Вы находитесь на странице: 1из 6

An Efficient Disaster Management System for Coal

Miners Using Sensor MANETs


Rama Murali G K Sriharsha D V Swarnalatha Srinivas and G. Narendra Kumar
ISRO Satellite Centre EMC2 Dept. of Electronics & Communication,
Bangalore Email: sriharshadv87@gmail.com UVCE, Bangalore - 560001
Email: ramamuraligk@gmail.com Email: gnarenk@yahoo.com

Abstract—Mobile Ad-hoc Networks (MANETs) are self- though proper mining design and planning, the hazards of the
organized networks built up for moving objects. The sub-terrestrial world remains unpredictable. This increases the
main challenges posed by MANETs simulation are their vulnerability of the miners. Most of the available technologies
faithful characterization and physical implementation. Logistic
difficulties, economic issues, technology limitations make are restricted in being reactive rather than proactive, which
simulation the mean of choice in the validation of networking means that it cannot predict an imminent disaster situation.
protocols for MANETs widely adopted development of real world And, once the disaster strikes sub-terrestrially, it leaves very
technologies. It is quite interesting to bring down complexities little window of opportunity to control the disaster from
of MANETs in realization of their characteristics both in getting worse. To overcome the difficulties for communication
simulation as well as real-time implementation by defining
MANET for coal miners tracking applications within the between miners, environmental monitoring, surviellance sys-
geographic scenario specified. We have used wired-cum-wireless tem etc. under mines, the paper explains an efficient disaster
technology with mobility in network layer, to achieve our desired management system which not only monitors and tracks the
goals of coal miners tracking and monitoring. The motion of miners at each and every instant, but also helps in establishing
miners is monitored across a predefined geographical area and an efficient wireless communication system between them,
network capability of up to 15 miners. The focus is not only
to track the miners, but also to establish an efficient disaster along with the most advantageous surveillance system.
management system, in order to safeguard the lives of miners.
We have achieved the design of a prototype, by considering B. Surveillance system
a base station and one node (miner). The prototype senses The Self Recording Surveillance System is a combination of
the changes in environmental conditions and warns the miner a VGA CMOS camera, a passive-infrared movement sensor,
of forth coming disaster. Multimedia information about the
mining environment can also be recorded and stored for months a 1 GB SD-card (or bigger), and an AVR Mega32 micro-
through Self recording surveillance System and the recordings controller implementing a solid-state time-lapse recorder. It
is used in case of post disaster investigation. The Self Recording is a compact, complete, self-contained surveillance system
Surveillance System is a combination of a camera, a passive- designed with miners safety and environmental conditions in
infrared movement sensor, a SD-card, and a microcontroller mind. It is installed in minutes, and it is affordable because
implementing a solid-state time-lapse recorder. It is a compact,
complete, self-contained surveillance system designed with of it is built using a handful of inexpensive parts.
miners safety in mind. It can store images and send them at For most typical environments, it stores more than one
the same time to the destination. Recording starts automatically month of images at a maximum rate of a color picture
upon detecting a movement and also when command is executed. every 2 seconds (320x200 pixels, comparable to VHS-CCTV
recorders), or 3 seconds (VGA, 640x480 pixels). Recording
Keywords: Mobile Ad-hoc Network, Access points, Nodes, Re-
peaters, Miners, surveillance system, sensors, Microcontrollers,
starts automatically upon detecting a movement. An infrared
Recorders. remote control and voice-prompt menus allow easy operation,
even when the camera is concealed or installed in places
I. I NTRODUCTION like corners. When the card is full, new images replace
automatically older ones, so the most recent snapshots are
A. Mines available. To investigate the images, the card is accessed from
Mines-excavations under the surface of the earth, can be the controlling station and the stored images are examined. The
classified in many categories as metal and non-metal mines, Self Recording Surveillance System records its files using a
coal mines etc. Surface mining and deep underground mining standard file system (FAT16 or FAT32) and image compression
are the two basic methods of mining. The decision of what format (JPEG). Retrieval is immediate as the camera sorts the
type of mine to construct depends on the depth of the coal pictures in folders according by date and time.
seam and the surrounding terrain. The physical and geo- 1) Network Simulator 2: This simulator (Figure 1) uses
graphical complexity of tunnels in underground mines impairs C++ and OTcl scripting languages using which all the spec-
the visibility of environment and operating assets, including ified conditions above can be executed (Figure 2). NS is a
human beings. Irrespective of the acuteness of locating mineral discrete event simulator targeted at networking research and
and is also responsible for the clients request data. The client
control panel system running on client side helps the user
for identifying current location, destination location, landmark
and the distance to be traveled. Traffic intensity of each lane
is notified through carrier access point. Shivmurthy, et al [5],
explains such a situation wherein the tracking of vehicles is
done using two simulators, Network Simulator (NS) and Sim-
ulation Urban Mobility (SUMO). The basic system concept
constitute three major components called Traffic Simulator,
Network Simulator and Application software to couple two
Simulators, for initial simulation set up and data exchange.

III. D ESIGN AND I MPLEMENTATIONS

Fig. 1. NS-2 Implementation A. Simulation of Network Scenario


The mobile nodes described so far mainly supports simu-
lation of multi-hop ad-hoc networks or wireless LANs. In ns,
routing information is generated based on he connectivity of
the topology, i.e. how nodes are connected to one another
through Links. Mobile nodes on the other hand have no
concept of links. They route packets among themselves, within
the wireless topology, using their routing protocol.
Base station here is the controlling station situated on the
earthsurface and it is wired to the access points situated under
mines at some predefined static places. The mining area is
Fig. 2. NS-2 completely installed with the MANETs environment, each
miner acting as a mobile node and access point itself being
a static node. BaseStationNode is created which plays the
provides substantial support for simulation of TCP, routing, role of a gateway for the wired and wireless domains. The
and multicast protocols over wired and wireless (local and BaseStationNode is essentially a hybrid between a Hierar-
satellite) networks which is heavily used in ad-hoc networking chical node1 (HierNode) and a MobileNode. The basestation
research as in routing protocols: AODV, DSDV, DSR, etc. NS2 node is responsible for delivering packets into and out of
is a discrete event simulator for networking research which the wireless domain. Each wireless domain along with its
works at packet level. This simulator provides substantial base-station would have a unique domain address assigned
support to simulate bunch of Protocols like TCP, UDP, FTP, to them. All packets destined to a wireless node would reach
HTTP and DSR. This software is used to simulate both wired the base-station attached to the domain of that wireless node,
and wireless network. who would eventually hand the packet over to the destination
NAM is a Tcl/TK based animation tool for viewing network (mobilenode). And mobilenodes route packets, destined to
simulation traces and real world packet traces. It is mainly outside their (wireless) domain, to their base-station node. The
intended as a companion animator to the NS simulator. mobilenodes in wired-cum-wireless scenario are required to
The network simulator supports TCP, UDP, HTTP, etc. pro- support hierarchical addressing/routing. Thus the MobileN-
tocols, traffic Models: Web Traffic, CBR, Topology Generation ode looks exactly like the BaseStationNode. The SRNode,
tools, Visualization tools, Large validation package, Protocol however, needs to have its own hier-address since it does
validation, Controlled experimental conditions and Low cost, not require any address demuxes and thus is not required to
time, collaboration and complexity. support hierarchical routing. The DSDV agent on having to
forward a packet checks to see if the destination is outside
II. R ELATED W ORK its (wireless) subnet and tries to forward the packet to its
VANET [4], deals with moving nodes which are a tad base-station node. In case no route to base-station is found
quicker referred to vehicles (nodes). But under such scenario, the packet is dropped or the packet is forwarded to the next
the network establishment is difficult since the node switches hop towards the base-station, which is then routed towards the
from one network to other rapidly.VANET system works on wired network by base stations classifiers. The DSR agent,
the principle identification of a vehicle, which is assigned on receiving a packet destined outside its subnet, sends out a
as Mobile-IP address to a vehicle. The system tracks the route-query for its base-station in case the route to base-station
vehicle through access points, which are established at various is not known. The data packet is temporarily cached while it
locations in lane or parks or in large campus. The carrier is a waits to hear route replies from base-station. On getting a
navigation server that connects with multiple clients (nodes) reply the packet is provided with routing information in its
Fig. 3. The mobile unit.

Fig. 4. The base unit.

header and sends away towards the base-station. The base-


station address demuxes routes it correctly toward the wired Fig. 5. Circuit diagram.
network.
B. Hardware Implementation of Sensor Systems The connector features also extra signals indicating card
The Hardware prototype designed has two parts. One Mo- insertion status and the position of the write-protect tab of the
bile unit (Figure 3) and the other was being Base unit (Figure card. We routed them to two spare I/O pins (internal pull-ups
4). The mobile unit which is to be fixed in the headgear enabled). A different kind of switch, the micro switch detect-
of the miner acts as the node of the MANET. The mobile ing when the lid is opened, and the external trigger switch
unit designed is as shown in the figure. The mobile unit will connect in the same way to the AVR However, we selected
have different types of sensors to gather the information of one of the three AVR interrupt pins for the external trigger,
environmental conditions and send to the base unit which in order to capture and flag automatically any transition. The
is fixed above the earth surface, Microcontroller to process same applies to the PIR input too. The latter pin comes from a
the information, ADC to convert the analog electrical signal Vishay TSOP34836 infrared receiver IC. Four LEDs showing
outputs of the sensors into digital signals for the proceeding device status take half of the port A. A spare bit on port C
operations. drives the relay output by means of the typical transistor &
The mobile system also will have the communication equip- diode network.
ments and multimedia devices. The transceiver helps in the
communication process between miners and between miner IV. R ESULTS
and the base unit operator at the controlling station. The snapshots of the simulated environment comprising
The designed prototype has the P89V51RD2 motherboard, of nodes (miners), access points and base station are shown
which is an 8051 architecture microcontroller board on which (Figure 6). The small circles indicate the nodes of the network
the various components are interfaced. environment, the access point and base station are shown in
1) Hardware Implementation of Surveillance System hexagons. The circles around the nodes explain the coverage
Recorder:: The below circuit diagram (Figure 5) sums up areas of the individual nodes. The nodes are designed to
the design and implementation methods we have followed be in continuous motion, communicating with the neighbors.
for bringing the surveillance system using PIR sensor and Each node transfers the information about its positions (in
coupling it with he storage media. The implementation details terms of Cartesian coordinates) to the base station every
are summed up here: The circuit develops around the AT instant(Figure 7). The miners (nodes) are identified at the base
Mega 32, and most interfacing resolves to straight connections, station by the unique IP address. The controlling station gives
as all AVR I/O pins provide programmable pull-ups and out the warning signals as well as other required information
respectable output current. One notable exception is the PIR through the access point. The access points act as repeaters,
movement sensor (Intertecs ITM256), which is a 5V part increasing the signal strength in the mining environment. The
(opposed to the rest of the circuit that works at 3.3V), and snapshots are taken from the Network animator. Each and
needs an independent power regulator (IC3, an LM2936-Z5 every node here is being tracked and the packet exchange
low-dropout, low quiescent current regulator from National). between miners and the base station are shown(Figure 8)s.
The camera module (Intertec ITCM328) connects to the UART The node 4, 11, and 10 perfectly explains the packet exchange,
RX and TX pins. Communication runs at 115200 baud, thus acknowledgements exchange(Figure 9) and how the safety of
we selected a 7.3728 MHz crystal for exact bit timing. The miners is achieved(Figure 10).
SD-CARD connects directly to the SPI port pins. The card MANET simulations were carried out in a topological area
connector is a Yamaichi FPS009-3202. of 100mx100m. Under this area include 15 to 50 miners
Fig. 6. Initial position.

Fig. 8. Access point monitoring Node 4.

Fig. 7. Node 4 sending data to access point.

represented as nodes and each has a wireless IP address Fig. 9. Node 4 moving out of range of Access Point.
with a mobility pattern randomly designed.The data exchange
between the nodes and the access points is shown in simulation
results(Figure 11). This area simulated under a base station and
various access points. Mobile Host that moves to other domain
communicates through Mobile IP. DSDV Ad-Hoc network
protocol is used for Routing Mobile Hosts/miners that sits on
each access points. The Mobile Hosts/miners that form Ad-
Hoc Network are monitored/tracked by DSDV and details are
viewed in Network Simulator NS2. The mobility of Mobile
Hosts is varied in the range of 0m/s to 1m/s.
The work of installing sensors and started with pressure and
temperature sensors is started and the result was successful.
The Miners Tracking in a defined geographical area was
logged into a separate information file for 15 miners. A
separate log file was created in DSDV routing file to monitor
Mobile hosts changing access points This file details includes
Miners IP address, time instant at which movement detected
and its locations. In the mobility observation shown are the Fig. 10. Node 4 is warned and is back in coverage area.
screen shots of the nodes (miners) in motion as they take
random path and their mobility can be seen. Here each node
is represented by a circle, access points and base station by can be analyzed using wireless trace file. The screen shots
a hexagon. The big circles around nodes indicate their radio highlight how each miner and access points are represented,
range by default 100m is used for each node. The path taken their position with respect to base-station.
Fig. 13. Ceiling view of a room captured by the Self Recording Surveillance
System Using PIR Sensor.

Fig. 11. A plot of movement of node 4


The power loss is made much minimum by making the
communication wired till the access points from the base
station.
The photo (Figure 13) above shows the ceiling view of
one of the living-room captured by the SELF RECORDING
SURVEILLANCE SYSTEM USING PIR SENSOR. Mileage
can vary, but you should be able to get about 50,000 frames at
Fig. 12. The information transfer is in half duplex mode. 320x200 (like the one below), or 25,000 at 640x480, using a
1 GB card. This corresponds to more than 40 hours of overall
recording.
V. R ESULTS OF H ARDWARE S YSTEMS Actual time span is much more than that. Likely, the best
The prototype that designed has two units-one mobile unit location for the camera is in the foyer, where people stand
and one base unit. Only one node is considered for the just a few minutes per day. In our case; just 20 minutes on
hardware prototype in initial stage. In actual scenario, every average, giving an impressive 120 days of storage capacity.
node is given its own IP address and the base station keeps The SELF RECORDING SURVEILLANCE SYSTEM US-
on receiving the signals from all the nodes. ING PIR SENSOR fulfills all our needs, but we know from
Getting the information(Figure 12), it updates the log file experience that it would be presumptuous to consider it a
about the location of the miner, the surrounding conditions finished product. Extensive testing, like verification against
of the particular miner is displayed. Based on the conditions the most commonly available cards and PC readers, would
received, the base unit decides which miner has to be warned be a huge task. Nonetheless, its potential should be easy to
and to that miner having the particular IP address, from appreciate, even in this homemade incarnation.
which dangerous conditions are being monitored, the warning The design is unquestionably useful. We hope people will
signals are sent. If the miner to which the warnings has to also like the design philosophy. The SELF RECORDING
be sent is out of the network coverage area, the network SURVEILLANCE SYSTEM USING PIR SENSOR merges
sends the signals to the destined miner via the neighboring two mainstream technologies flash memory and image sensors
miner as he still in the network area of the lost miner. The to create something new and practical. The result is a very
controller can also receive and send the voice signals from flexible concept: after you play some time with the prototype,
the miners and also some external warning signals if needed. it is really easy to find applications you havent thought before.
The designed hardware unit efficiently transmits and receives This design is definitely inexpensive. It takes advantage
to a range of 100 mts. The conditions considered are above from mass-produced components to generate an extremely
the earth surface, normal environmental conditions as initial cost-effective solution. The price of the most expensive part,
work. The sensors installed are pressure and temperature as the SD-card, is dropping every day, thanks to the booming
the microcontroller we used has limited number of interrupts. markets of music players and digital cameras. The same
Depending on the microcontroller used, the number of sensors applies to the camera module, which comes from the mobile
can be increased thereby increasing the monitoring efficiency. telephony market. Compared to standard video surveillance
As the network protocol used being DSDV the loss of data is equipment, the savings are striking, and more than balancing
minimal and efficient communications links are established. for the reduced frame rate or resolution. Other optimizations
are more serious. Replacing the LCD with a voice interface is
both cost-effective and optimal from a ease-of-use perspective.
The choice of the Mega32 processor is a perfect fit. It handles
easily its workload, and almost all its hardware features are
used. Also the sizes of FLASH and RAM are just right for
the application.
VI. C ONCLUSION AND F UTURE W ORK
In this paper we try to bring out the good use of ad-
hoc networks in the field of mine monitoring. It has become
a challenge for the present day technology to avoid the
disasters occurring during mining. The system not only tracks
a particular node but also keeps its trace at all instants of time.
We intend to incorporate different types of sensors like
humidity sensor, suitable gas detectors and sensors thereby
increasing the monitoring efficiency. Along with these sensors,
our work intends to achieve the system working even though
the power fails for very long duration. We also intend to bring
out the model in the form of a chip, which eases problems of
bulkiness and large area.
R EFERENCES
[1] G. K. Ramamurali, D. V. Sriharsha, J. Supreeth and G. Narendra Kumar,
MANETs for Tracking and Monitoring Coal Miners, B R V Vardhan Paper
Presentation, SJCE, Mysore, IEEE Bangalore Section, Nov. 2007,
[2] Shivamurti, Swarnalatha Srinivas and G. Narendra Kumar, Vehicular Ad-
Hoc Networks (VANETs) for Vehicle Tracking, TSEC National Confer-
ence, Mumbai, INDIA, pp: 30-34, Mar. 2007.
[3] c. Magnus Frodigh, Per Johansson and Peter Larsson, Wireless Ad-Hoc
Networking-the art of networking without a network, Ericsson Review,
No. 4, 2000.
[4] A. Thangavelu, K. Bhuvaneshwari, K. Kumar, K. Senthilkumar and
S. N. Sivanandan, Location Identification and Vehicle Tracking using
VANET, Signal Processing, Communications and Networking, 2007.
ICSCN apos.07. International Conference, pp: 112-116, Feb.2007.
[5] B. S. Sharif, P. T. Blythe, S. M. Almajnooni and C. C. Tsimenidis, Inter-
vehicle mobile ad hoc network for road transport systems, The Institution
of Engineering and Technology 11th, Newcastle University, UK, Jan.
2007.
[6] Patrick Studi, A framework for low-level QoS signaling components in
MANETs, Master Thesis, Jul. 2005.
[7] Christoph Sommer, Isabel Dietrich and Falko Dressler, Realistic Sim-
ulation of Network Protocols in VANET Scenarios, In Proceedings of
the SCS Communication Networks and Distributed Systems Modeling
and Simulation Conference (CNDS 2002), San Antonio, TX, Jan. 27-31,
2002.
[8] Panagiotis Papadimitratos and Zygmunt J. Haas, Secure Routing for
Mobile Ad hoc Networks, Wireless Networks Laboratory, School of
Electrical and Computer Engineering, Cornell University, 395 and 323
F.T. Rhodes Hall, Ithaca NY 14853.
[9] David B. Large, Lawrence Ball, and Arnold J. Farstad, Radio Transmis-
sion to and from Underground Coal Mines-Theory and Measurement,
IEEE Transactions on Communications, University of California, Berke-
ley, CA, March 1973.
[10] Alfred G. Emslie, Robert L. Lagace, and Peter F. Strong, Theory of
the Propagation sf UHF Radio Waves in Coal Mine Tunnels, IEEE
Transactions on antennas and propagation, Vol AP-23, No. 2, Mar. 1975.
[11] Tuulia Kullberg, The Effect of the Access Point Selection, Method on
Reachability between a Mobile Ad hoc Node and a Fixed Node, Masters
Thesis, Helsinki University of Technology, Department of Computer
Science and Engineering, Laboratory for Theoretical Computer Science,
2005.
[12] Shejie Li S. H., Gary Chan and Jingyi He, WIANI: Wireless In-
frastructure and Ad-Hoc Network Integration, Department of Electrical
Engineering, Princeton University, USA; New Territorie, Hong Kong.
[13] Violet R. Syrotiuk and Edgar Chvez, Ad-Hoc, Mobile, and Wireless
Networks, 4th International Conference, ADHOC-NOW 2005, Cancun,
Mexico, Oct. 2005.

Вам также может понравиться