scholarly journals Hierarchical model of information signals formation at the physical layer in FANET

2020 ◽  
Vol 11 (30) ◽  
pp. 178-188
Author(s):  
G. S. Vasilyev ◽  
O. R. Kuzichkin ◽  
I. A. Kurilov ◽  
D. I. Surzhik

Creation of reliable and efficient flying ad-hoc networks (FANET) requires detailed development of the model of the physical layer of data transmission, determined by the conditions of operation of the networks. The problems of well-known software simulators of communication networks are the simplified nature of the physical layer, as well as the inability to obtain specific analytical solutions in the process of simulation. The hierarchical model of formation of information signals which allows to represent various types of communication channels and the channel-forming equipment, for providing their analytical description and the further analysis is developed. The model allows to describe communication channels between UAVs and (or) ground control centers taking into account the effects of attenuation, intersymbol interference, multipath propagation of signals; schemes of terminal and intermediate network equipment with linear and nonlinear signal conversion; circuits with forward regulation, backward regulation and combined regulation; circuits with multi-channel signal generation and processing, as well as cross-links between channels. Analytical expressions of the transfer function of the generalized hierarchical model for an arbitrary number of disclosed levels of hierarchy are obtained. An example of the presentation and study of the UAV transmitter circuit on the basis of a hierarchical model of signal formation is considered.

2020 ◽  
Author(s):  
Indushree Banerjee ◽  
Martijn Warnier ◽  
Frances M. T Brazier

Abstract When physical communication network infrastructures fail, infrastructure-less communication networks such as mobile ad-hoc networks (MANET), can provide an alternative. This, however, requires MANETs to be adaptable to dynamic contexts characterized by the changing density and mobility of devices and availability of energy sources. To address this challenge, this paper proposes a decentralized context-adaptive topology control protocol. The protocol consists of three algorithms and uses preferential attachment based on the energy availability of devices to form a loop-free scale-free adaptive topology for an ad-hoc communication network. The proposed protocol has a number of advantages. First, it is adaptive to the environment, hence applicable in scenarios where the number of participating mobile devices and their availability of energy resources is always changing. Second, it is energy-efficient through changes in the topology. This means it can be flexibly be combined with different routing protocols. Third, the protocol requires no changes on the hardware level. This means it can be implemented on all current phones, without any recalls or investments in hardware changes. The evaluation of the protocol in a simulated environment confirms the feasibility of creating and maintaining a self-adaptive ad-hoc communication network, consisting of multitudes of mobile devices for reliable communication in a dynamic context.


Author(s):  
Suneetha Bulla, Et. al.

With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key management schemes such as symmetric and asymmetric cryptography have been used to support MANET environment. This paper conducted survey to gain a quick knowledge of security design demand and cryptography solutions to secure MANET.  This survey focused on security schemas and case studies of cryptography techniques on Ad Hoc networks. Finally, conclusions are discussed.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Author(s):  
Crescenzio Gallo ◽  
Michele Perilli ◽  
Michelangelo De Bonis

Mobile communication networks have become an integral part of our society, significantly enhancing communication capabilities. Mobile ad hoc networks (MANETs) extend this capability to any time/anywhere communication, providing connectivity without the need of an underlying infrastructure. The new coming realm of mobile ad hoc networks is first investigated, focusing on research problems related to the design and development of routing protocols, both from a formal and technical point of view. Then link stability in a high mobility environment is examined, and a route discovery mechanism is analyzed, together with a practical implementation of a routing protocol in ad hoc multi-rate environments which privileges link stability instead of traditional speed and minimum distance approaches.


2012 ◽  
pp. 847-862
Author(s):  
Cheng-Min Lin ◽  
Tzong-Jye Liu

ZigBee is based on IEEE 802.15.4 which specifies the physical layer and medium access control (MAC) for low-cost and low-power LR-WPAN. The technology can be applied in intelligent key, A/C operation and steering wheel inside vehicles. There are two types of devices in ZigBee, FFD and RFD. A FFD can communicate with RFDs and other FFDs, while a RFD can only communicate with a FFD. In ZigBee physical layer, it follows IEEE 802.15.4 standard and operates in unlicensed RF worldwide (2.4GHz global, 915MHz Americas or 868 MHz Europe). A superframe contained an active portion and an inactive portion is used in the MAC layer of ZigBee. The active portion includes CAP and CFP. In the inactive partition, the coordinator can enter sleep mode to save its power. Three main topologies of ZigBee are star, mesh, and tree. However, ZigBee is successfully produced into a low-cost controller applied for automotive applications, including vehicle control and status monitoring. According to the forecast of ON World in 2005 (ON WORLD, 2009), the deployed wireless sensing network nodes will increase to 127 million in 2010 from 1.2 million in 2005. It can be applied in home automation, battlefield surveillance, health care applications and vehicular environments. A wireless sensor network (WSN) constitutes a lot of wireless sensing nodes. In addition, a node in WSN consists of one or more sensors, a radio transceiver, and a microcontroller. The sensor can be used for sensing temperature, pressure, sound, vibration, motion or position, etc. to collect status from devices or environments. The transceiver is used to relay the information of the collected status computed by the microcontroller to a center node, called a gateway or sink. Therefore, a WSN belongs to one type of wireless ad-hoc networks. However, the nodes in a WSN are usually smaller than that in traditional wireless ad-hoc networks regarding node size, computing power, memory size, and transmission rage. In other words, the transmission ability, computing power, and memory size of WSN nodes are limited.


Sign in / Sign up

Export Citation Format

Share Document