A Project on
A SURVEY ON DISASTER RECOVERY USING MANET
DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
Department of Computer Science
MASTER OF SCIENCE INCOMPUTER SCIENCE
By
Ritwik Mukherjee
Roll no: 15499016012
A Project on
A survey on Disaster recovery using Manet
By
Ritwik Mukherjee
UNDER THE GUIDANCE OF
Mr. TANUMOY NAG
Assistant Professor
Dinabandhu Andrews Institute of Technology & Management
THESIS REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENTS FOR THE POST GRADUATE DEGREE
OF
MASTER OF SCIENCE IN COMPUTER SCIENCE
DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY & MANAGEMENT
Session: 2016– 2018.
Roll Number: 15499016012
Registration Number: 16154181001
ACKNOWLEDGEMENT
I am extremely grateful and remain indebted to our guide Mr. Tanumoy Nag and Mrs. Paromita Roy for being a source of inspiration and for their constant support in the Design, Implementation and Evaluation of the project. We are thankful to them for their constant constrictive criticism and individual suggestions, which benefited us a lot while developing the project on “A Survey on disaster recovery using
MANET”. They have been a constant source of inspiration and motivation for hard work. They have been very co-operative throughout this project work. Through this column, it would be our utmost pleasure to express our warm thanks to them for their encouragement, co-operation and consent without which we mightn’t be able to accomplish this project. We also express our gratitude to
other technical and non technical staff for providing us the infrastructure to carry out the project and to all staff members who were directly and indirectly instrument in enabling us to stay committed for the project.
(Ritwik Mukherjee)
CERTIFICATE
This is to certify that this Dissertation entitled as........................... ................................. Is done by .......................................... registration / roll number .......................................... of DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KOLKATA, WESTBENGAL independently under my guidance and supervision for the partial fulfillment of ........................ ................................
Mr. Tanumoy Nag Mrs. Paromita Roy (Assistant professor) (H.O.D)
TABLE OF CONTENTS 1. Abstract 1
2. Introduction 2
3. Literature survey 5
4. Disaster recovery using routing protocol 9
5. Advantages and disadvantages 12
6. Diagram 13
7. Conclusion & future scope 14
8. Reference 15
1
1. ABSTRACT
MANET or (Mobile Ad hoc network) is infrastructure less network which posses
characteristics like decentralized administration and very less efforts for setup and
it is also self configuring . Due to this, it is most suitable for many applications like
military opearations, disaster area rescue operation, collaborative computing and
conference meeting where it is not possible to setup wired network or
infrastructure based wireless network. Such as like disaster rescue operation or
disaster recovery model when a disaster occurs it becomes difficult to provide
services in the affected areas due to the lack of communication. All modes of
communication system get damaged and it takes a lot of time to establish an
infrastructure network, this is where ad hoc network comes to play there are certain
features of ad hoc network like infrastructure less architecture, routing protocols,
broadcast method, and energy saving when it is applied to such disaster scenario.
It is necessary to propose a possible practical communication model for developing
ad hoc network configuration technologies.
.
.
2
2. INTRODUCTION
In this paper we will discuss about modifing a complex existing MANET
architecture to improve communication capabilities and to make a better disaster
recovery model during any disaster which can be natural or man-made.
The wireless network can be categorised as Infrastructured and Infrastructure less.
In Infrastructured wireless networks , the mobile nodes will have mobility during
communication but the base stations are fixed. When the nodes move out of range
of a particular base station, they eventually get into range of another base station.
In Infrastructure less or ad hoc wireless network, the mobile nodes itself will act as
routers and will move while communicating, there will not be fixed base stations
and these mobile nodes can dynamically create new routing channels among
themselves and form their own network on the move.
In catastrophe situations, robust communication systems are needed to rescue the
public and to ensure safety.[3] Instant speedy rescue should be enforced by the
rescue team as the disaster area may further be affected our moto is to ensure that
information should reach the destination timely manner as well as without loss of
any data. So this task is accomplished by improving routing protocols.
Information should reach the destination timely manner as well as without loss of
any data. This task can be done by routing protocols in other words we can say the
routing is the process of it simply carries information about the best path from
router to router instead of not to move data from one end to another therefore
routing is the process of directing packets from source node to destination node
tables. To transfer a packet to next hop certain operations should be needed to
perform like first of all is Packet switching which involves changing a packet's
physical destination address to that of the next hop and the next one is Path
determination which is the process of choosing an optimal route from all the
available routes typically from all the routing information stored in the respective
routing table , routing protocols can be classified as proactive routing protocol ,
reactive routing protocol and hybrid routing protocol.
3
Proactive Routing Protocols:
A proactive approach to MANET routing implies in this form of routing each
node in the network keeps information of all the nodes contained in the network
seeks to maintain a constantly updation in the topology. The whole network
should, at all times, be known to all nodes. This results in a constant congestion of
routing traffic, but no initial delay in communication. In this routing system those
protocols that require the nodes to continuously evaluate and update the routes.
Eg:
OLSR (Optimized Link State routing):
[5]OLSR is an type of proactive routing protocol used in mobile adhoc network, in
olsr only nodes which are selected as multipoint relay are used for controlling
traffic. It is one of the main system of proactive routing, it working type is that
each node uses its local information to route packets.
Reactive Routing Protocols
Reactive protocols seek to set up routes on-demand. If a node wants to
communicate with a node to which it has no route, the routing protocol will try to
establish secure connection. Reactive Routing Protocols are those routing protocols
in which the nodes does not keep record of other node in the same network. Data is
sent to the destination using the valid route. This type of routing is efficient if the
routes are not often used routes are created only when needed. This requires two
signals called “route discovery” and “route maintenance”.
AODV (Ad-Hoc On-Demand Distance Vector routing protocol):
[6]The Ad-Hoc On-Demand Distance Vector routing protocol is a reactive routing
protocols, and in this protocol the topology information is only transmitted by
nodes when demand. When a node wishes to transmit traffic to a host to which it
has no route, it will generate a route request message that will be spread in a
limited way to other nodes. This causes control traffic overhead, when initiating
such communication, A route is considered found when the route request message
4
reaches either the destination itself, or an intermediate node with a valid route
entry for the destination is found,
and the last one is
Hybrid routing protocol:
[7]Here, each node maintains the network topology information. Protocols
belonging to this category combine the best features of the above two categories.
In this feature nodes within a certain distance from the node or within a particular
geographical location is concerned,these distance is said to be as routing zone of
the given node. For accomplishing routing within this zone, a table-driven
approach is used, an on-demand approach is used for nodes which are located
beyond this zone.
Zone routing protocol (ZRP) :
It is a hybrid routing protocol which effectively
combines the best features of both proactive and reactive routing protocols. It
divides the network into zones ,It requires extra memory because it built a
hierarchical architecture where it has to keep its each and every network
topological information it keeps routing relation in a specified region called zones
which is done like other routing system of query and reply mechanism.
This different protocols have their own role in rescue operation on the basis of
analyzing the disaster affected area in many ways one way is by the
communication system maintenance in post disaster area in case the
communication system was not damaged still there arises some problem like
network congestion which occurs when a network has to carry more data that
actually it can afford there is a chance of network break down .
It is essential to restore communication networks in large scale disasters
earthquake ,floods, avalanches and landslides by repairing the infrastructure as
5
quickly as possible and taking appropriate measures to control congestion.
Communication and sharing of information in emergencies are also possible via ad
hoc networks, which take full advantage of the features of wireless communication
including rapid and temporary setup and outstanding terminal portability and
mobility.
Ad hoc networks can enable communication among temporarily assembled user
terminals without relying on the conventional communication infrastructure. [8] In
these types of cases we need to setup a (DAA) disaster area architecture model
which includes several basic facilities like Lighting Arrangement and Generator
Set, Water Facilities, sanitation, Food- Storage & Distribution, Clothing and
Medical Facilities & Psycho-social Support
3.LITERATURE SURVEY
[9] shows the complete difference between the proactive ,reactive and hybrid
routing protocol with their features
Like in case of reactive routing protocol, If a node wants to send a packet to
another node then this protocol searches for the route in an on-demand manner and
establishes the connection between sender and receiver so that they can
communicate with each other it does not keep information about all the nodes and
in case of proactive routing protocol In this every node maintain routing table
which contains the full information of all the nodes present in the network. The
routing tables are updated periodically after a small time interval.
Proactive protocols have large overhead and less latency while reactive protocols
have less overhead and more latency. So a Hybrid protocol is invented to
overcome the shortcomings of both proactive and reactive routing protocols.
A hybrid protocol is suitable for large networks.
6
[10] Distinguishes between different routing protocols such as Ad-hoc on demand
distance vector routing (AODV) routing is a packet routing protocol used for
dynamic wireless network. It is one of most popular reactive protocol. It is a
collection of mobile nodes without any centralized access point or existing
infrastructure. It provides a free loop, self starting and large number of mobile
nodes. Where, every node maintains the routing information of the every node in
the network by using routing table. In routing table destination address, next level
address and destination sequence number is recorded. Route request (RREQ),
Route reply (RREP) and Route error (RERR) are three types of messages used in
AODV protocol.
The Zone Routing protocol (ZRP) which is an example of hybrid routing protocols
combines the advantages of both reactive and proactive protocol, taking advantage
of proactive discovery within a node's local neighborhood and using a reactive
protocol scheme for communication between this specified neighborhood are
called zones and each node may be of multiple overlapping zones and each zone
may be of different sizes.
Dynamic state routing protocol (DSR) allows the network to be completely self-
organizing and self-configuring, without the need for any existing network
infrastructure or administration. The protocol is composed of the two main
functions called Route Discovery and Route Maintenance, which work together to
allow nodes to discover and maintain routes to arbitrary destinations in the ad hoc
network. In these protocol source is discovered in on demand basis, the sender first
determines the route from source to destination and also it contains the address of
the required node.
DSR protocol comes under proactive routing include easily used for loop-free
routing, operation in networks containing unidirectional links use of only soft state
in routing, and very rapid recovery when routes in the network change. The DSR
protocol is designed mainly for mobile ad hoc networks of up to multiple number
of node and is designed to work well even with very high rates of mobility.
7
So among these it shows that hybrid routing protocol is better then the rest of two.
In catastrophe situations, robust communication systems are needed to rescue the
public and to ensure safety. Instant speedy rescuing should be enforced by the
rescue team as the disaster area may further be affected by disaster which can be
man made or natural. Due to the fact that preinstalled infrastructure may have been
destroyed by the catastrophe, there is a demand for instant communication systems
independent of such infrastructure. The concept of MANET fills this drawback due
to their infrastructureless and decentralized network system they provide a better
backup than wired system. In these disaster area situations, the users of the newly
developed communication systems need reliable communication. The base station
may be either temporarily fixed and mobile stations can be used. The users will be
civil protection forces or the civil defence forces.
like ambulances ,couches, fire fighters, rescue team, paramedics and many others,
the total function of these area is monitored by routing protocols like AODV
protocol
The main objectives of AODV protocol is to quickly
and dynamically adapt to topological changes .Thus AODV is a pure on-demand
routing protocol. The Control messages used in AODV are: Route Request
Messages, Route Reply Messages, Route Error Message and Route Reply
acknowledgement
In these cases the main working principle is AODV maintains
its path by using control messages in certain types of word such as “HELLO”
messages which in turn is used
to detect the neighbours in connectivity range. If there is a link failure, the route
maintenance scheme was engaged. The control messages are sent at one second
interval and the nodes can tolerate a loss of only 2 control messages and will
declare that link is lost. When a source node has to communicate with destination
node, and it does not have a valid route to the destination, it initiates a path
8
discovery process to locate the node. It broadcasts a RREQ which is called route
request control packet to its corresponding neighbours,
which in turn forward the request to their corresponding neighbours, and so on, this
technique carries out until the required destination or an intermediate node with a
new route to the destination is located .
Then comes clustering based AODV routing protocol :
[11] [4] A cluster head is represented by an identifier . Clusters are created for the
proposed network disaster model because when network size increases which
causes the number of nodes to be increased causing network overhead the usage of
clustering procedure reduces this problem by the method of localizing route
discovery and maintenance, and a cluster head is elected in order to reduce routing
control overhead and improves network flexibility and scalability. After that the
performance of Clustered AODV is analysed. Cluster or zonal heads are the
important strategy for the routing ,resource allocations and network
managements. The following are the basic working procedure of clustering based
routing :
Internal cluster routing: In this step each node deploys a routing information
about its particular cluster. When a node sends request to its neighbouring
cluster which is its destination using a route request signal and dose not get
a reply the node which sends request understands that the route is broken
or is down. So it maintains a own path among themselves.
Simulation procedure : step by step procedure from creating a network to
accomplish the work of AODV protocol.
Performance analysis using ZBMRP protocol
ZBMRP comes under hybrid routing protocol it works on the besis of two
completely different protocol s that is working in same working zone. The two
9
routing protocols are Intrazone and the interzone routing protocol the first one
operates inside the specific routing zone internally and learns the minimum
distance and routes to all the nodes within that particular specified zone, and the
second one is based on reactive routing scheme and is used for finding the specific
routes between different routing zones Here the border nodes are referred as
peripheral nodes
Mobility models in MANET:
[12]Mobility models in MANET determine the movements of the nodes in the
considered ad-hoc network. Reference group mobility(RPGM): In this mobility model it has a group leader which determines the group motional behavior the nodes in this group is distributed randomly and the different nodes use their own mobility model, this is generally used movement of crews in disastrous situation.
Random Waypoint Mobility model (RWP): The model is very simple and it is widely used for measuring the performance of MANET, it contains the feature of change in direction and speed and in between them it contains the pause feature of controlling the entire process , after a specific paused time the MANET selects the specific direction in that particular simplified area then another pause time when the time is elapsed it selects another destination.
4.DISASTER RECOVERY USING ROUTING PROTOCOLS
In [13] the recovery model is mentioned as a disaster area is treated as an empty
and open-space area. This assumption is behind
the oversimplified scenarios when studying disaster recovery situations with
MANETs. First, the proposed model will split the disaster area into grids. The area
is going to
be divided into a hexagonal grids, since transmission areas for the node is circular
and the hexagonal is the closer shape to cover circular areas .
10
Three common algorithms are known in finding the paths in such emergency
situations:
The first algorithm explores in all directions equally. The second
algorithm that seeks the lower cost paths by avoiding
the blocked ways due to the disaster, the trees, enemies near places and others
obstacles.
Lastly, the third one is a modified algorithm of the second. Where it was optimized
for a single location. The first algorithms are Breadth first search algorithm, the
second is Dijkstra’s algorithm and the third one is A* algorithm.
Using such algorithms to filter the locked neighbouring cells that are impossible to
pass.And finally a heuristic function is to be applied to find the distance between
two grids/areas
In the other the recovery model is based on simulation model . The main purpose
of the simulation model is to estimate the performance of four different routing
protocols (AODV, DSR, and ZRP) based on various performance metrics for
MANET in realistic environment scenarios. We have considered a simulation
model based on the concept of mobility models. A disaster affected area has been
considered, three different groups for varying number of nodes are taken. Here in
first, the random movement of the nodes in a single group (Rescue relief
helicopters) is considered RWP and in the second and third group people struck
under the disaster affected areas are taken and RPGM model is applied.
Both of the groups are considered with group mobility with same network
condition. One wireless subnet is taken to provide wireless routes between single
group and multiple groups.
11
Phases of disaster management:
[14][15] Now a the disaster recovery scenario is developed but for those who
does not own any modern communication device which can be equipped
with mobile ad hoc technology and can be used as a MANET the main phases
of disaster management are
In a pre disaster scenario is also called mitigation it the process of making
people aware about the upcoming situation of the disaster that includes
reducing loss of life and properties and also to locate places where there can
be mass destruction which is accomplished through satellite ,a satellite
surveys about the disaster proned areas and the transevers of the satellite
forward the information to the nearest base station and from there the
message is delivered to the rescue teams and also by announcing through
radio and television to alert the people
In a post disaster scenario the deployed nodes keep informed about the
places where people are trapped does not matter if the communication
system is damaged or not, the active nodes sends the information to to the
nearest base station and from there it is transmitted to the satellite to the
disaster recovery team. And in many places if the mobile adhoc devices
which are detected such as smartphones, tablets and pda the emergency
response team tries to communicate through it .
Immediate response when disaster is approaching: Immediate response is
carried out by the emergency group such as warning and evacuating people ,
search and rescue, providing immediate assistance and also cleared the
affected area. The adhoc network informs the servivors and emergency
response team to locate the survivors and assist the survivors to save
themselves
12
Preparedness enables the people about how the disaster might affect the
society and the nature of the disaster and to keep them ready about the
disaster .
5.Advantages and disadvantages of MANET:
Advantages:
MANET has infrastructureless , decentralized , shareable , dynamic and
self-organised network.
It is robust, flexible and mobile in nature.
It supports multi hop routing.
It is light weighted terminal.
It does not need to connect with internet to function.
It supports fault tolerance.
It reduces cost since it is free in some cases and works in low power.
Disadvantages:
The power of the battery is limited in some case and needs to renew battery
frequently’
The bandwidth is much lower than wired structure.
The delay may happen when no operation is done by the nodes that means
the nodes are in sleeping mode and suddenly they get the instruction which
requires time to set up.
Certain transmission errors like loss of signal, attenuation, some signals are
consumed by the earth and while passing through building walls the signal
strength gets weak.
13
6.Diagram
This diagram specifies the necessary disaster recovery model.
14
7.Conclusion &Future scope:
As an upcoming technology in the field of wireless communication MANET
plays a vital role when there arises certain emergency situation like disasters ,
catastrophies which can be natural like earthquake, tsunami , building collisions
and man made disasters like terrorism the technology of mobile adhoc network
fixes these problems ,it uses different types of disaster recovery scenario and
mobility models like using applications of different routing protocols, mobile
detection nodes which will able to detect and sent signals to satellite to warn
people but still there arises some problem like the energy utilization because the
nodes which are run by batteries cannot retain its power for long time, it doesnot
provide high bandwidth and sometimes provide high attenuation . These are the
problems which is needed to solve.
15
8.References:
[1]Sam, C. Ramakristanaiah1 R. Praveen. "A Survey on MANETs in Disaster
Rescue Operations."
[2]Boukerche, Azzedine, et al. "Routing protocols in ad hoc networks: A survey."
Computer networks 55.13 (2011): 3032-3080.
[3]Sivagurunathan, S., and K. Prathapchandran. "BEHAVIOUR OF ROUTING
PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR
EMERGENCY AND RESCUE SITUATION IN INDIA."
[4]Kaushik, Gaurav, and Saumya Goyal. "An Clustering based AODV approach
for MANET." Proceeding of International Conference on Emerging Trends in
Engineering and Technology. 2013.
[5]Ruengsatra, Tanapat, et al. "A hybrid communication approach for disaster
recovery system." Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International
Conference on. IEEE, 2015.
[6] KJ, ABHILASH, and SARIKA TALE. "Energy Efficient MANET based
Emergency Communication Module for Post Disaster Recovery."
[7]Gondaliya, Nikhil, and Dhaval Kathiriya. "An application of ad hoc networks in
disaster area for search and rescue operation: a survery and challenges." International Journal of Advanced Research in Computer and Communication
Engineering 3.3 (2014): 5711-5714.
[8] Mahapatra, R. P., Tanvir Ahmad Abbasi, and Mohd Suhaib Abbasi. "A propose
architecture of manet for disaster area architecture." International journal of
computer theory and engineering 2.1 (2010): 31.
16
[9]Kaur, Prabhleen. "An Overview on MANET-Advantages, Characteristics and
Security Attacks." International Journal of Computer Applications, 4th
International Conference on Advancements in Engineering & Technology (ICAET
2016).
[10] Dhenakaran, Dr SS, and A. Parvathavarthini. "An overview of routing
protocols in mobile ad-hoc network." International Journal of Advanced Research
in Computer Science and Software Engineering 3.2 (2013).
[11]Preetha, V., and K. Chitra. "Performance Evaluation of ZBMRP protocol in
Disaster Recovery Scenario."
[12]Pant, Stuti, et al. "Performance Analysis of Various MANET Routing
Protocols with Change in Number of Nodes over Different Mobility Models."
(2016).
[13]Manaseer, Saher, and AfnanAlawneh. "A New Mobility Model for Ad Hoc
Networks in Disaster Recovery Areas." International Journal of Online
Engineering (iJOE) 13.06 (2017): 113-120.
[14]Anjum, Shaik Shabana, Rafidah Md Noor, and Mohammad Hossein Anisi.
"Survey on MANET based communication scenarios for search and rescue
operations." IT Convergence and Security (ICITCS), 2015 5th International
Conference on. IEEE, 2015.
[15]Dr Deepshikha Aggarwal A Smartphone based Framework for Disaster ManagementIJETSRwww.ijetsr.com ISSN 2394 – 3386Volume 4, Issue 7July
2017