2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
Tactical communication networking faces diverse operational scenarios where network optimization ... more Tactical communication networking faces diverse operational scenarios where network optimization is a very challenging task. Learning from the network environment, in order to optimally adapt the network settings, is an essential requirement for providing efficient communication services in such environments. Cognitive networking deals with the application of cognition to the entire protocol stack for achieving network-wide performance goals. One of the key requirements of a cognitive network is to learn the relationships between network protocol parameters spanning the entire stack in relation with the operating network environment. In this paper, we use a probabilistic graphical modeling approach, Bayesian Networks (BNs), in order to create a representation of the dependence relationships between significant parameters spanning transport and medium access control (MAC) layers in multi-hop wireless network environments. We exploit this model to face one of the problems of the TCP protocol, that does not have any mechanism to infer when congestion is about to occur in the network and therefore waits till some packets are lost for reacting to congestion in the network. Such a reactive nature of TCP leads to wastage of precious network resources like bandwidth and power. In this paper we show how to infer in advance the congestion state of the network. We constructed BNs for different network environments by sampling network parameters on-the-fly in the ns-3 simulation platform. We found that it is possible to predict the congestion state of the network with quite good accuracy given sufficient training samples and the current value of the TCP congestion window.
2012 IEEE International Conference on Communications (ICC), 2012
The use of wireless technology and advanced signal processing for personalized healthcare is extr... more The use of wireless technology and advanced signal processing for personalized healthcare is extremely promising. A relevant application appears to be the field of group dynamics, in which the study of a heart-rate measure, the RR interval time series, can reveal valuable information about individuals, as well as the group as a whole. In this paper, we present the results of computing the wavelet coherence among the RR interval time series of a group of people during a Kundalini yoga meditation session, revealing entrainment among them during specific activities and additional important information, such as patterns of heart rate variability that are common to all members of the group. We propose a novel method to study the connections among people in real time, underlying the bounds in the accuracy as a function of the delay introduced.
2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), 2000
In an effort to conserve energy, mobile hosts wake up periodically to serve incoming traffic. Thi... more In an effort to conserve energy, mobile hosts wake up periodically to serve incoming traffic. This gives rise to a trade-off between energy consumption and delay. However, the deterministic strategy of current systems might not yield the desired performance. We show that knowledge of the statistical characteristics of incoming trafflc can be used to better meet the energy and delay requirements of the mobile node. We consider zero-buffer and buffered models. We propose some strategies to improve energy efficiency and study the related trade-offs. We also introduce a new metric for energy efficiency and derive explicit expressions for the same. Our results prove that significant gains accrue by employing intelligent wakeup schemes.
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
Cognitive networking deals with applying cognition to the entire network protocol stack for achie... more Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios that apply cognition only at the physical layer. Designing a cognitive network is challenging since learning the relationship between network protocol parameters in an automated fashion is very complex. We propose to use Bayesian Network (BN) models for creating a representation of the dependence relationships among network protocol parameters. BN is a unique tool for modeling the network protocol stack as it not only learns the probabilistic dependence of network protocol parameters but also provides an opportunity to tune some of the cognitive network parameters to achieve desired performance. To the best of our knowledge, this is the first work to explore the use of BNs for cognitive networks. Creating a BN model for network parameters involves the following steps: sampling the network protocol parameters (Observe), learning the structure of the BN and its parameters from the data (Learn), using a BN-based inference engine (Plan and Decide) to make decisions, and finally effecting the decisions (Act). We have proved the feasibility of achieving a BN-based cognitive network system using the ns-3 simulation platform. From the early results obtained from our approach, we provide interesting insights on predicting the network behavior, including the performance of the TCP throughput inference engine based on other observed parameters.
Abstract In this chapter, we present an application of the Cognitive Networking paradigm to the d... more Abstract In this chapter, we present an application of the Cognitive Networking paradigm to the design and development of autonomous Cognitive Access Point (CogAP) for Wi-Fi hotspots and home wireless networks. In these environments, we typically use only one ...
802.11 (WiFi) is a well established network communications protocol that has wide applicability i... more 802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communicati...
When medical care is initiated at a mass casualty event, the first activity is the triage of vict... more When medical care is initiated at a mass casualty event, the first activity is the triage of victims, which is the grouping by victims severity of injury. Paper triage tags are often used to mark victims' triage status and to record information on injuries and treatments administered in the field. In this paper we describe the design and development of an"Intelligent Triage Tag" (ITT), an electronic device to coordinate patient field care. ITTs combine the basic functionality of a paper triage tag with sensors, nonvolatile memory, a microprocessor and 802.11 wireless transmission capabilities. ITTs not only display victims' triage status but also signal alerts, and mark patients for transport or immediate medical attention. ITTs record medical data for later access offsite and help organize care by relaying information on the location of the victims during field treatment. ITTs are a part of the Wireless Information System for Medical Response in Disasters (WIISARD...
2008 5th IEEE Consumer Communications and Networking Conference, 2008
In this paper, throughput performance of WMNs is studied. In our model, a regular grid backbone n... more In this paper, throughput performance of WMNs is studied. In our model, a regular grid backbone network overlays on a random ad hoc network. We propose a framework to calculate non-asymptotic throughput, which can be obtained by computing several deterministic parameters. Two problems are investigated. In Maximum Throughput Partition (MTP) problem, the ideal throughput is achieved by optimally partitioning the network with a proper number of backbone nodes. In Maximum Throughput Partition with Hops' number Constraint (MTPHC) problem, a similar problem is studied but with constraint on the average number of hops in the backbone network. The results show that it is critical to find an appropriate size of the backbone network for a WMN, especially when the hops' number constraint is imposed. Our solution of MTPHC problem can be also used to obtain the ideal transmission range when less-than-optimal number of backbone nodes is deployed. Comparing with the minimum transmission range, the ideal one can achieve the same optimal throughput but effectively reduce the average number of hops in mesh backbone communications.
Authors' Contributions and Signatures I declare that I participated in the study concept and desi... more Authors' Contributions and Signatures I declare that I participated in the study concept and design, acquisition of data, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, statistical analysis, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Brett C. Meyer, M.D. I declare that I participated in the study design, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, and statistical analysis. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Rema Raman, Ph.D. I declare that I participated in the acquisition of data, analysis and interpretation of data, and critical revision of the manuscript for important intellectual content. I have no conflicts of Interest regarding this manuscript. Thomas Hemmen, M.D. I declare that I participated in acquisition of data, critical revision of the manuscript for important intellectual content, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Richard Obler, M.D., M.P.H. I declare that I participated in the study concept and design, analysis and interpretation of data, critical revision of the manuscript for important intellectual content, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Justin A. Zivin, M.D., Ph.D. I declare that I participated in critical revision of the manuscript for important intellectual content, and administrative, technical, or material support. I have no conflicts of Interest regarding this manuscript. Ramesh Rao, Ph.D. I declare that I participated in the analysis and interpretation of data, critical revision of the manuscript for important intellectual content, statistical analysis, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Ronald G. Thomas, Ph.D. I declare that I participated in the study concept and design, acquisition of data, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, statistical analysis, obtaining funding, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript.
This report is the final summary report of the Wireless Internet Information System for MedicAl R... more This report is the final summary report of the Wireless Internet Information System for MedicAl Response to Disasters (WIISARD) project funded by the National Library of Medicine (NLM BAA 02-103/VMS). The goal of this 3-year project was to develop, test and apply scalable wireless Internet technologies to improve the medical care of victims and address life-threatening medical problems arising at the site of disasters and terrorist attacks. In addition, the project aimed to develop a living laboratory and testbed for these ...
Achieving reliable, efficient data communications networks at disaster site is a difficult task. ... more Achieving reliable, efficient data communications networks at disaster site is a difficult task. Network paradigms such as Wireless Mesh Network (WMN) architectures are one paradigm for providing high bandwidth scalable data communication. WMNs are formed by self-organized wireless nodes that use multi-hop wireless relaying for data communications. In this paper describe our experience using mesh network architecture broadband network developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client server applications tested during a large scale homeland security drill. The results suggest that 802.11 mesh networks are feasible and scalable systems for field communications. We also present our traffic measurements based on which we make essential requirements for such medical emergency response networks.
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
Tactical communication networking faces diverse operational scenarios where network optimization ... more Tactical communication networking faces diverse operational scenarios where network optimization is a very challenging task. Learning from the network environment, in order to optimally adapt the network settings, is an essential requirement for providing efficient communication services in such environments. Cognitive networking deals with the application of cognition to the entire protocol stack for achieving network-wide performance goals. One of the key requirements of a cognitive network is to learn the relationships between network protocol parameters spanning the entire stack in relation with the operating network environment. In this paper, we use a probabilistic graphical modeling approach, Bayesian Networks (BNs), in order to create a representation of the dependence relationships between significant parameters spanning transport and medium access control (MAC) layers in multi-hop wireless network environments. We exploit this model to face one of the problems of the TCP protocol, that does not have any mechanism to infer when congestion is about to occur in the network and therefore waits till some packets are lost for reacting to congestion in the network. Such a reactive nature of TCP leads to wastage of precious network resources like bandwidth and power. In this paper we show how to infer in advance the congestion state of the network. We constructed BNs for different network environments by sampling network parameters on-the-fly in the ns-3 simulation platform. We found that it is possible to predict the congestion state of the network with quite good accuracy given sufficient training samples and the current value of the TCP congestion window.
2012 IEEE International Conference on Communications (ICC), 2012
The use of wireless technology and advanced signal processing for personalized healthcare is extr... more The use of wireless technology and advanced signal processing for personalized healthcare is extremely promising. A relevant application appears to be the field of group dynamics, in which the study of a heart-rate measure, the RR interval time series, can reveal valuable information about individuals, as well as the group as a whole. In this paper, we present the results of computing the wavelet coherence among the RR interval time series of a group of people during a Kundalini yoga meditation session, revealing entrainment among them during specific activities and additional important information, such as patterns of heart rate variability that are common to all members of the group. We propose a novel method to study the connections among people in real time, underlying the bounds in the accuracy as a function of the delay introduced.
2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), 2000
In an effort to conserve energy, mobile hosts wake up periodically to serve incoming traffic. Thi... more In an effort to conserve energy, mobile hosts wake up periodically to serve incoming traffic. This gives rise to a trade-off between energy consumption and delay. However, the deterministic strategy of current systems might not yield the desired performance. We show that knowledge of the statistical characteristics of incoming trafflc can be used to better meet the energy and delay requirements of the mobile node. We consider zero-buffer and buffered models. We propose some strategies to improve energy efficiency and study the related trade-offs. We also introduce a new metric for energy efficiency and derive explicit expressions for the same. Our results prove that significant gains accrue by employing intelligent wakeup schemes.
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
Cognitive networking deals with applying cognition to the entire network protocol stack for achie... more Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios that apply cognition only at the physical layer. Designing a cognitive network is challenging since learning the relationship between network protocol parameters in an automated fashion is very complex. We propose to use Bayesian Network (BN) models for creating a representation of the dependence relationships among network protocol parameters. BN is a unique tool for modeling the network protocol stack as it not only learns the probabilistic dependence of network protocol parameters but also provides an opportunity to tune some of the cognitive network parameters to achieve desired performance. To the best of our knowledge, this is the first work to explore the use of BNs for cognitive networks. Creating a BN model for network parameters involves the following steps: sampling the network protocol parameters (Observe), learning the structure of the BN and its parameters from the data (Learn), using a BN-based inference engine (Plan and Decide) to make decisions, and finally effecting the decisions (Act). We have proved the feasibility of achieving a BN-based cognitive network system using the ns-3 simulation platform. From the early results obtained from our approach, we provide interesting insights on predicting the network behavior, including the performance of the TCP throughput inference engine based on other observed parameters.
Abstract In this chapter, we present an application of the Cognitive Networking paradigm to the d... more Abstract In this chapter, we present an application of the Cognitive Networking paradigm to the design and development of autonomous Cognitive Access Point (CogAP) for Wi-Fi hotspots and home wireless networks. In these environments, we typically use only one ...
802.11 (WiFi) is a well established network communications protocol that has wide applicability i... more 802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communicati...
When medical care is initiated at a mass casualty event, the first activity is the triage of vict... more When medical care is initiated at a mass casualty event, the first activity is the triage of victims, which is the grouping by victims severity of injury. Paper triage tags are often used to mark victims' triage status and to record information on injuries and treatments administered in the field. In this paper we describe the design and development of an"Intelligent Triage Tag" (ITT), an electronic device to coordinate patient field care. ITTs combine the basic functionality of a paper triage tag with sensors, nonvolatile memory, a microprocessor and 802.11 wireless transmission capabilities. ITTs not only display victims' triage status but also signal alerts, and mark patients for transport or immediate medical attention. ITTs record medical data for later access offsite and help organize care by relaying information on the location of the victims during field treatment. ITTs are a part of the Wireless Information System for Medical Response in Disasters (WIISARD...
2008 5th IEEE Consumer Communications and Networking Conference, 2008
In this paper, throughput performance of WMNs is studied. In our model, a regular grid backbone n... more In this paper, throughput performance of WMNs is studied. In our model, a regular grid backbone network overlays on a random ad hoc network. We propose a framework to calculate non-asymptotic throughput, which can be obtained by computing several deterministic parameters. Two problems are investigated. In Maximum Throughput Partition (MTP) problem, the ideal throughput is achieved by optimally partitioning the network with a proper number of backbone nodes. In Maximum Throughput Partition with Hops' number Constraint (MTPHC) problem, a similar problem is studied but with constraint on the average number of hops in the backbone network. The results show that it is critical to find an appropriate size of the backbone network for a WMN, especially when the hops' number constraint is imposed. Our solution of MTPHC problem can be also used to obtain the ideal transmission range when less-than-optimal number of backbone nodes is deployed. Comparing with the minimum transmission range, the ideal one can achieve the same optimal throughput but effectively reduce the average number of hops in mesh backbone communications.
Authors' Contributions and Signatures I declare that I participated in the study concept and desi... more Authors' Contributions and Signatures I declare that I participated in the study concept and design, acquisition of data, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, statistical analysis, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Brett C. Meyer, M.D. I declare that I participated in the study design, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, and statistical analysis. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Rema Raman, Ph.D. I declare that I participated in the acquisition of data, analysis and interpretation of data, and critical revision of the manuscript for important intellectual content. I have no conflicts of Interest regarding this manuscript. Thomas Hemmen, M.D. I declare that I participated in acquisition of data, critical revision of the manuscript for important intellectual content, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Richard Obler, M.D., M.P.H. I declare that I participated in the study concept and design, analysis and interpretation of data, critical revision of the manuscript for important intellectual content, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Justin A. Zivin, M.D., Ph.D. I declare that I participated in critical revision of the manuscript for important intellectual content, and administrative, technical, or material support. I have no conflicts of Interest regarding this manuscript. Ramesh Rao, Ph.D. I declare that I participated in the analysis and interpretation of data, critical revision of the manuscript for important intellectual content, statistical analysis, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript. Ronald G. Thomas, Ph.D. I declare that I participated in the study concept and design, acquisition of data, analysis and interpretation of data, drafting of the manuscript, critical revision of the manuscript for important intellectual content, statistical analysis, obtaining funding, administrative, technical, or material support, and study supervision. I have seen and approved the final version. I have no conflicts of Interest regarding this manuscript.
This report is the final summary report of the Wireless Internet Information System for MedicAl R... more This report is the final summary report of the Wireless Internet Information System for MedicAl Response to Disasters (WIISARD) project funded by the National Library of Medicine (NLM BAA 02-103/VMS). The goal of this 3-year project was to develop, test and apply scalable wireless Internet technologies to improve the medical care of victims and address life-threatening medical problems arising at the site of disasters and terrorist attacks. In addition, the project aimed to develop a living laboratory and testbed for these ...
Achieving reliable, efficient data communications networks at disaster site is a difficult task. ... more Achieving reliable, efficient data communications networks at disaster site is a difficult task. Network paradigms such as Wireless Mesh Network (WMN) architectures are one paradigm for providing high bandwidth scalable data communication. WMNs are formed by self-organized wireless nodes that use multi-hop wireless relaying for data communications. In this paper describe our experience using mesh network architecture broadband network developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client server applications tested during a large scale homeland security drill. The results suggest that 802.11 mesh networks are feasible and scalable systems for field communications. We also present our traffic measurements based on which we make essential requirements for such medical emergency response networks.
Uploads
Papers by Ramesh Rao