158
application for information display. Presentation layer functions as a converter to convert a smart phone reada-
ble form into computer readable form.
x Session Layer
Session layer establishes dialogues between two nodes and allows data exchange either in the form of simplex,
full duplex or half duplex methods. Besides, it also sup- ports error recovery services to ensure the data can be
exchanged without error. It is useful to manage a flow of data such as ECG readings.
x Transport Layer
Transport layer mainly handles end-to-end delivery of messages to ensure the messages can be sent properly. If
the size of the message is too big, transport layer will perform segmentation and reassembly to break the mes-
sage into smaller parts at the receiver and reassemble the message. This layer utilises the service from the core
channel to impart quality of service QoS as an aid in transferring data, monitoring of segmented data and re-
transfer when necessary.
x Network Layer
Network layer handles the delivery of packets from source to destination by referring to the IP address. Oth-
er than delivery of packets, it also handles the routing of packets to the correct destination using the correct
routes. The packets will be en-capsulated at the receiver and when the packets reach the receiving end, de-
capsulation will be performed to remove the header at- tached to it.
x Data Link Layer
The purpose of is categorized into 3 processes referred to media access control, error control and message de-
159
lineation. It also establishes an exchange of data frames between nodes. Originally, the frames are data blocks
that have been converted. The media access control han- dles the transmission of frame into the communication
medium, and performs the error control process by checking the data bits. Once they have passed these
stages, the frame will be transferred to the correct desti- nation without any disruption.
x Physical Layer
It is the model’s underlying layer that manages, activates and de-activates physical connection for bit transmis-
sion. All the data and information will be converted into bits like 1 and 0 and then they will be transmitted
through the communication medium. Therefore, this layer only concerns about the network hardware and the
type of circuit to be used to transmit the messages.
5.1.2 Site Survey
It is one of the most crucial steps to initialize the planning of networks. It is because this is where the decision of how many
radio station or wireless access point to be placed? made. Even though it seems to be simple, this step cannot be taken lightly.
Site survey is carried out to perform stress test in identifying problematic issues such as poor reception, network interference
and so on. This procedure must be given an emphasis because it could reveal useful information to perform what-if analysis.
What-if analysis generates a lot of questions solutions can be provided to address the question before we engage in the real
plan. Some sample of questions include what if an object block downs the wireless signal? and what if the signal coverage
needed to be expand as far as to the road across the other build- ing? Hence, the locations of wireless emitter should be studied
including the extent of area covered, the capacity of network,
160
interference problem as well as possible obstacles. Coverage area basically refers to the signal strength. To check this signal,
we can connect our PC to a wireless network and observe the 5 bars icon of bottom right of the PC. More green bars indicate
stronger signal strength. If we move our PC further away from the access point, we can observe a reduction of green bar im-
mediately. If we move the PC further away, the wireless con- nection will be disconnected. There is a formula for this
measurement:
ࡿሺࢊሻ ן
ࢊ
However, this applies by assuming that there is no obstacle in between wireless access point and the device connected. The
second element refers to the capacity of network. It mainly con- trols the user limit. Besides, the amount of data transferred by
all users at the same time can be regulated. When it reaches the maximum capacity, any other users who attempt to connect to
the wireless access point will be denied. Interference refers to the degree of distraction towards the wireless broadcast signal.
This can happen when the wireless access point shares the same frequency band with others. For instance, there are a few wire-
less routers in the same place that broadcast the signal using the same channel and such situation results in interference. Interfer-
ence can cause a reduction of the data speed and reduces the connection quality. Apart from interference resulted from chan-
nel conflicts; physical obstacles can be one of the major causes to interfere the signal transmittance. For instance, thick walls
with steel beam can absorb or block the wireless signal. Another example is glass panel which have the capability to reflect the
wireless signal. In order to get accurate data and information from site survey, a lot of work has to be done. For instance, we
can install a network management system into a laptop to cap- ture the measurement of signal strength and its interference in
different locations. Access points are often moved around dif-
5.1
161
ferent locations in order to find the best signal strength. Modern surveying software can also be used to measure and analyze
signal from the access points just by walking around with the laptop. In the case of the hospital, the coverage extent must be
estimated as it is not possible to search through every corner. Site surveys can only provide the signal to be expected but the
outcome doesn’t mean that the real channel functions exactly the same as what we performed during survey. Additionally, the
authorized risk assessments must also be given a consideration on the possibility of interfering with sensitive medical devices.
5.1.3 Comparison of Standalone Ad Hoc and Centrally Coordinated Network
The deployment of wireless network is categorized into two methods which include standalone ad hoc and centrally coordi-
nated network. The network entry is an independent operation and configuration to prevent congestion and device failure.
Moreover, it does not have centralized control on data flow and user access management, and each body network operates inde-
pendently. In the situation of patient monitoring application, it requires an intense level of energy to meet the performance as it
involves continuous data streaming. With this configuration, the issues of power management, packet loss and security may arise
and can cause performance degradation on network.
162
Figure 5.3 an ad-hoc network FONG et al 2011
In centrally coordinated network, each access point is no longer required to perform most of the management task as it has been
taken over by the central controller. Hence, the observation of channel efficiency for the whole channel can be centrally con-
ducted. With such configuration, it is very easy to expand the coverage area. All we need to do is just plug in more entry
points to the central control and the user-traffic can be moni- tored among access points. Apart from that, we also can pro-
gram the central controller to re-configure the access point independently if the network condition changes such as pro-
gramming the central controller to disable failed access point and re-route traffic for load balancing. This provides the net-
work with the abilities of self-recovery. This configuration to- pology is shown in Figure 5.3. Instead of using a switch or
router, it uses controller. In conclusion, standalone ad-hoc net- work is more suitable for smaller network with small coverage
area and small number of access points, while centrally coordi- nated network is more suitable for network with dynamic
changes from time to time.