Skip to main content

Multihop Wireless Access Networks for Flood Mitigation Crowd-Sourcing Systems

  • Chapter
  • First Online:
  • 683 Accesses

Part of the book series: Lecture Notes in Computer Science ((TLDKS,volume 10720))

Abstract

Natural disasters can be mitigated or even anticipated if we have appropriate means, in terms of communications and data sharing models, to collect relevant data in advance or during disaster occurrences, which can be used for supporting disaster prevention and recovery processes. This work proposes a framework that encourages people to collect and share data about disaster, especially flood in Ho Chi Minh City, via on-site established multihop wireless access networks configured by the sharing of internet connectivity in users’ mobile devices. For connectivity sharing, on-the-fly establishment of multihop wireless access network (OEMAN) scheme is thoroughly analyzed and improved to resolve its inherent issue on traffic load imbalance due to its tree-based structure. More specifically, we propose a linear program for overload-aware routing optimization considering wireless interference. Evaluations implemented in Matlab show that the overload-aware routing improves load balancing among available virtual access points in OEMAN. By avoiding nodes with heavy load in the network, our solution improves network throughput compared to overload-unaware routing protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Quang, T.M., Kien, N., Yamada, S.: DRANs: resilient disaster recovery access networks. In: The 1st IEEE International Workshop on Future Internet Technologies (IWFIT 2013), in conjunction with IEEE COMPSAC 2013, pp. 754–759, July 2013

    Google Scholar 

  2. Ogura, J., Park, M., Wakatsuki, Y., Sanchez, R.: Japan earthquakes: dozens killed; race against the clock to find survivors. CNN, April 2016. http://edition.cnn.com/2016/04/16/asia/japanearthquake/

  3. McKirdy, E., Singh, H.S.: Deadly earthquake shakes part of Northeastern India. CNN, January 2016. http://edition.cnn.com/2016/01/03/asia/india-earthquake/

  4. Hanna, J.: 43 dead after typhoon koppu hits Philippines. CNN, October 2015. http://edition.cnn.com/2015/10/22/asia/typhoonkoppu-lando-philippines/

  5. Quang, T.M., Nguyen, K., Cristian, B., Yamada, S.: On-the-fly establishment of multihop wireless access networks for disaster recovery. IEEE Commun. Mag. 52(10), 60–66 (2014)

    Article  Google Scholar 

  6. Quang, T.M., Shibata, Y., Cristian, B., Yamada, S.: On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw. 40, 46–60 (2016). Elsevier

    Article  Google Scholar 

  7. Chandra, R., Bahl, P.: Multinet: connecting to multiple IEEE 802.11 network using a single wireless card. IEEE INFOCOM Hong Kong, pp. 882–893, March 2004

    Google Scholar 

  8. Ho Chi Minh City: Steering center of the urban flood control program, February 2017. http://www.ttcn.hochiminhcity.gov.vn/

  9. Plate, E.J.: Flood risk and flood management. J. Hydrol. 267, 2–11 (2002)

    Article  Google Scholar 

  10. van der Kooij, M.: Flood monitoring and disaster management response. GEO-connexion Int. Mag. 26–28 (2013)

    Google Scholar 

  11. de Brito Moreira, R., Degrossi, L.C., De Albuquerque, J.P.: An experimental evaluation of a crowdsourcing-based approach for flood risk management. In: 12th Workshop on Experimental Software Engineering (ESELAW), At Lima, Peru, pp. 1–11, April 2015

    Google Scholar 

  12. Do, H.N., Vo, M.T., Tran, V.S., Tan, P.V., Trinh, C.V.: An early flood detection system using mobile networks. In: International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, pp. 599–603, October 2015

    Google Scholar 

  13. Gomes, J.L., Jesus, G., Rogeiro, J., Oliveira, A., Tavares da Costa, R., Fortunato, A.B.: Molines - towards a responsive web platform for flood forecasting and risk mitigation. In: Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1171–1176 (2015)

    Google Scholar 

  14. Amrani, C.E., Rochon, G.L., El-Ghazawi, T., Altay, G., Rachidi, T.: Development of a real-time urban remote sensing initiative in the Mediterranean region for early warning and mitigation of disasters. In: IEEE International Geoscience and Remote Sensing Symposium (IGARSS), pp. 2782–2785 (2012)

    Google Scholar 

  15. Serpico, S., Dellepiane, S., Boni, G., Moser, G., Angiati, E., Rudari, R.: Information extraction from remote sensing images for flood monitoring and damage evaluation. Proc. IEEE 100(10), 2946–2970 (2012)

    Article  Google Scholar 

  16. Mandal, S., Saha, D., Banerjee, T.: A neural network based prediction model for flood in a disaster management system with sensor networks. In: International Conference on Intelligent Sensing and Information Processing, pp. 78–82 (2005)

    Google Scholar 

  17. Perez, P., Holderness du Chemin, T., Turpin, E., Clarke, R.: Citizen-driven flood mapping in Jakarta: a self-organising socio-technical system. In: IEEE International Conference on Self-adaptive and Self-organizing Systems Workshops (SASOW), pp. 174–178 (2015)

    Google Scholar 

  18. Funayama, T., Yamamoto, Y., Tomita, M., Uchida, O., Kajita, Y.: Disaster mitigation support system using Twitter and GIS. In: International Conference on ICT and Knowledge Engineering, pp. 18–23 (2014)

    Google Scholar 

  19. Ma, Q., Gao, L., Liu, Y.F., Huang, J.: A game-theoretic analysis of user behaviors in crowdsourced wireless community networks. In: 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 355–362 (2015)

    Google Scholar 

  20. Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  21. Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., Crowcroft, J.: XORs in the air: practical wireless network coding. SIGCOMM Comput. Commun. Rev. 36(4), 243–254 (2006). http://doi.acm.org/10.1145/1151659.1159942

  22. Fan, K., Wei, X., Long, D.: A load-balanced route selection for network coding in wireless mesh networks. In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, pp. 1–6, 14–18 June 2009. http://dx.doi.org/10.1109/ICC.2009.5198624

  23. Maxemchuk, N.F.: Dispersity routing. In: International Conference on Communications (ICC 75), pp. 41.10–41.13, San Francisco, CA, June 1975

    Google Scholar 

  24. Sengupta, S., Rayanchu, S., Banerjee, S.: Network coding-aware routing in wireless networks. IEEE/ACM Trans. Netw. 18(4), 1158–1170 (2010)

    Article  Google Scholar 

  25. Jain, K., Padhye, J., Padmanabhan, V.N., Qiu, L.: Impact of interference on multi-hop wireless network performance. In: Proceedings of ACM MobiCom, pp. 66–80, September 2003

    Google Scholar 

  26. Fon website, February 2017. https://corp.fon.com/en

  27. Zhang, Y., Chen, H.-H., Guizani, M.: Cooperative Wireless Communications, 1st edn. CRC Press, Boca Raton (2009)

    Book  Google Scholar 

  28. Olfati-Saber, R., Fax, J.A., Murray, R.M.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215–233 (2007)

    Article  MATH  Google Scholar 

  29. Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgement

This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number C2017-20-16.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quang Tran Minh .

Editor information

Editors and Affiliations

Appendix A Overload Detection in OEMAN

Appendix A Overload Detection in OEMAN

This section describes functionalities in OEMAN to handle overloaded nodes. Some of these functions have been modified to adapt them to our optimization model. Let \(L_{i}\) denotes the load of node i \(\in \) V. The load \(L_i\) is defined as the total amount of traffic \(u_{(i(e))}\) which is unicast on link e at node i minus the sending capacity \(q_{i(e)}\) of node i on link e:

$$\begin{aligned} L_{i} = u_{(i(e))} - q_{i(e)} \end{aligned}$$
(8)

Overload is detected at a node i when \(L_i > B_i\), where \(B_i\) is the buffer size of node i. Overload detection is illustrated in Fig. 10. In this example, \(PC_1\) is the VAP of \(PC_3\) and \(PC_4\), where PC is personal computer. \(PC_1\) examines its load [Algorithm 1: line 7–9] by

$$\begin{aligned} L_{PC_1} = u_{PC_1(e(PC_1,AP))} - q_{PC_1(e(PC_1,AP))} \end{aligned}$$
(9)

where \(q_{PC_1(e(PC_1,AP))}\) is the sending capacity of node \(PC_1\) on the link \(PC_1\) to AP and \(u_{PC_1(e(PC_1,AP))}\) is the total amount of traffic from \(PC_3\) and \(PC_4\) which is unicast on link \(e(PC_1,AP)\) at \(PC_1\). \(PC_1\) detects that it is overloaded (\(L_{PC_1}\) \({>}\) \({B_{PC_1}}\)) [Algorithm 1: line 7] since the traffic from two sub-trees t1 and t2 rooted by \(PC_3\) and \(PC_4\) is greater than the buffer capacity of node \(PC_1\). In that case, \(PC_1\) asks for help from other PCs for sharing load. Consequently, \(PC_1\) will broadcast its overload messages to all PCs managed by it, namely \(PC_3\) and \(PC_4\). Immediately, \(PC_4\) moves to another VAP (\(PC_2\)) [Algorithm 1: line 10–11] to transmit its traffic to AP. Examining wireless interference under the protocol model of interference [29] is also performed before doing a handover to \(PC_2\). Consequently, load balancing among VAPs is achieved.

Fig. 10.
figure 10

A node with heavy load in a tree-based network

Algorithm 1 describes the computing of load at a VAP and the execution of the handovers in the case of the overloaded VAP.

figure a

Algorithm 2 is the handover function which considers the conditions of doing a handover of any client node.

figure b

Algorithm 3 is the function returning the value of sending capacity of examining node.

figure c

Algorithm 4 is the function returning the value of a VAP which can be consider for serving handover of a client node.

figure d

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer-Verlag GmbH Germany

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Minh, Q.T., Toulouse, M. (2017). Multihop Wireless Access Networks for Flood Mitigation Crowd-Sourcing Systems. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T., Thoai, N. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI. Lecture Notes in Computer Science(), vol 10720. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56266-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-56266-6_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-56265-9

  • Online ISBN: 978-3-662-56266-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics