Introduction
Accessibility and effective communication are very crucial with regards to effective tackling and management of dangers and other disasters. Adequate and more reliable communication frameworks play a very fundamental towards the effectiveness of a response plan. Due to technological advancements, a lot of changes have occurred in the communication sector globally. From local network transmissions to international transmissions has facilitated rapid and faster means of communication, which are very important in activities taking place in the modern world. Among the milestones of development in connection, the industry is the invention of wireless radio frequency transmission of signals from different sources, and these frequencies transmitted and collected from a receiver on the other end.
The first telephone was invented in 1849 by an Italian innovator Antonia Meucci. Even though the invention was merely the basic phone, it laid a foundation for more developments and other technological advancements in the communication sector globally. In recent years, a lot of technological merging has taken place. More advanced and sophisticated devices are being developed, which can multi-task and perform complex operations. A lot of evolution has been observed in the telephone industry with the development of wireless phones to more complex devices known as smartphones and other 5th generation computers. Due to their ability to connect to the wireless network, communication and accessibility have significantly been achieved. The aims to enhance connectivity have also accelerated various inventions and development of gadgets that potentiate the ability of these devices to access a reliable network for effective communication.
WiFi routers are electronic gadgets that enable routing and forwarding of wireless network packets and can also be used as an access point to local networks. Even though its functioning is similar to that of wired routers, its utilization of wireless radio frequency signals makes it more efficient since it can communicate effectively with both internal and external signal environments. WiFi routers create an interface that enhances mobility, connectivity, and multiple accesses to the same network with purposes of improving connectivity and effective communication. More advancement in wireless networks with more progress in the WiFi router technologies has caused more sophisticated interfaces, even in the interior parts of the globe. The utilization of these advanced technologies in the management of calamities is among the few advantages of assimilating technologies to enhance emergency communications.
The research aims to assess the effectiveness of WiFi routers in ResponseResponse to tragedies and disasters, which often occur, and how WiFi routers can be vital in technologies in disaster relief operations. The objectives of the research include; To find out how WiFi routers can be used to locate survivors during a disaster rescue operation accurately and To assess how WiFi routers can help rescuers find the survivors quickly.
Literature Review
In the coming future, the WI-FI networks are considered to have broader coverage in the wireless products markets. Wireless Local Area Network will initiate faster communication in the locations which are restricted to have secondary computing spatial domains like hospitals, offices, campuses, enterprise facilities, and factories (Namuduri, 2017). In those environments, Wireless Local Area Network (WLANs) will expand and complement the areas covered of the wired networks, which are existing (Ma & Shi, 2019). The primary WLAN attractions entail flexibility, effectiveness in terms of cost, information infrastructure tetherless access, ease of installation, and the support for faster computing operations through the mobility of the station. The main reason why WI-FI is preferably used is that it can be installed very fast by the non- technical personnel in an Ad Hoc configuration even without supporting the backbone network and pre-planning (Namuduri, 2017).
The clock time, which is synchronized and accurate, is essential in various sensor applications of the network, especially as a result of the collaborative aspect of the sensor networks. For instance, in the application target tracking, the nodes of the sensor require both the time and location when the target is detected to find out the goal moving speed and direction properly (Ma & Shi, 2019). Consequently, because of the limited resources on the nodes of the sensor, the synchronization protocol of the traditional clock, for instance, the network time protocol (NTP), cannot be applied in the networks of the sensor directly (Sun et al., 2018). The Wireless sensor networks have been the consideration of the interests which are intensive in the community of research, networked through the wireless lines, less expensive onboard sensors with smart nodes as well as interacting with more intelligence with the physical world (Shahria et al., 2019).
The systems are aiming at different applications such as food safety, environmental, habitat monitoring and medical, controlling the inventory, military initiatives, and homeland security. One essential application set entails diffusion phenomena monitoring. Sensor deployment does not follow the pattern generally because of natural limitations (Faisal & Hossain, 2019). How they are deployed; for instance, they may be spread over a substantial mountainous area from the airplane that may not be easy to access. The sensor nodes location, therefore, develops a point pattern that is random in the plane. The techniques of the point pattern analysis have been employed traditionally to classify the design as regular, casual, or clustered (Ma & Shi 2019).
In this research paper, the initially described techniques that analyze a two-dimensional space of the clustering points are used. Nevertheless, the focus of the analysis is on the formation of holes or voids in some point pattern, which is regarded as the indications of systematic or hazard destruction in places that are monitored by sensors (Namuduri, 2017). The method of data collection dwelled on collecting data on the sensor network architecture with the characteristics such as; the observation of each sensor to be sent to the sink and represented as a < L, T, M> whereby the letters L, T, and M represents the spatial location, the time stamp, and the measurement value respectively (Ma & Shi, 2019).
The assumption is that the nodes can identify its spatial location denoted as L by the use of any of the techniques of the fine-grained localization. The wireless sensor networks (H- WSNs) consist of a significant number of devices that are wireless equipped with different computing capabilities and communication (Namuduri, 2017). Comparing it with the conventional wireless sensor networks, whereby all the tools have computing capabilities and transmission, which is common, H-WSNs houses different operating environments, thus becomes very useful in most of the military or civil applications (Ma & Shi,2019). The primary example of H-WSNs is the sensor networks underwater, which occasionally encompass the various kinds of sensors placed at different depths inside the water, as well as surface, diverse onshore, and the data sinks underwater (Sun et al., 2018). Equipping it with different activities that are heterogeneous wireless devices collectively make up the multipurpose sensor network, which is scalable and initiates various sensing work like tactical surveillance, pollution monitoring, and exploration of offshore (Faisal &Hossain, 2019).
In the wireless Ad Hoc networks, the transmission of packets occurs from the destination source by submitting through the multiple nodes, which are intermediate operating as relays (Sun et al., 2018). The system is organized independently, and the tasks are lacking for the specific nodes such as the routers as in the wired networks, which are responsible for forwarding and routing or the wireless networks access points working in the mode of infrastructure that facilitates communication (Ma & Shi, 2019). In a case where the central authority who is managing the whole system is lacking, the autonomous nodes can act selfishly by asking others to forward their data but does not assist in other nodes' packets forwarding. Such selfish behavior can tamper with the operations of the network or can make even the whole system to stop functioning altogether (Namuduri, 2017). Because of the importance of such a problem of selfishness in the wireless Ad Hoc networks, many authors researched the issue in the game-theoretic framework and came up with some outstanding results.
The essential setbacks of the design WSNs are developing the protocol or method to make the randomly deployed sensor nodes operate in an organized and collaborative manner. The network routing design protocol is very much crucial to WSNs performance than the one from the conventional networks of communications (Faisal &Hossain, 2019). Among many network routing protocols proposed over the past years, lifetime, efficiency of energy, and hierarchical routing protocols, which contributes mainly to the scalability of the system. All the modern clustering protocols are the top-down strategies, which formulate the global knowledge first of the WSN, by not detailing the fundamental level nodes but provides the specifications (Namuduri, 2017).
There is an increasing interest in different application sets of Mobile Ad Hoc Networks (MANETs). Apart from using the centralized infrastructure, the MANET nodes cooperate to issue networks during the movements (Namuduri, 2017). Capability like that is critical for some scenarios which are unique like the emergency field or battlefield work where the centralized or preexisting communication infrastructure is lacking. MANET on the battlefield can issue different services to provide support to various missions like battlefield maps and the situation of the enemy, among others (Sun et al., 2018). Applications like those make the demand to rise on persistent sessions and reliable transport. To successfully realize such services leads to the dangerous obstacles not only because the communication environment is harsh as a result of factors like radio fading, mobility of the node and interfering but also because of the attack by the enemies.
The adoption of the networks of communication in the last decade at all levels of the system of factory automation has resulted in impressive growth (Sun et al., 2018). Expressly, at the secondary level, mainly referred to as either field level or device in the computer integrated manufacturing (CIM) framework, the field buses have been employed to extensively link controllers to actuators or sensors (Namuduri, 2017). As a result of the typical operations made at the level, the field bus performance operations in the communication times may be essential. Communication reliability and security are the two crucial aspects of any network. The typical task of communication in the wireless sensor network is for every node sensor to sense the local environment, and to follow the request, send the required data back to the base station (BS) (Faisal &Hossain, 2019). In this research paper, the hybrid multipath scheme (H-SPREAD) to increase both the reliability and security of the task in the potentially unreliable and hostile proposed wireless sensor network (Ma & Shi, 2019).
The new scheme depends on the distributed N -to-1 discovery protocol multipath, which is the inability to get the node-disjoint path, which is multiple from every node sensor to the BS in one route discovery process simultaneously (Shahria et al., 20...
Cite this page
Communication: Key to Effective Disaster Management & Response Plan - Essay Sample. (2023, Apr 21). Retrieved from https://proessays.net/essays/communication-key-to-effective-disaster-management-response-plan-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Overview of Kathy Kelly's Life
- A Discussion on Network Neutrality Paper Example
- Essay Sample on Political Cartoon Images
- Essay Sample on Protecting Image in Online Attack: Engage, Pre-empt & Diplomacy
- Speech Example on Effective Communication: Uniting Professionals and Clients
- Essay on Achieving Sustainable Economic and Environmental Balance: A Challenge Ahead
- Essay Example on Police Task Forces: Changes, Challenges & Strategies