Applying wireless and mobile agent technologies for human

University of Wollongong
Research Online
University of Wollongong Thesis Collection
1954-2016
University of Wollongong Thesis Collections
2005
Applying wireless and mobile agent technologies
for human decision making in the mission critical
emergency environments
Hamidreza Pousti
University of Wollongong
Recommended Citation
Pousti, Hamidreza, Applying wireless and mobile agent technologies for human decision making in the mission critical emergency
environments, PhD thesis, School of Economics and Information Systems, University of Wollongong, 2005. http://ro.uow.edu.au/
theses/299
Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library:
[email protected]
Applying wireless and mobile agent technologies for
human decision making in the mission critical
emergency environments
A thesis submitted in fulfilment of the
requirements for the award of the degree
Master of Information Systems (Research)
from
UNIVERSITY OF WOLLONGONG
by
Hamidreza Pousti
BSc (University of Tehran)
MICT (University of Wollongong)
School of Economics and Information Systems
2005
Abstract
Emergency response tasks, both military and civilian, occur in what are termed, 'Extreme
Environments' characterised by uncertainty, high stress physical situations, and time sensitive
decision-making. Emergency response crews in such environments need to be highly mobile,
utilising a variety of advanced wireless technologies to communicate while accomplishing
their assignments. It is crucial for the users in the field to be aware of their own situation and
the situation in their vicinity to construct their own goals in coping with unpredictable
conditions. These are problems identified in the Small Unit Operation (SUO) model used by
the military in situations where people and equipment work together to meet some mission
objective. These entities may have distinct roles and information needs, and are often
geographically distributed. Moreover, other groups of users in the command and control (C2)
position need to have an overall and clear picture of the current state of the operation, at the
necessary level of detail, in order to make the proper decisions based upon different types of
information they receive and their own knowledge.
To tackle these issues, users face challenges concerned with the responsible for handling data
through volatile wireless network connections and narrow bandwidth conditions. These
conditions pose new challenges for all parties of users in terms of situation-awareness,
sensemaking, reliable decision making and consequent actions.
The aim of this research is to focus on technologies that can help decision makers in two
ways: reduce the level of environmental uncertainty, and provide better situation awareness
and sensemaking for individuals and teams in extreme environments. These technologies are
studied in the light of human sensemaking requirements and the factors contributing to
human cognitive states, especially in time critical situations.
To achieve this aim, a secondary case study was carried out to identify various user
requirements in dynamic environments, and the ways technologies can address those needs.
Results show that many new wireless technologies, such as those based on Ultra Wideband
(UWB) radio, demonstrate considerable potential for emergency response tasks
circumstances. Furthermore, software agents show potential for deployment in emergency
tasks to reduce the degree of uncertainty. Software mobile agents also show potential to
improve the accuracy and agility of operations along with the ability to deal with the volatile
wireless networks. The way decision makers understand their environmental states is vital for
the success of emergency response operations. This understanding depends on the human
capabilities of interpretation of information, as well as the memory and knowledge of
decision makers at the moment the information is received. Thus, human issues need to be
understood alongside the advances in technology. The potential contributions of the concept
of mobile agents in this area is significant, especially where software mobile agents work as
autonomous entities in order to handle the task and local decisions, on behalf of mobile
emergency response crews.
These findings draw attention to the significant role of software mobile agents working in a
meshed wireless network. They could provide an ubiquitous network in an extreme
environment. They also have the capability of supporting users' situation awareness,
sensemaking and critical decision making, vital in emergency response environments.
CERTIFICATION
I, Hamidreza Pousti, declare that this thesis, submitted in fulfilment of the
requirements for the award of Master degree, in the Department of information
systems, University of Wollongong, is wholly my own work unless otherwise
referenced or acknowledged. The document has not been submitted for qualifications
at any other academic institution.
Hamidreza. Pousti
03 August 2005
Acknowledgements
Many people supported me during the completion of this thesis with criticism, helpful
assistance, and references. This thesis would have never been possible without them. I
would like to take this opportunity to offer thanks to all of them.
Firstly, my sincere thanks go to my supervisors, Associated Professor Helen Hasan
and Professor Eryk Dutkiewicz. They have asked just the right questions at precisely
the right times. They forced me to think when I believed I had thought enough. They
gave strength to my mind, and they were always there. Helen, your time, patience and
wisdom are greatly appreciated. Your earnest and steadfast mentorship helped reveal
to me the true nature of scientific enquiry, for which you have earned my deepest
respect and gratitude.
Also I am extremely grateful to Eryk for accepting the
responsibility of being my co-supervisor. Eryk, you always steered me in the right
direction when I wasn’t certain which path to investigate and I acknowledge your
awesome helps and contribution to my Master studies.
Many thanks to the University of Wollongong, particularly Department of
Information Systems and the head of the department, Professor Peter Eklund, for
supporting my research and giving me the chance to present my research topic there
and providing me with valuable feedbacks. Likewise, I am grateful to the Faculty of
Commerce at the University of Wollongong, especially Dean of Faculty of
Commerce, Professor John Glynn and faculty's Research Manager, Mr. David
Aylward, for supporting and providing me with amazing and unique facilities at the
new Commerce Research Centre.
I owe a considerable dept of gratefulness to many friends and colleagues who filled
my life with laughter and joy throughout my Master thesis.
I owe an immense debt of gratitude to my family and my acknowledgements now
move closer to home to all my immediate and extended family. Mum and Dad, there
are no word to express my gratitude but know it was you who have been my strength
throughout. Dad (Pedaram) I am proud of you and I have had always this feeling in
my heart for every single moment. Dad, your continual interest, advises, enthusiasm
and support were my life-raft. Mum (Madaram) I learned the biggest lessens of my
life in your hug. I understood what the love is just because of you. Your love and
encouragement is my wealth.
And finally, my beloved wife, Naghmeh, for your unconditional love and support
particularly, during the times when it all seemed too hard. You are more deserving of
my thanks than anyone for bringing this thesis to end. Few people are as fortunate as I
am, however, to have a spouse who has offered not only emotional support but
intellectual support as well. Thank you for all your patience and scarifies you made in
all countless nights and weekends I spent locked away in front of computer. This
journey would not have been possible and such an amazing experience without you. I
would like to thank you for, quite simply, everything: Naghmeh, your companionship
means the world to me.
Publications and Awards
•
Pousti, H. and Hasan, H. (2005), ‘Knowledge Management through Mobile
Networks in Emergency Situations’, Proceeding of 4th International
Conference on Mobile Business, ICMB 2005, Sydney, Australia.
•
Pousti, H., Hasan, H. and Dutkiewicz, E. (2005), ‘Application of Mobile
Agents in Wireless-Based Mission Critical Emergency Operations’,
Proceeding of the 11th International Conference on Distributed Multimedia
Systems, DMS'2005, Banff, Canada.
•
Pousti H. and Dutkiewicz, E. (2005),’ Effects of wireless-based mobile agents
on the effectiveness of critical operations in extreme environments’, Accepted
paper in the 2nd International conference on Mobile Technology, Applications
and Systems, IEE Mobility 2005, Nov. 2005, Guangzhou, China.
•
Selected thesis topic from the Faculty of Commerce for the PhD Research
Commercialisation Workshop in Queensland, April 2005
Table of Contents
List of Figures
List of Tables
List of Abbreviations
1.
Introduction ........................................................................................................ 1
1.1. Introduction .................................................................................................. 1
1.2. Outline of the Thesis .................................................................................... 5
2.
Research Methodology ....................................................................................... 7
2.1. Chapter Overview ........................................................................................ 7
2.2. Introduction .................................................................................................. 7
2.3. The case for a qualitative research approach ............................................... 8
2.4. Ethnography ............................................................................................... 10
2.5. Action Research ......................................................................................... 12
2.6. Grounded Theory ....................................................................................... 15
2.7. Case Study .................................................................................................. 17
2.8. Justification for the case study used in this research .................................. 20
2.9. Limitations ................................................................................................. 27
3.
Literature Review ............................................................................................. 29
3.1. Introduction ................................................................................................ 29
3.2. Review of agent technology literature ....................................................... 30
3.2.1. Defining an agent ........................................................................... 30
3.2.2. Attributes and Characteristics of Agents ........................................ 34
3.2.3. Agent Environment ........................................................................ 40
3.2.4. Mobile Agents ................................................................................ 42
3.3. Review of public safety literature .............................................................. 58
3.4. Review of wireless technology literature ................................................... 63
3.4.1. Wireless Local Area Networks ...................................................... 63
i
3.4.2. Ad hoc Wireless Networks ............................................................. 66
3.4.3. Bluetooth ........................................................................................ 79
3.4.4. Zigbee ............................................................................................. 82
3.4.5. IEEE 802.11 ................................................................................... 87
3.4.6. Ultra Wide Band (UWB) ................................................................ 91
3.5. Review of Wearable Computing literature ................................................. 98
4.
Analysis of results ........................................................................................... 105
4.1. Introduction .............................................................................................. 105
4.2. Review of the September 11, 2001 WTC Collapse ................................. 106
4.2.1. Background .................................................................................. 106
4.2.2. First hit on the World Trade Centre ............................................. 107
4.2.3. Second hit on the World Trade Centre ......................................... 111
4.3. Case Discussion ........................................................................................ 115
4.4. Case Study Analysis ................................................................................. 120
4.4.1. Large number of users involved in the radio communication ...... 121
4.4.2. Lack of interoperability among different parties .......................... 123
4.4.3. Data traffic and network congestion ............................................ 125
4.4.4. Lack of Meta Data ........................................................................ 127
4.4.5. Network interruptions and volatility ............................................ 129
4.4.6. Problems concerning the suitability of equipment ....................... 130
4.4.7. Intelligent communication systems with autonomy ..................... 132
5.
Discussions ...................................................................................................... 136
5.1. Introduction .............................................................................................. 136
5.2. Small Unit Operation ............................................................................... 138
5.3. Mobile Agents .......................................................................................... 140
5.4. Message Routing ...................................................................................... 145
5.5. Mesh Networks ........................................................................................ 148
5.5.1. Scenario 1 (Civilian fire event) .................................................... 153
5.5.2. Scenario 2 (Dangerous area isolation) ......................................... 158
5.6. Ultra Wideband technology ..................................................................... 160
5.7. Sensor Networks ...................................................................................... 166
5.8. Agent Framework ..................................................................................... 171
ii
5.9. Human, the ultimate decision maker and actor ........................................ 178
5.9.1. Situation Awareness and Decision Making ................................. 179
5.9.2. Sensemaking in a Changing Environment ................................... 185
5.9.3. Knowledge and Sensemaking .................................................... 193
5.9.3.1. Role of Knowledge Management in the Sensemaking Process194
5.10. Chapter Conclusion ................................................................................ 197
6.
Conclusions ..................................................................................................... 198
6.1. A Summary of the Results and Conclusions ............................................ 198
6.2. Further Work ............................................................................................ 201
Bibliography
Appendixes
iii
List of Figures
3.1
Interactions between an agent and its environment ....................................... 32
3.2
Combination of primary attributes of agents .................................................. 37
3.3
The framework in which a mobile agent can move throughout a network .... 44
3.4
Classification of wireless technologies based on the coverage rang .............. 65
3.5
Parasitic mobile ad hoc WLAN ..................................................................... 67
3.6
A typical wireless bridge topology – point to point ....................................... 69
3.7
A typical wireless Star topology – Point to Multipoint .................................. 70
3.8
A typical wireless mesh topology – peer to peer ........................................... 70
3.9
A Bluetooth piconet with one master and up to 8 slave nodes ...................... 80
3.10
A Bluetooth scaternet with two masters.......................................................... 81
3.11
Different types of topologies supported by Zigbee......................................... 84
3.12
Comparison of narrowband spectrum and Ultra-wideband ............................ 92
3.13
Different wireless technologies range and data rate........................................ 98
3.14
Attributes of wearable computing devices in interaction with humans ........ 101
4.1
The area destroyed in the North Tower hit by the first airplane ................... 109
4.2
The area destroyed in the South Tower hit by the first airplane ................... 112
5.1
A mesh configuration that every node can function as a outer .................... 151
5.2
An ad hoc wireless network supported by mesh topology at the scene ........ 154
5.3
Compatibility of mesh networks and SUO ................................................... 154
5.4
Determining the location of the first responder inside the buildings ............ 156
5.5
Different public safety agencies can communicate to each other ................. 157
iv
5.6
Isolation of dangerous area to protect civilians............................................. 158
5.7
Set up a fast and reliable network instantly at the scene............................... 159
5.8
Communications scenario through UWB ..................................................... 165
5.9
RETSINA framework ................................................................................... 175
5.10
Proposed framework based on the mobile agent........................................... 177
5.11
Source of situation awareness information ................................................... 183
5.12
Cognitive Processes of an Action.................................................................. 184
5.13
Single Sensemaking Cycle ............................................................................ 192
5.14
Sensemaking cycle and linkages ................................................................... 193
5.15
The sensemaking triangle.............................................................................. 195
v
List of Tables
3.1
Comparison of different wireless topology .................................................... 72
3.2
Comparison table of Bluetooth and other wireless standards ........................ 82
3.3
Zigbee physical device types .......................................................................... 85
3.4
IEEE 802.11 different standards and their specifications .............................. 88
3.5
Comparison of 802.11a, 802.11b and 802.11g .............................................. 90
3.6
UWB specifications and applications ............................................................ 96
5.1
Comparison of different wireless topologies ............................................... 152
5.2
Pproperties of the UWB and its benefits ...................................................... 162
5.3
Comparison between different wireless standards ....................................... 164
vi
List of Abbreviations
3D
APRL
AWICS
C2
DARPA
EMS
FDNY
FFD
GPSR
ICT
IEEE
IS
KM
LAN
LPD
MANET
M-MPR
MP-MP
NYPD
OFDM
PAN
PAPD
PDA
PHY/MAC
PMP
P-MP
RAM
RETSINA
RF
RFD
ROM
RPC
SA
SEA
SUO
TCP/IP
UWB
WBAN
Wi-Fi
WLAN
WPAN
WSN
WTC
3 Dimensions
Any-Path Routing without Loops
Aircraft Wireless Intercommunications System
Command and Control
Defense Advanced Research Projects Agency
Emergency Medical Service
Fire Department of New York
Full Function Device
Greedy Perimeter Stateless Routing
Information and Communications Technology
Institute of Electrical and Electronics Engineers
Information Systems
Knowledge Management
Local Area Network
Low Probability of Detection
Mobile Ad hoc Network
Meshed Multi Path Routing
Multi Point to Multi Point
New York Police Department
Orthogonal Frequency Division Multiplexing
Personal Area Network
Port Authority Police Department
Personal Digital Assistant
Physical/Media Access
Point to Multi Point
Point to Multi Point
Random Access Memory
Reusable Environment for Task Structured Intelligent Network Agents
Radio Frequency
Reduced Function Device
Read Only Memory
Remote Procedure Call
Situation Awareness
Spokesman Election Algorithm
Small Unit Operation
Transmission Control Protocol / Internet Protocol
Ultra Wide Band
Wireless Body Area Network
Wireless Fidelity
Wireless Local Area Network
Wireless Personal Area Network
Wireless Sensor Network
World Trading Centre
vii