Introduction
Body area networks (BAN) are a form of wireless personal area network (WPAN) and it has recently been accepted as 4th generation mobile communications systems taking the form of human to human networking incorporating wearable sensors and communication. BAN is normally thought of as wireless sensor networks (WSN) however in this paper we try to elaborate on how BAN works. BAN can take various forms, it incorporates the use of sensors which can be found in, on or around the body and it uses different types of communication. In the following section we shall elaborate on the specific communication architecture used by BAN.
Communication Architecture (by Ivy Wainaina)
The BAN communication architecture is divided into 3 tiers namely:
• Tier 1 – Intra-Ban communication design
• Tier 2 – Inter-Ban communication design
• Tier 3 – Beyond-Ban communication design
As shown in the image below, it depicts an example of a BAN implementation.
Figure 1: BAN 3-tier communication architecture.
Intra-BAN communication design
It handles communication between body sensors and the communication between the sensors with the personal server (PS). The design of this layer is critical as the sensors are battery-operated and have low bit rates thus it’s important that there is an energy-efficient MAC protocol with QoS provisioning.
The connection between the sensors and PS can be wired or wireless. In wired they use MIThril and SMART to connect the sensors to the PS. MIThril is a wearable computing platform that is used to monitor a user’s physiological state and the surrounding environment in real time. In wireless they use CodeBlue to connect the sensors directly to the access points.
Topologies implemented are star and mesh. In a star...
... middle of paper ...
... (IOT), the use of BAN is exponentially increasing in the society from clothing, shoes, body implants and other wearable sensors. The BAN is able to link to WSN as shown in figure 7 below. For example, a patient with chronic illnesses such as heart disease, liver and kidney failure might have sensors placed in or on their body and in the environment around them such as chairs or bed. In this instance, if they happen to have a cardiac arrest the in body sensor will relay this information to the doctors furthermore with the integration to WSN the doctor is able to determine the exact location of the patient (the chair). The challenge to engineers especially in developing countries is to come up with tailored uses of BAN, bearing in mind the timely transmission and synchronization of data from the various sensors is crucial in the use of BAN.
Figure 7: IOT and BAN
It runs a RealAudio Server over TCP with media stream transmission via UDP for supplying sound clips.
In the final chapter of The Impossible Knife of Memory, the main character of the book, Hayley begins it off talking about being in a fairytale. If this was her fairytale, this chapter would be her happily ever after. Before this chapter of the book, her life had been disorganized frequently because of her father’s disorder. Her father, Andy Kincain, a war veteran, has PTSD. Also known as Post Traumatic Stress Disorder; this disorder is caused by seeing or experiencing a very intense, and terrifying event. In Andy’s case, the war was what caused his condition.
The placement of implantable chips into patients for the purpose of accurately identifying patients and properly storing their medical history records has become a subject of a strong debate. Making sure patients are properly identified before a procedure and storing their health history records for future use has been difficult, if not impossible. The idea of being able to retrieve accurate patient’s medical history for a follow up care without relying on patient’s memory is a challenging task for many healthcare organizations. Many ideas and technologies have been introduced over the years to help solve this problem, but unfortunately the problem is still not fully resolved. There are still many errors in the healthcare due in part by improper record keeping and inaccurate patient identification. One idea that has being in discussion to eliminate these problems for good, is the introduction of a chip or radio frequency identification (RFID) technology implanted into human for the purpose storing medical data and accurately identify patients. VeriChip Corporation is currently the maker of this implantable RFID chip. They are the only corporation cleared by the U.S. Food and Drug Administration (FDA) to make this implantable radio frequency transponder system for humans for the purpose of identifying patients and storing their health history information. The chip was first developed for the use of radar systems by Scottish physicist, Sir Robert Alexander Watson-Watt in 1935 just before World War II. (Roberti, 2007). This technology helps identify approaching planes of the enemy from mile away. Today, RFID has several uses. It is used for animal tracking. It is attached to merchandise in stores to prevent theft. It can be instal...
wearables that connect to apps such as MapFitnessPal. The apps provide consumers with the ability to track their food consumption, and view a nutritional breakdown of their food intake.
With this newer technology Physicians, nurses, and other approved medical staff have the option to monitor their patient’s heart functionality, and fix pacemaker electrical signals to fit patients need from a mobile device, without ever bringing the patient into the Physicians’ office. Cardiac remote patient monitoring uses smart phones, and specific designed (secured) e-mails to deliver information sent from the device implanted within the patient’s heart. This allows medical staff to receive pertinent up-to date- information on the condition of the patient’s pacemaker, and heart. This can help create profound patient care, early critical heart failure, or heart defibrillation detection; while adding to medical staff’s proficiency, and cutting costly emergency room visits with prevention detection ("Remote Monitoring Technology Improves Pacemaker Performance", 2012).
Mann, S., Nolan, J. and Wellman, B.. “Sous-veillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance & Society 1.3 (2003): 331-55. Web. 4 Mar. 2010.
J. A. Gutierrez ,M. Naeve , E. Callaway , M. Bourgeois ,V. Mitter and B. Heile "IEEE 802.15.4:adeveloping standard for low-power low-cost wireless personal area networks", IEEE Network, vol. 15, no. 5, pp.12 -19 2001
Also, it requires a fast and secure communication to monitor real-time connection status to act as Energy Manager. [SANCHEZ]
8) Ian F. Akyildiz, Ismail H. Kasimoglu, “Ad Hoc Networks’’, Wireless sensor and actor networks: Research Challenges, Georgia Institute of Technology, USA, May-2004.
MIThril task is to make a wearable computer as unnoticeable and light as possible. There are not kits for marketing, but an easy and clear document available to anyone who is willing to attempt of making one himself. This is a task that gets people to get involved and make a wearable computer to be worldwide.
One of the latest advancements in wireless data. It is used in GSM (Global System for Mobile Communications) for transferring data in packets.
The perception layer includes a group of Internet-enabled devices that are able to perceive, detect objects, gather information, and exchange information with other devices through the Internet communication networks. Radio Frequency Identification Devices (RFID), cameras, sensors, Global Positioning Systems (GPS) are some examples of perception layer devices. Forwarding data from the perception layer to the application layer under the constraints of devices’ capabilities, network limitation and the applications’ constraints is the task of the network layer. IOT systems use a combination of short-range networks communication
The Internet of Things (IoT) is the network of physical objects accessed through the Internet. The Network of interconnected objects harvests information from the environment (sensing) and interacts with the physical world (actuation/command/control), uses existing Internet standards to provide services for information transfer, analytics, applications and communications (Jiong et al. 2012).
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
To my mind after today’s standards - 3D and 4K- movies are going to come to a new level of entertainment. I am not talking about higher resolutions or better surround sound, but about blurring the line between the physical and the digital world. In other words, the move from watching a movie to being part of a movie. I might be wrong but who would not like to play his favorite character in a movie, interact with other characters and affect the movie’s outcome? Wireless bodysuits will make the audience feel, what their characters fee...