검색 상세

전투무선망에서 신뢰성있는 멀티캐스트 MAC 프로토콜

Reliable Multicast MAC protocol for CNR networks

초록/요약

Combat net radio (CNR) networks are the most important communication infra for the ground forces such as infantry of Army and Marine corps. CNR is the primary means for short-range (less than 35 kilometers (22miles)) secure voice command and control (C2) below division level. It is also the secondary means for combat support (CS) and combat service support (CSS) units throughout the corps. Historically, mobile ad hoc network was originally introduced for this CNR networks. Mobile ad hoc networks have been used for tactical networks such as CNR to improve battlefield communications and survivability. The lack of infrastructure and the peer-to-peer nature of ad hoc networking make random access protocols the natural choice for medium access control in ad hoc networks. Indeed, most proposals of MAC protocols for ad hoc networks are based on the random access paradigm; in addition, the CSMA/CA scheme was selected by the IEEE802.11 committee as the basis for its standards due to the inherent flexibility of this scheme [1]. Therefore, the IEEE 802.11 standards are the most potential candidate for CNR networks in commercial area. MIL-STD-188-220 is the Interoperability Standard for Digital Message Transfer Device (DMTD) Subsystems of American Department of Defense. This standard has been widely used in data communication among command, control, communications computer and intelligence (C4I) systems [3-5]. The physical, datalink and network layers of OSI-7-layers are handled in MIL-STD-188-220. The commercial protocols are used for the higher layers. The data-link layer is the largest part of the protocol. The MAC protocol of MIL-STD-188-220 is implemented by 6 different network access delay (NAD) mechanisms. Among the 6 NAD schemes, R (random) - NAD and DAP (deterministic adaptable priority) - NAD are mandatory. R-NAD provides all stations with an equal opportunity to access the network, which increases the possibility of collisions like CSMA/CA used in IEEE 802.11 standards. Multicasting is an efficient communication service for supporting multi-point applications in the Internet. In tactical networks, the role of multicast services is potentially even more important due the bandwidth and energy savings that can be achieved through multicast packet delivery [2]. IEEE 802.11 standards and MIL-STD-188-220 also specify multicast services as well as unicast services in Layer 2. Military communication systems generally require reliability with the corresponding ACKs at multiple levels. However, the conventional multicast schemes over IEEE 802.11 and MIL-STD-188-220 have some constraints in respect to time overhead. Since ACK packet receptions from all multiple receivers degrade the channel efficiency and reduce the overall network performance. This degradation is worsened as the number of multicast receivers increases. Throughout this thesis, we investigate the characteristics of tactical multicast services in Layer 2, and then we propose reliable multicast MAC protocols for the candidate commercial and military standards. We select the IEEE 802.11 standard for the commercial standard and MIL-STD-188-220 for the military standard.

more

목차

CHAPTER 1 INTRODUCTION 1
1.1 Motivation 1
1.2 Contribution 3
1.3 Outline of the thesis 7
CHAPTER 2 BACKGROUNDS OF CANDIDATE MAC PROTOCOL FOR CNR 8
2.1 IEEE 802.11 standards 8
2.2 MIL-STD-188-220 11
CHAPTER 3 RELIABLE MULTICAST MAC PROTOCOL BASED ON IEEE 802.11 STANDARD 25
3.1 Introduction 25
3.2 Related Works 27
3.3 Proposed MAC protocol 38
3.4 Performance Evaluation 44
3.5 Chapter Summary 64
CHAPTER 4 RELIABLE MULTICAST MAC PROTOCOL BASED ON MIL-STD-188-220 65
4.1 Introduction 65
4.2 Related Works 66
4.3 Proposed MAC protocol 69
4.4 Performance Evaluation 72
4.5 Chapter Summary 82
CHAPTER 5 EFFECTIVE PACKET TRANSMISSION SCHEME FOR REAL-TIME SITUATIONAL AWARENESS BASED ON MIL-STD-188-220 84
5.1 Introduction 84
5.2 Related Works 86
5.3 Proposed scheme 88
5.4 Performance Evaluation and Simulation Results 91
5.5 Chapter summary 97
CHAPTER 6 CONCLUSIONS AND FUTURE WORKS 99
6.1 Conclusions 99
6.2 Future works 100
REFERENCES 102

more