Академический Документы
Профессиональный Документы
Культура Документы
Abstract—Mobile Ad-hoc Networks (MANETs) are self- though proper mining design and planning, the hazards of the
organized networks built up for moving objects. The sub-terrestrial world remains unpredictable. This increases the
main challenges posed by MANETs simulation are their vulnerability of the miners. Most of the available technologies
faithful characterization and physical implementation. Logistic
difficulties, economic issues, technology limitations make are restricted in being reactive rather than proactive, which
simulation the mean of choice in the validation of networking means that it cannot predict an imminent disaster situation.
protocols for MANETs widely adopted development of real world And, once the disaster strikes sub-terrestrially, it leaves very
technologies. It is quite interesting to bring down complexities little window of opportunity to control the disaster from
of MANETs in realization of their characteristics both in getting worse. To overcome the difficulties for communication
simulation as well as real-time implementation by defining
MANET for coal miners tracking applications within the between miners, environmental monitoring, surviellance sys-
geographic scenario specified. We have used wired-cum-wireless tem etc. under mines, the paper explains an efficient disaster
technology with mobility in network layer, to achieve our desired management system which not only monitors and tracks the
goals of coal miners tracking and monitoring. The motion of miners at each and every instant, but also helps in establishing
miners is monitored across a predefined geographical area and an efficient wireless communication system between them,
network capability of up to 15 miners. The focus is not only
to track the miners, but also to establish an efficient disaster along with the most advantageous surveillance system.
management system, in order to safeguard the lives of miners.
We have achieved the design of a prototype, by considering B. Surveillance system
a base station and one node (miner). The prototype senses The Self Recording Surveillance System is a combination of
the changes in environmental conditions and warns the miner a VGA CMOS camera, a passive-infrared movement sensor,
of forth coming disaster. Multimedia information about the
mining environment can also be recorded and stored for months a 1 GB SD-card (or bigger), and an AVR Mega32 micro-
through Self recording surveillance System and the recordings controller implementing a solid-state time-lapse recorder. It
is used in case of post disaster investigation. The Self Recording is a compact, complete, self-contained surveillance system
Surveillance System is a combination of a camera, a passive- designed with miners safety and environmental conditions in
infrared movement sensor, a SD-card, and a microcontroller mind. It is installed in minutes, and it is affordable because
implementing a solid-state time-lapse recorder. It is a compact,
complete, self-contained surveillance system designed with of it is built using a handful of inexpensive parts.
miners safety in mind. It can store images and send them at For most typical environments, it stores more than one
the same time to the destination. Recording starts automatically month of images at a maximum rate of a color picture
upon detecting a movement and also when command is executed. every 2 seconds (320x200 pixels, comparable to VHS-CCTV
recorders), or 3 seconds (VGA, 640x480 pixels). Recording
Keywords: Mobile Ad-hoc Network, Access points, Nodes, Re-
peaters, Miners, surveillance system, sensors, Microcontrollers,
starts automatically upon detecting a movement. An infrared
Recorders. remote control and voice-prompt menus allow easy operation,
even when the camera is concealed or installed in places
I. I NTRODUCTION like corners. When the card is full, new images replace
automatically older ones, so the most recent snapshots are
A. Mines available. To investigate the images, the card is accessed from
Mines-excavations under the surface of the earth, can be the controlling station and the stored images are examined. The
classified in many categories as metal and non-metal mines, Self Recording Surveillance System records its files using a
coal mines etc. Surface mining and deep underground mining standard file system (FAT16 or FAT32) and image compression
are the two basic methods of mining. The decision of what format (JPEG). Retrieval is immediate as the camera sorts the
type of mine to construct depends on the depth of the coal pictures in folders according by date and time.
seam and the surrounding terrain. The physical and geo- 1) Network Simulator 2: This simulator (Figure 1) uses
graphical complexity of tunnels in underground mines impairs C++ and OTcl scripting languages using which all the spec-
the visibility of environment and operating assets, including ified conditions above can be executed (Figure 2). NS is a
human beings. Irrespective of the acuteness of locating mineral discrete event simulator targeted at networking research and
and is also responsible for the clients request data. The client
control panel system running on client side helps the user
for identifying current location, destination location, landmark
and the distance to be traveled. Traffic intensity of each lane
is notified through carrier access point. Shivmurthy, et al [5],
explains such a situation wherein the tracking of vehicles is
done using two simulators, Network Simulator (NS) and Sim-
ulation Urban Mobility (SUMO). The basic system concept
constitute three major components called Traffic Simulator,
Network Simulator and Application software to couple two
Simulators, for initial simulation set up and data exchange.
represented as nodes and each has a wireless IP address Fig. 9. Node 4 moving out of range of Access Point.
with a mobility pattern randomly designed.The data exchange
between the nodes and the access points is shown in simulation
results(Figure 11). This area simulated under a base station and
various access points. Mobile Host that moves to other domain
communicates through Mobile IP. DSDV Ad-Hoc network
protocol is used for Routing Mobile Hosts/miners that sits on
each access points. The Mobile Hosts/miners that form Ad-
Hoc Network are monitored/tracked by DSDV and details are
viewed in Network Simulator NS2. The mobility of Mobile
Hosts is varied in the range of 0m/s to 1m/s.
The work of installing sensors and started with pressure and
temperature sensors is started and the result was successful.
The Miners Tracking in a defined geographical area was
logged into a separate information file for 15 miners. A
separate log file was created in DSDV routing file to monitor
Mobile hosts changing access points This file details includes
Miners IP address, time instant at which movement detected
and its locations. In the mobility observation shown are the Fig. 10. Node 4 is warned and is back in coverage area.
screen shots of the nodes (miners) in motion as they take
random path and their mobility can be seen. Here each node
is represented by a circle, access points and base station by can be analyzed using wireless trace file. The screen shots
a hexagon. The big circles around nodes indicate their radio highlight how each miner and access points are represented,
range by default 100m is used for each node. The path taken their position with respect to base-station.
Fig. 13. Ceiling view of a room captured by the Self Recording Surveillance
System Using PIR Sensor.