Advances in Telemedicine Technologies Enabling Factors and Scenarios G Graschow Instant Download
Advances in Telemedicine Technologies Enabling Factors and Scenarios G Graschow Instant Download
https://ebookbell.com/product/advances-in-telemedicine-
technologies-enabling-factors-and-scenarios-g-graschow-4096772
https://ebookbell.com/product/advances-in-telemedicine-for-health-
monitoring-technologies-design-and-applications-tarik-a-
rashid-33600616
https://ebookbell.com/product/advances-in-geology-and-resources-
exploration-ahmad-safuan-bin-a-rashid-44888202
https://ebookbell.com/product/advances-in-pattern-recognition-and-
artificial-intelligence-marleah-blom-44899142
https://ebookbell.com/product/advances-in-communication-devices-and-
networking-proceedings-of-iccdn-2021-sourav-dhar-45107982
Advances In Databases And Information Systems 26th European Conference
Adbis 2022 Turin Italy September 58 2022 Proceedings Silvia Chiusano
https://ebookbell.com/product/advances-in-databases-and-information-
systems-26th-european-conference-adbis-2022-turin-italy-
september-58-2022-proceedings-silvia-chiusano-45107984
https://ebookbell.com/product/advances-in-abdominal-wall-
reconstruction-albert-losken-jeffrey-janis-45210530
https://ebookbell.com/product/advances-in-oilwater-separation-a-
complete-guide-for-physical-chemical-and-biochemical-processes-papita-
das-45285516
https://ebookbell.com/product/advances-in-smart-energy-systems-biplab-
das-ripon-patgiri-valentina-emilia-balas-45334114
https://ebookbell.com/product/advances-in-biobased-fiber-moving-
towards-a-green-society-sanjay-mavinkere-rangappa-45983380
ADVANCES IN
TELEMEDICINE:
TECHNOLOGIES,
ENABLING FACTORS
AND SCENARIOS
Edited by Georgi Graschew
and Theo A. Roelofs
Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Edited by Georgi Graschew and Theo A. Roelofs
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
Statements and opinions expressed in the chapters are these of the individual contributors
and not necessarily those of the editors or publisher. No responsibility is accepted
for the accuracy of information contained in the published articles. The publisher
assumes no responsibility for any damage or injury to persons or property arising out
of the use of any materials, instructions, methods or ideas contained in the book.
Preface IX
video coding standard with the recent IEEE 802.11e WLAN standard. This new ap-
proach allows for the transmission of video streams over WLAN with an assigned
guaranteed bandwidth (QoS) as required for telemedicine video applications in suf-
ficiently high quality. The next study reports on the development of a wireless cross-
standard communication protocol (2) that supports the creation of network-of-net-
works for e-Health applications from existing commercial (WiFi, WiMAX) and military
(HIDL, Link 11) communication systems. This new protocol has been implemented
in a demonstrator network that allows for the operation and investigation of various
real-life healthcare scenarios. The section is closed up by extensive considerations on
safety and electromagnetic compatibility (3) in wireless WiFi-, DECT- or GSM-based
telemedicine applications. The electromagnetic environment of typical urban homes
is characterised and an assessment for the potential safe use of home telemonitoring
systems is presented. The need for adequate and harmonised legislation and regula-
tion is also addressed.
The section on Enabling Factors starts with a chapter on Quality Control in Tele-
medicine (12). Describing the transposition of a corresponding Directive by the Euro-
pean Union into Spanish national legislation, the paper explains in detail how quality
control in distant medical service provision has recently been legally regulated (by a
CE-label instrument similar to the one for equipment) and points out the consequences
for medical doctors and healthcare providers. It calls for and contributes to appropriate
measures for corresponding training and licensing of health workers. The next chapter
focuses on those complex heterogeneous factors (“work system”) other than technol-
ogy that are crucial for sustainable implementation of Effective Telemedicine-based
Services (13). Using an established approach from research on Socio Technical Systems
as lens of analysis, three main levers emerge: formalisation of a clear and agreed busi-
ness model between hospital unit and local health agency, involvement of a call center
for service provision, empowerment of nurses. The resulting managerial implications
are discussed.
This book has been conceived to provide valuable reference and learning material to
other researchers, scientists and postgraduate students in the field. The references at
the end of each chapter serve as valuable entry points to further reading on the various
topics discussed and should provide guidance to those interested in moving forward
in the field of Telemedicine.
We sincerely acknowledge all contributing authors for their time and effort in prepar-
ing the various chapters; without their dedication this book would not have been possi-
ble. Also we would like to thank Katarina Lovrecic from InTech Open Access Publisher
for her excellent technical support during the realisation process of this book.
Fundamental Technologies
1
1. Introduction
Wireless Local Area Network (WLAN) have been widely utilized at this moment to support
video-related applications such as video streaming, multimedia messaging, teleconference,
voice over IP, and video telemedicine. This is due to WLAN constitutes a ubiquitous
wireless standard solution and its implementation is not complex in terms of WLAN devices
configuration and deployment. In addition, WLAN has superior characteristics compared
with other wireless standard, including mobility fashions, high data rate, and low cost
infrastructure.
The video-related application transmission such as telemedicine video will experience
challenges including low throughput, delays, jitter and packet lost during its transmission
over wireless network. This is due to wireless network or WLAN has specific characteristics
which can influence the transmission consisting of time-varying channel, transmission error,
and fluctuating bit rate characterized by factors such as noise, interference, and multiple
fading. Thus, a video coding system for the transmission is necessary to adapt to the WLAN
characteristics.
Recently, The Scalable Video Coding (SVC) standard as an extension of H.264/AVC have
enabled a video bit stream to adapt to time-varying channel, transmission error, and
fluctuating bit rate (Schierl et al. 2007). SVC also provides a scalability of receiver side
receptions since receivers have possibly heterogeneous capabilities in terms of display
resolution and processing power. In addition, SVC can support lower throughput and
improve better coding efficiency compared with prior video coding techniques such as
H.262/MPEG-2, H.263, MPEG-4, and H.264/AVC.
Currently, a new IEEE standard called The IEEE 802.11e is available to support Quality of
Service (QoS) in WLAN. Specifically, this standard introduces a new MAC layer
coordination function called Hybrid Coordination Function (HCF). Although IEEE 802.11e
is more reliable than the previous standard, it still refers to OSI protocol stack in which
every layer does not cooperate with each other. While wireless environments have specific
4 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
characteristics which may influence and degrade the quality level of the telemedicine
application, namely time-varying bandwidth, delay, jitter and loss (Kim et al. 2006).
There are previous works which concern with cross layer techniques in wireless network. In
(Choi et al., 2006), the focus was on cross layer optimization between application, data link,
and physical layers to obtain the end to end quality of wireless streaming video application.
A cross layer scheduling algorithm was utilized in (Kim, 2006) for throughput improvement
in WLAN considering scheduling method and physical layer information. The authors
utilized a H.264/AVC video coding in application layer over IEEE 802.11e EDCA wireless
networks (Ksentini et al., 2006). MPEG-4 FGS video coding and FEC were utilized in
application layer to deliver video application over IEEE 802.11a WLAN in (Schaar et al.,
2003). In (Schaar et al., 2006), the authors utilized a MCTF video coding in application layer
over IEEE 802.11 a/e HCCA wireless networks.
In this paper, a new approach in transmitting telemedicine video application over wireless
LAN is performed to assign guaranteed bandwidth (QoS) for connection request of
telemedicine video application. This approach utilizes a cross layer design technique based
on H.264/SVC and IEEE 802.11e wireless network to optimize the existing wireless LAN
protocol stack. From our results, an appropriate bandwidth could be achieved based on
Quality of Service (QoS) provision for telemedicine video application during its
transmission over wireless LAN.
The rest of this paper is organized as follows. The overview of telemedicine system
including Telemedicine, H.264/SVC, and IEEE 802.11e Wireless Network is explained in
Section II. Section III explains our proposed cross layer design of wireless LAN for video
telemedicine transmission. The prototype and simulation model is described in Section IV.
Results and Analysis is explained in Section V. Then, we conclude this paper in Section VI.
2. Telemedicine system
2.1 Telemedicine
Telemedicine constitutes healthcare services implemented through network infrastructures
such as LAN, WLAN, ATM, MPLS, 3G, and others, to provide health care service quality
especially in rural, urban, isolated areas, or mobile areas (Ng et al., 2006). Furthermore,
telemedicine involves interactions between medical specialists at one station and patients at
other stations and utilizes healthcare application which can be divided into video images,
images, clinical equipments, and radiographic images.
The authors in (Pavlopoulos et al., 1998) have presented an example of telemedicine
advantage through implementation on ambulatory patient care at remote area. Another
application has been done in (Sudhamony et al., 2008) for cancer care in rural area. High
technology telemedicine application in surgery has already been developed in (Xiaohui et
al., 2007).
Currently, the telemedicine utilizes available wired and wireless infrastructures.
Telemedicine infrastructures with wired network have been proposed using Integrated
Service Digital Network (ISDN) (Al-Taei, 2005), Asynchronous Transfer Modes (ATM)
(Cabral and Kim, 1996), Very Small Aperture Terminal (VSAT) (Pandian et al., 2007) and
Asymmetric Digital Subscriber Line (ADSL) (Ling et al., 2005). Telemedicine has also been
implemented in wireless network using Wireless LAN (WLAN) (Kugean et al., 2002),
Worldwide Interoperability for Microwave Access (WIMAX) (Chorbev et al., 2008), Code
Division Multiple Access (CDMA) 1X-EVDO (Yoo et al., 2005), and General Packet Radio
Switch (GPRS) (Gibson et al., 2003).
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 5
Every infrastructure has its own obstacle, in particularly when implemented in a remote
area. For example, Asynchronous Transfer Mode (ATM) and Multi Protocol Label Switching
(MPLS) have mobility and scalability limitations, although both networks provide high
Quality of Service (QoS) and have stability on delivering data (Nanda and Fernandes, 2007).
The fragility of 3G UMTS network for telemedicine has been explored in (Tan et al., 2006),
where the implementation costs are high and does not provide QoS.
There is a necessity of specific rule to define Quality of Services (QoS) provision of
telemedicine application. In addition, parameterized QoS is a clear QoS bound expressed in
terms of quantitative values such as data rate, delay bounds, jitter, and packet loss (Ni and
Turletti, 2004). Thus, we refer to (Supriyanto et al., 2009) to obtain the parameterized QoS or
QoS provision for telemedicine application. The desired output data rate for telemedicine
system in seven medical devices can be seen in Table 1.
means the received video quality. The distortion-rate curve constitutes an indicator of
acceptable video quality for any coding techniques at fluctuating bit rate. If a video coding
curve follows the movement of the distortion-rate curve, an optimal video quality will be
acquired. The three staircase curves mean the performance of the non-scalable coding
technique. On fluctuating bit rate conditions such as low, medium, or high bit rate, the non-
scalable coding techniques try to follow the movement of the distortion-rate curve indicated
by the upper corner of the staircase curve very close to the distortion-rate curve. The three
staircase curves have different optimal video quality at each since every staircase curve can
only achieve the distortion-rate curve either in low, medium or high bit rate. While a
scalable video coding can follow the movement of the distortion-rate curve in which the
scalable video coding has two layers, namely base layer and enhancement layer. Thus, the
scalable video coding has the optimal video quality at each condition, either in low,
medium, or high bit rate.
The common forms of scalability consist of temporal, spatial, and quality scalability. The
spatial scalability constitutes a video coding technique in which picture size (spatial
resolution) of video source is reduced. The temporal scalability means some parts of video
bit stream reduced in term of frame rate (temporal resolution). Then, quality scalability
constitutes a video coding technique in which the spatio-temporal resolution of video source
is still the same as the complete bit stream, but fidelity is lower. The quality scalability is
also commonly known as SNR scalability. Figure 2 shows a basic concept of SVC in which it
combines temporal, spatial, and quality scalability.
Recently, IEEE 802.11e standard proposed a new MAC layer coordination function in the
datalink layer to provide QoS support, namely HCF (Hybrid Coordination Function). HCF
consists of two channel access method, namely The Enhanced Distributed Channel Access
(EDCA) and The HCF Controlled Channel Access (HCCA). Access Points (APs) and
wireless stations which have supported The IEEE 802.11e standard are called QoS-enhanced
AP (QAP) and QoS-enhanced station (QSTA) respectively (Ni and Turletti, 2004).
Distributed IFS (DIFS), and Arbitrary IFS (AIFS). SIFS is the smallest IFS utilized to transmit
frames such as ACK, RTS, and CTS. PIFS is the second smallest IFS utilized by Hybrid
Coordinator (HC) to acquire the medium before any other stations. DIFS is the IFS for
stations to wait after sensing an idle medium. The last, AIFS is the IFS utilized by different
Access Categories (ACs) in The Enhanced Distributed Channel Access (EDCA) to wait after
sensing an idle medium.
Every access categories in the EDCA contains their own Arbitrary Interframe Space (AIFS),
Minimum Contention Windows (CWmin), Maximum Contention Windows (CWmax), and
Transmission Opportunity (TXOP) in which the highest priority is assigned by the smallest
values of AIFS, CWmin, CWmax, and the largest value of TXOP to acquire the first probability
in term of channel access functions, and the lowest priority is vice versa, as illustrated in
Figure 4 (Kim et al., 2006).
Fig. 4. Different IFS values in IEEE 802.11e EDCA (Kim et al., 2006)
Fig. 5. The Target Beacon Transmission Time (TBTT) interval of IEEE 802.11e HCF frame
(Cicconetti, 2005)
Fig. 6. Proposed Cross Layer Design of Wireless LAN for Telemedicine Video Transmission
We utilize H.264/SVC as a video coding technique in application layer due to this standard
has an ability to support current technologies such as digital television, animated graphics,
and multimedia application. In addition, its implementation utilizes relatively low bit rate in
wireless network so it could be accessed easily by heterogeneous mobile users.
In datalink layer, we utilize a new MAC layer coordination function in datalink layer of OSI
layers to provide QoS support, namely HCF (Hybrid Coordination Function). The HCF
consists of two channel access method, namely The Enhanced Distributed Channel Access
(EDCA) and HCF Controlled Channel Access (HCCA).
In physical layer, we utilize IEEE 802.11g standard which is currently available in many
wireless LAN devices. This standard operates in 2.4 GHz radio band and supports a variety
of modulations and data rates so that it can operate with its predecessor such as 802.11a and
802.11b (Labiod et al., 2007).
Parameter Value
Application Layer
Video coding H.264/SVC
Datalink Layer
Slot time 20 µs
SIFS 10 µs
Data rate 54 Mbps
Basic rate 6 Mbps
Parameter for queue 0
AIFS 2
CWMin 7
CWMax 15
TXOP 3.008 ms
Parameter for queue 1
AIFS 2
CWMin 15
CWMax 31
TXOP 6.016 ms
Parameter for queue 2
AIFS 3
CWMin 31
CWMax 1023
TXOP 0
Parameter for queue 3
AIFS 7
CWMin 31
CWMax 1023
TXOP 0
Physical Layer
Frequency 2.472 GHz
Preamble length 96 bits
PLCP header length 24 bits
PLCP data rate 6 Mbps
Table 4. Simulation parameters for the proposed cross layer design (the second step)
Then, the SVC video is compared with others. In this step we only utilize one QSTA and one
QAP.
In the second step, there are four kinds of traffic flows between QSTA and QAP delivered over
the proposed cross layer design. First flow is VoIP traffic at 64 Kbps data rate over UDP
protocol and constitutes the highest priority. Second flow is video traffic in which we utilize a
“Sony Demo” SVC video over UDP protocol and constitutes the second highest priority. Third
flow is CBR traffic at 125 Kbps data rate over UDP protocol and constitutes the third highest
priority. Forth flow is FTP traffic at 512 Kbps data rate over TCP protocol and constitutes the
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 13
lowest priority. The simulation parameters utilized in this step are shown in Table 4. In this
step, we utilize five QSTAs and one QAP to increase traffic in the wireless LAN.
Third step, four traffic flows are delivered over the original IEEE 802.11b wireless LAN. First
flow is VoIP traffic at 64 Kbps data rate over UDP protocol. Second flow is video traffic in
which we utilize a “Sony Demo” SVC video over UDP protocol. Third flow is CBR traffic at
125 Kbps data rate over UDP protocol. Forth flow is FTP traffic at 512 Kbps data rate over
TCP protocol. In this step, we also utilize five QSTAs and one QAP to increase traffic in the
wireless LAN.
Parameter Value
Application Layer
Video coding H.264/SVC
Datalink Layer
Service Interval (SI) 20 ms
Mean Data rate 10 Mbps
Nominal SDU size 1500 byte
Maximum SDU size 2132 byte
SIFS 10 µs
PIFS 30 µs
CWMin 31
CWMax 1023
TXOP 8.16 ms
Physical Layer
Frequency 2.472 GHz
Preamble length 96 bits
PLCP header length 24 bits
PLCP data rate 1 Mbps
Table 5. Simulation parameters for the proposed cross layer design (HCCA simulation
model)
14 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Fig. 7. The IEEE 802.11e EDCA Prototype consists of Wireless AP and wireless station
Table 7 shows Madwifi WMM/WME parameter [36] utilized in wireless AP and wireless
station in which we can observe that video and voice traffic flows have smaller CWmin,
CWmax, and AIFS values and higher TXOP values. Thus, the video and voice traffics will
have greater probability of gaining access to the wireless medium.
To perform live video streaming application during experiments, we assign the wireless AP
as a streaming server utilizing VLC software (VLC, 2009). The VLC software is also installed
in the wireless station to display the live video streaming application. Then, the Foreman
QCIF video is delivered over wireless LAN and the wireless station will display the
Foreman QCIF video streaming utilizing the VLC media player.
All experiments performed consist of two steps. First step, we activate the WMM/WME
(WiFi multimedia / WiFi multimedia extension) feature of Madwifi driver on the IEEE
802.11e EDCA prototype. Furthermore, this experiment is begun with FTP and Ping
application running firstly, namely from t = 0 s to t = 4.3 s. Beginning at t = 4.3 s, the
Foreman QCIF video streaming flow is begun and begins competing for channel access with
the previous applications. Finally, at t = 16.46 s, the live video streaming finishes and the
other applications also follow to finish after that.
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 15
Specification Description
Wireless Access Point
Personal Computer (PC) Dell PC with Intel Pentium IV 2.4 GHz
Operating System (OS) Debian 4 Linux OS
Wireless Ethernet TP-LINK TL-WN551G
Wireless device driver Madwifi
Applications VLC server, Proftp server, ping
Frequency 2.412 GHz
Data rate 54 Mbps
Wireless Station
Personal Computer (PC) Dell PC with Intel Pentium IV 2.4 GHz
Operating System (OS) Debian 4 Linux OS
Wireless Ethernet TP-LINK TL-WN551G
Wireless device driver Madwifi
Applications VLC client, Firefox browser, Wireshark
Frequency 2.412 GHz
Data rate 54 Mbps
Table 6. Specifications of the IEEE 802.11e EDCA Prototype
Fig. 8. The throughput values of five different video flows over The IEEE 802.11e EDCA
wireless network
Figure 9 shows the throughput values of four flows with different priorities over the
proposed cross layer design. We can observe that the voice and video flows acquire the
assigned throughput, namely 64.13 Kbps and 309.59 Kbps respectively. In the Figure 9, the
high priority streams look stable during their transmission over wireless LAN. This can
happen due to EDCA scheme associates voice and video packets with access category 1
(AC1) and access category 2 (AC2) respectively so it give more channel access opportunities.
In the EDCA scheme, the AC1 and AC2 have higher priority and the AC1 and AC2 are
assigned with smaller CWmin, CWmax, and AIFS and longer TXOP to influence the
successful transmission probability.
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 17
Fig. 9. The throughput values of four flows with different priorities over the proposed cross
layer design.
Fig. 10. The throughput values of four flows over the conventional IEEE 802.11b wireless
network
18 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Figure 10 shows the throughput values of four flows in which there are not priorities over
the conventional IEEE 802.11b wireless network. We can observe that the VoIP flow has the
same throughput as the FTP flow. It indicates that the delay-constrained VoIP flow
competes with the non-delay-constrained FTP flow to acquire the available bandwidth. This
is can happen due to there are not priorities in the wireless medium, so every traffic flow
will contends each other to access to the wireless medium.
Table 8 shows the average throughput values of four flows for every video coding technique
over the proposed cross layer design. We can observe that VoIP, CBR, and FTP flows are
similar in term of average throughput for five video coding techniques. Furthermore, the
H.264/SVC video has the lowest throughput compared with the other video coding
techniques.
Table 9 shows the average throughput, delay and packet loss values of video flow for every
video coding technique over the proposed cross layer design. We observe that the proposed
cross layer design delivers 99.68 percent of video packets within average delay of 10.66 ms.
Furthermore, the proposed cross layer design has the lowest packet loss value than the
previous solutions such as Static Mapping and Adaptive Cross Layer Mapping (Lin et al.,
2009). Thus, this proves that the proposed cross layer design fits to be utilized very
acceptably in telemedicine application.
Table 8. The average throughput values of four flows for every video coding technique
Table 9. The average throughput, delay and packet loss values of video flow for every video
coding technique
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 19
Fig. 11. The throughput values of SVC video flow over HCCA downlink, HCCA uplink, and
EDCA
Fig. 12. The delay values of SVC video flow over HCCA downlink, HCCA uplink, and
EDCA
20 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Table 10. The throughput, delay and packet loss values of video flow over HCCA downlink,
HCCA uplink, and EDCA link
500
450
400
350
Delay (ms)
300
250 Video Flow
200
150
100
50
0
4.30
4.58
5.06
5.89
6.66
7.61
8.43
9.28
10.10
11.41
12.37
13.23
14.12
15.08
15.96
Time (second)
1000
950
900
850
800
750
700
650
Delay (ms)
600
550
500 Video Flow
450
400
350
300
250
200
150
100
50
0
8.91
9.2
9.63
10.4
11.2
12
12.9
13.7
14.6
15.4
16.4
17.3
18.2
20.1
20.9
Time (second)
flow in which video packets are assigned with smaller CWmin, CWmax, and AIFS values
and higher TXOP values.
Figure 14 shows throughput value of video streaming flow over the original IEEE 802.11g
wireless LAN in which we do not activate the EDCA scheme in the datalink layer. From t =
20.02 s to t = 20.25 s, the throughput decrease deeply below 100 Kbps, while the average
throughput value is 292.02 Kbps. We can observe that the bit rate requirement vary widely
over time for the video flow. At this duration, we can see that the video streaming
experiences delay for the moment. This is can happen due to there are not priorities in the
wireless medium, thus video traffic flow will contends with other flows to access the
wireless medium.
Figures 15 shows delay experienced by video flow over our IEEE 802.11e EDCA prototype
in which the average delay value is 36.09 ms. The IEEE 802.11e EDCA prototype reduces the
delay to the minimum level, indicating that video packets are transmitted almost
immediately. At t = 10.85 s, the delay increase greatly towards 431.99 ms, while the
maximum delay value allowed is 100 ms. Then, the packet loss value experienced by video
flow is 4.71 % and this is still in QoS provision.
Figures 16 shows delay values for video flow over the original IEEE 802.11g wireless LAN in
which the average delay value is 37.17 ms. Due to video traffic has the same priority as other
applications, it results in greatly increased video packet delays. This is mainly due to all
packets competing with each other without restraint to acquire the shared channel medium.
At t = 20.02 s, the delay increase greatly towards 942.7 ms and this is greater than the delay
in our IEEE 802.11e EDCA prototype. Then, the packet loss value experienced by video flow
is 7.48 % and this is out of QoS provision.
6. Conclusion
In this paper, we have implemented a proposed cross layer design of wireless LAN to deliver
four traffic flows of telemedicine application with different priorities and to assign
telemedicine video with QoS guarantee simulated in NS2 environment and implemented in
IEEE 802.11e EDCA prototype. The NS2 simulation models are divided into EDCA and HCCA
simulation respectively based on the channel access method, namely EDCA and HCCA in the
datalink layer. Results of NS2 simulations and experiments of the IEEE 802.11e EDCA
prototype prove that the cross layer design of wireless LAN is able to support telemedicine
application acceptably during its transmission over wireless LAN based on Quality of Service
(QoS) provision. Thus, the new design has a potential to be utilized in telemedicine system.
7. Acknowledgement
This work is fully support by Ministry of Science, Technology and Innovation (MOSTI)
Malaysia under grant of Science Fund Vot No. 79196. The authors would like to thank to
Research Management Centre (RMC) Universiti Teknologi Malaysia (UTM) for their support.
8. References
Al-Taei, M. (2005). “Telemedicine needs for multimedia and integrated services digital
network (ISDN)”, Proc. ICSC Congress on Computational Intelligence Methods
and Applications, IEEE, Amman, Jordan.
24 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Ansel, P.; Ni, Q.; and Turletti, T. (2006). “ FHCF: A Simple and Efficient Scheduling Scheme
for IEEE 802.11e Wireless LAN”, Mobile Networks and Applications, 11, 391-403,
Springer Netherlands.
Auwera, G.; and Reisslein, M. (2009). “Implications of Smoothing on Statistical Multiplexing
of H.264/AVC and SVC Video Streams” IEEE Transactions on Broadcasting,
55(3):541-558.
Auwera, G.; David, P. T.; and Reisslein, M. (2008). “Traffic and Quality Characterization of
Single-Layer Video Streams Encoded with H.264/MPEG-4 Advanced Video
Coding Standard and Scalable Video Coding Extension”. IEEE Transactions on
Broadcasting, 54(3):698-718.
Bourawy, A. A. (2008). “Scheduling in IEEE 802.11e Networks with Quality of Service
Assurance”, Master of Science, Queen’s University, Canada.
Cabral, J.J. and Kim, Y. (1996). “Multimedia systems for telemedicine and their
communications requirements”, IEEE Communications Magazine.
Cicconetti, C.; Lenzini, L.; Mingozzi, E. Stea, G. (2005) “A Software Architecture for
Simulating IEEE 802.11e HCCA”, Proc. 3rd Internet Performance, Simulation,
Monitoring and Measurement IPS-MoMe 2005 March 14-15, Warsaw (Poland).
Chen, Y.; Feng, J.; Lo, K. T.; Zhang, X. (2008). “Wireless Multimedia Systems: Cross Layer
Considerations”, Taylor & Francis Group, LLC.
Choi, L.U.; Kellerer, W.; Steinbach, E. (2006). “On Cross-Layer Design for Streaming Video
Delivery in Multiuser Wireless Environments”, EURASIP Journal on Wireless
Communications and Networking.
Chorbev, I.; Mihajlov, M.; Jolevski, I. (2008). “WiMAX supported telemedicine as part of an
integrated system for e-medicine”. Proc. 30th International Conference on
Information Technology Interfaces, IEEE, Dubrovnik.
Gibson, O.J.; Cobern, W.R. Hayton, P.M. and Tarassenko, L. (2003). “‘A GPRS mobile phone
telemedicine system for self-management of type 1 diabetes”, Proc. 2nd IEEE
EMBSS Conference on Biomedical Engineering and Medical Physics, Birmingham.
Ke, C. H. (2006). http://140.116.72.80/~smallko.
Kim, H.; Hou, J. C.; Hu, C.; and Ge, Y. (2006) “QoS Provisionings in IEEE 802.11-complaint
Networks”, Elsevier.
Kim, S. W. (2006). “Cross-Layer Scheduling Algorithm for WLAN Throughput
Improvement”, Springer-Verlag Berlin Heidelberg.
Kim, H.; Hou, J. C.; Hu, C.; and Ge, Y. (2006) “QoS Provisionings in IEEE 802.11-complaint
Networks”, Elsevier.
Ksentini, A.; Naimi, M.; and Gueroui, A. (2006). “Toward an Improvement of H.264 Video
Transmission over IEEE 802.11e through A Cross-Layer Architecture”, IEEE
Comm. Magazine.
Kugean, C.; Krishnan, S. M.; Chutatape, O.; Swaminathan, S.; Srinivasan, N.; and Wang, P.
(2002). “Design of a mobile telemedicine system with WLAN, Proc. Asia-Pacific
Conference on Circuits and Systems’, IEEE, Singapore.
Labiod, H.; Afifi, H.; and Santis, C. (2007). “Wi-Fi Bluetooth Zigbee WiMAX”, Springer.
Li, W. (2001). “Overview of Fine Granularity Scalability in MPEG-4 Video Standard”, IEEE
Transaction on Circuits and Systems for Video Technology.
Cross Layer Design of Wireless LAN for Telemedicine Application Considering QoS Provision 25
Lin, C.-H.; Shieh, C.-K.; Ke, C.-H.; Chilamkurti, N. K.; and Zeadally, S. (2009). “An adaptive
cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e
WLAN”, Telecommunication Systems, 42, 223-234. Springer Netherlands.
Ling, L.; Dezhong, Y.; Jianqig, L.; Bin, L.; Ling, W. (2005). “A multimedia telemedicine
system”, Proc. 27th Annual International Conference of the Engineering in
Medicine and Biology Society, IEEE.
Madwifi Project, (2009). http://madwifi-project.org/
Nanda, P.; and Fernandes, R. (2007). “Quality of Service in Telemedicine”, Proc. First
International Conference on the Digital Society, IEEE.
Ng, H S; Sim, M L; Tan, C M; and Wong, C C. (2006). “Wireless Technologies for
Telemedicine”, BT Technology Journal, Vol 24 No 2.
Ni, Q.; Turletti, T. (2004). “QoS Support for IEEE 802.11 Wireless LAN”. http://www-
sop.inria.fr/planete/qni/ 802.11 QoS_qni.pdf
Pandian, P. S.; Safeer, K. P.; Shakunthala, D. T.; Padaki, V. C. (2007). “Internet Protocol
Based Store and Forward Wireless Telemedicine System for VSAT and Wireless
Local Area Network”, Proc. International Conference on Signal Processing,
Communications and Networking, IEEE, Chennai.
Pavlopoulos, S.; Kyriacou, E.; Berler, A.; Dembeyiotis, S.; Koutsouris, D. (1998). “A novel
emergency telemedicine system based on wireless communication technology-
Ambulance”, IEEE Transactions on Technology in Biomedicine, vol.2, no.4, p.261 –
267.
Schaar, M. van der; Krishnamachari, S.; Choi, S.; and Xu, X. (2003). “Adaptive Cross-Layer
Protection Strategies for Robust Scalable Video Transmission Over 802.11 WLANs”,
IEEE Journal on Selected Areas in Communication.
Schaar, M. van der; Andreopoulus, Y.; and Hu, Z. (2006). “Optimized Scalable Video
Streaming over IEEE 802.11a/e HCCA Wireless Networks under Delay
Constraints”, IEEE Transaction on Mobile Computing.
Schierl, T.; Stockhammer, T.; and Wiegand, T. (2007). “Mobile Video Transmission Using
Scalable Video Coding”, IEEE Transactions on Circuits and Systems for Video
Technology, Vol 17 No 9.
Schwarz, H.; Marpe, D.; and Wiegand, T. (2007). “Overview of Scalable Video Coding
Extension of The H.264/AVC Standard”, IEEE Transactions on Circuits and
Systems for Video Technology, Vol 17 No 9.
Sudhamony, S.; Nandakumar, K.; Binu, P.; and Niwas, S. (2008). “Telemedicine and tele-
health services for cancer-care delivery in India”, IET Communications, vol.2, no.2,
p. 231 – 236.
Supriyanto, E.; Satria, H.; Mulyadi, I. H.; Putra, E. H. (2009). “A Novel Low Cost
Telemedicine System Using Wireless Mesh Network”, 3rd SEATUC Symposium.
Tan, Y. E.; Istepanian, N.P. and R.S.H. (2006). “Fragility Issues of Medical Video Streaming
over 802.11e-WLAN m-health Environments”, Proc. the 28th IEEE EMBS Annual
International Conference.
Trace Files, (1993). http://trace.eas.asu.edu/TRACE/ltvt.html.
VLC Media Player, (2009). http://www.videolan.org/vlc/
26 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
Xiaohui, X.; Ruxu, D.; Lining, S.; and Zhijiang, D. (2007). “Internet based telesurgery with a
bone-setting system”, Proc. IEEE International Conference on Integration
Technology, Shenzhen.
Yoo, S.K.; Jung, S. M.; Kim, B. S.; Yun, H. Y; Kim, S. R.; Kim, D. K. (2005). “Prototype Design
of Mobile Emergency Telemedicine System”, Proc. Computational Science and Its
Applications, Springer, Berlin.
Yoon, H. (2006). “Test of Madwifi-ng WMM/WME in WLANs, NML-technical report-UM
group.
Wireshark, (2009) http://www.wireshark.org/download.html.
2
1. Introduction
Evolution from wired to wireless communication systems has brought great advantages to
healthcare services. Mobility support function for e-Health applications gives practitioners,
medical centres, and hospitals new tools for managing patients’ care, electronic records, and
medical billing to ultimately enable patients to have a higher control of their own well
being. E-Health and health care services are information based, hence better utilisation of
information has the potential to make services more integrated, can enhance patient safety
and accountability. These will have a positive impact and will increase patient’s acceptance
of the services. In order to make e-Health applications more integrated and acceptable for
the users it is needed to improve their efficiency. All the above motivated us to research
within area of wireless standards and their interconnectivity in order to provide efficient,
reliable, and robust service and eliminate connectivity boundaries for e-Health applications.
In this chapter, focus is on the development and investigation of novel technologies which
would allow efficient and reliable healthcare by utilising the latest wireless technologies.
More specifically, research methodology and ideas, which consider the use of wireless
broadband systems, commercial (such as WiFi, WiMAX) and military (such as HIDL, Link
11), in real-life healthcare scenarios are proposed and studied.
IPv4 is the most common network layer protocol and uses a 20 byte header for all its
packets. While this works for networks such as Ethernet which can communicate packets up
to 1500 bytes long, it will not work for networks such as Link 11 which is only capable of
sending 6 byte packets. The computers/people generating the information do not know or
think about the transmission method or protocol that is used to exchange the information
only that they are able to reproduce the source data at the destination. There may be some
requirements on the data such as priority, latency or data-rate, but as long as the
communications medium is able to support this it does not matter how the information is
transported. For the purposes of e-Health service all user data could be arranged into the
three categories: Real time traffic, Priority and Best Effort.
While there may be more subcategories that these types of traffic can be divided into for the
purposes of this research only these should be addressed. Real time traffic (such as audio or
video) has low latency and minimum data rate requirements. If the latency increases or the
data rate decreases too much then the information becomes unusable. Priority traffic (such
as situational awareness updates) is typically of fixed size and has low latency, high
guarantee requirements. Finally best effort traffic (such as email or file transfer) does not
have any specific quality of service requirements. Therefore for each data link not only
description of how to transfer digital user data is important but also how to try and provide
quality of service requirements.
This subsection briefly outlines the characteristics of each data-link and its operation,
including the message formats. In the next subsections an explanation is given on why and
how to transport digital user data over the various data links. After explaining how each
data link works and how to implement a network management system capable of
supporting e-Health ‘network-of-networks’ the translation of information between each
network will be provided and ensure compatibility on such matters as addressing and
quality of service by creating an overarching network management system (NMS) separate
from the individual NMSs on each network .
Note that an IP network does not guarantee that packets received at a destination will be
received in the same sequence they were sent. It is the responsibility of the transport layer
(for those transport layers that do guarantee data order such as TCP) or the application layer
(if it is using a datagram protocol such as UDP) to handle mis-ordered packets.
Addressing
The pivotal role of IPv4 is that it provides a standard method of addressing which is used
throughout the Internet. In fact, without it, the Internet would probably not exist as we
know it today. IPv4 addressing is very similar to postal addressing; everyone has a house
number, a street, a city and a country. The only difference in IP is that the information is
ordered differently, an IPv4 address consists of 4 bytes which are typically written as
AAA.BBB.CCC.DDD with the A’s in essence denotes the country, B the city, C the street and
D the house number. This subdivision of the address into 4 ‘octets’ allows the Internet to be
broken down into lots of networks of networks to facilitate with routing. Simplistically: two
computers with the same A, B and C numbers will be on the same small local network, two
computers with the same A and B but different C numbers will be in the same larger wide
area network but different local networks, and finally two computers with just the same A
numbers will probably be in the same country but on physically separated networks.
Routers within this ‘network-of-networks’ can use subnet masks therefore to decide if they
need to route a packet internal or external to the network. These subnet masks determine
this via checking the source and destination addresses against the mask and if they are
different then the packet is for a destination external to the network and if they are the same
then it is for somewhere internal to the network. For example a typical IPv4 source address
might be 192.168.20.5 and a destination address 192.15.34.140, if the router operates a subnet
mask of 255.255.0.0 then the router will compare the first and second octets and if they are
the same then route the packet within the network, but if they are different (as in this case)
the packet is routed to the external gateway and to the correct network. The octets matching
the subnet mask are referred to as the Network ID and the rest of the octets are the Host ID,
in the example above the source address has a network ID of 192.168 and a host ID of 20.5.
We will return to this notion of IP addresses and subnet masks later, as a mechanism for
subdividing the ‘network-of-networks’ and thus addressing packets between different data
link networks.
Header
The IPv4 header is outlined below in the table 4.1 below.
HIDL Overview
HIDL was designed to provide a near real time, high integrity data communications link
between multiple nodes within an Unmanned Aerial Vehicle community. It sends command
and control information from a ground station to multiple UAVs in the air. It also allows the
UAVs to send information from the air to other UAVs or ground receivers.
This network can have a maximum of 5 active transmitters in the network at any one time.
This effectively means 1 timing master (base station) and 4 network entrants (client units).
However as explained later there can be multiple receive only passive terminals that are
capable of one way communication.
Time Architecture
HIDL uses a time division mechanism to packetize the data to be transmitted, i.e. a packet of
information is transmitted at a known rate (the period of the time division). The HIDL time
structure divides the time domain into contiguous periods of 10ms - termed Timeslots. A
group of 100 contiguous timeslots is termed an epoch, which is equivalent to a period of one
second. These epochs are repeated every second, and therefore the timeslot allocation is
repeated every second. It is essentially a broadcast architecture and therefore each receiver
is capable of receiving every packet transmitted in an epoch as long as it is in range, and
therefore while there is only ever one transmitter per timeslot there maybe multiple
receivers.
As a result of this scheme multiple QoS schemes cannot be assigned to a timeslot as there is
no data packet processing performed within the system, instead only bandwidth (timeslot
allocation) is the only variable. Therefore voice, text and video packets are treated
identically within the HIDL network; it is up to the operator to provide the required levels
of network resources to meet the demands of the application. This is in contrast to Link 16
which can provide contention access as well as the dedicated access scheme which is used in
HIDL. Ultimately this will mean that while real-time, priority and best effort traffic will be
transported with the same level of QoS the anticipated amount of each type of traffic will be
used to calculate the timeslot allocation.
decomposition. Otherwise it could use a Network Address Translation (NAT) router that
will convert the traffic to a unicast address via a Port number. While performing NAT over
HIDL and ‘network-of-networks’ is possible, explanation of its functionality is outside the
scope of this research.
Relay
HIDL provides the ability for one terminal within the network to act as a relay for other
terminals too far away from the source terminal to hear its communication. As all terminals
are part of the same network it is up to the network manager to ensure that there are
sufficient resources (timeslots) for the relay terminal to pass on any messages destined for
terminals out of range of the transmitter. However if there are not enough timeslots
available to the relay to pass on the packets within an epoch some packets will get dropped.
The relay unit also provides time synchronization for the nodes out of range of the ground
control station, thereby ensuring that all nodes throughout the extended network are
operating on the same global time structure.
Receive only units
HIDL allows for portable units to be used in receive only mode, which means that they are
capable of receiving all of the messages communicated throughout the network but unable
to respond. In an operational environment it is envisaged that there will be multiple ground
units with these receive only terminals. This therefore means that when these ground
terminals are networked to other networks as part of a larger system there will be more
ways of communicating in one direction than the other.
HIDL Network Management System
Each network entrant must first communicate with the timing master in order to fully
synchronise itself prior to any node-to-node communication. This process provides a
registration mechanism that the network manager can use to ascertain which terminals are
actively participating. The five network management timeslots already provide each client
with a list of those active client nodes within the network and what their addresses are. This
enables all active and passive nodes in the network to continuously have an up to date list of
all active participants in the network (obviously the passive nodes are not able to declare
their existence).
Resource allocation (time slots) are managed and allocated by the timing master (control
station) and are fixed for the duration, unless the timing master issues a new timeslot
assignment. This means that any node requiring more bandwidth will have to send a
request to the network manager at the base station who will modify the timeslot allocation
scheme and issue a new one.
There is no defined protocol inherent within HIDL to accomplish a change in timeslot
structure, this must be done by sending over the air data messages to the controlling
computer at the timing master who will then provide the timing master HIDL unit with a
new timeslot allocation and instruct it to distribute it to all the nodes who will then adopt it.
As these messages go over the data interface they must be compatible with the formats of
messages being used for ‘network-of-networks’ traffic over HIDL and be identifiable to the
timing master control computer that it is a resource request message. It is the
recommendation of this research project to not use a separate or unique message structure
for identifying these packets, but instead use a pre-existing mechanism such as UDP port
numbers for identification. As long as the length of the packet is less than the maximum
Novel Wireless Communication Protocol for e-Health Applications 35
value that can be transmitted in one timeslot it does not matter how big the packet is, as
only one packet can be transmitted in any one timeslot regardless of size.
It is also proposed that all circuits denoted for use by ‘network-of-networks’ compatible
terminals be set to the broadcast mode, meaning that all packets transmitted by a ‘network-
of-networks’ HIDL terminal will be received by all of the other ‘network-of-networks’ HIDL
terminals, it will be up to each destination computer/router to decide whether or not to
forward or drop the packet. There are two possible methods of implementing ‘network-of-
networks’ over HIDL with regards to resource allocation. The first involves allocating only
one circuit to each HIDL terminal for ‘network-of-networks’ traffic. The second involves
allocating ‘cross-over’ nodes two circuits; the first is used to carry traffic internal to the
network and the second for traffic destined for outside the network (effectively ‘cross-over’
to ‘cross-over’ communication). The second method will provide the network manager
computer with more information that it can use to allocate the timeslots and balance the
amount of network-to-network traffic against internal traffic. Discovery of the most effective
method and resource allocation algorithm will be investigated in simulation.
HIDL Node Attrition Strategy
The HIDL network is very similar in format to a WiFi network: it requires a central base
station to provide timing and network management but individual client units can talk to
each other. All HIDL radio equipment is identical whether the node is to be a timing master,
an active node, a relay or a passive node; therefore any node can be chosen to perform the
timing master’s role. It is advisable to choose a node within range of all other terminals, so
as to allow synchronisation. If a node is too far away but covered by a relay node then the
relay node must be in the range of the timing master. As any node can take on this role of
timing master it is proposed to use the same recovery process as was outlined above in this
section. Although the given scheme, will provide the ability for timing master to take over it
should be noted that HIDL was designed to be a UAV Command and Control data link. As
such nodes could lose contact with the timing master as a result of their location rather than
the loss of the timing master. If a node falls out of link there are mechanisms such as a ‘re-
acquisition strategy’ that are performed to account for this.
Therefore it is not advised that another UAV automatically assume that the timing master
has been lost and adopt its functionality, instead like WiMAX (where the role of the base
station is restricted to a few units) the adoption of the timing master role should only be
performed by a ground unit who should be more capable of making this assessment.
Link 16 Description
Link 16 Overview
Link 16 is one of the military’s Tactical Data Links, which is to say it is primarily used to
communicate tactical information between units or platforms in the battle space. This
research is not aiming to investigate the benefits to be obtained from changing the
equipment, but rather the benefits that could be obtained by modifying the operational use
of the Link 16 standard.
Packet Format
Link 16 messages can be transmitted using either Double Pulse (DP) or Single Pulse (SP)
encoding. Double pulse operation sends the same symbol packet using two pulses rather
than the one used for single pulse operation. This means single pulse packets can send more
36 Advances in Telemedicine: Technologies, Enabling Factors and Scenarios
data per timeslot than double pulse packets but the probability of reception is reduced.
There are 4 different formats a Link 16 message can take Standard, Packed-2 SP, Packed-2
DP and Packed- 4 SP. A standard message can send 225bits/timeslot, both Packed-2 formats
can send 450bits/timeslot and the Packed-4 can send 900 bits/timeslot. As there are 128
timeslots per second this gives us a data rate of 28.8, 57.6 and 115.2Kbps respectively. These
numbers also depend on whether or not Error Detection Coding (EDC) is used, however
this research will not be investigating their use, instead we will only use formats that do use
EDC.
Each transmission in a timeslot is preceded by a Link 16 header which tells the receiver how
to decode the data portion by identifying the packet format (Packed-2, Packed-4 etc), the
message format (free text or fixed format), encoding (i.e. Reed Solomon) the transmitting
terminal and if the message has been relayed.
There are two message formats used in Link 16: Free Text and Fixed Format. Free text
messages within Link 16 do not need to follow any defined message structure; this is how
voice, ASCII text and video are passed over JTIDS. Fixed format messages though need to
follow the Link 16 message structure (J-Series Messages).
Access Methodologies
Link 16 operates a Time Division Multiple Access scheme (TDMA), which means that all
units operating within a Link 16 network are synchronised in time and transmit and receive
at predefined times.
It uses 12.8 minute epoch which is divided into 98,304 timeslots. However, this is a little
unwieldy so it is broken down into 64 frames, each 12 seconds long. Each frame contains
1536 timeslots and these are used when allocating timeslots to terminals. All the timeslots in
the scheme are allocated by the network manager to individual units for transmission. As all
nodes know the timeslot allocation the receivers know when they should listen to receive
data from any given transmitter. By increasing or decreasing a unit’s timeslot allocation you
are effectively changing the maximum transmission bandwidth/data-rate of the unit.
Currently timeslots are first labelled according to their Network Participation Group (a
mechanism for receivers to use to determine in which timeslots they need to listen) then
allocated to units. This mechanism allows us to easily define a new Network Participation
Group (NPG) for ‘network-of-networks’ network data, which will allow ‘network-of-
networks’ to use existing hardware and maintain operational compatibility with existing
systems. Those terminals not equipped to take part in the data network will not listen and
will not take part in the networked data NPG and therefore will not receive any ‘network-
of-networks’ packets and be unable to decode them. Again at the receiver, messages are
output with a header defining in which NPG the packet was received in thereby allowing
terminals to clearly identify ‘network-of-networks’ traffic from other traffic being received
from the network. Users interact with Link 16 terminals by sending messages to the terminal
with a header defining in which NPG the message is to be transmitted. The terminal is then
left to broadcast the message in the appropriate timeslot. An interesting result of using
NPGs is that the sender does not necessarily have to know who the receivers are or the route
to the destination, and as it is a broadcast system, the sender can take for granted that the
same timeslot allocation table has been distributed and therefore that all receivers it wants
to talk to are listening in for its transmissions.
Currently Link 16 systems distribute Precise Participant Location and Identification (PPLI)
messages to organise sender, receiver and route information (at least once every 12 seconds).
Another Random Scribd Document
with Unrelated Content
Lyveth ayens the byleyve,
And no lawe kepeth;
And hath no lykynge to lerne,
Ne of houre Lord hure,
Bote harlotrie other horedom,
Other elles of som wynnyng.
Wan men carpen of Crist
Other of clennesse of soule,
He wext wroth, and wol not huyre
Bote wordes of murthe,
Penaunce and povre men,
The passion of seyntes,
He hateth to huyre therof
And alle that therof carpen.
Thuse beth the braunches, be war,
That bryngeth man to wanhope.
Ye lordes and ladyes,
And legates of holy churche,
That feden fool sages,
Flaterers and lyers,
And han lykynge to lythen hem,
In hope to do yow lawe—
Væ! vobis qui ridetis, etc.
And geveth suche mede an mete,
And povre men refusen;
In youre deth deynge,
Ich drede me sore
Lest tho maner men
To moche sorwe yow brynge.
Consensientes et agentes pari pæna punientur.
Patriarkes and prophetes,
Prechours of Godes wordes,
Saven thorgh here sermons
Mannes soule fro helle:
Ryght so flaterers and foles
Aren the fendes procuratores,
Entysen men thorgh here tales
To synne and to harlotrie.
Clerkus that knowen this,
Sholde kennen lordes
What David seide of suche men,
As the Sauter telleth:
Non habitabit in medio domus meæ qui
facit superbiam, qui loquitur
iniquum.
Sholde non harlot have audience
In halle ne in chaumbre,
Ther that wys men were.
Whitnesse of Godes wordes;
Nother a mys-prout man
Among lordes alouwed.
Clerkus and knyghtes
Wolcometh kynges mynstrales,
For love of here lordes
Lithen hem at festes:
Muche more, me thenketh,
Riche men auhte
Have beggers byfore hem,
Wiche beth Godes mynstreles,
As he seith hymself,
Seynt Johan berith whittnesse:
Qui vos spernit, me etiam spernit.
Therfor ich rede yow, riche,
Reveles when ye maken,
For to solace youre soules,
Suche mynstrales to have,
The povre for a foul sage
Syttynge at thy table,
Whith a lered man to lere the
What oure Lord suffrede,
For to savy thy saule
Fram Satan thyn enemye,
And fitayle the withoute flateryng
Of Good Friday the feste:
And a blynde man for a bordiour,
Other a bed-reden womman
To crye a largesse byfor oure Lord,
Youre good loos to shewe.
Thuse thre manere mynstrales
Maken a man to lauhe;
In hus deth deyng
Thei don hym gret comfort,
That by hus lyfe loveth hem,
And loveth hem to huyre.
Thuse solaceth the soule,
Til hymself be falle
In a wele good hope, for he wroghte so,
Among worthy seyntes,
Ther flaterers and foles
Whith here foule wordes
Leden tho that lithen hem
To Luciferes feste,
With Turpiloquio, a lay of sorwe,
And Lucifers fitele,
To perpetual peyne
Other purgatorye as wykke,
For he litheth and loveth
That Godes lawe despiteth.
Qui histrionibus dat, dæmonibus sacrificat.
3997. the rode of Lukes. The second Trin. Col. MS. has be the rode
of Chestre. There was a famous cross at Lucca, but whether a part
of the real cross, I have not ascertained. Calvin, in his most able and
entertaining Admonitio de Reliquiis, declines undertaking a list of all
the places where pieces of the real cross were shown. "Denique si
congesta in acervum essent omnia quæ reperiri possent, integrum
navis onus efficerent: cum tamen evangelium testificetur ab unico
homine ferri potuisse. Quantæ igitur audaciæ fuit, ligneis frustis sic
totum implere orbem, quibus ferendis ne trecenti quidem homines
sufficiant?" Calvini, Opusc. p. 277. There was also at Lucca one of
the impressions of our Saviour's face on the handkerchief of
Veronica. The peculiar oath of William Rufus was by the holy face at
Lucca.
4154. In the second Trin. Col. MS. the passage stands as follows:—
4251. Scimus enim qui dixit, mihi vindicta, et ego retribuam. Paul. ad
Heb. x, 30; conf. Paul. ad Rom. xii, 19.
4390. ripe chiries manye. This passage, joined with the mention of
cherry-time in l. 2794, shows that cherries were a common fruit in
the fourteenth century. "Mr. Gough, in his British Topography, says
that cherries were first brought in by the Romans, but were
afterwards lost and brought in again in the time of Henry VIII, by
Richard Harris, the king's fruiterer; but this is certainly a mistake.
When in the New Forest in Hampshire in the summer of 1808, I saw
a great many cherry-trees, apparently, of much more considerable
age than the time of Henry VIII. The very old trees were universally
of the kind called merries." H. E.
4659. Ps. xxxvi, 25. Junior fui, etenim senui: et non vidi justum
derelictum, nec semen ejus quærens panem.
4695. Here again, after many verbal variations from our text,
Whitaker's text adds the following long passage, which is very
curious, and well worthy to be preserved. Whitaker calls it "one of
the finest passages in the whole poem."
4941. Prov. xxiv, 16. Septies enim cadet justus, et resurget; impii
autem corruent in malum.
5014. if I may lyve and loke. Price (in Warton) first pointed out the
identity between this expression and the one so common in Homer:
it is "one of those primitive figures which are common to the poetry
of every country."
——I've heard
Schoolmen affirm, man's body is compos'd
Of the four elements.
In Shakespeare (Twel. N. ii, 3), Sir Toby Belch inquires, "Does not
our life consist of the four elements?" and Brutus is commended for
possessing these elements properly blended, in which the perfection
of a man's nature was supposed to consist:—
On the other hand, the ill mixing of these elements was supposed to
be accompanied with a corresponding derangement of the
intellectual faculties. Thus, in one of the plays of Beaumont and
Fletcher, a madman is addressed:—
The more mythic form of this legend gives eight things to the
formation of the body, instead of four. Our earliest notice of this
legend in England occurs in the prose Anglo-Saxon Dialogue
between Saturn and Solomon (Thorpe's Analecta, p. 95):—"Saga me
þæt andworc þe Adám wæs of-ge-worht se ærusta man? Ic þe
secge of viii punda ge-wihte. Saga me hwæt hatton þage? Ic þe
secge þæt æroste wæs fóldan pund, of ðam him wæs flesc ge-
worht; oðer wæs fyres pund, þanon him wæs þæt blód reád and
hát; þridde wæs windes pund, þanon him wæs seo æðung ge-seald;
feorðe wæs wolcnes pund, þanon him wæs his módes
unstaðelfæstnes ge-seald; fifte wæs gyfe pund, þanon him wæs ge-
seald se fat and geðang; syxste wæs blostnena pund, þanon him
wæs eagena myssenlicnys ge-seald; seofoðe wæs deawes pund,
þanon him becom swat; eahtothe wæs sealtes pund, þanon him
wæron þa tearas sealte."—Tell me the matter of which Adam the
first man was made? I tell thee, of eight pound-weights. Tell me
their names? I tell thee, the first was a pound of earth, of which his
flesh was made; the second was a pound of fire, from which his
blood was red and hot; the third was a pound of wind, of which
breath was given him; the fourth was a pound of cloud, whereof was
given him his instability of mood; the fifth was a pound of ...,
whereof was given him fat and sinew; the sixth was a pound of
flowers, whereof was given him diversity of eyes; the seventh was a
pound of dew, whereof he had sweat; the eighth was a pound of
salt, whereof he had salt tears. This legend was still prevalent in
England as late as the fifteenth century, when we find it among the
curious collection of questions (closely resembling those of Saturn
and Solomon just quoted) entitled "Questions bitwene the Maister of
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
ebookbell.com