Emergency Communications during Natural Disasters: Infrastructure and Technology

2007 ◽  
Vol 3 (2) ◽  
pp. 10-17
Author(s):  
Nandana Rajatheva ◽  
Dinusha Gamage ◽  
Kazi Ahmed ◽  
Poompat Saengudomlert

The recent earthquakes, tsunami events raised the necessity for having appropriate disaster warning and recovery systems. There are on-going researches in the area of mobile networks which can be directly applicable to sensor networks. In this paper, we present how the disaster warning systems can be enhanced by using these smart sensor networks. Moreover, emergency communications can use ad-hoc network architecture. In the paper, we present how emergency communications can utilize the surviving network infrastructure for transmission of data such as Audio/video conference, access to Geographic Information System (GIS) etc.

Author(s):  
Budi Rahmadya

Ad Hoc Network Communication is mobile networks communications and have a high mobility for each of its nodes. This type of network communications is a temporary networkwith utilizing a WiFi network or Bluethoot as a medium of communications. In the entirenetwork, node moves with a speed varying and unpredictable direction. Packets data delivery from the source node to destination node by using an ad hoc network requires its owntechniques. In this research discussed the existing data communication technique inVehicular Ad Hoc Network (VANETs) Communications with attention: Broadcasting Time, Routing Protocol, Message Dissemination, Delay Tolerant Network Dissemination and / DTN.These techniques can increase the delivery ratio / sending data packets to the destination as well as a smaller delay time. In order to maintain the integrity of the data packets received bythe destination node, the authors have proposed a method of duplicate messages in thisresearch.


Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.


2013 ◽  
Vol 756-759 ◽  
pp. 1059-1062 ◽  
Author(s):  
Xue Bing Wang

By making small adjustment to general ad hoc network architecture, we build a network topology with short average path length and high clustering coefficient, which are two important metrics of ad hoc networks. Furthermore, an efficient probabilistic flooding routing algorithm is proposed based on this network model. Simulation results show that this architecture behaves better performance than its ordinary counterpart.


Author(s):  
Anuj Joshi ◽  
Pallavi Srivastava ◽  
Poonam Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration. Due to this unique property, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for, security challenges has become a primary concern to provide secure communication. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have identified the challenges and proposed solutions to overcome them. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.


This research paper proposes the “mobile ad hoc networks (MANETs) need aid autonomously self-organized networks without framework backing”. For a “mobile ad hoc network, nodes move arbitrarily”; consequently that network might background fast also random topology changes.In view nodes previously, a MANET regularly have set transmission ranges, a percentage node can't correspond specifically with one another. Hence, routing path in mobile networks possibly hold numerous hops, each hub to mobile networks need the obligation on go about as a switch. This paper is an review from research work on “routing protocol for MANET, Mobile Ad Hoc Network” has as of late increased a ton of fame among computer researchers and specialists. “A MANET is an infrastructure less network” with a lot of dynamic, versatile and self-arranging hubs. Intrigue and utilization of remote versatile network have been becoming in the course of the most recent couple of years.MANETs to have a productive multicast directing and a Quality of Service (QoS) component.Multicast for Ad hoc Network with Hybrid Swarm Intelligence convention depends on swarm insight based optimization technique.


2014 ◽  
Vol 11 (2) ◽  
Author(s):  
Budi Rahmadya

Ad Hoc Network Communication is mobile networks communications and have a high mobility for each of its nodes. This type of network communications is a temporary networkwith utilizing a WiFi network or Bluethoot as a medium of communications. In the entirenetwork, node moves with a speed varying and unpredictable direction. Packets data delivery from the source node to destination node by using an ad hoc network requires its owntechniques. In this research discussed the existing data communication technique inVehicular Ad Hoc Network (VANETs) Communications with attention: Broadcasting Time, Routing Protocol, Message Dissemination, Delay Tolerant Network Dissemination and / DTN.These techniques can increase the delivery ratio / sending data packets to the destination as well as a smaller delay time. In order to maintain the integrity of the data packets received bythe destination node, the authors have proposed a method of duplicate messages in thisresearch.


Sign in / Sign up

Export Citation Format

Share Document