scholarly journals Hierarchical model of information signals formation at the physical layer in FANET

2020 ◽  
Vol 11 (30) ◽  
pp. 178-188
Author(s):  
G. S. Vasilyev ◽  
O. R. Kuzichkin ◽  
I. A. Kurilov ◽  
D. I. Surzhik

Creation of reliable and efficient flying ad-hoc networks (FANET) requires detailed development of the model of the physical layer of data transmission, determined by the conditions of operation of the networks. The problems of well-known software simulators of communication networks are the simplified nature of the physical layer, as well as the inability to obtain specific analytical solutions in the process of simulation. The hierarchical model of formation of information signals which allows to represent various types of communication channels and the channel-forming equipment, for providing their analytical description and the further analysis is developed. The model allows to describe communication channels between UAVs and (or) ground control centers taking into account the effects of attenuation, intersymbol interference, multipath propagation of signals; schemes of terminal and intermediate network equipment with linear and nonlinear signal conversion; circuits with forward regulation, backward regulation and combined regulation; circuits with multi-channel signal generation and processing, as well as cross-links between channels. Analytical expressions of the transfer function of the generalized hierarchical model for an arbitrary number of disclosed levels of hierarchy are obtained. An example of the presentation and study of the UAV transmitter circuit on the basis of a hierarchical model of signal formation is considered.

2020 ◽  
Author(s):  
Indushree Banerjee ◽  
Martijn Warnier ◽  
Frances M. T Brazier

Abstract When physical communication network infrastructures fail, infrastructure-less communication networks such as mobile ad-hoc networks (MANET), can provide an alternative. This, however, requires MANETs to be adaptable to dynamic contexts characterized by the changing density and mobility of devices and availability of energy sources. To address this challenge, this paper proposes a decentralized context-adaptive topology control protocol. The protocol consists of three algorithms and uses preferential attachment based on the energy availability of devices to form a loop-free scale-free adaptive topology for an ad-hoc communication network. The proposed protocol has a number of advantages. First, it is adaptive to the environment, hence applicable in scenarios where the number of participating mobile devices and their availability of energy resources is always changing. Second, it is energy-efficient through changes in the topology. This means it can be flexibly be combined with different routing protocols. Third, the protocol requires no changes on the hardware level. This means it can be implemented on all current phones, without any recalls or investments in hardware changes. The evaluation of the protocol in a simulated environment confirms the feasibility of creating and maintaining a self-adaptive ad-hoc communication network, consisting of multitudes of mobile devices for reliable communication in a dynamic context.


Author(s):  
Suneetha Bulla, Et. al.

With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key management schemes such as symmetric and asymmetric cryptography have been used to support MANET environment. This paper conducted survey to gain a quick knowledge of security design demand and cryptography solutions to secure MANET.  This survey focused on security schemas and case studies of cryptography techniques on Ad Hoc networks. Finally, conclusions are discussed.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


2021 ◽  
Vol 22 (9) ◽  
pp. 1247-1259
Author(s):  
Iftikhar Ahmad ◽  
Rafidah Md Noor ◽  
Zaheed Ahmed ◽  
Umm-e-Habiba ◽  
Naveed Akram ◽  
...  

AbstractHeterogeneous vehicular clustering integrates multiple types of communication networks to work efficiently for various vehicular applications. One popular form of heterogeneous network is the integration of long-term evolution (LTE) and dedicated short-range communication. The heterogeneity of such a network infrastructure and the non-cooperation involved in sharing cost/data are potential problems to solve. A vehicular clustering framework is one solution to these problems, but the framework should be formally verified and validated before being deployed in the real world. To solve these issues, first, we present a heterogeneous framework, named destination and interest-aware clustering, for vehicular clustering that integrates vehicular ad hoc networks with the LTE network for improving road traffic efficiency. Then, we specify a model system of the proposed framework. The model is formally verified to evaluate its performance at the functional level using a model checking technique. To evaluate the performance of the proposed framework at the micro-level, a heterogeneous simulation environment is created by integrating state-of-the-art tools. The comparison of the simulation results with those of other known approaches shows that our proposed framework performs better.


Sign in / Sign up

Export Citation Format

Share Document