Login | Register

Application Layer Architectures for Disaster Response Systems

Title:

Application Layer Architectures for Disaster Response Systems

Hormati, Mohammadmajid (2013) Application Layer Architectures for Disaster Response Systems. PhD thesis, Concordia University.

[thumbnail of Hormati_PhD_F2013.pdf]
Preview
Text (application/pdf)
Hormati_PhD_F2013.pdf - Accepted Version
Available under License Spectrum Terms of Access.
2MB

Abstract

Traditional disaster response methods face several issues such as limited situational awareness, lack of interoperability and reliance on voice-oriented communications. Disaster response systems (DRSs) aim to address these issues and assist responders by providing a wide range of services. Since the network infrastructure in disaster area may become non-operational, mobile ad-hoc networks (MANETs) are the only alternative to provide connectivity and other network services. Because of the dynamic nature of MANETs the applications/services provided by DRSs should be based on distributed architectures. These distributed application/services form overlays on top of MANETs.
This thesis aims to improve three main aspect of DRSs: interoperability, automation, and prioritization. Interoperability enables the communication and collaboration between different rescue teams which improve the efficiency of rescue operations and avoid potential interferences between teams. Automation allows responders to focus more on their tasks by minimizing the required human interventions in DRSs. Automation also allows machines to operate in areas where human cannot because of safety issues. Prioritization ensures that emergency services (e.g. firefighter communications) in DRSs have higher priority to receive resources (e.g. network services) than non-emergency services (e.g. new reporters’ communications). Prioritizing vital services in disaster area can save lives.
This thesis proposes application layer architectures that enable three important services in DRSs and contribute to the improvement of the three aforementioned aspects of DRSs: overlay interconnection, service discovery and differentiated quality of service (QoS). The overlay interconnection architecture provides a distributed and scalable mechanism to interconnect end-user application overlays and gateway overlays in MANETs. The service discovery architecture is a distributed directory-based service discovery mechanism based on the standard Domain Name System (DNS) protocol. Lastly, a differentiated QoS architecture is presented that provides admission control and policy enforcement functions based on a given prioritization scheme.
For each of the provided services, a motivation scenario is presented, requirements are derived and related work is evaluated with respect to these requirements. Furthermore, performance evaluations are provided for each of the proposed architectures. For the overlay interconnection architecture, a prototype is presented along with performance measurements. The results show that our architecture achieves acceptable request-response delays and network load overhead. For the service discovery architecture, extensive simulations have been run to evaluate the performance of our architecture and to compare it with the Internet Engineering Task Force (IETF) directory-less service discovery proposal based on Multicast DNS. The results show that our architecture generates less overall network load and ensures successful discovery with higher probability. Finally, for the differentiated QoS architecture, simulations results show that our architecture not only enables differentiated QoS, it also improves overall QoS in terms of the number of successful overlay flows.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Thesis (PhD)
Authors:Hormati, Mohammadmajid
Institution:Concordia University
Degree Name:Ph. D.
Program:Electrical and Computer Engineering
Date:18 August 2013
Thesis Supervisor(s):Khendek, Ferhat and Glitho, Roch
ID Code:977529
Deposited By: MOHAMMADMAJID HORMATI
Deposited On:13 Jan 2014 15:00
Last Modified:18 Jan 2018 17:44

References:

[1] A. S. Bahora et al., “Integrated peer-to-peer applications for advanced emergency response systems. Part I. Concept of operations,” IEEE Systems and Information Engineering Design Symposium, pp. 255- 260, 24-25 April 2003.
[2] K. Lorincz et al., “Sensor networks for emergency response: challenges and opportunities,” IEEE Pervasive Computing, vol.3, no.4, pp. 16- 23, Oct.-Dec. 2004.
[3] T. Gao et al., “The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage,” IEEE Transactions on Biomedical Circuits and Systems, vol.1, no.3, pp.203-216, Sept. 2007.
[4] A. Müller, A. S. Shirazi, F. Alt, A. Schmidt, “ZoneTrak: Design and Implementation of an Emergency Management Assistance System,” Adjunct Proceedings of the Eigth International Conference on Pervasive Computing (Pervasive 2010), Springer Helsinki, Finland 2010.
[5] J. Casper, R. R. Murphy, “Human-robot interactions during the robot-assisted urban search and rescue response at the World Trade Center,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.33, no.3, pp. 367- 385, June 2003.
[6] J. Liu and I. Chlamtac, “Mobile Ad-Hoc Networking with a View of 4G Wireless: Imperatives and Challenges”, Mobile Ad Hoc Networking, chapter 1, Wiley-IEEE Press, July 2004.
[7] E. K. Lua, et al., “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Communications Surveys & Tutorials, vol.7, no.2, pp. 72- 93, Second Quarter 2005.
[8] IDD-ESCAP. (2011), “ICT for Disaster Management: Real life examples,” [Online]. Available: http://www.unapcict.org/ecohub/ict-for-disaster-management-real-life-examples.
[9] N. Aschenbruck et al., “Modelling mobility in disaster area scenarios,” Proceedings of 10th ACM IEEE Int. Symp. Model. Anal. Simul. Wirel. Mob. Syst. MSWIM, Chania, Greece, 2007.
[10] S. Hamedi, M. Hormati, R. Glitho, and F. Khendek, “Integrating wireless sensor networks and mobile ad hoc networks for an enhanced end-user experience,” Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services, 2010 ITU-T, pp.1-7, 13-15 Dec. 2010.
[11] M. Hormati, F. Belqasmi, R. Glitho, and F. Khendek, “A DNS Protocol-Based Service Discovery Architecture For Disaster Response Systems,” Proceedings of IEEE symposium on Computers and Communications (ISCC), 2013.
[12] S. Cheshire and M. Krochmal, “Multicast DNS,” IETF RFC 6762, February 2013.
[13] H. Hartenstein and K. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Communications Magazine, vol.46, no.6, pp.164-171, June 2008.
[14] M. S. Corson, J. P. Macker, and G. H. Cirincione, “Internet-Based Mobile Ad Hoc Networking,” IEEE Internet Computing, July–August 1999, pp.63-70.
[15] H. Luo et al., “The Design and Evaluation of Unified Cellular and Ad-Hoc Networks,” IEEE Transactions on Mobile Computing, vol.6, no.9, pp.1060-1074, Sept. 2007.
[16] H. Wu et al., “Integrated cellular and ad hoc relaying systems: iCAR,” IEEE Journal on Selected Areas in Communications, vol.19, no.10, pp.2105-2115, Oct 2001.
[17] Conti, M., “Body, Personal, and Local Ad Hoc Wireless Networks,” M. Ilyas (Ed.), Handbook of Ad Hoc Networks, CRC Press, New York, 2003 (Chapter I).
[18] S. Ullah et al., “A Comprehensive Survey of Wireless Body Area Networks,” Journal of Medical Systems, Volume 36, Issue 3, pp.1065-1094, 2012.
[19] IEEE 802.15 working group for WPAN website, [online] Available: http://grouper.ieee.org/groups/802/15/.
[20] B. Crow et al., “IEEE 802.11 Wireless Local Area Networks”, IEEE Communications Magazine, vol.35, no.9, pp.116,126, Sep 1997.
[21] Napster, available at Internet: http://www.napster.com/.
[22] M. Ripeanu, “Peer-to-peer architecture case study: Gnutella network,” Proceedings of First International Conference on Peer-to-Peer Computing, pp.99-100, Aug 2001.
[23] Bittorrent, available at Internet: http://www.bittorrent.com/.
[24] Kazaa, available at Internet: http://www.kazaa.com/.
[25] Skype, available at Internet: http://www.skype.com/.
[26] J. Liebeherr, T. K. Beam, “HyperCast: A Protocol for Maintaining Multicast Group Members in a Logical Hypercube Topology,” Proceedings of the First International COST264 Workshop on Networked Group Communication, p.72-89, November 17-20, 1999.
[27] I. Clarke et al., “Freenet: A distributed anonymous information storage and retrieval system,” ICSI Workshop on Design Issues in Anonymity and Unobservability, pp.46-66, 2000.
[28] Overnet, available at Internet: http://www.overnet.org/.
[29] K. Ponmozhi, R. S. Rajesh, “Applying P2P in MANETs for resource sharing,” International Conference on Control, Automation, Communication and Energy Conservation (INCACEC) 2009, pp.1-5, 4-6 June 2009.
[30] I. Stoica et al., “Chord: A scalable peer-to-peer lookup service for internet applications,” SIGCOMM Comput. Commun. Rev. 31, 4 (August 2001), pp.149-160.
[31] A. I. T. Rowstron and P. Druschel, “Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems,” Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, November 12-16, 2001.
[32] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, “Tapestry: An infrastructure for fault-resilient wide-area location and routing,” Technical Report UCB-CSD-01-1141, U. C. Berkeley, Apr. 2001.
[33] L. Yan, K. Sere, and X. Zhou, “Towards an integrated architecture for peer-to-peer and ad hoc overlay network applications,” Proceedings of 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS) 2004, pp.312- 318, 26-28 May 2004.
[34] E. Cohen and S. Shenker, “Replication strategies in unstructured peer-to-peer networks,” IGCOMM Comput. Commun. Rev., vol. 32, no. 4, pp. 177-190, 2002.
[35] K. Jeong et al., “RNet: A Hierarchical P2P Overlay Network for Improving Locality in a Mobile Environment,” Fourth International Conference on Networked Computing and Advanced Information Management, NCM '08, vol.1, no., pp.623-630, 2-4 Sept. 2008.
[36] R. Winter, T. Zahn, and J. Schiller, “DynaMO: Applying Topological Locality to the Construction of Dynamic, Mobility-Aware Overlays,” Technical Report B 03-04, Freie Universität Berlin, February 2004.
[37] T. Zahn, R. Winter, and J. Schiller, “Simple, efficient peer-to-peer overlay clustering in mobile, ad-hoc networks,” Proceedings of the 12th IEEE Intl Conf. on Networks, pp.520-524, 2004.
[38] X. Shen et al., “Handbook of Peer-to-Peer Networking,” Springer, 2009.
[39] Li Gong, “JXTA: a network programming environment,” IEEE Internet Computing, vol.5, no.3, pp.88,95, May/Jun 2001.
[40] Open Chord, available at Internet: http://open-chord.sourceforge.net/.
[41] Resilient Overlay Networks, available at Internet: http://nms.csail.mit.edu/ron/.
[42] E. Meshkova et al., “A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks”, Computer Networks, Volume 52, Issue 11, 8 August 2008, pp.2097-2128.
[43] K. Arnold et al., “Jini Specification, first ed.,” Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999.
[44] E. Guttman et al., “Service Location Protocol,” Version 2, RFC 2165, June 1997.
[45] K. Lua et al., “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Communications Surveys and Tutorials 7 (2) (2004) pp.72–93.
[46] S. Ratnasamy et al., “A scalable content-addressable network,” Proceedings of the ACM SIGCOMM, San Diego, CA, USA, August 2001, pp.161-172.
[47] M. Stokes, “Gnutella2 Standard,” available at Internet: http://g2.trillinux.org/index.php?title=Main_Page
[48] T. Hargreaves, “The fasttrack protocol,” available at Internet: http://cvs.berlios.de/cgi-bin/viewcvs.cgi/gift-fasttrack/giFT-FastTrack/PROTOCOL?view=markup&content-type=text%2Fvnd.viewcvs-markup&revision=HEAD
[49] K. Sripanidkulchai, B. Maggs, and H. Zhang, “Efficient content location using interest-based locality in peer-to-peer systems,” Proceedings of INFOCOM, San Francisco, USA, March 2003, pp.177-180.
[50] E. Crawley et al., “A Framework for QoS-Based Routing in the Internet,” IETF RFC 2386, Aug. 1998.
[51] R. Braden, D. Clark, and S. Shenker, “Integrated Services in the Internet Architecture: an Overview,” IETF RFC 1633, June 1994.
[52] S. Blake et al., “An Architecture for Differentiated Services,” IETF RFC 2475, Dec. 1998.
[53] B. Davie et al., “An Expedited Forwarding PHB (Per-Hop Behavior),” IETF RFC 3246, March 2002.
[54] J. Heinanen et al., “Assured Forwarding PHB Group”, IETF RFC 2597, June 1999.
[55] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless Sensor Networks: A Survey,” IEEE Communication Magazine, August 2002.
[56] M.V. Pulgarin, R. Glitho, and A. Quintero, “An Overlay Gateway for the Integration of IP Multimedia Subsystem and Mobile Sink Based Wireless Sensor Networks,” IEEE Vehicular Technology Conference (VTC)), Ottawa, Canada, Fall 2010.
[57] K. Kwak et al., “An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET”, Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, vol.1, no., pp.517-524, 20-24 July 2009.
[58] P. Costa et al., “The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario”, Fifth IEEE International Conference on Pervasive Computing and Communications IEEE Computer Society Washington, DC, USA 2007.
[59] L. Liquori et al., “Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks,” Crovella, M., Feeney, L.M., Rubenstein, D., Raghavan, S.V. (eds.) NETWORKING 2010, Lecture Notes in Computer Science (LNCS), vol. 6091, pp.67-82. Springer, Heidelberg (2010).
[60] L. Cheng, “Bridging Distributed Hash Tables in Wireless Ad-Hoc Networks,” IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.5159–5163, Los Alamitos (2007).
[61] D. Borsetti et al., “Content Discovery in Heterogeneous Mobile Networks,” Heterogeneous Wireless Access Networks: Architectures and Protocols, pp.419-441. Springer, Heidelberg (2009).
[62] L.G. Erice et al., “Hierarchical P2P Systems,” Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003, Lecture Notes in Computer Science (LNCS), vol. 2790, pp. 1230–1239. Springer, Heidelberg (2003).
[63] C. Fu, R. Glitho, and F. Khendek, “Signaling for Multimedia Conferencing in Stand Alone Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 8, No7, July 2009, pp.991-1005.
[64] J. Rosenberg et al., “Session Initiation Protocol (SIP),” IETF RFC 3261, June 2002.
[65] A. N. Mian, R. Baldoni, and R. Beraldi, “A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks,” IEEE Pervasive Computing, vol.8, no.1, pp.66-74, Jan.-March 2009.
[66] J S. Cheshire and M. Krochmal, “DNS-Based Service Discovery,” IETF RFC 6763, Feb. 2013.
[67] P. Gu, J. Wang, and H. Cai, “ASAP: An advertisement-based search algorithm for unstructured peer-topeer systems,” International Conference on Parallel Processing (ICPP), September 10-14, page 8, Xian, China, 2007.
[68] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors”, Communications of the ACM, 13(7), pp.422–426, 1970.
[69] M. Skjegstad et al., “A protocol for robust and efficient service discovery in large, highly mobile radio networks,” MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp.456-463, Oct. 31 2010-Nov. 3 2010.
[70] F. Sailhan and V. Issarny, “Scalable Service Discovery for MANET,” Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom'2005), Kauai Island, Hawaii 8–12 March 2005.
[71] R. Deepa, S. Swamynathan, “A Service Discovery Model for Mobile Ad Hoc Networks,” International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), pp.135-139, 12-13 March 2010.
[72] M. Klein and B. König-Ries, “Multi-layer clusters in ad hoc networks - an approach to service discovery,” Proceedings of 1st International Workshop on Peer-to-Peer Computing (Co-Located with Networking 2002), Pisa, Italy 2002, pp. 187–201.
[73] G. Schiele, C. Becker, and K. Rothermel, “Energy-efficient cluster-based service discovery for ubiquitous computing,” Proceedings of 11th ACM SIGOPS European Workshop, Leuven, Belgium, Sep. 2004.
[74] N. Suri et al., “Peer-to-peer communications for tactical environments: Observations, requirements, and experiences,” IEEE Communications Magazine, vol.48, no.10, pp.60-69, October 2010.
[75] P. Mockapetris, “Domain names - concepts and facilities,” IETF RFC 1034, Nov. 1987.
[76] S. Pöhlsen, C. Buschmann, and C. Werner, “Integrating a Decentralized Web Service Discovery System into the Internet Infrastructure”, Sixth European Conference on Web Services, 2008.
[77] OPNET, available at Internet: http://www.opnet.com/.
[78] N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, “Modeling mobility in disaster area scenarios”, Performance Evaluation, Volume 66, Issue 12, December 2009, Pages 773-790.
[79] N. Aschenbruck et al., “BonnMotion - A Mobility Scenario Generation and Analysis Tool SIMUTools”, Proceedings of the 3rd International ICTS Conference on Simulation Tools and Techniques, Torremolinos, Malaga, Spain, 2010.
[80] B. Wellington. (2012), dnsjava (2.1.3) [Online]. Available: http://www.xbill.org/dnsjava/.
[81] T. K. Moseng and Ø. Kure, “DiffServ in Ad Hoc Networks. Presented at the EuroNGI Wireless and Mobility workshop,” Sitges, Spain, June 7-9, 2006.
[82] L. SoB, “INSIGNIA: An IP-based quality of service framework for mobile ad hoc networks,” Journal of Parallel and Distributed Computing, Special issue on Wireless and Mobile Computing and Communications, 2000, 60(4), pp.374-406.
[83] R. Braden et al., “Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification,” IETF RFC 2205, Sept. 1997.
[84] H. Xiao and W. K. G. Seah, “A Flexible Quality of Service Model for Mobile Ad Hoc Networks”, IEEE VTC2000-spring, Tokyo, Japan, 2000, pp.445-449.
[85] H. Badis and K. A. Agha, “CEQMM: a complete and efficient quality of service model for MANETs”, Proceedings of ACM Intl. w/s on Perf. Evaluation of wireless ad hoc, sensor & ubiquitous networks 2006, pp.25–32.
[86] P. Sinha, R. Sivakumar, and V. Bharghavan, “CEDAR: a core extraction distributed ad hoc routing algorithm,” Proceedings of the IEEE Infocom’99, Vol. 17(8), p. 1454-1465.
[87] G-S. Ahn et al., “Support Service Differentiation for Real-Time and Best Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN),” IEEE Transactions on Mobile Computing Sept. 2002.
[88] K. Ramakrishnan, S. Floyd, and D. Black, “An Addition of Explicit Congestion Notification (ECN) to IP,” IETF RFC 3168, Sept. 2001.
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top