11 research outputs found

    Routing in Large Scale tactical mobile ad hoc Networks

    Get PDF
    The current Transformation of the military networks adopts the MANET as a main component of the tactical domain. Indeed, a MANET is the right solution to enable highly mobile, highly reactive and quickly deployable tactical networks. Many applications such as the Situational Awareness rely on group communications, underlying the need for a multicast service within the tactical environment where the MANET is employed as a transit network. The purpose of this thesis is to study the setting up of an optimal multicast service within this tactical environment. We firstly focus on defining the protocol architecture to carry out within the tactical network paying particular attention to the MANET. This network is interconnected with different types of networks based on IP technologies and implementing potentially heterogeneous multicast protocols. The tactical MANET is supposed to be made of several hundred of mobile nodes, which implies that the scalability is crucial in the multicast protocol architecture choice. Since the concept of clustering proposes interesting scalability features, we consider that the MANET is a clustered network. Thereby, we define two multicast routing protocols adapted to the MANET: firstly STAMP that is in charge of the multicast communications within each cluster and secondly SAFIR that handles multicast flows between the clusters. These two protocols that can be implemented independently, act in concert to provide an efficient and scalable multicast service for the tactical MANET. Then, we study the interoperability of these multicast protocols employed within the MANET with those employed in the heterogeneous networks that it is interconnected with in order to guarantee end-to-end seamless multicast services to users. Finally, since the multicast protocols proposed in this thesis rely on underlying unicast routing protocols, we propose, in the last chapter, a scalable unicast routing protocol based on OLS

    Algorithmes de routage dans les réseaux mobile ad hoc tactique à grande échelle

    No full text
    The current Transformation of the military networks adopts the MANET as a main component of the tactical domain. Indeed, a MANET is the right solution to enable highly mobile, highly reactive and quickly deployable tactical networks. Many applications such as the Situational Awareness rely on group communications, underlying the need for a multicast service with the tactical environment where the MANET is employed as a transit network. The purpose of this thesis is to study the setting up of an optimal multicast service within this tactical environment. We firstly focus on defining the protocol architecture to carry out within the tactical network paying particular attention to the MANET. This network is interconnected within different types of networks based on IP technologies and implementing potentially heterogeneous multicast protocols. The tactical MANET is supposed to be made of several hundred of mobile nodes, which implies that the scalability is crucial in the multicast protocol architecture choice. Since the concept of clustering proposes interesting scalability features, we consider that the MANET is a clustered network. Thereby, we define two multicast routing protocols adapted to the MANET: firstly STAMP that is in charge of the multicast communications within each cluster and secondly SAFIR that handles multicast flows between the clusters. These two protocols that can be implemented independently, act in concert to provide an efficient and scalable multicast service for the tactical MANET.La Transformation qui s'opère depuis quelques années dans les réseaux militaires place le MANET comme une composante principale du domaine tactique. En effet, un MANET met en œuvre des nœuds de communication de grande mobilité, de grande réactivité et qui se déploient rapidement. De nombreuses applications militaires temps réel (ex : "situational awarness") reposent sur des communications de groupes et nécessitent donc l'existence d'un service multicast dans l'environnement tactique où le MANET est utilisé comme réseau de transit. L'objectif de cette thèse est d'étudier la mise en place d'un service multicast optimum dans l'environnement tactique MANET. Nous nous sommes premièrement attachés à définir l'architecture protocolaire multicast à déployer au sein du réseau tactique et plus particulièrement dans le MANET. Le MANET tactique est supposé être composé de plusieurs centaines de nœuds, ce qui implique que la contrainte de passage à l'échelle est déterminante dans le choix de l'architecture protocolaire du service multicast. Nous avons choisi le clustering comme solution de passage à l'échelle. Nous avons alors défini deux protocoles de routage multicast adaptés au MANET: STAMP, chargé des communications multicast à l'intérieur de chaque cluster et SAFIR, chargé des flux multicast entre les clusters. Ces deux protocoles agissent de concert pour fournir un service multicast performant et supportant le passage à l'échelle dans le MANET tactique. [...

    Algorithmes de routage dans les réseaux mobile ad hoc tactique à grande échelle

    No full text
    La Transformation qui s'opère depuis quelques années dans les réseaux militaires place le MANET comme une composante principale du domaine tactique. En effet, un MANET met en œuvre des nœuds de communication de grande mobilité, de grande réactivité et qui se déploient rapidement. De nombreuses applications militaires temps réel (ex : "situational awarness") reposent sur des communications de groupes et nécessitent donc l'existence d'un service multicast dans l'environnement tactique où le MANET est utilisé comme réseau de transit. L'objectif de cette thèse est d'étudier la mise en place d'un service multicast optimum dans l'environnement tactique MANET. Nous nous sommes premièrement attachés à définir l'architecture protocolaire multicast à déployer au sein du réseau tactique et plus particulièrement dans le MANET. Le MANET tactique est supposé être composé de plusieurs centaines de nœuds, ce qui implique que la contrainte de passage à l'échelle est déterminante dans le choix de l'architecture protocolaire du service multicast. Nous avons choisi le clustering comme solution de passage à l'échelle. Nous avons alors défini deux protocoles de routage multicast adaptés au MANET: STAMP, chargé des communications multicast à l'intérieur de chaque cluster et SAFIR, chargé des flux multicast entre les clusters. Ces deux protocoles agissent de concert pour fournir un service multicast performant et supportant le passage à l'échelle dans le MANET tactique. [...]The current Transformation of the military networks adopts the MANET as a main component of the tactical domain. Indeed, a MANET is the right solution to enable highly mobile, highly reactive and quickly deployable tactical networks. Many applications such as the Situational Awareness rely on group communications, underlying the need for a multicast service with the tactical environment where the MANET is employed as a transit network. The purpose of this thesis is to study the setting up of an optimal multicast service within this tactical environment. We firstly focus on defining the protocol architecture to carry out within the tactical network paying particular attention to the MANET. This network is interconnected within different types of networks based on IP technologies and implementing potentially heterogeneous multicast protocols. The tactical MANET is supposed to be made of several hundred of mobile nodes, which implies that the scalability is crucial in the multicast protocol architecture choice. Since the concept of clustering proposes interesting scalability features, we consider that the MANET is a clustered network. Thereby, we define two multicast routing protocols adapted to the MANET: firstly STAMP that is in charge of the multicast communications within each cluster and secondly SAFIR that handles multicast flows between the clusters. These two protocols that can be implemented independently, act in concert to provide an efficient and scalable multicast service for the tactical MANET.TOULOUSE-ENSEEIHT (315552331) / SudocSudocFranceF

    STAMP : Shared-Tree Ad hoc Multicast Protocol

    No full text
    International audienceMulticasting in mobile ad hoc networks (MANET) has received considerable attention and is extremely challenging due to the limited bandwidth and the dynamic topology characteristics of such networks (to name only a few). Moreover, the multicast capability of communications is going to be of great interest, especially in new military wireless environments for the digitized battlefield. Indeed, tactical MANETs, where large networks can be deployed, also add scalability constraints when designing a multicast routing protocol. Currently, the best response to scalability in ad hoc networks is to gather nodes into groups as a result of a clustering algorithm. The work of this paper focuses on solving the two related challenges: to achieve efficient and adaptive multicast communications firstly inside each cluster and secondly among the clusters. This paper presents a solution regarding the first challenge. We propose shared-tree ad hoc multicast protocol (STAMP), a core-based multicast routing protocol independent from the underlying unicast routing protocol. Compared to other shared-tree multicast protocols, STAMP achieves good performance even under mobility since it takes advantage from the broadcast capacity of the medium to deliver data on the tree (data forwarding based on mesh principles). Discrete event simulations were run to evaluate and to compare our method to other existing solution

    An efficient Scalable structure-Free Inter cluster multicast Routing (SAFIR) protocol for large tactical Mobile Ad hoc Networks

    No full text
    International audienceScalability is a fundamental requirement in the field of Mobile Ad hoc Networks with the current significant growth in military network capabilities, such as greater node counts, increased bandwidth, better routing times and decreased latencies. Indeed, the advent of the digitized battlefield defines the needs for tactical Mobile Ad hoc Networks, which are formed by hundreds to thousands of nodes. Consequently, the well-known challenging issues of multicasting in MANET become even more significant with these networks, since the legacy routing protocols do not scale with such tactical environments. We propose in this paper an efficient solution that meets the needs for a scalable multicast routing protocol for a large-scale tactical MANET. Relying on a clustered network, which is an appropriate solution to handle scalability, the protocol proposed in this paper defines how to achieve multicast communications between nodes that belong to different clusters

    Statistical Admission Control in Multi-Hop Cognitive Radio Networks

    No full text
    International audienceWe address the problem of online admission control in multi-hop, multi-transceiver cognitive radio networks where the channel access is regulated by a bare-bones time-division multiple access protocol and the primary user activity is modeled as an ON/OFF process. We show that the problem of computing the available end-to-end bandwidth-necessary for admission control-is NP-Complete. Rather than working on an approximation algorithm and analyzing its worst-case performance, we relax the problem of online admission control by using a randomized scheduling algorithm and analyzing its average performance. Randomized scheduling is widely used because of its simplicity and efficiency. However, computing the resulting average throughput is challenging and remains an open problem. We solve this problem analytically and use the solution as vehicle for BRAND-a centralized heuristic for computing the average bandwidth available with randomized scheduling between a source destination pair in cognitive radio networks. Driven by practical considerations, we introduce a distributed version of BRAND and prove its correctness. An extensive numerical analysis demonstrates the accuracy of BRAND and its enabling value in performing admission control

    An efficient Scalable structure-Free Intercluster multicast Routing (SAFIR) protocol for large tactical Mobile Ad hoc Networks

    No full text
    International audienceScalability is a fundamental requirement in the field of Mobile Ad hoc Networks with the current significant growth in military network capabilities, such as greater node counts, increased bandwidth, better routing times and decreased latencies. Indeed, the advent of the digitized battlefield defines the needs for tactical Mobile Ad hoc Networks, which are formed by hundreds to thousands of nodes. Consequently, the well-known challenging issues of multicasting in MANET become even more significant with these networks, since the legacy routing protocols do not scale with such tactical environments. We propose in this paper an efficient solution that meets the needs for a scalable multicast routing protocol for a large-scale tactical MANET. Relying on a clustered network, which is an appropriate solution to handle scalability, the protocol proposed in this paper defines how to achieve multicast communications between nodes that belong to different clusters

    On estimating the end-to-end bandwidth in multi-transceiver multi-hop cognitive radio networks

    No full text
    International audienceCognitive radios promise to revolutionize the performance of wireless networks in general and multi-hop wireless networks in particular by making efficient use of the portion of the licensed spectrum left un-utilized. Realizing this promise, however, requires revisiting many of the current network architectures and protocols, which is the subject of a very active research effort. In this work, we focus on Quality of Service routing and more specifically, admission control. We consider a multi-hop cognitive radio network where every node is equipped with multiple transceivers. Because the research and development of a widely accepted MAC protocol for these networks is still ongoing, we assume a bare-bones TDMA protocol at the link layer. We show that, for the network considered, the problem of finding the maximum end-to-end bandwidth of a given path is NP-Complete. Given this result, we consider a relaxed version of the problem wherein the slot allocations are carried out at each node by selecting at random the required number of slots among those available. For this case, we provide a linear time algorithm for computing the average residual end-to-end bandwidth. We perform an extensive numerical analysis that demonstrates its accuracy and enabling value for performing admission control

    COExiST: Revisiting Transmission Count for Cognitive Radio Networks

    No full text
    International audienceTransmission count, the number of transmissions required for delivering a data packet over a link, is part of almost all state-of-the-art routing metrics for wireless networks. In traditional networks, peer-to-peer interference and channel errors are what define its value for the most part. In cognitive radio networks, however, there is a third culprit that can impact the transmission count: primary user interference. It may be tempting to think of primary user interference as no different than interference caused by other peers. However, unlike peers, primary users do not follow the same protocol and have strict channel access priority over the secondary users. Motivated by this observation, we carry out an empirical study on a USRP testbed for analyzing the impact of primary users. Our measurements show that a primary user has a distinct impact on the transmission count, which the de facto standard approach, ETX, designed for traditional networks, fails to capture. To resolve this, we present COExiST (for COgnitive radio EXpected transmISsion counT): a link metric that accurately captures the expected transmission count over a wireless link subject to primary user interference. Extensive experiments on a five-node USRP testbed demonstrate that COExiST accurately captures the actual transmission count in the presence of primary users -- the 80th percentile of the error is less than 20%
    corecore