Routing Biomedical Data Between Applications Through Ad Hoc
Transcription
Routing Biomedical Data Between Applications Through Ad Hoc
CONCAPAN XXXI 1 Routing Biomedical Data Between Applications Through Ad Hoc Networks Lic. Fabio Bruschetti Universidad Nacional de San Martín Email: fbrusche@gmail.com Mg. María Claudia Abeledo Universidad Nacional de San Martín Email: cabeledo@linti.unlp.edu.ar Tech. Sebastián José Emilio Lorandi Universidad Nacional de San Martín Email: slorandi@gmail.com Pedro Facundo Iriso, Cristian Miño Universidad Nacional de San Martín Email: pedroiriso@gmail.com, mectis@hotmail.com María de las Mercedes Cresta Universidad CAECE Email: mercedes_cresta@hotmail.com Abstract-- This work is intended to demonstrate that ad hoc networks can transport biometric information such as electrocardiogram, plethysmography, body temperature, blood pressure, breath and cardio frequency in a reliable and secure way taking advantages of routing capabilities, high speed, minimal infrastructure and reduced costs. Biometric data will come from medical devices that capture, digitilize and store data in electronic files. The solution presented here combines those medical devices and personal computers with small pieces of free software. Connecting patients located far away from high complexity medical centers with the help of Internet will result in fast diagnostic, appropriate analysis and immediate response without moving professionals from one site to another. on these locations always need communication services for voice and data but there may be an inappropriate telecommunications infrastructure. At present, health care devices can meter and digitize human medic information and store it in computer files. Such devices have affordable prices and can easily be connected to a computer to transfer its data. As healthcare services are essentials in mentionated cases the lack of telecommunications infrastructure seems to be a common barrier. Communication facilities for low density and low economic level communities is one of the most difficult issue to solve by any government, specially in underdeveloped countries where most government resources attend social, political, economic problems [1][ 2]. Index Terms-- Ad hoc networks, Communication equipment, Data acquisition, Prognostics and health management, Rural areas, Wireless networks. II. RELATED WORK I. INTRODUCTION T aking care of remote patients is a challenge for any public or private healthcare organization. Medic professionals are not available in any place and any time, not to mention in communities located far away from cities and even worst if their economic activity is significantly low. Dealing with emergencies or long term healthcare situations This work was supported in part by San Martín National University UNSAM (Public) and CAECE University (Private). IEEE, Sección El Salvador. A. Ad Hoc etworks: A Brief Description Ad-hoc voice communication was used in many ancient societies to send messages [3]. The history of wireless networks started in the 1970’s and the interest has been growing ever since. During the last decade, and especially at the end of it, the interest has almost exploded probably because of the fast growing Internet. Today we see two kinds of wireless networks but the difference between them is not as obvious as it may seem. The first kind and most used today is a wireless network built on-top of a wired network and thus creates a reliable infrastructure wireless network [4] (figure 1). EL Salvador, Noviembre 2011 CONCAPAN XXXI Wireless communication enables information transfer among a network of disconnected, and often mobile, users. Popular wireless networks such as mobile phone networks and wireless LANs are traditionally infrastructure-based, i.e. base stations, access points and servers are deployed before the network can be used. In contrast, ad hoc networks are dynamically formed amongst a group of wireless users and require no existing infrastructure or pre-configuration (figure 2). Fig. 1. Infrastructure-based wireless network Fig. 2. Ad hoc network [5] The dynamic and self-organizing nature of ad hoc networks makes them particular useful in situations where rapid network deployments are required or it is prohibitively costly to deploy and manage network infrastructure. [6] B. Applications of ad hoc wireless networks As a first approximation, we could simply define ad hoc applications as pieces of software that run on ad hoc networks. We do not believe however that this definition adequately characterizes the essence of ad hoc applications. Defining a class of applications (ad hoc applications) by coupling it to one (but only one) possible implementation technology (ad hoc networks) reduces the generality and effectiveness of the definition. This is particularly true in such a changing arena as mobile network technology. Indeed, no widely adopted ad hoc network exists nowadays. However, many researchers work on the subject in order to build what will probably be the next generation networks. [7]. Nevertheless, we can mention some ad hoc network applications: • Attendees in a conference room sharing documents and other information via their laptops and handheld computer; IEEE, Sección El Salvador. • • • 2 Armed forces creating a tactical network in unfamiliar territory for communications and distribution of situational awareness information; Small sensor devices located in animals and other strategic locations that collectively, monitor habitats and environmental conditions; Emergency services communicating in a disaster area and sharing video updates of specific locations among workers in the field, and back to headquarters. [6]. C. Risks in wireless ad-hoc connections Wireless ad-hoc connections are generally considered a security risk for the following reasons: • o physical access needed: outside nodes can gain connection to the network by the simple fact of being located in the radio range of any other trusted network node • There is no centralized management: failures such as packet dropping and transmission impairments cannot be easily traced avoiding to understand whether this failures are normal or caused by an malicious attack [8] • Compromise of links or nodes: Attackers may attempt to take control of a trusted node to perform malicious actions that can be very difficult to detect because of ad-hoc nodes may perform diverse behaviors [9]. • Restricted power supply: nodes that may not have continuous external appropriate DC or AC voltage cannot suddenly cooperate or support wireless network functions [10] D. Why Wireless etworks for Medical Applications Due to advances in the wireless networks field, new and innovative applications are being thought of in medical as well as healthcare field [11]. In the medical field applications ranging from equipment management to patient management are being developed. Efficiency among hospital staff is increased by using some of these newly available applications and tools. In the healthcare field, issues such as long-term patient care, support for elderly people and smart homes are being discussed in the realm of wireless networks. There is also research being done on creating teletrauma systems using the wireless channel. This will potentially allow trauma specialist to be virtually on patient’s bed sides while they are being moved to the trauma center. In the near future homes can be designed to take care of patients or people with disabilities without the presence of a healthcare provider. A patient who is located far away can be cared for remotely by communicating his/her status in real-time to caregivers. Another issue that concerns the healthcare field is the very large number of expensive medical devices that are incompatible with each other. Tedious routines are involved in translating results from one machine to another. With Wireless Technology this compatibility issue can be reduced Another hot issue in the wireless networks field is implantable devices. These devices can be implanted on EL Salvador, Noviembre 2011 CONCAPAN XXXI normal day to day wearable. Wireless sensor implanted inside patient's body has their own significant benefits . Patients can wear sensors that monitor vital signs and report them in realtime to their doctor. This helps towards the issue of access because now the patient doesn't need to be around the hospital all the time. This improves access and quality of healthcare for patients and saves money for care providers. E. Scope Of This Work This work exposes a simple and cost effective solution that can be implemented using ad hoc networks to transport sensored health data from medical devices connected to a patient (such as electrocardiograph device) to a doctor being in front of a hospital’s computer. This approach also provides a reliable data transfer using ad hoc networks connected to the Internet. According to bioethics and human rights [12], collected data from a human patient was replaced with simulated data generated with a personal computer using an emulator (Java ECG Generator [25]). F. Scenery This work was based on an ad hoc wireless network configured in a rural zone. Computer nodes are limited and only one of them has an ADSL [13] Internet connection. In this zone, there are patient with some risk pathologies but there are not enough professionals and equipment to attend or solve patient’s deceases. A software application installed in personal computers (desk or laptop) with wireless capabilities will transfer data collected from medic devices to specialized centers. Data packages will be routed among active nodes from patient’s the node that is connected to the Internet. Medical professionals located on the other side of Internet cloud will receive diagnosed data, analyze them and then return their conclusions like treatment with medicines, care to provide, need to transfer the patient, specific maneuvers, etc. G. The Solution Proposed In This Work As shown in figure 3, the solution includes the following hardware and software components: • Hardware: - A digital ECG collector device (Dev01) with standard USB cable - 2 PCs (Node02 and Noder03) with wireless capability and fixed IP addresses from 192.168.1.2 and 192.168.1.3. - Dev01 connected to Node03 through USB (ECG). - 1 PC (Node01) with a fixed IP address is 192.168.1.1. connected to: a) the wireless ad hoc network with Node02 and b) an Internet Service Provider through ADSL (Upload speed of 250 Kbps and download speed of 630 Kbps [14]) - Node02 and Node03 has no access to Internet - 1 PC (Node04) located at a healthcare center far away from the rural zone and connected to Internet through IEEE, Sección El Salvador. 3 ADSL (Upload speed of 2,32 Mbps and download speed of 2,48 Mbps [14]). - All nodes in the rural zone are in different houses, and Node03 is in patient’s home. • Software: - Ubuntu 10.10 [18] operating system in Node02 and Node03 with kernel version 2.6.38 with B.A.T.M.A.N. [15][16] routing protocol installed - Microsoft Windows XP Service Pack 3 operating system in Node01 and Node04 - Custom Java Software Applications in nodes using Java ECG Generator application (open source) [25] - Java Runtime Environment (JRE) 1.6 [17] in nodes running Custom Java Software Applications (Node01 and Node04) Rural Zone Node02 192.168.1.2 Wireless ad-hoc connections ISP ADSL Modem Patient Node03 192.168.1.3 Node01 192.168.1.1 Wireles Ad-Hoc Network Dev01 Internet ADSL Modem Node04 Specialist ISP Urban Zone Fig. 3. Hardware and connectivity components: rural zone H. Environment Set-up Nodes Node01 to Node03 is configured to build the ad hoc network. Ubuntu Node01 with Firestarter [19] is configured to share the wireless ad hoc network (wlan0) and the Internet connection through 3G (ppt0). Node03 is far enough from Node01 so they cannot be linked without the presence of Node02, between them. To check routing features, once all nodes had access to Internet, Node02 was moved away so nodes Node02 and Node03 lost theirs connections to Internet. Figure 4 shows when connections were lost. EL Salvador, Noviembre 2011 CONCAPAN XXXI 4 Fig. 5. Batch file processing messages Fig. 4. Connection lost when routing node is out of wireless range There are two batch files needed for the operation. One for the patient’s computer and the other for the doctor’s computer as follows: Patient’s computer NURSE.BAT: On patient’s side (NURSE), the application will popup a screen form (figure 6). The operator must fill out input fields with data form patient and from himself (patient’s name, clinic record, observations, etc.). In addition, single measures (i.e. body temperature) and multiple measures contained in electronic files (i.e. electrocardiogram) can be added. Once the form is completed, the operator can send this captured data to doctors (DOCTOR). After that, popup message will indicate that NURSE is waiting for DOCTOR’s diagnostic and treatment (figure 7). REM Client’s Application SET APLICACION_PATH=C:\PROGRAM FILES\EXEC SET CLASSPATH=%APLICACION_PATH%\lib\Nurse.jar ;%APLICACION_PATH%\lib\Commoncomponents.j ar;%APLICACION_PATH%\lib\javacsv.jar SET HOST=router-pedro.no-ip.info (1) SET PORT=1000 SET JAVA_HOME= %JAVAHOME%\bin JAVA NURSE.APLICACIONMAIN %HOST% %PORT% (1) The application resolves the IP address through a domain name. It was used a free Web Domain Name Service provider [20] Doctor’s computer DOCTOR.BAT: REM Doctor’s Application SET APLICACION_PATH= C:\PROGRAM FILES\EXEC SET CLASSPATH=%APLICACION_PATH%\lib\Doctor.ja r;%APLICACION_PATH%\lib\Commoncomponents. jar SET PORT=1000 SET JAVA_HOME= %JAVAHOME%\bin JAVA DOCTOR.APLICACIONMAIN %PORT% Batch files and applications must be in local disks prior to operation Fig. 6. NURSE application input form screenshot Fig. 7. NURSE application popup waiting message On doctor’s side, the application will popup a screen (figure 8). I. Solution Operation The initial step is to connect Dev01 USB to Node03. Then generate and store a file with collected data from the (ECG). Generated file will be accessed from Node03. The both batch files (NURSE.BAT and DOCTOR.BAT as shown in figure 5) are started on Node03 and Node04 computers respectively. IEEE, Sección El Salvador. EL Salvador, Noviembre 2011 CONCAPAN XXXI Fig. 8. Doctor’s form screenshot 5 J. Results obtained All ad hoc and Internet transfer response times were captured and measured using the network protocol analyzer Wireshark [21]. An average ECG takes a few minutes [22]. In our sample we consider a standard ECG with 12 leads [23] and an average of 6 seconds for each lead [24] resulting the Total ECG Measurement Time (TECGTotal): TECGTotal: 12 leads * 6 sec = 72 sec leads As Dev01 takes 256 samples per second, the total number of samples (TS) needed is: TS=72 sec * 256 samples = 18.432 samples sec Results are as follows: • The average ad hoc network routing time to transfer ECG (18.432 samples) plus additional information (maximum 1.024 bytes) from Node03 (NURSE) to Node01 connected to Internet in the rural zone is: TtoAdhoc Avg = 9,8713 sec Fig. 9. DOCTOR application popup waiting message Once data has from NURSE arrives, it will be displayed int the screen form (figure 9) for doctors or professionals. Multiple data colleted can be opened and graphed in an additional screen (figure 10) and the user can type in feedback into the application. This feedback will be transmitted to NURSE using Internet and the ad hoc network on patient’s side. When diagnostic or treatment is received on patient’s side, the popup message (figure 9) will be turned off. • The average network transfer time from Node01 to Node04 (DOCTOR) through Internet (1) to transfer ECG plus additional information is: TtoDInternet Avg = 72,0791 sec • The total average network transfer time from NURSE to DOCTOR is: TtoDTotal Avg = TtoAdhoc Avg + TtoDInternet Avg TtoDTotal Avg = 9,8713 sec + 72,0791 sec = 81,9504 sec • The average network transfer time from Node04 (DOCTOR) to Node01 through Internet (1) containing diagnosis information (about 2.048 bytes) is: TDtoInternet Avg = 3,8541 sec • TtoAdhoc Avg = 2,8345 sec Fig. 10. DOCTOR application multiple data presentation (Electrocardiogram) Files generated by Dev01 (ECG) are ASCII plain text format, each row ends with hex values 0Dh 0Ah (Carriage Return and Line Feed). File name extension is “.DAT”. The content and parameters of these files are as follows: • Time: Time of sample (starting always from zero) • Voltage: Sample measure in mV (10-3 Volts) • Peak: “3” when peak is reached (previous and next voltage values al less than the voltage of the sample) The average ad hoc network routing time from Node01 to Node03 (NURSE) with diagnosis is: • The total average network transfer time from DOCTOR to NURSE is: TDtoTotal Avg = TDtoInternet Avg + TtoAdhoc Avg TDtoTotal Avg = 3,8541 sec + 2,8345 sec = 6,6886 sec • The complete network transfer is in average: TTotalAvg = TtoDTotal Avg + TDtoTotal Avg TTotalAvg = 81,9504 sec + 6,6886 sec IEEE, Sección El Salvador. EL Salvador, Noviembre 2011 CONCAPAN XXXI TTotalAvg = 88,6390 sec (1) Internet file transfer latency may vary depending on both sides ADSL real connection speeds. K. Conclusions The proposed solution enables the transport of health data from patients to any destination. We identify the following type benefits: a) Related to ad hoc networks: • • • They allow a fast deployment with an easy configuration and reliable data transmission. They are available at a very reasonable and affordable costs Only one computer needs public Internet access for the entire wireless ad hoc network. The network can be geographically extended by adding nodes. b) Related to the solution • • Provides more efficient results in terms of quality, costs and time savings because qualified feedback come in minutes, professionals are virtual (there is o need to travel), information is digitally recorded (there is no need for papers). This solution can co-operate with future fixed wireless infrastructure when available. III. REFERENCES [1] Budget 2008–09: economic issues, Parliamentary Library, Parliament of Australia, 4 June 2008 http://www.aph.gov.au/library/pubs/rp/BudgetReview/Econo mic_Issues.htm [2] Wi-Fi Pilots for Development in Latin America and the Caribbean, International Development Research Centre, October 2003, Canada [3] Ad hoc Wireless Networks – Architectures and Protocols – C. Siva Ram Murthy and B. S. Manoj – Prentice Hall Communications Engineering and Emerging Technologies Series. http://www.idrc.ca/en/ev-86101-201-1-DO_TOPIC.html [4] Ad hoc Protocol Evaluation and Experiences of Real World Ad Hoc Networking – David Lundberg – Department of Information Technology, Uppsala University http://www.update.uu.se/~davidl/msthesis/thesis.pdf [5] Pohang University of Science and Technology http://monet.postech.ac.kr/research.html [6] The ARC Communications Research Network http://www.acorn.net.au/home.cfm [7] From Ad Hoc Networks to Ad Hoc Applications - Position Paper – Benoît Garbinato, Philippe Rupp – Institut d’Informatique et Organisation (INFORGE) – Ecole des HEC – Université de Lausanne [8] Yongguang Zhang and Wenke Lee, Security in Mobile Ad hoc Networks, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005. IEEE, Sección El Salvador. 6 [9] Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003. [10] Mishra, Amitabh: Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press (2008) [11] Medical Applications of Wireless Networks, Tam Vu Ngoc, Washington University in St. Louis, 21 April 2008 http://www.cse.wustl.edu/~jain/cse57408/ftp/medical/index.htm l [12] Universal Declaration on Bioethics and Human Rights, Records of the General Conference, 33rd session, Paris, 3 – 21 October 2005 http://unesdoc.unesco.org/images/0014/001428/142825e.pdf #page=80 [13] ADSL (Asymmetric Digital Subscriber Line) http://www.techterms.com/definition/adsl [14] BandwithPlace Internet Speed Tester http://www.bandwidthplace.com/ [15] Simple pragmatic approach to mesh routing using B.A.T.M.A.N. (Better Approach To Mobile Ad hoc Networking) – Johnson, Ntlatlapa and Aichele – 2nd IFIP International Symposium on Wireless Communications and Information Technology – October 2008 http://researchspace.csir.co.za/dspace/handle/10204/3035 [16] Linux Users Group Rosario – Argentina – March 2011 http://lugro-novedad.blogspot.com/2011/03/se-libero-elkernel-2638-incluye-batman.html [17] Java Technology http://www.oracle.com/us/technologies/java/index.html [18] The Ubuntu Project – Free Operating System http://www.ubuntu.com/project [19] Firestarter – Open Source visual firewall program http://www.fs-security.com/ [20] Role of the Domain Name System (DNS), J.C. Klensin, J. Klensin – February 2003 http://tools.ietf.org/html/rfc3467 [21] Free multiplatform software Wireshark Version 1.4.0 for Windows http://www.wireshark.org/ [22] British heart foundation – ECG http://www.bhf.org.uk/heart-health/tests/ecg.aspx [23] The Standard 12 Leads ECG – Frank G. Yanowitz, MD – Professor of Medicine – University of Utah School of Medicine http://library.med.utah.edu/kw/ecg/ecg_outline/Lesson1/inde x.html [24] Tratado de Enfermería y Cuidados Críticos Pediátricos y Neonatales – Chapter 56 http://www.eccpn.aibarra.org/temario/seccion4/capitulo56/c apitulo56.htm [25] A Dynamical Model for Generating Synthetic Electrocardiogram Signals http://www.mit.edu/~gari/CODE/ECGSY/JAVA/APPLET2/ ecgsyn/ecg-java/software.html IV. BIOGRAPHIES Fabio Bruschetti (1964): IT Information Systems graduate with honors from CAECE University. Current researcher on Computer Networks at UNSAM and lecturer on Data Processing Systems at UNSAM, Computer EL Salvador, Noviembre 2011 CONCAPAN XXXI 7 Architectures at CAECE University, Networking Essentials at CAECE University and Information Technology at UBA postgraduate department. María Claudia Abeledo (1962): IT Information Systems graduate with honors from CAECE University. Magister computer networking graduate with honors from La Plata University. Current researcher and lecturer on Computer Networks at UNSAM and current lecturer on Computer Networks and Networking Essentials at CAECE University. Sebastián José Emilio Lorandi (1987): Electro-medicine technician from UNSAM. Current researcher and lecturer on Electronic Measurements, Medical Instruments and Biomedical Signal Acquisition and Processing at UNSAM. Pedro Facundo Iriso (1989): Advanced student of Networking Technician Degree from UNSAM. Cristian Miño (1983): Advanced student of Networking Technician Degree from UNSAM. María de las Mercedes Cresta (1979): Advance student of IT Information Systems from CAECE University. IEEE, Sección El Salvador. EL Salvador, Noviembre 2011
Similar documents
Transmitting Sensor Data Through Ad Hoc Networks: A Fast and
[2] Budget 2008–09: economic issues, Parliamentary Library, Parliament of Australia, 4 June 2008 http://www.aph.gov.au/library/pubs/rp/BudgetReview/Econo mic_Issues.htm [3] Wi-Fi Pilots for Develop...
More information