these kind of environments.
Through time, government administrations tried to find
mechanisms to integrate those remote communities to the
society with communications infrastructure, at least, to provide
access to knowledge, exchange products and get some
services. This is the case of certain healthcare services.
Then, healthcare services will be essential in the extreme
situations mentioned above, lack of infrastructure seems to be
a common barrier. A cost-benefit analysis might reduce the
chance for these communities and, in most cases, makes
prohibitive any acceptable access media [4].
II. RELATED WORK
A. Ad Hoc Networks: Origin And Description
The use of ad hoc voice communication was used in many
ancient societies to send messages [6]. The history of wireless
networks started in the 1970’s and the interest has been
growing ever since. During the last decade, and especially at
the end, the interest has almost exploded probably because of
the fast growing Internet. Today we see two kinds of wireless
networks but the difference between them is not as obvious as
it may seem. The first kind and most used today is a wireless
network built on-top of a wired network and thus creates a
reliable infrastructure wireless network [7].
The critical nature of ad hoc wireless networking is in part
due to a confluence of events and technologies. The events
take the form of challenges, while the technologies create
opportunities for meeting these challenges in truly novel and
impressive ways.
The first of the challenges is relatively long-term. The
advent of the Internet and subsequent broadening of the
2
Internet access and e-commerce markets have created a
significant demand for mobile services. Hundreds of millions
of users around the world want to access the Internet, and they
want to do it at any time and from virtually any place. Initial
demand for Internet access, at least in the United States, was
mainly met by wired networks [8]: telephone modems, DSL
and cable connections, or wired local area networks, with a
few wireless options available as well (Ricochet, CDPD, and
WLANs). An “irrational exuberance” met the first wave of
Internet users, sparking enormous investment in networking
technologies as well as applications (the "dotcoms"). Failed
expectations faced the demise of a large number of these
companies. This demise has masked, in the minds of some, a
broad-based increase in the use of the Internet for email and
relatively simple data services. Email, messaging, stock
quotations, and similar services are becoming fully integrated
into our professional and domestic culture, creating a sustained
demand for medium-rate services for mobile users that can be
best met by ad hoc wireless networking technology. Given the
further potential for home networking of appliances and
remote metering of utilities, the long-term demand for ad hoc
wireless networking technology seems secure |9].
The other challenge, ad hoc wireless networks, are expected
to work in the absence of any fixed infrastructure (see Figure
1). In ad hoc wireless networks, the routing and resource
management are done in a distributed manner in which all
nodes coordinate to enable communication among themselves
[6].
Wireless ad-hoc connections
Wireless adhoc
communication
Wireless
ad-hoc
nodes
Fig. 1. Ad hoc wireless network [5]
B. Risks In Wireless Ad Hoc Connections
Wireless ad hoc connections are generally considered a
security risk for the following reasons [10]:
• No physical access needed: outside nodes can gain
connection to the network by the simple fact of being
located in the radio range of any other trusted network
node
• There is no centralized management: failures such as
packet dropping and transmission impairments cannot be
easily traced avoiding to understand whether this failures
are normal or caused by an malicious attack [11]
• Compromise of links or nodes: Attackers may attempt to
take control of a trusted node to perform malicious actions
that can be very difficult to detect because of ad hoc
nodes may perform diverse behaviors [12].
• Restricted power supply: nodes that may not have
continuous external appropriate DC or AC voltage cannot
suddenly cooperate or support wireless network functions
[13].
These vulnerabilities can be mitigated with several security
schemes to protect ad hoc networks to malicious behaviors
[14].
C. Applications Of Ad Hoc Wireless Networks
Ad hoc wireless networks, due to their quick and
economically less demanding deployment, find applications in
several areas:
• Collaborative and distributed computing: Considering a
group of researchers who want to share their findings
sending data in a file format to several nodes in the
network.
• Emergency operations: In environments where
conventional infrastructure based communications
facilities doesn’t exist, immediate deployment of ad hoc
wireless networks would be an alternate solution for
coordinating activities like disaster situations, remote
medical healthcare, etc [6].
D. Wireless Networks For Medical Healthcare Applications
Due to advances in the wireless networks field, new and
innovative applications are being thought of in medical as well
as healthcare field [15]. In the medical field applications
ranging from equipment management to patient management
are being developed. Efficiency among hospital staff is
increased by using some of these newly available applications
and tools. In the healthcare field, issues such as long-term
patient care, support for elderly people and smart homes are
being discussed in the realm of wireless networks. There is
also research being done on creating teletrauma systems using
wireless channels. This will potentially allow trauma specialist
to be virtually on patients bed sides while they are being
moved to the trauma center.
In the near future homes can be designed that take care of
patients or people with disabilities without the presence of a
healthcare provider. A patient who is located remotely can be
cared for remotely by communicating his/her status in realtime to caregivers. Another issue that concerns the healthcare
field is the very large number of expensive medical devices
that are incompatible with each other. Tedious routines are
involved in translating results from one machine to another.
With wireless technology this compatibility issues can be
reduced
Another issue in the wireless networks field is data
collector devices. These devices can be implanted on normal
day to day wearable. Wireless sensors can be implanted inside
or just attached to patient's body to have significant benefits.
Patients can wear sensors that monitor and report vital signs to
3
their doctor in a real-time fashion. This helps towards the issue
of access because now the patient doesn't need to be around
the hospital all the time. This improves access and quality of
healthcare for patients and saves money for care providers.
E. Scope Of This Work
This work exposes a simple and cost effective solution that
can be implemented using ad hoc networks to transport
sensored health data from medical device connected to a
patient (an electrocardiograph device), to a doctor being in
front of a hospital’s computer. This approach also provides a
reliable data transfer from patients in the ad hoc network to
specialists connected to the Internet.
According to bioethics and human rights [16], collected
data from a human patient was replaced with simulated data
generated with a personal computer using a Microsoft Excel
spreadsheet.
F. Scenery
This work was based on an ad hoc wireless network
configured in a rural zone with a standard PC patients and one
of them also connected to public Internet through. Another
standard PC connected to Internet was located at the hospital
accessed by doctors.
This rural zone has several patients with different diseases
that must be supervised in a regular basis like diverse
cardiopathys and diabetes. The zone has insufficient medical
personnel to accomplish with all supervisions. In fact, this kind
of visits would be preferable to be held by a doctor in person
to give immediate response for patients, but these exams are
usually done by specialized technicians like nurses, blood
extractors, etc. but they are not entitled to change any medical
treatment. Only in critical cases doctors take these exams on
patient’s site.
In our case, the patient has a moderated aortic insufficiency
that requires an ECG (electrocardiogram) with prescheduled
frequency. And additional limitation was that ECG data
needed to be printed on millimeter thermal ECG paper to be
submitted to the doctor. The doctor used to provide feedback
after two or more hours, being optimistic.
G. The Solution Proposed In This Work
As shown in figures 2a and 2b, the solution includes the
following hardware and software components:
• Hardware:
- A digital ECG collector device (Dev01) with standard
USB cable
- 3 PCs (Node02 to Noder04) with wireless capability
and fixed IP addresses from 192.168.1.2 to 192.168.1.4
- Dev01 connected to Node04 through USB.
- 1 PC (Node01) with a fixed IP address is 192.168.1.1.
connected to:
a) the wireless ad hoc network with Node2 to Node4
and
b) an Internet Service Provider through ADSL (Upload
speed of 250 Kbps and download speed of 637
Kbps [17]).
•
- Node02 to Node04 has no access to Internet as Node01
gateway function is disabled
- 1 PC (Node05) located at a hospital far away from the
rural zone and connected to Internet through ADSL
(Upload speed of 2.657 Kbps and download speed of
2.361 Kbps [17]).
Software:
- Microsoft Windows XP Service Pack 3 operating
system in all nodes
- Proprietary device software in Node01 (PropSw) to
generate data files with collected data from the ECG
device
- Custom C++ software in nodes (CswNodeNN, where
NN is the node’s number) using Windows APIs and
Gnuplot [18]
- Node01 running FTP Server Service (FileZilla Server
[19])
- Node05 running FTP Client Service (FileZilla Client
[19])
Fig. 2a. Hardware and connectivity components: rural zone
Hospital
ADSL
Modem
Node05
ISP
Specialist
Fig. 2b. Hardware and connectivity components: urban zone
H. Set-up and Operation
The complete cycle consist of four phases: a) device
measure and data file creation, b) file transfer, c) data
processing and d) acceptance and completion (see figure 4).
Changes in patient’s medical treatment maybe required after
phase d but they are out of the cycle we are considering.
4
Data is backed up
and deleted from
networks
Phase a
Device
measure
and data file
creation
Phase d
Acceptance
and
completion
Data is showed
for human
acceptance
Data is copied
between ad hoc
nodes
Phase b
File transfer
Phase c
Data
processing
Data is transferred
between Internet
nodes
Fig. 3. Operation’s cycle
Once the patients’ add-hoc network is running with all
nodes connected to Node01, a shared folder is created in
Node01 (Node01.ShDir) and virtual folders are created in
remaining add-hoc network nodes (NodeNN.ShDir being NN
the node number). Then Node01 is connected to Internet and
the FTP Service (Server) is started. Dev01 is connected to
Node04.
All custom software applications are launched and running.
They were designed to run in background and can be accessed
through the Windows Systray [20].
CSwNode01 application connects Node01.ShDir using the
FTP service (Client); so any FTP client can gain access to this
folder.
PropSw generates a new ECG data file according to
scheduled frequency and saves it in a local directory of
Node04 named Node04.Dir (Phase a). CSwNode04 detects an
existing file in Node04.Dir and copies it in Node01.ShDir
directory. The application records generated files in an internal
list. When the new file disappears form Node01.ShDir it pops
up a message notifying that the new file was processed as
shown in figure 4 (Phase d).
•
•
•
•
•
•
•
•
•
•
•
•
•
X Column values inclusion
User Id
Date
Time in HH:MM:SS,d...d format (being d...d nineteen
decimals digits for seconds)
“***End of Header***” string separator
Number of input channels (1 in our case)
Quantity of Samples taken
X Dimension variable type (time in our case)
X0 value (Initial value is zero in our case)
DeltaX or X sample interval
“***End of Header***” string separator
“Y Values” and “Comments” string titles
List of y values (captured data), one value per row
As Node05 in the Hospital is connected to Internet and FTP
Service (Client) is started and CSwNode05 application shares
Node01.ShDir across Internet using the FTP service (Client).
CSwNode05 application configuration screen is shown in
figure 5.
Fig. 5. Software configuration dialog
“Configure” action button allows change of parameters and
“History” action button shows a list of processed files.
CSwNode05 checks every 5 seconds (TChecking) if any file
appears in Node01.ShDir. If so, it copies the file from
Node01.ShDir to a local directory on Node05 called
Node05.Dir through Internet using the FTP service mentioned
before (Phase b). Then pops up a message and plays an
audible alarm on Node05 to indicate that new data has been
detected and needs to be processed as shown in figure 6.
Fig. 4. Data processing confirmation
Files generated with ECG data are ASCII plain text format,
each row ends with hex values 0Dh 0Ah (Carriage Return and
Line Feed). File name extension is “.DAT”. The content and
parameters of these files are as follows:
• Software name
• Reader and Writer versions
• Field Separator type
• Decimal Separator type
• Single or Multiple Headings
• Time Preferences
Fig. 6. Pending process confirmation dialog
Once confirmed, the application opens the file and
processes the data generating a Gnuplot graphic with ECG
data as shown in figure 7a and 7b (Phase c). For each graphic
plot , the application takes each value from the list and
automatically calculates
value using , and Quantity of
Samples using the following formula:
X n = X 0 + ( n * DeltaX )
5
being n = sample number (from zero to (Quantity of
Samples – 1).
Internet file transfer latency may vary depending on both sides
ADSL real connection speeds.
In the Hospital, when the doctor closes the ECG graphic in
Node05, CSwNode05 application erases the file both in
Node05.Dir and Node01.ShDir.
J. Conclusions
The proposed solution enables the transport of critical
sensored data from small and far away communities lacking in
infrastructure and resources to any desired destination.
Comparing this method with traditional approaches, we
identify the following benefits.
The solution:
• Is built around a very simple ad hoc network
implementation at low costs (with almost any home
computers with wireless capability), there is no need of
fixed external wireless communication infrastructure, it is
fast to be deployed, it has an easy configuration and
reliable transmission with low latency. This solution can
be applied to unexpected situations where urgent results
are the key success factor.
• Only needs one public Internet physical access for the
entire wireless ad hoc network so many people can take
advantage of it immediately by simply adding a node to
the network.
• Provides more efficient results in terms of quality, costs
and time savings because feedback come in seconds,
professionals does not need to travel, many professionals
can collaborate virtually, the interchange of information is
paperless, among others.
• Could be considerably more efficient by adding better
wireless antennas with more RF gain to the ad hoc
wireless network adapters.
• Could be geographically extended by adding network
routing capabilities to ad hoc network nodes.
• Can co-operate with future fixed wireless infrastructure
when available.
Fig. 7a. ECG Graphic – Normal scale
III. REFERENCES
Fig. 7b. ECG Graphic – Enlarged scale
I. Results obtained
All ad hoc and Internet transfer response times were
captured and measured using the network protocol analyzer
Wireshark [21]. Results are as follows:
• Average file transfer time between Node04 and Node01
through the ad hoc network is TAvgad-hoc = 1.5371 sec.
• Average file transfer time between Node01 and Node05
through public Internet is TAvgInternet = 10.2023 sec.
To calculate the average total time (TAvgTotal) , we should
add the five seconds delay time (TChecking) that CSwNode05 may
incur between upcoming files checks, resulting:
TAvg Total = TAvg ad − hoc + TAvg Internet + TChecking = 16.7394 sec .
[1] Statement by Mr. Sha Zukang, Under-Secretary-General for
Economic and Social Affairs UNDESA-GAID Global Forum
on Access and Connectivity in Asia-Pacific and on
Innovative Financing Mechanisms for ICT for Development,
Kuala Lumpur, 19 May 2008,
http://www.un.org/esa/desa/ousg/statements/2008/20080519
_forum_ICT.html
[2] Budget 2008–09: economic issues, Parliamentary Library,
Parliament of Australia, 4 June 2008
http://www.aph.gov.au/library/pubs/rp/BudgetReview/Econo
mic_Issues.htm
[3] Wi-Fi Pilots for Development in Latin America and the
Caribbean, International Development Research Centre,
October 2003, Canada
http://www.idrc.ca/en/ev-86101-201-1-DO_TOPIC.html
[4] Uso de Wireless Mesh LANs como alternativa de
comunicación en comunidades rurales, December 2005,
IEEE
http://ewh.ieee.org/r9/panama/noticieeero/noti042005.pdf
[5] Pohang University of Science and Technology
http://monet.postech.ac.kr/research.html
[6] Ad hoc Wireless Networks – Architectures and Protocols – C.
6
Siva Ram Murthy and B. S. Manoj – Prentice Hall
Communications Engineering and Emerging Technologies
Series.
[7] Ad hoc Protocol Evaluation and Experiences of Real World
Ad Hoc Networking - David Lundberg - Department of
Information Technology, Uppsala University
http://www.update.uu.se/~davidl/msthesis/thesis.pdf
[8] United States Demand for Internet Access, Scott J. Savage and
Donald M. Waldman, September 2004
http://www.bepress.com/cgi/viewcontent.cgi?
article=1052&context=rne
[9] Energy Aware Ad hoc Networks, Andrea Goldsmith and
Stephen B. Wicker, IEEE Wireless Communication, August
2002
http://wsl.stanford.edu/Publications/Andrea/goldsmith_wick
er_energy_aware.pdf
[10] Yongguang Zhang and Wenke Lee, Security in Mobile Ad
hoc Networks, in Book Ad Hoc Networks Technologies and
Protocols (Chapter 9), Springer, 2005.
[11] Panagiotis Papadimitraos and Zygmunt J. Hass, Securing
Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc
Wireless Networks (Chapter 31), CRC Press LLC, 2003.
[12] Mishra, Amitabh: Security and Quality of Service in Ad Hoc
Wireless Networks. Cambridge University Press (2008)
[13] Amitabh Mishra and Ketan M. Nadkarni, Security in
Wireless Ad Hoc Networks, in Book The Handbook of Ad
Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
[14] Security Issues in Mobile Ad Hoc Networks – A Survey,
Wenjia Li and Anupam Joshi, Department of Computer
Science and Electrical Engineering, University of Maryland,
Baltimore County
http://www.cs.umbc.edu/~wenjia1/699_report.pdf
[15] Medical Applications of Wireless Networks, Tam Vu Ngoc,
Washington University in St. Louis, 21 April 2008
http://www.cse.wustl.edu/~jain/cse57408/ftp/medical/index.htm l
[16] Universal Declaration on Bioethics and Human Rights,
Records of the General Conference, 33rd session, Paris, 3 –
21 October 2005
http://unesdoc.unesco.org/images/0014/001428/142825e.pdf
#page=80
[17] BandwithPlace Internet Speed Tester
http://www.bandwidthplace.com/
[18] Gnuplot free portable graphing utility for Windows, Version
4.4.0, 13 March 2010
http://www.gnuplot.info/
[19] Free software FileZilla for Windows Server and Client
Project, 2003. http://wiki.filezilla-project.org/Documentation
[20] Windows System Tray Icons, Microsoft Support, December
2007
http://support.microsoft.com/kb/310578
[21] Free multiplatform software Wireshark Version 1.4.0 for
Windows
http://www.wireshark.org/
IV. BIOGRAPHIES
Luis Marrone
(1953): Electronic Engineer with honors from UBA.
Current lecturer and researcher on Computer Networks at UNLP, graduate
and postgraduate courses. Co-Director of Master Data Networks at UNLP.
Advisor of the Scientific Research Committee of Buenos Aires (CIC) .Board
Member of the Faculty of Information Technology UNLP, and Faculty of
Engineering UBA.
Fabio Bruschetti
(1964): IT Information Systems graduate with honors
from CAECE University. Current researcher on Computer Networks at
UNSAM and lecturer on Data Processing Systems at UNSAM, Computer
Architectures at CAECE University, Networking Essentials at CAECE
University and Information Technology at UBA postgraduate department.
Daniel Alberto Priano
(1959): Electromechanical Engineer graduate
with honors from UTN. Current researcher and lecturer on Computer
Networks at UNSAM and lecturer on Thermodynamics at UTN
María Claudia Abeledo (1962): IT Information Systems graduate with
honors from CAECE University. Magister computer networking graduate
with honors from La Plata University. Current researcher and lecturer on
Computer Networks at UNSAM and current lecturer on Computer Networks
and Networking Essentials at CAECE University.