Click here to load reader
Upload
praveenkumar-sheri
View
57
Download
6
Embed Size (px)
Citation preview
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 50
IMPLEMENTATION OF AODV PROTOCOL FOR
EFFECTIVE DISASTER MANAGEMENT SYSTEM Praveen K. Sheri(1),Mahaveer Jayakkanavar(2) ,Harshavardan T.R(3)
Department of Electronics and Communication Engineering Bahubali College of Engineering, Shravanabelagola 573135
Abstract
In recent years the world has experienced a number of
catastrophic natural disasters such as earthquake, hurricane,
typhoon, tsunami, etc. Emergency communication modules in
large-scale disaster struck areas is deployed by using wireless
Ad-hoc networks which requires no centralized networks.
Message routing in a decentralized environment and
fluctuating network topology is not a well-defined problem.
The main areas of concern would be wireless link quality, propagation path loss, fading, multiuser interference, and
topological changes. This is suitably accomplished by altering
the transmitted power to use only that amount needed to
maintain acceptable signal-to-noise ratio (SNR) at receiver.
Routing is one of the key issues in MANETs due to their
highly dynamic and distributed nature. In particular, Energy
efficient routing is the most important design criteria in
MANETs since mobile nodes will be powered by batteries
with limited capacity. Power failure of a mobile node not only
affect the node itself but also its ability to forward packets on
behalf of others and thus the overall network lifetime.
Reducing the transmitted power allows spatial reuse of the
channel and thus increasing network throughput. The benefit of
power conservation for MANETs also poses the concern to
find the most power efficient way to route a packet from the
source to the destination with a high success rate. Although
establishing a temporary communication network to support
emergency communications and networking is one of the most
urgent tasks in a disastrous rescue mission, feasible technology options are very limited. We propose to use mobile units (cell
phones) owned by rescue volunteers themselves to establish
MANET to support such a need. A temporary base station is
setup near to the disaster area by extending the connection
from the nearest base station. The access Points are placed at
different places in the disaster area. These access points
connected to the temporary setup base station. The rescuers use
devices such as notebook, mobile etc whichever are available,
to communicate among them. One of the well known protocols
is AD-HOC ON DEMAND DISTANCE VECTOR ROUTING
PROTOCOL (AODV). AODV is the simplest and widely used algorithm either for wired or wireless network.
I. Introduction
Each device in a MANET is free to move independently in
any direction, and will change its links to other devices
frequently. So for a MANET, each device has to maintain the
information required to properly route traffic. Every device in
MANET acts as a router. MANETs are highly suitable for
applications involving special outdoor events, communications
in the regions with no infrastructure, emergencies and natural
disasters and military operations. One of the well known
protocols is AD-HOC ON DEMAND DISTANCE VECTOR
ROUTING PROTOCOL (AODV). AODV is the simplest and
widely used algorithm either for wired or wireless network. It
is one of the most efficient routing protocols in terms of
establishing the shortest path and lowest power consumption. It
is mainly used for ad-hoc networks a ubiquitous
communication network deployment proves to be important.
In the present generation of wireless communication
systems, there is a need for the rapid deployment of
independent mobile users. Significant examples include
establishing survivable, efficient, dynamic communication for
emergency rescue operations and disaster relief efforts e.g. the
tsunami that struck Japan during 2011, the aftermath of a
hurricane where cellular/PCS service may not be available.
Typically, emergency rescue communication is centralized,
and the network is dependent on proper function of the central controllers. If the centralized infrastructure were to fail due to a
disaster or any other reason, the network may collapse. Hence,
advances in wireless communication should aid in making
emergency preparedness systems and disaster relief networks
robust and autonomous, and provide for reliable and secure
inter-group communication.
The main advantage of Ad-hoc network is that, deployment
of network needs no fixed infrastructure. In recent years the world has experienced a number of catastrophic natural
disasters such as earthquake, hurricane, typhoon, tsunami etc.
The victims trapped in the collapsed buildings and landslides
will have a great chance of survival in case the rescue team
reaches for help in a short period of time.
We have described about the available communication
systems which have advantages on one over the other, that can be used during the catastrophic disasters, such as walkie-talkie,
emergency mobile communication systems and mobile ad hoc
networks. Here we consider MANETs can be used more
efficiently for emergency communication. The main concern
in communication or networking is the selection of best
protocol, section vii deals with AODV (ad hoc on demand
routing vector protocol) and its algorithm.
We discuss about the software part that is, the simulation which is carried out using network simulation software (NS2)-
version 2.34 on Linux platform redhat-5. The programming
language used here is TCL which is based C++ coding. The
simulations result, both animation output (NAM) and trace
graph output are given. Finally we conclude with the output of
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 51
a sample of rescue operation using emergency communication
in catastrophic disaster struck area where centralized network
infrastructure is unavailable.
II. Challenges and System Analysis
A general mobile network consists of wireless access
networks and interconnecting backbone networks. The mobile
terminals are connected to the base stations (access points) by
wireless access networks, and the base stations are connected
to the wired backbone networks. There are drawbacks to these
systems when large-scale disasters, such as earthquakes, occur:
if the base stations or other elements of the infrastructure comprising these networks are damage by disasters,
communications may be impossible.
Even if the infrastructure is not damaged, spikes in traffic
and congestion may render communication virtually
impossible. The communication system crash posed a huge
impact as the disaster response will not be able to be initiated
due to the following reasons:
Regular rescue teams including fire fighters, police and army
are away from the disaster struck area. Transportation system
is paralyzed by broken bridges and landslides. Trained rescue
squads are misplaced to wrong areas as they were not aware of
the actual geographical scenario of disaster and divided into
isolated groups. Victims are not given medical aid at the right
time as a result of low communicative area.
Rescue operations and disaster relief scenarios cannot rely
on centralized and organized connectivity and can be termed as
wireless mobile ad hoc networks (MANETs) for emergency
telecommunication. A MANET is an autonomous collection of
mobile nodes that communicate over relatively bandwidth-
constrained wireless links. A Mobile Adhoc network for
emergency telecommunication may operate in a stand-alone
manner or be connected to a larger network. The set of
applications for emergency MANETs is diverse, ranging from small, static networks that are constrained by power sources, to
large-scale, mobile, highly dynamic networks. The design of
network protocols for these networks is a complex issue.
MANET communication module can transmit information
from a node to any other node within its radio range. If the
destination node is not within the range of the source then an
intermediate node acts as a router to route to the destination
node and is termed as hop-by-hop. In the scenario of a
catastrophic natural disaster struck area, all the centralized
networks would crash and it is difficult for victims to
communicate for finding safe zones. Deployment of MANET
in such decentralized areas is of great help. Existing mobile phones are used by the victims to furnish their condition to the
rescue team and outside world. This information is vital as
these are used to track the victims by processing the number of
hops taken by the packets to reach the rescue team and the
approximate direction. Due to low cost for development and
hectic usage environment makes the device best suited for the
communication during catastrophic disaster.
III. Causes for Communication
Systems Crash
To many people’s surprise, cellular mobile communication
systems that were thought highly dependable in emergency
were completely wiped out in many cases.
Base stations were crashed.
Trunks connecting base stations to MSCs were broken
almost everywhere, specially broken roads and
bridges (Trunks were laid along roads and bridges).
Backup power generators were out because of fuel
exhausted.
Critical hardware equipments were down because
cooling tower fell down or cooling pipes were broken.
Cell phone ran out of battery and had no way to
recharge because of power line failure or simply
chargers not available.
Communication systems were overwhelmed by
extremely huge traffic.
Threatened by so many resources of failure, it requires a miracle for a cellular mobile communication system to survive
in such a catastrophic disaster, even for a robust system with
99.9999% reliability.
IV. Available Options Of Emergency
Communication Systems
There are few options for emergency communication
systems. Various equipment vendors are offering emergency
mobile communication systems. Specially designed systems
are expensive and offer only limited number of handsets. It is
prohibitively expensive to deploy sufficient capacity for a catastrophic disaster as big as mentioned cases. In summary,
the capacity current specially designed emergency
communication systems may be able to support regular rescue
squads, but are far from sufficient for large amount of
volunteers.
Most cellular operators have emergency cellular systems that
use satellite links as backhauls and can be deployed to a demanded area in a few hours. However, there are two
problems. First, cellular operators may not have sufficient
number of such systems for catastrophic disaster. Secondly,
volunteers do not know each other and have no time to
memorize (or keep in handset) many phone numbers and may
not have handset chargers in hand.
Due to the disadvantages of these systems (viz. Walkie-
talkie, emergency communication systems) we prefer MANETs.
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 52
V. Adhoc Routing Protocol
The ad hoc network is the communication network without a
pre exist network infrastructure. In cellular networks, there is a
network infrastructure represented by the base stations, radio network controllers ...etc. In ad hoc networks every
communication terminal or radio terminal (RT) communicates
with its partner to perform peer to peer communication. If the
required RT is not a neighbour to the initiated call RT (outside
the coverage area of the RT), then the other intermediate RTs
are used to perform the communication link. This is called
multi-hop peer to peer communication. This collaboration
between the RTs is very important in the ad hoc networks. In
ad hoc networks all the communication network protocols
should be distributed throughout the communication terminals
i.e. the communication terminals should be independent and highly co-operative.
AODV is currently one of the most popular ad-hoc routing
protocols and has enjoyed numerous reviews. These indicate
that AODV performs very well both during high mobility and
high network traffic load, making it one of the most interesting
candidates among today’s ad-hoc routing protocols. Several
independent AODV implementations exist, such as AODV-UU
and Mad-hoc AODV.
VI. Dynamic Power Conscious
Routing
As conservation of the power in a network has enormous
benefits, the implementation of a dynamic power conscious
routing is intimated. At the receiver, the desired signal can be
corrupted due to the interference of other intermediate nodes.
A node is capable of tracking all the other nodes within its
transmission range. Interfering nodes use the same modulation
scheme as the transmitter and can vary their transmit power up to a maximum Pmax. This multiuser interference is a Gaussian
random process. At the receiver, the decoder maintains an
estimate of the average SNR. The main focus of implementing
dynamic power conscious routing is to route a packet on a path
that will require the least amount of total power expended and
for each node to transmit with just enough power to ensure that
the transmission is received with an acceptable bit error rate.
Threshold is a design parameter and may be selected according
to the network performance desired. Considering to be the bit
signal-to-noise-density ratio and by calculating its value from
the below equation at a node, it is possible to achieve required.
Considering the movement of nodes in the disaster struck
area as Gaussian random process, during the transmission of
packet from source to the destination, the Signal-to-noise-
density ratio at the receiver changes in view of the equation,
∑b / N e ff = (PR /D) / (No + Pi / W) (1)
Where, W is the system bandwidth, Pi is the interference
power and D is the data rate in bits per second.
The receiving power PR is equated to the transmitting power
using the equation (1) and concluded that small alteration in
the transmitting power to maintain the acceptable SNR at the
receiver could help enormous conservation of power in the
network with a high success rate of transmitting the packets.
Average power expended is the average power consumed in
the network relaying successful packets (including necessary
control packets) from their source to their destination per unit
time.
VII. Ad Hoc on Demand Distance
Vector Routing
AODV (AD HOC ON DEMAND DISTANCE VECTOR
ROUTING) routing classified as a pure on demand routing
protocol system, when a node want to send a message to
another destination node and does not have a valid route to that
destination its initiates a path discovery process to find the
destination node. The source node broadcast a route request
(RREQ) packet to its neighbours, and these neighbours
forward the request to their neighbours, and so on until reach to
destination node or reach intermediate node have a information about the route to destination node .Each node recode its own
sequence number known as a broadcast ID, The broadcast ID
is incremented for every RREQ the node initiates, and record
also the nodes IP address , a RREQ with its own sequence
number and the broadcast ID, the source node includes in the
RREQ the most recent sequence number it has for the
destination, Intermediate nodes can reply to the RREQ only if
they have a route to the destination if the destination sequence
number is greater than or equal to that contained in the RREQ .
During forwarding process the intermediate node records the
address of the neighbours, from which node first copy of RREQ is broadcasted, is received, if additional copy is
received from same RREQ, these packets are discarded to
avoid looping problem. When the RREQ reached the
destination node or intermediate node with recent route to
destination, the destination or intermediate node responds by
unicasting a route replay (RREP) packet back to the
neighbours that received the first RREQ.
When a intermediate node discover a broken link or failure in active route, it broadcast a route error (RERR) packet to
inform its neighbours it discover a route failure, and then these
neighbours forward this RERR packet to all nodes that use this
broken route, then the source node can re-initiate route
discovery process if the route is still needed. The advantage of
AODV is avoiding creating temporary routing loop problem.
During link failure the time complexity is lower than DSDV,
because informs another nodes only about link status changing.
Routes are established on demand and destination sequence
numbers are used to find the latest route to destination. The
connection setup delay is less and the limitations of AODV need big memory capacity. Route Request packet can lead to
heavy control overhead.It is clear from the table that there is no
clear winner and the routing protocol has to be selected strictly
based on the application. Routing in WSNs is one of the
emerging trends of the present research activities. Energy
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 53
awareness is one of the vital parameters to be considered for
the designing of the protocol
VIII. Implementation
Rescue operation during large-scale disaster cannot strongly
rely on centralized networks. Restoration of emergency
communication network in such areas is essential. The rescue
operations in disaster response are rapid and effective service
provision. The rescue team should be alerted immediately
about the current status of the area under investigation. The
nearby activated base station transceiver system (BTS)
accessible to the disaster struck area is located and an access point is wired to it. This provides the connectivity to all the
other wireless access points deployed in and around the
disaster struck area. Access points are air dropped all around
the disaster struck area with the help of rescue team choppers
such that all the access points act as low power base stations
and form a local area network (LAN). The mobiles used by the
victims will be automatically latched to their nearest access
point and network. Thus the victims are easily located and the
rescue team is alerted by the victim. Each member of the
rescue team will have a headgear installed with the
communication module with basic sensors, video capturing
device etc.
Figure 1 Steps involved in Victim location identification.
The Figure 1 shows the steps involved in the victim location
identification,
When the catastrophic disaster takes place, the location of
the disaster and the area covered is first surveyed.
The Mobile Ad hoc NETworks (MANETs) are
deployed with the help of choppers and the decentralized
network is established
The information of the victims location is sensed through
the base stations and this acquired information is sent to
the rescue brigades
Once the location is identified the victims are moved to
safe zone
The flow chart for rescue operation after catastrophic
disaster is shown in Figure 2 Initially the information of the
disaster and the area under investigation is acquired. The
nearby activated base station transceiver systems (BTS) is
located and a wired access point is deployed to provide
connectivity.
The rescue team is alerted for the disaster response.
MANET based emergency communication network is
deployed. The access points with Kong wobbler structure
is air dropped around the disaster stuck area with the help
of rescue team choppers. Due to its unique structure it
lands vertically or floats over water and is ready for
network communication instantly. The video capturing
devices installed at the access points will record the current scenario of the disaster struck area and transmit
this information to the base station.
The mobile devices used by the victims will automatically
get latched to the nearby access point network. The victim
in the disaster struck area will come under any of the
access points, and by this the exact location of the victim
is tracked. The condition around the victim is also
predicted and all these information is sent to the rescue
brigades.
The rescue operations are undertaken and the victim is
moved to the safe zone. The information gathered from the rescue brigade’s headgear helps the base station to
investigate the complete post-disaster scenario. The
images captured by the headgear with low resolution for
low power consumption is transmitted to the base station
for image processing and then to study the situation. The
victim’s communication modules in the safe zone will be
hibernated in the view of dynamic power consciousness.
The rescue team are allowed to communicate amongst
each other when it is need to direct themselves to a
particular remote location.
Whenever the rescue brigades fail to find the victims at a
location, an alert is sent to the base station to resend the information about the victim’s location, and the rescue
operation resumes.
Figure 2.Rescue operation after catastrophic disaster
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 54
IX. Device Constraints
As the rescue team is alerted for disaster response, the access
points with Kong wobbler structure are dropped in the disaster
struck areas using rescue team airplanes. Due to its unique structure it lands vertically and is ready for network
communication instantly. This unique structure also allows to
float on water and thus an efficient MANET module is
deployed. Access points are deployed all around the area under
investigation such that all the victims will be able to connect to
the network. The Access points is installed with the video
capturing device hence images of the current scenario of the
disaster struck area is updated to the base station. These
information become vital as the rescue brigades are guided to
the danger zone. The headgear of every rescue brigade is
incorporated with the MANET communication module, thus allowing them to communicate with the victims. In addition the
headgear also contains the basic sensors and a video capturing
device which helps in recording the current situation of the
victim and transmits it to the base station.
Mobile devices typically have strong battery and bandwidth
constraints. Power conservation can be achieved on two
different fronts such as the device and the communication
protocols. The energy efficiency of a device involves reducing the usage of the battery for all the hardware of the device,
including the CPU, display and peripherals.
Alteration of the transmitted power to use feeble amount to
maintain acceptable signal-to-noise ratio (SNR) at receiver can
conserve the power in the network. The communication
protocols also can be power-aware designs. One of the Smart
batteries have low discharge rates, a long cycle life, a wide operating temperature range, and high energy density. Nickel
cadmium (NiCad), nickel metal hydride (NiMH), and lithium
ion (Li-ion) are the most commonly used for mobile devices.
Li-ion batteries have the highest energy density among these
technologies.
X. Simulation Results
A. Nam Outputs
We have Considered 35 nodes as the victims in the disaster
struck area, they are allowed to freely move around the area.
We also consider 2 access points, 3 rescue choppers and 7
rescue brigades. The rescue teams are constantly moving around and helping the victims to move to the safe area. The
trace file and nam file results provided by the ns2 gives
enormous amount of information about the victims. It specifies
position of the node, number of nodes within the network of
access point and also visualizes in detail about the packet
transmission amongst the victims, rescue team, access points,
and base station is simulated.
Figure 3 Simulation in NS2
Figure 4 shows the disaster area. It shows the connection
between the nearest base stations and temporary base station
created near the disaster struck area.
Figure 4 Simulation of NS2
The above figure 4 shows communication between two
choppers.
The chopper carrying the rescuers to the disaster struck
area.
The chopper carries the access points to the disaster struck
area.
The access points with Kong wobbler structure is air
dropped around the disaster stuck area with the help of
rescue team choppers. Due to its unique structure it lands vertically or floats over water and is ready for network
communication instantly.
The video capturing devices installed at the access points
will record the current scenario of the disaster struck area
and transmit this information to the base station.
The choppers carry a number of rescuers and dropping
them in the disaster area.
Connections are existed between the victims, rescue teams
and base stations.
In the Figure the choppers rescue the victims.
Many a times due to long distance between choppers and
rescuers direct communication is not possible. So, rescuer uses access points to communicate with the choppers.
Communication between the victims can be observed in the
figures.
Safe zone
Danger zone
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 55
Showing after the rescue operation is over then all rescuers
is sent back through choppers. Access points are also
recollected from the disaster area.
The nearby activated base station transceiver systems (BTS)
is located and an wired access point is deployed to provide
connectivity. The mobile devices used by the victims will
automatically get latched to the nearby access point network. The victim in the disaster struck area will come under any of
the access points, and by this the exact location of the victim is
tracked. The condition around the victim is also predicted and
all these information is sent to the rescue brigades.
The figure 4 shows nodes representing the victims in the
disaster struck area. They are randomly moving around. The
nodes identified as the rescue team brigades moving around for victim’s service. The access point shown nodes indicate the
access points with Kong wobblers structure which cover the
area under investigation. The deep sky blue nodes represent the
rescue team choppers. The information is continuously
exchanged and the tracking of the victim is undertaken. The ns
simulation also provides x-graphs of the network throughput
(Mbps) between the node pairs. Studying the graphs, the power
at the transmitter is altered to achieve the required network
throughput and helps in reduction of dynamic power
consumption.
Figure 5 Simulation in NS2
In figure 5 base station finds the victim location in the
disaster stuck area and informs the traced locations to the
rescue brigades. Once the information of the victim is received, the rescue team reaches the victim location and brings them to
the safe zone. The information gathered from the rescue
brigade’s headgear helps the base station to investigate the
complete post-disaster scenario. The images captured by the
headgear with low resolution for low power consumption is
transmitted to the base station for image processing and then to
study the situation.
In figure 5 all most all the victims are moved to the safe zone with the help of the choppers and the rescue brigades. The
rescue brigades collect the victims and send the information to
the rescue choppers about the present location and drive them
to the safe zone. The rescue teams are allowed to communicate
amongst each other when it is need to direct themselves to a
particular remote location. In case the rescue brigades fail to
find the victims at a location, an alert is sent to the base station
to resend the information about the victim’s location, and the
rescue operation resumes
Figure 6 Simulation in NS2
In figure all the victims are moved to the safe zone and the
kong wobbler considered as access points are pulled back,
since they can be pulled back and reused.
Figure 7 simulation in NS2
Metrics used for analysis
Throughput of received packets: This represents the
number of packets received within a given time
interval.
Throughput of dropped packets: This represents the number of packets dropped within a given time
interval.
End to end delay: It represents the delay encountered
between the sending and receiving of the packets.
Jitter: It represents any unwanted variation in one or
more signal generated during packet transmission.
B. Throughput of Generating Packets
Figure 8 represents the number of packets generated within a
given time interval. The rate of packets generation as the
mobility speed is varied and the movement of source node and
destination are randomly. That can be noticed the number of
generate packets in begin of simulation were huge because the
path between source node and destination is short (low number
of hops), while at the end of simulation the rate of generate
packets were low because the path between source node and
destination is long (high number of hops).
Safe Zone
Danger Zone
Safe Zone
Danger Zone
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 56
Figure 8 Throughput of generating packets
C. Throughput of Sending Packets
Figure 9 represents the number of packets sent within a
given time interval. The rate of packets sending is varied as the
mobility speed is varied and the movement of source node and
destination are randomly. That can be noticed the number of
sending packets in begin of simulation were huge because the
path between source node and destination is short (low number
of hops), while at the end of simulation the rate of sending
packets were low because the path between source node and destination is long (high number of hops
Figure 9Throughput of sending packets
Figure 10 Throughput of forwarding packets
D. Throughput of Forwarding Packets
Figure 10 represents the number of packets forwarded within
a given time interval. Since in Ad Hoc networks the nodes send
packets to the destination at a time, all packets cannot be send
simultaneously thus some of the packets are forwarded which
is first in queue and all others are made to wait in the queue.
Those packets which are forwarded are called forwarding
packet.
E. Throughput of Receiving Packets
Figure 11 represents the number of packets receiving within a given time interval. All mast all packets generated by the
nodes reaches the destination within a given time interval.
Figure 11 Throughput of receiving packets
F. Throughput of Dropping Packets
Figure 12 below represents the number of packets sent
within a given time interval. The throughput of dropping
packets for the AODV protocol is low. Only at a couple of
times, it shows a jump in dropping rate, but nonetheless, the
overall rate of packet drop is less. That obviously clear the
number of dropped packets in begin of simulation were huge because the rate of mobility is high while at the end of
simulation the rate of dropped packets were low because the
rate of mobility is too low.
Figure 12 Throughput of dropping packets
G. End to End Delay (EED)
Figure 13 & 14 below represents the throughput of sending bits v/s minimal simulation end to end delays and throughput
of receiving bits v/s minimal simulation end to end delay. We
find out that there is some initial delay caused in the
throughput which is probably the delay caused during the route
discovery process by AODV. After that, as the throughput
increases, the end to end delay also increases.
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 57
Figure 13 represents the throughput of sending bits v/s minimal simulation end to end delays
Figure 14 represents the throughput of receiving bits v/s minimal simulation end to end delay
XI. Conclusions
In catastrophic disaster struck areas, it was difficult to
enhance the availability of power lines and backhauls as they
are highly dependent on the robustness of roads and bridges. The dynamic power conscious emergency communication
module proves to be superior in places where power is the
main criteria. We have demonstrated a approach to energy
conservation for ad hoc routing. We have shown that it
performs at least as well as an normal ad hoc routing protocol
for packet loss and route latency, and yet it can substantially
conserve energy, allowing network lifetime to increase in
proportion to node density. The emergency communication
module holds the significant features such as simplicity,
extensive usage, and low cost.
The most important lessons we learned from numerous
disasters are that mobile communication system is vulnerable
and the loss of communication system may have a catastrophic
consequence. We analyze the causes for failure of the entire
communication systems in disaster area and propose
emergency communication and information system. Brief
system requirements and system design are given. The
technical aspects of experimental results are analyzed.
XII. References
[1] AWOS KHAZAL ALI, “An Alternative Routing
Mechanisms For Mobile Ad-Hoc Networks” October,
2008.
[2] Sudhakar. Pillai. M, Pranav. P. D, Chethan, Smitha
Shekar and G. Narendra Kumar, “Efficient
Performance of MANETs in Coal Mines”, The 2nd
International Muli-conference on Complexity,
Informatics and Cybernetics, Orlando, Florida, USA.
[3] Ankita K. Patel and Radhika D. Joshi, “Energy
Conservation for Wireless Mobile Ad hoc Networks
using Hexagonal GAF Protocol”.
[4] Shejie Li S. H., Gary Chan and Jingyi He, “WIANI:
Wireless Infrastructure and Ad-Hoc Network
Integration”, Department of Electrical Engineering,
Princeton University, USA;New Territorie, Hong
Kong
www.cs.ust.hk/~gchan/papers/ICC05_WIANI.pdf.
[5] Violet R. Syrotiuk and Edgar Chvez, “Ad-Hoc,
Mobile, and Wireless Networks”, 4th International
Conference, ADHOC-NOW 2005, Cancun, Mexico,
Oct. 2005.
[6] Madhavi W. Subbarao, “Mobile Ad Hoc Data
Networks for Emergency Preparedness
Telecommunications - Dynamic Power-Conscious
Routing Concepts”, National Communications
Systems. February 1, 2000.
[7] Yao-Nan Lien, Hung-Chin Jang, and Tzu-Chieh Tsai,
“ A MANET Based Emergency Communication and
Information System for Catastrophic Natural
Disasters”, Proc. of IEEE Workshop on Specialized
Ad Hoc Networks and Systems, Montreal, Canada,
June 26, 2009.
Biography
1. PRAVEEN K SHERI , [B.E] in electronics &
communication Engg from Visvesvaraya Technological
University, Belgaum, Karnataka[India], presently working as
International Journal of Advanced Technology & Engineering Research (IJATER)
National Conference on Emerging Trends in Technology (NCET-Tech)
ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 58
technician in Bahubali College of Engineering,
Shravanabelagola(Karnataka), [email protected]
2. MAHAVEER JAYAKKANAVAR, [AMIE], in electronics
& communication Engg from IEI, Kolkatta, West
Bangal[India], presently working as technician in Bahubali
College of Engineering, Shravanabelagola(Karnataka) ,
3. HARSHAVARDHAN T.R, working as Asst.Technician in
Bahubali College of Engineering,
Shravanabelagola(Karnataka), [email protected]