Academia.eduAcademia.edu

Command And Control in Disaster Management

Like war, the disasters are also much unstructured in scope. The national disaster system may employ detailed Command and Control (C2) which is poorly equipped to deal with uncertainty, complexity and variability. The first response to uncertainty is to try to minimize it by creating a powerful, highly efficient command and control apparatus (Command Structure) able to process huge amounts of information and intended to reduce nearly all unknowns. Detailed command and control emphasizes vertical, linear information flow: in general, information flows up the chain of command and orders flow down. Discipline and coordination are imposed from above. The proposed C2 model accepts the turbulence and uncertainty of disaster. Rather than increase the level of certainty that C2 seeks, this approach of command and control reduces the degree of uncertainty that we need. This C2 for disaster management decentralizes decision-making authority and grants subordinates significant freedom of actio...

IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012 ISSN (Online): 1694-0814 www.IJCSI.org 256 Command And Control in Disaster Management Kumar Surjeet Chaudhury 1, Arpita Nibedita 2 and Pradipta Kumar Mishra 3 1 Computer science and Engineering, Jadavpur University , Kolkata, West Bengal State 700032, India 2 3 Computer science and Engineering , WBUT, Kolkata, West Bengal State 700106, India Computer Science and Engineering,IIIT,Bhubaneswar Orissa state 751003, India Abstract Like war, the disasters are also much unstructured in scope. The national disaster system may employ detailed Command and Control (C2) which is poorly equipped to deal with uncertainty, complexity and variability. The first response to uncertainty is to try to minimize it by creating a powerful, highly efficient command and control apparatus (Command Structure) able to process huge amounts of information and intended to reduce nearly all unknowns. Detailed command and control emphasizes vertical, linear information flow: in general, information flows up the chain of command and orders flow down. Discipline and coordination are imposed from above. The proposed C2 model accepts the turbulence and uncertainty of disaster. Rather than increase the level of certainty that C2 seeks, this approach of command and control reduces the degree of uncertainty that we need. This C2 for disaster management decentralizes decision-making authority and grants subordinates significant freedom of action which increases tempo and improves the ability to deal with fluid and disorderly situations. Keywords: C2 (command and control), management, Wi-max Technology, PDA 1. disaster Introduction Command and control (C2)"[1] has been getting a lot of attention in recent years. It was a hot topic for United State’s Congress during discussions leading up to the Goldwater-Nichols Defense Reorganization Act, of USA of 1986. Command and control involves the complex collection of functions and systems an executive draws on to arrive at decisions and to see they are carried out, thus, the acronym C2 may be used to refer to anything from information to sophisticated communications and computer equipment, to the executive's own mind-the last involving education, training, experience, native intelligence, and other aspects of cognition. This broad view enables us to deal better with communication technology and its often confusing terminology. This chapter helps us to understand why C2 has grown by steps to what many now call "C3I2"Command, Control, Communications, Intelligence, and Information [7]. 2. Necessity of C2 in disaster management Like war, the disasters are also much unstructured in scope. No one can predict at what exact time and how a disaster will strike. In democratic country like India, only the government is the solo organization who will act and take necessary actions to disaster. Thus any model for disaster management must follow the government rules and regulations. The governmental structure itself is a hierarchical one, where there is a central or root position and below, its branches or sub-levels are spread [10]. The central authority will take decision depending on the discussion with its subordinates, and that decision will be treated as a command to all other leafs. Whenever there is a disaster, the command or actions to be taken is released by the government authority and pass to its lower levels and different other organizations for implementation. The command is issued after collecting relevant information from them and its lower levels. The national disaster system may employ detailed command and control. Unfortunately, detailed C2 is poorly equipped to deal with uncertainty, complexity and variability. Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012 ISSN (Online): 1694-0814 www.IJCSI.org 3. Proposed C2 system for disaster management This proposed C2 model for disaster management is just an approach of C2 strategy but not the detailed C2 system. This approach accepts the turbulence and uncertainty of disaster. Rather than increase the level of certainty that C2 seeks, this approach of command and control reduces the degree of uncertainty that we need [2]. be bandwidth-aware and change their mode of transmission accordingly to accommodate a volatile network. The goal is to enable mutual understanding with limited exchanges of data. This command and control for disaster management can be described as spontaneous [3]. Subordinates are guided not by detailed instructions and control measures but by their knowledge of the requirements of the overall mission. This C2 for disaster management decentralizes decision-making authority and grants subordinates significant freedom of action. It is much more informal and flexible than detailed C2. It increases tempo and improves the ability to deal with fluid and disorderly situations. This approach of C2 for disaster management allows for both horizontal and broadcast information. Horizontal information saves time and increases situational awareness by moving information directly among agents in the field. Broadcast information from the commanders presents information to the field agents that they can process and act on autonomously. The proposed C2 system for disaster management can precisely be elaborated diagrammatically [4]. Fig. 2 Command & Control (C2) process 4. Fig. 1 Command & Control (c2) system During the race against the clock high-level commanders must be able to delegate decision making due to the sheer volume of information. Using some automated software, the tempo of the local group is much faster as a result. Variability requires adaptability. Field agents must respond quickly to changes in the environment. Applications will 257 Role of communication in C2 system Communication system plays the central role in C2 system for disaster management. When a disaster strikes, it may damage the existing communication system even across the terrestrial border. The proper flow of information from the incident site to authority and simultaneously command or response direction from authority to incident site must be well communicated [5]. However for this we need a communication system, which may be damaged due to disaster. There are two alternative methods possible for that purpose. First one is one need to restore the existing communication network which may take some hour or even some days or even months also. During those days communication from authority to operational stuff is not possible and one can easily guess what will the result of response and relief operation? Alternate method is after disaster breaks the existing network, if we are able to deploy a network rapidly (may be of Wi-Fi or wi-max) up to position where we have available network for communication, one can send information from the core incidental site to the authority. The information then flow from there to some higher authority and finally reaches an emergency operation center by any means. The more and more information from the incident site reaches to the authority; the authority can visualize the situation more accurately, and then analyzes those information or Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012 ISSN (Online): 1694-0814 www.IJCSI.org 258 feedbacks so that authority can take the better decision immediately for more accurate response work. The less the amount of information gathered by the commanding authority, the more difficulties he/she will face while taking decision. 5. Proposed N/W architecture In case the existing communication system breaks by disaster, for continuity of response and relief operation, one needs a rapidly deployable network system. That means one need to establish any sort of communication method which may includes various technologies like WiFi or Wi-max etc. and extends this rapidly deployable communication network’s range to the existing network reach-ability area. Keeping all the services and the constraint in the mind the architecture of the proposed system has been developed as the following. In this proposed network architecture is divided into five layers namely Frontier, Access, Backbone, Backhaul and Backend layer. Fig.3: Proposed architecture for rapidly deployable network 6. The proposed-system should reach all the possible locations under disaster-siege for data collection; nomadic approach and the inclusion of mobile handheld devices will add flexibility in the process. Mobile handheld devices can collect and transmit data. They are also called Personal Digital Assistant (PDA). Network of such devices is named as FRONTIER Network. For the 1st case, we need a device that connects PDA (s) together to form a Wireless network; this device is called a Wireless Access Point (WAP). A mesh network of such devices is required for the full coverage of the area under disaster siege, since, coverage of a single WAP may not be adequate, and it should be called ACCESS Network. For the 2nd case, a long range communication is required and the ACCESS Network should be a connected to a Customer Premises Equipment (CPE) of the Long Range Communication Device. CPE will in turn communicate to a Base Tran receiver Station (BTS) or to a series of BTS (s) for further traveling of the data; we named this arrangement as BACKHAUL Network. Backhaul network will later merge to an existing BACKBONE Network wireless (GSM/CDMA) or wired network. After the travel via existing Backbone network, data will be deposited to CENTRAL DATA REPOSITORY, which will be connected to different departmental Network via Internet for further distribution and processing of the said data, which we termed as BACKEND Network. Conclusion Since disaster is just like war and much unstructured in scope, we may adapt the Command and control system for disaster management which is the main aspect of the first part of the work. The strict C2 system may not be best suited to disaster scenario; rather proposed C2 architecture which follows the C2 methodology with some autonomy at the lower functionality divisions may gives a success as an output for proper disaster management work. To design this disaster management model, I follow the NFPA 1600, 2007 edition standards. Among the different functional areas as identified by this standard, the two areas, Incident Management and Facility are highlighted, which is the second part of the work. The last part is the maximum extent of ICT implementation of the above two functional activities. References [1] Introduction to International Disaster Management by Damon P. Coppola; ELSEVIER Publication. [2]Command and Control of Disaster Operations by Walter G. Green III, Ph. D., CEM ; Universal Publishers/uPUBLISH.com, USA 2001 [3] Handbook of Disaster Research by Havidan Rodriguez, Enrico L. Quarantelli, Russel R. Dynes; University of Delaware, newark, Delaware; Springer Publication [4] Pearson, David E. (David Eric), 1953- The world wide military command and control system: evolution and effectiveness. [5] Command and control for war and peace, Thomas P.Coakley, Washington, D.C. Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012 ISSN (Online): 1694-0814 www.IJCSI.org [6] The future of command and control for disaster response. Joseph Rosen (Darthmouth-hitchcock medical center), Eliot Grig and Susan McGrath (Thayer School of Engineering, Dartmouth College), Jaron Lanier (Advance network and service Inc), Scott Lillibridge (Centre for bio security and disaster preparedness, university of texas), David Sargent (School of public health, darthmouth college). [7] Communication support system for emergency management Me Nakatani, Shinobu Yamasaki, Kosuke Takahashi, Yoshinon Hijikata, Shogo Nishida Graduate School of Engineering Science, Osaka University Machikaneyamacho 1-3, Toyonaka, Osaka 56@8531 Japan . [8] R.K.Bhandari,Disaster Management in India-a New Awakening, www.vitcdmm.org/journel_on disasters.pdf [9] Forthcoming journal publication: Canada’s Experience in Developing a National Disaster Mitigation Strategy: A Deliberative Dialogue Approach, special issue, The International Journal of Mitigation and Adaptation Strategies, fall 2004 (draft attached). [10] Etkin, Dave; Haque, Emdad C; Brooks, Gregory R (Eds.): 2003, An Assessment of Natural Hazards and Disasters in Canada, Special Issue of the Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Kluwer Academic Publishers, 28(23):211-593 First Author Kumar Surjeet Chaudhury received his M.E. Degree in Computer Science & Engineering from Jadavpur University, Kolkata. He is currently an Assistant Professor and Head of the Department of Computer Science & Engineering of Hi-Tech Institute of Technology, Bhubaneswar. His research interest includes Distributed System, Data Compression Techniques. Second Author Arpita Nibedita received her M.Tech Degree in Multimedia & Software System from NITTTR, Kolkata. She is currently an Assistant Professor and Head of the Department of Computer Science & Engineering of Hi-Tech College of Engineering, Bhubaneswar. Her research interest includes Distributed System, GIS. Third Author Pradipta Kumar Mishra received his MTech. Degree in Computer Science and Engineering from IIIT-BH. He is currently an Assistant Professor in Department of Computer Science and Engineering of Hi-tech Institute of Technology, Bhubaneswar .His research interest include Ad-Hoc network, Wireless sensor network and Network security Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved. 259