Electronic Triage Tag and Opportunistic Networks in Disasters
Electronic Triage Tag and Opportunistic Networks in Disasters
Electronic Triage Tag and Opportunistic Networks in Disasters
Disasters
Abraham Martn-Campillo ,
Ramon Mart
eiko.yoneki@cl.cam.ac.uk,
jon.crowcroft@cl.cam.ac.uk
abraham.martin@uab.cat,
ramon.marti.escale@uab.cat
ABSTRACT
Keywords
General Terms
Design
corresponding author
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
ACM SWID 2011, December 6, 2011, Tokyo, Japan.
Copyright 2011 ACM 978-1-4503-1044-4/11/0012 ...$10.00.
1.
INTRODUCTION
2.
2.1
3.
Figure 2:
reader
3.2
Figure 4: START protocol assistant for the
triage of victims
3.1
Coordination point
4.
FORWARDING
method is the best option, but the use of broadcastbased forwarding approaches (where multiple copies of
the same data is spread throughout all the network)
has two problems. The first one is the energy efficiency.
Since data transfer using wifi is the most energy consuming process in a handheld device [18], each data
transfer consumes a lot of energy. For this reason it
is important to select a forwarding algorithm that does
not waste a lot of energy relaying unnecessary data.
The second problem occurs in cases with a high number of messages because due to the short contact times
it is not possible to forward all the data in a node, so it
may also require some kind of data forwarding priority
management.
But choosing the right forwarding method for the application depends also on a number of factors: the number of first responders working in the zone 0, the number of victims, the size of the ETT, the buffer of the
device, and the energy consumption of the device using
the network.
For these reason we created the Time To Return (TTR)
routing method, a simple mechanism to forward data
only once per node (energy efficient) with good delivery
performance thanks to taking advantage of the use of a
time that it is usually used in disasters but never used
in applications.
4.1
Time To Return
4.1.1
Protocol
4.2
Evaluation
as eventually all the nodes will come back to the coordination point. Hence, for measurements we will use
the CDF delivery delay and the delivery cost (number
of messages relayed per messages created), two important metrics used to evaluate opportunistic network and
routing protocols performance. The CDF delivery delay represents the difference between the time when a
message is delivered and its creation time.
The traces used for the simulation have been generated by the Bonnmotion tool. BonnMotion [17] is an
application that generates traces of different types of
scenario. One of these scenarios is disasters. They create mobility traces based on the analysis of the disaster
scenario created for the preparation of the FIFA world
cup in Germany [3]. This mobility model for disasters is
useful for defining zones of an emergency. The incident
location where the victims are found (Zone 0); patients
waiting for treatment area (Zone 1, where coordination point is); casualties clearing stations; the ambulance parking point and the coordination, or meeting,
point. The parameters for the generations of traces can
be found in table 1.
Once the traces are generated with the BonnMotion,
we use them as an input of the ONE simulator. The
ONE simulator [10] is a simulation environment specially designed for opportunistic networks simulation.
It supports different routing algorithms in the nodes
and sender and receiver types (with different characteristics in interfaces for example). A link speed of 54
Mbps and a radio range of 60m are the values defined
for all the nodes. The link speed is chosen using the
802.11g standard, the simulator is in charge of changing the speed rate depending of the distance between the
two nodes. As for the maximum radio range, we carried
tests using iPhones 3GS that gave us an average result
of 60 meters. We tested the radio range outdoor with
obstacles (typically for disaster scenarios). The radio
range is a parameter that can change depending of the
device the user is using. We also tested the maximum
data transfer rate for the wifi network (802.11g) of the
iPhone 3GS with a result of 6,4 Mbps. The duration of
the simulation is 6000 seconds.
We have chosen a message size of 225kB. We have
calculate this size for a message containing text and
a small size photo. We have supposed a mass casualty incident hence a total number of 2000 messages are
created during the simulation (100 minutes). The messages can be Electronic Triage Tags or messages with
information about the emergency scenario. A size of 10
MB has been chosen for the buffer size of each node,
so each node will be able to store up to 45 messages
each node before it starts rejecting messages because
the buffer is full. Each node will create an average of 33
messages throughout the simulation, so each node has
buffer space to store more messages, even if it is not
Value
60
1300x250 m
100x40 m
6000 s
60 m
10 MB
2000 messages
225 kB
4.2.1
Results
1
0,9
0,8
0,7
CDF
0,6
0,5
0,4
0,3
0,2
0,1
0
0
1000
MaxProp
2000
Epidemic
3000
Delay
(sec)
ProPHET
4000
5000
FirstContact
6000
TTR
Routing
MaxProp
PRoPHET
Epidemic
FirstContact
TTR
Delivery cost
382
121
100
9
2
5.
Triage
Application
Triage
Application
(1)
(1)
(2)
HAGGLE
TTR
manager
Device
HAGGLE
TTR
manager
Device
Figure 11: Haggle-ETT scheme. (1) Communications intra device between Haggle application
and Haggle platform (2) Communications inter
devices between Haggle platforms
coordination point.
5.1
Implementation
6.
HAGGLE-ETT
6.1
Implementation
7.
CONCLUSIONS
Having all the information about the victims in a digital format is essential for the prioritisation in the rescue
process. However, due to the nature of the emergency
scenarios, communications cannot rely in existing infrastructures because they can become unusable for different reasons. Hence, the forwarding of this data may
become difficult and the data may arrive to a coordination point with an excessive delay.
In this paper, we have presented MAETT and HaggleETT, two applications that create Electronic Triage
Tags with triage information of the victims in the emergency scene, and forward them to a coordination point
using ad-hoc networking. The triage is done using an
application with a GUI that follows the START protocol. This process creates an ETT which is forwarded,
using the Time To Return (TTR) forwarding method,
to a coordination point using opportunistic networks
without relying in any communications infrastructure.
The time to return to a coordination point, that is commonly used in emergencies, is assigned to each person
working in the disaster in order to have a periodic security check. The TTR forwarding method uses this time
as a forwarding decision: the ETTs will be forwarded to
the node with the lower TTR, meaning that they will
arrive earlier to a coordination point.
These applications are not only limited to scenarios
without available network infrastructure, they can also
be used in scenarios where end to end connections are
available. In these cases, a node could communicate
directly with a coordination point. If the network infrastructure becomes unavailable, or if there are delays
and disruptions the applications will continue working.
This fact makes the applications useful in any situation.
7.1
Future work
As future work, an extensive research about performance of opportunistic forwarding methods in emergencies scenarios is planned. Having a good method of
forwarding data in disasters scenarios is critical. The
characteristics of an emergency scenario cannot be predicted (density of nodes, number of messages, etc) and
those elements have a big impact in the performance of
the forwarding methods. Furthermore, other applications for disasters, different from ETTs, can be developed based on our research in Mobile Agents or Haggle
in order to be able to use them even in worst cases scenarios where infraestructured networks are unusable.
8.
ACKNOWLEDGEMENT
This research has been partially funded by the Spanish Ministerio de Educacion (FPU AP2008-03149), by
the Catalan DURSI (2009SGR1224) and by the Spanish
Ministerio de Ciencia e Innovacion (TIN2010-15764).
9.
REFERENCES
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
floods/story-fn7celvh-1226046611966.
[23] L. Wallis. START is not the best triage stategy.
Br J Sports Med, 36(6):473, 2002.
[24] J. E. White. Telescript technology: Mobile agents.
In J. Bradshaw, editor, Software Agents. AAAI
Press/MIT Press, Menlo Park, CA, 1996.
[25] M. Wooldridge and N. R. Jennings. Intelligent
agents: Theory and practice. Knowledge
Engineering Review, 10(2):115152, 1995.