9

Click here to load reader

IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

Embed Size (px)

Citation preview

Page 1: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 50

IMPLEMENTATION OF AODV PROTOCOL FOR

EFFECTIVE DISASTER MANAGEMENT SYSTEM Praveen K. Sheri(1),Mahaveer Jayakkanavar(2) ,Harshavardan T.R(3)

Department of Electronics and Communication Engineering Bahubali College of Engineering, Shravanabelagola 573135

Abstract

In recent years the world has experienced a number of

catastrophic natural disasters such as earthquake, hurricane,

typhoon, tsunami, etc. Emergency communication modules in

large-scale disaster struck areas is deployed by using wireless

Ad-hoc networks which requires no centralized networks.

Message routing in a decentralized environment and

fluctuating network topology is not a well-defined problem.

The main areas of concern would be wireless link quality, propagation path loss, fading, multiuser interference, and

topological changes. This is suitably accomplished by altering

the transmitted power to use only that amount needed to

maintain acceptable signal-to-noise ratio (SNR) at receiver.

Routing is one of the key issues in MANETs due to their

highly dynamic and distributed nature. In particular, Energy

efficient routing is the most important design criteria in

MANETs since mobile nodes will be powered by batteries

with limited capacity. Power failure of a mobile node not only

affect the node itself but also its ability to forward packets on

behalf of others and thus the overall network lifetime.

Reducing the transmitted power allows spatial reuse of the

channel and thus increasing network throughput. The benefit of

power conservation for MANETs also poses the concern to

find the most power efficient way to route a packet from the

source to the destination with a high success rate. Although

establishing a temporary communication network to support

emergency communications and networking is one of the most

urgent tasks in a disastrous rescue mission, feasible technology options are very limited. We propose to use mobile units (cell

phones) owned by rescue volunteers themselves to establish

MANET to support such a need. A temporary base station is

setup near to the disaster area by extending the connection

from the nearest base station. The access Points are placed at

different places in the disaster area. These access points

connected to the temporary setup base station. The rescuers use

devices such as notebook, mobile etc whichever are available,

to communicate among them. One of the well known protocols

is AD-HOC ON DEMAND DISTANCE VECTOR ROUTING

PROTOCOL (AODV). AODV is the simplest and widely used algorithm either for wired or wireless network.

I. Introduction

Each device in a MANET is free to move independently in

any direction, and will change its links to other devices

frequently. So for a MANET, each device has to maintain the

information required to properly route traffic. Every device in

MANET acts as a router. MANETs are highly suitable for

applications involving special outdoor events, communications

in the regions with no infrastructure, emergencies and natural

disasters and military operations. One of the well known

protocols is AD-HOC ON DEMAND DISTANCE VECTOR

ROUTING PROTOCOL (AODV). AODV is the simplest and

widely used algorithm either for wired or wireless network. It

is one of the most efficient routing protocols in terms of

establishing the shortest path and lowest power consumption. It

is mainly used for ad-hoc networks a ubiquitous

communication network deployment proves to be important.

In the present generation of wireless communication

systems, there is a need for the rapid deployment of

independent mobile users. Significant examples include

establishing survivable, efficient, dynamic communication for

emergency rescue operations and disaster relief efforts e.g. the

tsunami that struck Japan during 2011, the aftermath of a

hurricane where cellular/PCS service may not be available.

Typically, emergency rescue communication is centralized,

and the network is dependent on proper function of the central controllers. If the centralized infrastructure were to fail due to a

disaster or any other reason, the network may collapse. Hence,

advances in wireless communication should aid in making

emergency preparedness systems and disaster relief networks

robust and autonomous, and provide for reliable and secure

inter-group communication.

The main advantage of Ad-hoc network is that, deployment

of network needs no fixed infrastructure. In recent years the world has experienced a number of catastrophic natural

disasters such as earthquake, hurricane, typhoon, tsunami etc.

The victims trapped in the collapsed buildings and landslides

will have a great chance of survival in case the rescue team

reaches for help in a short period of time.

We have described about the available communication

systems which have advantages on one over the other, that can be used during the catastrophic disasters, such as walkie-talkie,

emergency mobile communication systems and mobile ad hoc

networks. Here we consider MANETs can be used more

efficiently for emergency communication. The main concern

in communication or networking is the selection of best

protocol, section vii deals with AODV (ad hoc on demand

routing vector protocol) and its algorithm.

We discuss about the software part that is, the simulation which is carried out using network simulation software (NS2)-

version 2.34 on Linux platform redhat-5. The programming

language used here is TCL which is based C++ coding. The

simulations result, both animation output (NAM) and trace

graph output are given. Finally we conclude with the output of

Page 2: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 51

a sample of rescue operation using emergency communication

in catastrophic disaster struck area where centralized network

infrastructure is unavailable.

II. Challenges and System Analysis

A general mobile network consists of wireless access

networks and interconnecting backbone networks. The mobile

terminals are connected to the base stations (access points) by

wireless access networks, and the base stations are connected

to the wired backbone networks. There are drawbacks to these

systems when large-scale disasters, such as earthquakes, occur:

if the base stations or other elements of the infrastructure comprising these networks are damage by disasters,

communications may be impossible.

Even if the infrastructure is not damaged, spikes in traffic

and congestion may render communication virtually

impossible. The communication system crash posed a huge

impact as the disaster response will not be able to be initiated

due to the following reasons:

Regular rescue teams including fire fighters, police and army

are away from the disaster struck area. Transportation system

is paralyzed by broken bridges and landslides. Trained rescue

squads are misplaced to wrong areas as they were not aware of

the actual geographical scenario of disaster and divided into

isolated groups. Victims are not given medical aid at the right

time as a result of low communicative area.

Rescue operations and disaster relief scenarios cannot rely

on centralized and organized connectivity and can be termed as

wireless mobile ad hoc networks (MANETs) for emergency

telecommunication. A MANET is an autonomous collection of

mobile nodes that communicate over relatively bandwidth-

constrained wireless links. A Mobile Adhoc network for

emergency telecommunication may operate in a stand-alone

manner or be connected to a larger network. The set of

applications for emergency MANETs is diverse, ranging from small, static networks that are constrained by power sources, to

large-scale, mobile, highly dynamic networks. The design of

network protocols for these networks is a complex issue.

MANET communication module can transmit information

from a node to any other node within its radio range. If the

destination node is not within the range of the source then an

intermediate node acts as a router to route to the destination

node and is termed as hop-by-hop. In the scenario of a

catastrophic natural disaster struck area, all the centralized

networks would crash and it is difficult for victims to

communicate for finding safe zones. Deployment of MANET

in such decentralized areas is of great help. Existing mobile phones are used by the victims to furnish their condition to the

rescue team and outside world. This information is vital as

these are used to track the victims by processing the number of

hops taken by the packets to reach the rescue team and the

approximate direction. Due to low cost for development and

hectic usage environment makes the device best suited for the

communication during catastrophic disaster.

III. Causes for Communication

Systems Crash

To many people’s surprise, cellular mobile communication

systems that were thought highly dependable in emergency

were completely wiped out in many cases.

Base stations were crashed.

Trunks connecting base stations to MSCs were broken

almost everywhere, specially broken roads and

bridges (Trunks were laid along roads and bridges).

Backup power generators were out because of fuel

exhausted.

Critical hardware equipments were down because

cooling tower fell down or cooling pipes were broken.

Cell phone ran out of battery and had no way to

recharge because of power line failure or simply

chargers not available.

Communication systems were overwhelmed by

extremely huge traffic.

Threatened by so many resources of failure, it requires a miracle for a cellular mobile communication system to survive

in such a catastrophic disaster, even for a robust system with

99.9999% reliability.

IV. Available Options Of Emergency

Communication Systems

There are few options for emergency communication

systems. Various equipment vendors are offering emergency

mobile communication systems. Specially designed systems

are expensive and offer only limited number of handsets. It is

prohibitively expensive to deploy sufficient capacity for a catastrophic disaster as big as mentioned cases. In summary,

the capacity current specially designed emergency

communication systems may be able to support regular rescue

squads, but are far from sufficient for large amount of

volunteers.

Most cellular operators have emergency cellular systems that

use satellite links as backhauls and can be deployed to a demanded area in a few hours. However, there are two

problems. First, cellular operators may not have sufficient

number of such systems for catastrophic disaster. Secondly,

volunteers do not know each other and have no time to

memorize (or keep in handset) many phone numbers and may

not have handset chargers in hand.

Due to the disadvantages of these systems (viz. Walkie-

talkie, emergency communication systems) we prefer MANETs.

Page 3: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 52

V. Adhoc Routing Protocol

The ad hoc network is the communication network without a

pre exist network infrastructure. In cellular networks, there is a

network infrastructure represented by the base stations, radio network controllers ...etc. In ad hoc networks every

communication terminal or radio terminal (RT) communicates

with its partner to perform peer to peer communication. If the

required RT is not a neighbour to the initiated call RT (outside

the coverage area of the RT), then the other intermediate RTs

are used to perform the communication link. This is called

multi-hop peer to peer communication. This collaboration

between the RTs is very important in the ad hoc networks. In

ad hoc networks all the communication network protocols

should be distributed throughout the communication terminals

i.e. the communication terminals should be independent and highly co-operative.

AODV is currently one of the most popular ad-hoc routing

protocols and has enjoyed numerous reviews. These indicate

that AODV performs very well both during high mobility and

high network traffic load, making it one of the most interesting

candidates among today’s ad-hoc routing protocols. Several

independent AODV implementations exist, such as AODV-UU

and Mad-hoc AODV.

VI. Dynamic Power Conscious

Routing

As conservation of the power in a network has enormous

benefits, the implementation of a dynamic power conscious

routing is intimated. At the receiver, the desired signal can be

corrupted due to the interference of other intermediate nodes.

A node is capable of tracking all the other nodes within its

transmission range. Interfering nodes use the same modulation

scheme as the transmitter and can vary their transmit power up to a maximum Pmax. This multiuser interference is a Gaussian

random process. At the receiver, the decoder maintains an

estimate of the average SNR. The main focus of implementing

dynamic power conscious routing is to route a packet on a path

that will require the least amount of total power expended and

for each node to transmit with just enough power to ensure that

the transmission is received with an acceptable bit error rate.

Threshold is a design parameter and may be selected according

to the network performance desired. Considering to be the bit

signal-to-noise-density ratio and by calculating its value from

the below equation at a node, it is possible to achieve required.

Considering the movement of nodes in the disaster struck

area as Gaussian random process, during the transmission of

packet from source to the destination, the Signal-to-noise-

density ratio at the receiver changes in view of the equation,

∑b / N e ff = (PR /D) / (No + Pi / W) (1)

Where, W is the system bandwidth, Pi is the interference

power and D is the data rate in bits per second.

The receiving power PR is equated to the transmitting power

using the equation (1) and concluded that small alteration in

the transmitting power to maintain the acceptable SNR at the

receiver could help enormous conservation of power in the

network with a high success rate of transmitting the packets.

Average power expended is the average power consumed in

the network relaying successful packets (including necessary

control packets) from their source to their destination per unit

time.

VII. Ad Hoc on Demand Distance

Vector Routing

AODV (AD HOC ON DEMAND DISTANCE VECTOR

ROUTING) routing classified as a pure on demand routing

protocol system, when a node want to send a message to

another destination node and does not have a valid route to that

destination its initiates a path discovery process to find the

destination node. The source node broadcast a route request

(RREQ) packet to its neighbours, and these neighbours

forward the request to their neighbours, and so on until reach to

destination node or reach intermediate node have a information about the route to destination node .Each node recode its own

sequence number known as a broadcast ID, The broadcast ID

is incremented for every RREQ the node initiates, and record

also the nodes IP address , a RREQ with its own sequence

number and the broadcast ID, the source node includes in the

RREQ the most recent sequence number it has for the

destination, Intermediate nodes can reply to the RREQ only if

they have a route to the destination if the destination sequence

number is greater than or equal to that contained in the RREQ .

During forwarding process the intermediate node records the

address of the neighbours, from which node first copy of RREQ is broadcasted, is received, if additional copy is

received from same RREQ, these packets are discarded to

avoid looping problem. When the RREQ reached the

destination node or intermediate node with recent route to

destination, the destination or intermediate node responds by

unicasting a route replay (RREP) packet back to the

neighbours that received the first RREQ.

When a intermediate node discover a broken link or failure in active route, it broadcast a route error (RERR) packet to

inform its neighbours it discover a route failure, and then these

neighbours forward this RERR packet to all nodes that use this

broken route, then the source node can re-initiate route

discovery process if the route is still needed. The advantage of

AODV is avoiding creating temporary routing loop problem.

During link failure the time complexity is lower than DSDV,

because informs another nodes only about link status changing.

Routes are established on demand and destination sequence

numbers are used to find the latest route to destination. The

connection setup delay is less and the limitations of AODV need big memory capacity. Route Request packet can lead to

heavy control overhead.It is clear from the table that there is no

clear winner and the routing protocol has to be selected strictly

based on the application. Routing in WSNs is one of the

emerging trends of the present research activities. Energy

Page 4: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 53

awareness is one of the vital parameters to be considered for

the designing of the protocol

VIII. Implementation

Rescue operation during large-scale disaster cannot strongly

rely on centralized networks. Restoration of emergency

communication network in such areas is essential. The rescue

operations in disaster response are rapid and effective service

provision. The rescue team should be alerted immediately

about the current status of the area under investigation. The

nearby activated base station transceiver system (BTS)

accessible to the disaster struck area is located and an access point is wired to it. This provides the connectivity to all the

other wireless access points deployed in and around the

disaster struck area. Access points are air dropped all around

the disaster struck area with the help of rescue team choppers

such that all the access points act as low power base stations

and form a local area network (LAN). The mobiles used by the

victims will be automatically latched to their nearest access

point and network. Thus the victims are easily located and the

rescue team is alerted by the victim. Each member of the

rescue team will have a headgear installed with the

communication module with basic sensors, video capturing

device etc.

Figure 1 Steps involved in Victim location identification.

The Figure 1 shows the steps involved in the victim location

identification,

When the catastrophic disaster takes place, the location of

the disaster and the area covered is first surveyed.

The Mobile Ad hoc NETworks (MANETs) are

deployed with the help of choppers and the decentralized

network is established

The information of the victims location is sensed through

the base stations and this acquired information is sent to

the rescue brigades

Once the location is identified the victims are moved to

safe zone

The flow chart for rescue operation after catastrophic

disaster is shown in Figure 2 Initially the information of the

disaster and the area under investigation is acquired. The

nearby activated base station transceiver systems (BTS) is

located and a wired access point is deployed to provide

connectivity.

The rescue team is alerted for the disaster response.

MANET based emergency communication network is

deployed. The access points with Kong wobbler structure

is air dropped around the disaster stuck area with the help

of rescue team choppers. Due to its unique structure it

lands vertically or floats over water and is ready for

network communication instantly. The video capturing

devices installed at the access points will record the current scenario of the disaster struck area and transmit

this information to the base station.

The mobile devices used by the victims will automatically

get latched to the nearby access point network. The victim

in the disaster struck area will come under any of the

access points, and by this the exact location of the victim

is tracked. The condition around the victim is also

predicted and all these information is sent to the rescue

brigades.

The rescue operations are undertaken and the victim is

moved to the safe zone. The information gathered from the rescue brigade’s headgear helps the base station to

investigate the complete post-disaster scenario. The

images captured by the headgear with low resolution for

low power consumption is transmitted to the base station

for image processing and then to study the situation. The

victim’s communication modules in the safe zone will be

hibernated in the view of dynamic power consciousness.

The rescue team are allowed to communicate amongst

each other when it is need to direct themselves to a

particular remote location.

Whenever the rescue brigades fail to find the victims at a

location, an alert is sent to the base station to resend the information about the victim’s location, and the rescue

operation resumes.

Figure 2.Rescue operation after catastrophic disaster

Page 5: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 54

IX. Device Constraints

As the rescue team is alerted for disaster response, the access

points with Kong wobbler structure are dropped in the disaster

struck areas using rescue team airplanes. Due to its unique structure it lands vertically and is ready for network

communication instantly. This unique structure also allows to

float on water and thus an efficient MANET module is

deployed. Access points are deployed all around the area under

investigation such that all the victims will be able to connect to

the network. The Access points is installed with the video

capturing device hence images of the current scenario of the

disaster struck area is updated to the base station. These

information become vital as the rescue brigades are guided to

the danger zone. The headgear of every rescue brigade is

incorporated with the MANET communication module, thus allowing them to communicate with the victims. In addition the

headgear also contains the basic sensors and a video capturing

device which helps in recording the current situation of the

victim and transmits it to the base station.

Mobile devices typically have strong battery and bandwidth

constraints. Power conservation can be achieved on two

different fronts such as the device and the communication

protocols. The energy efficiency of a device involves reducing the usage of the battery for all the hardware of the device,

including the CPU, display and peripherals.

Alteration of the transmitted power to use feeble amount to

maintain acceptable signal-to-noise ratio (SNR) at receiver can

conserve the power in the network. The communication

protocols also can be power-aware designs. One of the Smart

batteries have low discharge rates, a long cycle life, a wide operating temperature range, and high energy density. Nickel

cadmium (NiCad), nickel metal hydride (NiMH), and lithium

ion (Li-ion) are the most commonly used for mobile devices.

Li-ion batteries have the highest energy density among these

technologies.

X. Simulation Results

A. Nam Outputs

We have Considered 35 nodes as the victims in the disaster

struck area, they are allowed to freely move around the area.

We also consider 2 access points, 3 rescue choppers and 7

rescue brigades. The rescue teams are constantly moving around and helping the victims to move to the safe area. The

trace file and nam file results provided by the ns2 gives

enormous amount of information about the victims. It specifies

position of the node, number of nodes within the network of

access point and also visualizes in detail about the packet

transmission amongst the victims, rescue team, access points,

and base station is simulated.

Figure 3 Simulation in NS2

Figure 4 shows the disaster area. It shows the connection

between the nearest base stations and temporary base station

created near the disaster struck area.

Figure 4 Simulation of NS2

The above figure 4 shows communication between two

choppers.

The chopper carrying the rescuers to the disaster struck

area.

The chopper carries the access points to the disaster struck

area.

The access points with Kong wobbler structure is air

dropped around the disaster stuck area with the help of

rescue team choppers. Due to its unique structure it lands vertically or floats over water and is ready for network

communication instantly.

The video capturing devices installed at the access points

will record the current scenario of the disaster struck area

and transmit this information to the base station.

The choppers carry a number of rescuers and dropping

them in the disaster area.

Connections are existed between the victims, rescue teams

and base stations.

In the Figure the choppers rescue the victims.

Many a times due to long distance between choppers and

rescuers direct communication is not possible. So, rescuer uses access points to communicate with the choppers.

Communication between the victims can be observed in the

figures.

Safe zone

Danger zone

Page 6: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 55

Showing after the rescue operation is over then all rescuers

is sent back through choppers. Access points are also

recollected from the disaster area.

The nearby activated base station transceiver systems (BTS)

is located and an wired access point is deployed to provide

connectivity. The mobile devices used by the victims will

automatically get latched to the nearby access point network. The victim in the disaster struck area will come under any of

the access points, and by this the exact location of the victim is

tracked. The condition around the victim is also predicted and

all these information is sent to the rescue brigades.

The figure 4 shows nodes representing the victims in the

disaster struck area. They are randomly moving around. The

nodes identified as the rescue team brigades moving around for victim’s service. The access point shown nodes indicate the

access points with Kong wobblers structure which cover the

area under investigation. The deep sky blue nodes represent the

rescue team choppers. The information is continuously

exchanged and the tracking of the victim is undertaken. The ns

simulation also provides x-graphs of the network throughput

(Mbps) between the node pairs. Studying the graphs, the power

at the transmitter is altered to achieve the required network

throughput and helps in reduction of dynamic power

consumption.

Figure 5 Simulation in NS2

In figure 5 base station finds the victim location in the

disaster stuck area and informs the traced locations to the

rescue brigades. Once the information of the victim is received, the rescue team reaches the victim location and brings them to

the safe zone. The information gathered from the rescue

brigade’s headgear helps the base station to investigate the

complete post-disaster scenario. The images captured by the

headgear with low resolution for low power consumption is

transmitted to the base station for image processing and then to

study the situation.

In figure 5 all most all the victims are moved to the safe zone with the help of the choppers and the rescue brigades. The

rescue brigades collect the victims and send the information to

the rescue choppers about the present location and drive them

to the safe zone. The rescue teams are allowed to communicate

amongst each other when it is need to direct themselves to a

particular remote location. In case the rescue brigades fail to

find the victims at a location, an alert is sent to the base station

to resend the information about the victim’s location, and the

rescue operation resumes

Figure 6 Simulation in NS2

In figure all the victims are moved to the safe zone and the

kong wobbler considered as access points are pulled back,

since they can be pulled back and reused.

Figure 7 simulation in NS2

Metrics used for analysis

Throughput of received packets: This represents the

number of packets received within a given time

interval.

Throughput of dropped packets: This represents the number of packets dropped within a given time

interval.

End to end delay: It represents the delay encountered

between the sending and receiving of the packets.

Jitter: It represents any unwanted variation in one or

more signal generated during packet transmission.

B. Throughput of Generating Packets

Figure 8 represents the number of packets generated within a

given time interval. The rate of packets generation as the

mobility speed is varied and the movement of source node and

destination are randomly. That can be noticed the number of

generate packets in begin of simulation were huge because the

path between source node and destination is short (low number

of hops), while at the end of simulation the rate of generate

packets were low because the path between source node and

destination is long (high number of hops).

Safe Zone

Danger Zone

Safe Zone

Danger Zone

Page 7: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 56

Figure 8 Throughput of generating packets

C. Throughput of Sending Packets

Figure 9 represents the number of packets sent within a

given time interval. The rate of packets sending is varied as the

mobility speed is varied and the movement of source node and

destination are randomly. That can be noticed the number of

sending packets in begin of simulation were huge because the

path between source node and destination is short (low number

of hops), while at the end of simulation the rate of sending

packets were low because the path between source node and destination is long (high number of hops

Figure 9Throughput of sending packets

Figure 10 Throughput of forwarding packets

D. Throughput of Forwarding Packets

Figure 10 represents the number of packets forwarded within

a given time interval. Since in Ad Hoc networks the nodes send

packets to the destination at a time, all packets cannot be send

simultaneously thus some of the packets are forwarded which

is first in queue and all others are made to wait in the queue.

Those packets which are forwarded are called forwarding

packet.

E. Throughput of Receiving Packets

Figure 11 represents the number of packets receiving within a given time interval. All mast all packets generated by the

nodes reaches the destination within a given time interval.

Figure 11 Throughput of receiving packets

F. Throughput of Dropping Packets

Figure 12 below represents the number of packets sent

within a given time interval. The throughput of dropping

packets for the AODV protocol is low. Only at a couple of

times, it shows a jump in dropping rate, but nonetheless, the

overall rate of packet drop is less. That obviously clear the

number of dropped packets in begin of simulation were huge because the rate of mobility is high while at the end of

simulation the rate of dropped packets were low because the

rate of mobility is too low.

Figure 12 Throughput of dropping packets

G. End to End Delay (EED)

Figure 13 & 14 below represents the throughput of sending bits v/s minimal simulation end to end delays and throughput

of receiving bits v/s minimal simulation end to end delay. We

find out that there is some initial delay caused in the

throughput which is probably the delay caused during the route

discovery process by AODV. After that, as the throughput

increases, the end to end delay also increases.

Page 8: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 57

Figure 13 represents the throughput of sending bits v/s minimal simulation end to end delays

Figure 14 represents the throughput of receiving bits v/s minimal simulation end to end delay

XI. Conclusions

In catastrophic disaster struck areas, it was difficult to

enhance the availability of power lines and backhauls as they

are highly dependent on the robustness of roads and bridges. The dynamic power conscious emergency communication

module proves to be superior in places where power is the

main criteria. We have demonstrated a approach to energy

conservation for ad hoc routing. We have shown that it

performs at least as well as an normal ad hoc routing protocol

for packet loss and route latency, and yet it can substantially

conserve energy, allowing network lifetime to increase in

proportion to node density. The emergency communication

module holds the significant features such as simplicity,

extensive usage, and low cost.

The most important lessons we learned from numerous

disasters are that mobile communication system is vulnerable

and the loss of communication system may have a catastrophic

consequence. We analyze the causes for failure of the entire

communication systems in disaster area and propose

emergency communication and information system. Brief

system requirements and system design are given. The

technical aspects of experimental results are analyzed.

XII. References

[1] AWOS KHAZAL ALI, “An Alternative Routing

Mechanisms For Mobile Ad-Hoc Networks” October,

2008.

[2] Sudhakar. Pillai. M, Pranav. P. D, Chethan, Smitha

Shekar and G. Narendra Kumar, “Efficient

Performance of MANETs in Coal Mines”, The 2nd

International Muli-conference on Complexity,

Informatics and Cybernetics, Orlando, Florida, USA.

[3] Ankita K. Patel and Radhika D. Joshi, “Energy

Conservation for Wireless Mobile Ad hoc Networks

using Hexagonal GAF Protocol”.

[4] Shejie Li S. H., Gary Chan and Jingyi He, “WIANI:

Wireless Infrastructure and Ad-Hoc Network

Integration”, Department of Electrical Engineering,

Princeton University, USA;New Territorie, Hong

Kong

www.cs.ust.hk/~gchan/papers/ICC05_WIANI.pdf.

[5] Violet R. Syrotiuk and Edgar Chvez, “Ad-Hoc,

Mobile, and Wireless Networks”, 4th International

Conference, ADHOC-NOW 2005, Cancun, Mexico,

Oct. 2005.

[6] Madhavi W. Subbarao, “Mobile Ad Hoc Data

Networks for Emergency Preparedness

Telecommunications - Dynamic Power-Conscious

Routing Concepts”, National Communications

Systems. February 1, 2000.

[7] Yao-Nan Lien, Hung-Chin Jang, and Tzu-Chieh Tsai,

“ A MANET Based Emergency Communication and

Information System for Catastrophic Natural

Disasters”, Proc. of IEEE Workshop on Specialized

Ad Hoc Networks and Systems, Montreal, Canada,

June 26, 2009.

Biography

1. PRAVEEN K SHERI , [B.E] in electronics &

communication Engg from Visvesvaraya Technological

University, Belgaum, Karnataka[India], presently working as

Page 9: IMPLEMENTATION OF AODV PROTOCOL FOR EFFECTIVE DISASTER MANAGEMENT SYSTEM

International Journal of Advanced Technology & Engineering Research (IJATER)

National Conference on Emerging Trends in Technology (NCET-Tech)

ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 58

technician in Bahubali College of Engineering,

Shravanabelagola(Karnataka), [email protected]

2. MAHAVEER JAYAKKANAVAR, [AMIE], in electronics

& communication Engg from IEI, Kolkatta, West

Bangal[India], presently working as technician in Bahubali

College of Engineering, Shravanabelagola(Karnataka) ,

[email protected]

3. HARSHAVARDHAN T.R, working as Asst.Technician in

Bahubali College of Engineering,

Shravanabelagola(Karnataka), [email protected]