Investigating and presenting a robust and efficient routing protocol for military ad hoc wireless networks

Number of pages: 125 File Format: word File Code: 32162
Year: 2014 University Degree: Master's degree Category: Telecommunication Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Investigating and presenting a robust and efficient routing protocol for military ad hoc wireless networks

    Master's thesis in the field of telecommunication-system electrical engineering

    Abstract

    Investigation and presentation of a robust and efficient routing algorithm for military contingency wireless networks

    Since the early 1980s, a new concept In the name of network-based defense, it has been created in the military. In order to achieve this concept, there is a need to have a military telecommunication network with a high capacity to be able to distribute information among the entities in the network. Wireless ad hoc networks have received much attention due to the fact that they do not need infrastructure. The most common use of contingency networks is military use. With the increasing development of network access technologies, we see the emergence of heterogeneous networks. In these networks, nodes use different technologies to communicate with each other. Contingency networks are usually associated with the problem of scalability and uncertainty. Most of the routing protocols proposed for these networks do not consider the requirements of heterogeneous networks. By considering the heterogeneity of nodes and taking advantage of it, the problem of scalability and reliability can be solved. In order to achieve this goal, it is suggested to use a hierarchical structure to take advantage of the advantages of heterogeneous networks. In this thesis, we will first introduce contingency networks, their history and applications. In the following, we introduce the types of routing protocols available. Then we introduce heterogeneous hierarchical networks to solve the problem of scalability and reliability. In the following, two new hierarchical routing protocols for heterogeneous military networks are introduced. These two new protocols are based on DSDV and AODV. In the proposed structure, it is assumed that the network nodes are heterogeneous in terms of radio transmission range and battery level. In this structure, all nodes are equipped with a short-range radio, but some of the nodes are also equipped with a long-range radio in addition to this radio. As a result, the nodes are divided into two categories and a two-tier hierarchical structure is formed. In these two protocols, at first, nodes are clustered in the first layer and the cluster head is selected for them. Next, the routing is done in the lower and upper layers. At the end, the proposed protocol is fully simulated with NS-2 simulator software. The efficiency of this protocol has been investigated in comparison with other routing protocols in different topologies. The problem of scalability, the effect of the number of clusters on this method, and the effect of the mobility of nodes on these methods have been investigated.

    Key words: military contingency networks, hierarchical routing protocols, heterogeneous network, DSDV routing protocol.

    1-1 Preface

    Since the early 1980s, there has been a great growth There has been a rapid increase in the application of information technology [1] in the military forces and a new concept called network-based defense [2] has been defined and expanded. In order to achieve this concept, there is a need to have a military telecommunication network [3] with a high capacity to be able to distribute information among the entities in the network [1]. Also, in recent years, the use of telecommunication networks in military forces has been accompanied by major changes and significant improvements in the way a network is implemented and how its technologies are integrated in the army. Currently, having a military telecommunication network so that every soldier has the ability to access all the information available in the network is the highest priority of the military forces. On the other hand, with the development of long-range weapons, having long-range military telecommunication networks is a necessity.

    A military telecommunication network allows each station to exchange information received through its sensors. By this means, the commander can easily increase the ability to identify his station by receiving station information, outside the range of his sensors, and this makes him more aware of his surroundings. As a result, military telecommunication networks give commanders the ability to fight in very large areas. Having such a network gives military forces a great advantage on the battlefield [2].According to this need, in this thesis we will have a comprehensive review on the routing algorithms of contingency telecommunication networks and finally we will introduce a heterogeneous contingency network suitable for military applications and according to the requirements of this network we will provide a suitable routing algorithm for it. Military wireless networks [4] experience many different conditions. The limitations and requirements of military networks are fundamentally different from commercial networks. The purpose of military networks is that communication should be established at any time and place on the battlefield, and this means that we must have a resistant telecommunication network [5] that can maintain communication everywhere [3], as well as high reliability [6], the ability to survive and long life [7] in critical situations [4].

    The difference between military telecommunication networks and commercial networks (limitations and problems of military networks) [4]) is explained below:

    All or most of its users are mobile [8] and the network topology is completely variable and dynamic.

    Because of bad weather conditions and many natural obstacles, its links are completely unreliable, and the link quality and network capacity change.

    Usually, the network should be able to be implemented quickly.

    It has relatively little bandwidth.

    The possibility of attacks to disrupt the network or signal interference is very high. Therefore, the network must be designed to be resistant.

    There is a possibility of equipment being destroyed and lost by enemy forces.

    Usually messages are sensitive to delay.

    In terms of security, military networks face many limitations.

     

    1-3 Contingency networks function in military systems

    One ??technology that may meet the above network requirements and overcome its limitations and problems is mobile contingency networks [9] [1]. A MANET network is a collection of routers[10] equipped with wireless transmitters and receivers. These receivers and transmitters are free to move wherever they want and dynamically form an ad-hoc network - without any infrastructure or central user to command. The state of communication links at any moment of time is a function of various factors. As a result, the topology of the network changes rapidly [5].

    The characteristics of mobile contingency networks [11], which make it suitable for use in military networks [6], are as follows:

    It does not need infrastructure: it is not possible to create infrastructure in battlefields. The network must be capable of rapid implementation [2].

    Having a dynamic (non-static) topology[12]: in military networks, users are mobile and the status of links is variable, as a result, the network topology is constantly changing.

    Self-organized network [13]: It does not need a special center for management and command.

    Self-ability It has treatment [14].

    It has self-sustainability [15] (Military networks should have the possibility of fast reconstruction [16] and network recovery [17] [4].)

    Having equal relationships among users

    Considering these features, we understand that the contingency network is a suitable technology for military networks with mobility. are high [2]. Also, since there is a possibility of rebroadcasting [18] information in contingency networks, as a result, geographical limitations can be overcome and the coverage area can be expanded using successive rebroadcasts.

  • Contents & References of Investigating and presenting a robust and efficient routing protocol for military ad hoc wireless networks

    List:

    1- Chapter One: Introduction.. 10

    1-1 Preface.. 10

    1-2 Specifications of military networks. 11

    1-3 The function of contingency networks in military systems. 12

    1-4 Thesis structure. 13

    2-        Chapter Two: Moving Contingency Networks. 14

    2-1     Introduction.. 14

    2-2     Definition of contingency networks. 15

    2-3 History of contingency networks. 17

    2-4 Structure of layers in contingency networks. 20

    2-5 Types of wireless ad hoc networks. 23

    2-5-1          Mesh wireless network. 23

    2-5-2           Smart sensor network:. 24

    2-5-3           Moving contingency networks. 25

    2-6 Application of wireless ad hoc networks. 25

    2-7 Military ad hoc wireless networks. 29

    2-8 Heterogeneous Contingency Networks. 30

    2-9 Features or challenges of contingency networks:. 32

    2-10 Routing, the biggest challenge of contingency networks:. 34

    2-10-1       Routing challenges in wireless ad hoc networks:. 35

    2-11 NS2 emulator software. 35

    3- Chapter 3: Routing algorithms in homogeneous wireless contingency networks. 38

    3-1      Introduction.. 38

    3-2      Characteristics of routing protocols of ad hoc wireless networks. 39

    3-3 Classification of routing protocols of wireless ad hoc networks. 40

    3-3-1          Peculiar routing protocols. 41

    3-3-2 Hierarchical routing protocols. 44

    3-3-3          Routing protocols based on geographic location. 44

    3-3-4           Mixed routing protocols. 45

    3-4     A closer look at routing protocols for flat structure. 47

    3-4-1            DSDV routing protocol. 47

    3-4-2          AODV routing protocol. 48

    3-4-3 DSR protocol.. 49

    3-4-4          OLSR protocol.. 50

    3-5      More detailed examination of hierarchical routing protocols. 51

    3-5-1          ZRP protocol.. 52

    3-5-2          LANMAR protocol. 52

    4- Chapter 4: Routing protocols in heterogeneous networks. 54

    4-1     Introduction.. 54

    4-2     Heterogeneous networks.. 54

    4-3     Increasing spread of heterogeneous networks. 55

    4-4 Hierarchical structure in heterogeneous networks. 58

    4-5 Routing protocols in heterogeneous networks. 61

    4-5-1          HGRP method :.. 62

    4-5-2          Area-based hierarchical routing. 65

    4-5-3           HOLSR routing method :. 67

    4-5-4          HCB routing method:. 71 4-5-5 HAODV method. 78

    4-5-8             Proposed HDSDV protocol:. 85

    4-5-9           HAODV method :.. 92

    5-     Chapter Five: Simulation. 93

    5-1     Introduction.. 93

    5-2     Network simulator software. 93

    5-3 Structure of NS2 simulator:. 96

    5-4 Routing Protocol Performance Evaluation Criteria. 99

    5-5 Simulation results. 100

    5-5-1             Review of the proposed protocol in solving the scalability problem. 100

    5-5-2 Examining the effect of the number of clusters. 104

    6-        Chapter seven: conclusions and suggestions. 107

    6-1     Conclusion.. 107

    6-2      Suggestions:.. 108

    7- List of abbreviations.. 108

    8-         List of references.. 109

    Source:

    [1]     O. Tronarp, "Quality of Service in Tactical Ad Hoc Networks by Priority Queuing."

    [2] B. C. Kim, J. S. Lee, Y. Bang, J. K. Lee, H. S. Lee, and J. S. Ma, "Design of IPv6 Tactical Network based on Commercial Technologies: Architecture, Routing, and Mobility Management," in Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on 2008, pp. 708-713.

    [3] J. Y. Choi and Y.-B. Ko, "Multi-path routing with load-aware metric for tactical ad hoc networks," in Information and CommunicationKo, "Multi-path routing with load-aware metric for tactical ad hoc networks," in Information and Communication Technology Convergence (ICTC), 2010 International Conference on, 2010, pp. 370-375.

    [4] B. Kim, K. Kim, H.-l. Koo, B.-h. Roh, Y.-S. Kim, and J.-S. Jin, "Tactical network design and simulator with wireless mesh network-based backbone architecture," in Applications and Technology Conference (LISAT), 2010 Long Island Systems, 2010, pp. 1-5.

    [5] S. R. Raju, K. Runkana, and J. Mungara, "ZRP versus AODV and DSR: A Comprehensive Study on ZRP Performance on MANETs," in Computational Intelligence and Communication Networks (CICN), 2010 International Conference on, 2010, pp. 194-199.

    [6] H. Chen, X. Zhang, D. Zhang, and Z. Fu, "Multi-agent collaboration based trust routing scheme for military ad hoc network," in Open-Source Software for Scientific Computation (OSSC), 2011 International Workshop on, 2011, pp. 37-42. [7] M. X. Cheng and D. Li, Advances in wireless ad hoc and sensor networks: Springer, 2008. [8] C. K. Toh, "Ad hoc mobile wireless networks: protocols and systems," 2001. [9] R. Jurdak, Wireless ad hoc and sensor networks: A cross-layer design perspective: Springer Science+ Business Media, 2007.

    [10] R. Ramanathan and J. Redi, "A brief overview of ad hoc networks: challenges and directions," IEEE communications Magazine, vol. 40, pp. 20-22, 2002.

    [11] "http://en.wikipedia.org/wiki/Packet_radio."

    [12] C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in ACM SIGCOMM Computer Communication Review, 1994, pp. 234-244.

    [13] D. Johnsort, "Routing in ad hoc networks of mobile hosts," in Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, 1994, pp. 158-163.

    [14] A. S. Tanenbaum, Computer networks vol. 4: Prentice-Hall Englewood Cliffs (NY), 1989.

    [15] I. C. S. L. M. S. Committee, "Wireless LAN medium access control (MAC) and physical layer (PHY) specifications," ed: IEEE Std, 1997.

    [16] A. U. Bhobe and P. L. Perini, "An overview of smart antenna technology for wireless communication," in Aerospace Conference, 2001, IEEE Proceedings., 2001, pp. 2/875-2/883 vol. 2.

    [17] G. Lin, G. Noubir, and R. Rajaraman, "Mobility models for ad hoc network simulation," in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 2004.

    [18] S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile ad hoc networking: Wiley. com, 2004. [19] S. K. Sarkar, T. Basavaraju, and C. Puttamadappa, Ad hoc mobile wireless networks: principles, protocols and applications: CRC Press, 2007. [20] P. Mohapatra and S. Krishnamurthy, AD HOC NETWORKS: technologies and protocols: Springer, 2005. [21] P. Kuosmanen, "Choosing routing protocol for military ad hoc networks based on network structure and dynamics," Master's Thesis, Helsinki University of Technology, 2002.

    [22] K. Chandrashekar, R. Morera, A. McAuley, and J. Baras, "Domain based hierarchical routing for large heterogeneous MANETs," in Military Communications Conference, 2005. MILCOM 2005. IEEE, 2005, pp. 1284-1290.

    [23] K. Xu and M. Gerla, "A heterogeneous routing protocol based on a new stable clustering scheme," in MILCOM 2002. Proceedings, 2002, pp. 838-843.

    [24] Y. Xia, C. K. Yeo, and B. S. Lee, "Hierarchical cluster based routing for highly mobile heterogeneous MANET," in Network and Service Security, 2009. N2S'09. International Conference on, 2009, pp. 1-6.

    [25] S. Chakrabarti and A. Mishra, "Quality of service in mobile ad hoc networks," in The handbook of ad hoc wireless networks, 2003, pp. 41-69.

    [26] H. A. Amri, M. Abolhasan, and T. Wysocki, "Scalability of MANET routing protocols for heterogeneous and homogeneous networks," Computers & Electrical Engineering, vol. 36, pp.

Investigating and presenting a robust and efficient routing protocol for military ad hoc wireless networks