Performance Analysis of Proactive Neighbor Discovery in a Heterogeneous Tactical Network

R. Lopes, Paulo H. L. Rettore, S. M. Eswarappa, J. Loevenich, P. Sevenich
{"title":"Performance Analysis of Proactive Neighbor Discovery in a Heterogeneous Tactical Network","authors":"R. Lopes, Paulo H. L. Rettore, S. M. Eswarappa, J. Loevenich, P. Sevenich","doi":"10.1109/ICMCIS52405.2021.9486398","DOIUrl":null,"url":null,"abstract":"This paper describes a quantitative evaluation of OLSRv2 proactive neighbor discovery in a heterogeneous tactical network using real military radios. Tactical networks generally have low data rates, high latency and hard to predict mobility patterns. The experimental network used in this investigation hosted mobile nodes using three different types of communication technologies, namely VHF (9.6 kbps, 20 km), UHF (240 kbps, 2 km) and SatCom (100-500 kbps - simulated). OLSRv2 was set to use multicast IPs to send hello and topology control messages within intervals suitable for the data rate available; using less than ~5% of the network nominal capacity. Therefore, we analyze results from a testbed with mobile nodes connected to a tactical network using OLSRv2 to create an overlay IP network. The quantitative results suggest that OLSRv2 can be fine-tuned to proactively discover IP nodes in radio networks with quite different link data rates. The trade-off between data overhead and time to converge is discussed over estimated metrics.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCIS52405.2021.9486398","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

This paper describes a quantitative evaluation of OLSRv2 proactive neighbor discovery in a heterogeneous tactical network using real military radios. Tactical networks generally have low data rates, high latency and hard to predict mobility patterns. The experimental network used in this investigation hosted mobile nodes using three different types of communication technologies, namely VHF (9.6 kbps, 20 km), UHF (240 kbps, 2 km) and SatCom (100-500 kbps - simulated). OLSRv2 was set to use multicast IPs to send hello and topology control messages within intervals suitable for the data rate available; using less than ~5% of the network nominal capacity. Therefore, we analyze results from a testbed with mobile nodes connected to a tactical network using OLSRv2 to create an overlay IP network. The quantitative results suggest that OLSRv2 can be fine-tuned to proactively discover IP nodes in radio networks with quite different link data rates. The trade-off between data overhead and time to converge is discussed over estimated metrics.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
异构战术网络中主动邻居发现性能分析
本文描述了一种基于真实军用无线电的异构战术网络中OLSRv2主动邻居发现的定量评估。战术网络通常具有低数据速率,高延迟和难以预测的移动模式。本研究中使用的实验网络承载了使用三种不同类型通信技术的移动节点,即VHF (9.6 kbps, 20 km)、UHF (240 kbps, 2 km)和SatCom (100-500 kbps -模拟)。设置OLSRv2使用组播ip在适合可用数据速率的间隔内发送hello和拓扑控制消息;使用不到网络标称容量的~5%。因此,我们分析了使用OLSRv2创建覆盖IP网络的移动节点连接到战术网络的测试平台的结果。定量结果表明,OLSRv2可以进行微调,以主动发现具有不同链路数据速率的无线网络中的IP节点。数据开销和收敛时间之间的权衡是通过估计的度量来讨论的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Novel Multi-Parameter based Rate-Matching of Polar Codes A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks CNN-based processing of radio frequency signals for augmenting acoustic source localization and enhancement in UAV security applications Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1