scholarly journals A Mathematical Model for Cross Layer Protocol Optimizing Performance of Software-Defined Radios in Tactical Networks

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 20520-20530 ◽  
Author(s):  
Irum Nosheen ◽  
Shoab A. Khan ◽  
Fatima Khalique
Author(s):  
Jithin Jagannath ◽  
Hanne Saarinen ◽  
Timothy Woods ◽  
Joshua O'Brien ◽  
Sean Furman ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Irum Nosheen ◽  
Shoab A. Khan ◽  
Umar Ali

In mission and time critical applications, bandwidth and delay optimizations are the key goals of communication systems. This paper presents a cross-layer framework design that reduces the call setup time, provides collision-free communication, and reuses the empty slots of Time Division Multiple Access (TDMA) protocol which otherwise causes low throughput and large delay. As number of communicating nodes in tactical networks is small as compared to commercial mobile ad hoc networks (MANETs), classical TDMA will yield huge number of empty slots and any Carrier Sense Multiple Access/Collision Detection (CSMA/CD) technique may cause more delay in some critical scenarios. Proposed methodology gives a Cross-Layer Architecture for Network (NET) Layer and Medium Access Control (MAC) Layer. Our design provides bandwidth efficient, collision-free communication to Software-Defined Radios (SDRs) in self-forming and self-healing tactical networks with low call setup time and multihop routing. For this purpose TDMA as MAC layer protocol and Ad Hoc On Demand Distance Vector (AODV) as Network Layer Routing Protocol are used. Our slot allocation (SA) algorithm, Cross-Layer TDMA (CL-TDMA), consists of control phase where AODV control packets are exchanged and data transfer phase where transmission of data and voice occurs. All active radios in vicinity gather information about communicating nodes based on the exchange of control packets by SDRs. Our algorithm then uses this information to help all active SDRs find slot(s) that will be used for collision-free transmission. A number of experiments are performed to establish improved performance of the proposed technique compared to other established techniques and protocols.


2020 ◽  
Author(s):  
Roberto Rigolin F. Lopes ◽  
Pooja Hanavadi Balaraju ◽  
Paulo H. Rettore ◽  
Peter Sevenich

This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem A) through ever-changing network conditions (problem B) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem A|B). We introduce two stochastic models to create sequences of QoS-constrained messages (A) and to create ever-changing network conditions (B). In sequence, we sketch a control loop to shape A to B to test our hypothesis using model A|B, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems A, B and A|B.


2020 ◽  
Author(s):  
Roberto Rigolin F. Lopes ◽  
Pooja Hanavadi Balaraju ◽  
Paulo H. Rettore ◽  
Peter Sevenich

This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem A) through ever-changing network conditions (problem B) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem A|B). We introduce two stochastic models to create sequences of QoS-constrained messages (A) and to create ever-changing network conditions (B). In sequence, we sketch a control loop to shape A to B to test our hypothesis using model A|B, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems A, B and A|B.


2021 ◽  
Author(s):  
Ridouane El Mezouary ◽  
Abdelmoghit Souissi

Abstract In this article, we propose a new mobility model, for a mobile and geographic cross-layer architecture. This cross-layer architecture allows service differentiation between real-time and best-effort traffic, for a mobile internet of things ( IoT ) network. We present a mathematical model, which works on the parameters of the MAC layer and the network layer. The mathematical model makes it possible to calculate the throughput between a source object and a destination object (gateway), under conditions of stable queues. We use the positional (geographic) information in the mathematical model of the proposed cross-layer architecture, to study the impact of mobility on the performance of the proposed mathematical model. The proposed mobility model defines two time intervals, the first interval for communication (transmission and reception of data without mobility at the same time), and the second time interval for the mobility of objects of the IoT network (without communication at the same time). The results show that the calculated throughput depends on the position of the objects, as well as the probability of transmission. Finally, we study the effect of distance and speed on the performance of the proposed cross-layer architecture.


Sign in / Sign up

Export Citation Format

Share Document