Professional Documents
Culture Documents
MILITARY COMMUNICATIONS
MAC. The allocation of MAC subnets can Step 6: Frequency Grouping — The fre-
be based on diverse goals and constraints, quency channels for which a frequency group
including flows among platforms, member- has priority will be predefined, designed once
ship in command, and security. during planning, or dynamically assigned. We
use the following example to illustrate how fre-
Step 4: Topology Design — With the plat- quency groups are formed and how they are
form location and radio interfaces defined, the assigned to a subnet. Assume that five frequen-
topology control algorithm can assign the power cy channels F 1–F 5 are assigned to a waveform.
level of each radio interface, which decides the Of these five channels, F1, F2, and F3 form fre-
links among platforms. The goals include pro- quency group G α and F 4 , F 5 , and F 3 form fre-
ducing a connected network that satisfies a set quency group Gβ. We note that as shown in this
of constraints (Fig. 3), including: example, frequency groups can overlap. Howev-
• Robustness: For example, k-connectedness. er, for the overlapped channel, one group needs
• Available radio interface: Only the same to be assigned as the priority group at any
interface type can be connected. instance. For example, Gβ may have the priority
• Energy/power constraints: Network-wide or subnet for F 3 based on policy (e.g., alleviating
per individual platform or per interface. congestion due to heavy load in subnets that are
• Delay: For example, network diameter con- using Gβ).
straints. To offer more flexibility, it is possible to have
• Improve loss performance and capacity per- frequency channels shared across waveforms, as
formance by considering traffic loading. shown in Fig. 4. In particular, two waveforms
(waveforms 1 and 2) can have an overlapped fre-
Step 5: Waveform Frequency Set — Fre- quency {F6}. We plan to exploit the benefits of
quency channels associated with a waveform this additional level of flexibility in developing
can be defined within the limits of the cogni- the design tool. Note that a hopset and its color
tive radio hardware and software. In many in the figure refer to a frequency group.
cases, it is expected that the waveforms will be
non-overlapping. However, overlap may be Step 7: Primary Channel Allocation — The
permitted. primary frequencies must be assigned for each
subnet. We use the allocation of groups to sub-
nets to define the primary frequencies a subnet
can use. In general, the frequency group assign-
:Gx gateway node has x ment algorithm should aim at reducing inter-
instantiated interfaces (i1,i2,...ix) ference across subnets. Figure 5 gives an
:N1 non-gateway node Waveform 1 example of assigning the same group to sub-
has 1 ad hoc interface Waveform 2 nets A and C, which are far enough apart not
N110 to interfere. The figure also shows the initial
N19 i1 G25
frequency assignments, assuming that F 3 is
i1 G21 assigned to group Gβ. Our model also assumes
i1 G22 i1 G24
i1 G23 i2 N15 that one channel per waveform is used for
N14 i2 i2 sensing and information exchange among mem-
i2 i3 bers of the same waveform. There is no need
i2 N114
N 13 N111 for information exchange among subnets of
N11 N18 different waveforms.
N16
N113
N12 N112
N17 Step 8: Dynamic Spectrum Access — Given
the primary frequency group assigned to a sub-
net, frequency-sets are formed dynamically
Figure 2. Platform group and frequency group assignment. based on the traffic loading of a subnet and the
interference.
To realize the concept of available spectrum
or real-time channel allocation, channels can be
:Gx gateway node has x Waveform 1
dynamically borrowed from other frequency
instantiated interfaces (i1,i2,...ix) Waveform 2 groups and form a frequency-set. In particular,
:N1 non-gateway node suppose F3 is in group Gβ and hence assigned to
has 1 ad hoc interface subnet β. Assume subnets α and β are far away
N110 from each other; subnet α can utilize F3, F4, and
N19 i1 G25 F 5, as long as it does not cause interference to
i1
subnet β. In this case subnet α’s frequency-set
G21 i1 G22 i1 G24 would consist of {F1, F2, …, F5}, and subnet β’s
i1 G23 i2 N15
i2
frequency-set would consist of {F 3, …, F 5}. In
N14 i2
i2
N114 i3 addition, even if a subnet using group α and a
i2
N 13 N111 subnet using group β are close to each other, a
subnet only uses the frequency channels it needs;
N11 N16 N18
N113 the unused channels can be lent to any close-by
N12 N112 subnets of the same waveform type. In our exam-
No links N17
between ple, suppose subnet β is lightly loaded and only
subnets needs F5; then F4 and F3 can be lent to close-by
subnet α. In this case subnet α’s grequency-set
Figure 3. Topology design. would consist of {F1, …, F4}, and subnet β’s gre-
Order of Several Hours (Once per Mission) future force networks like warfighter informa-
— As an example, consider the MAC subnet tion network-tactical (WIN-T) and future com-
and waveform frequency sets. Interface group- bat systems (FCS). In addition, not explicitly
ing (i.e., MAC subnet) and waveform frequency assumed here is that the association between an
sets should last the entire mission. These interface and waveform is also fixed throughout
assumptions are made according to how fre- the entire mission. Moreover, we also assume
quency planning and subnet design are done for that traffic loading (i.e., IER) and platform
movement pattern are given as input in
advance.
:Gx gateway node has x
interfaces (i1,i2,...ix) Subnet D (W2, G3) Order of an Hour (Several Times in a Mis-
H = F6 sion) — As an example, consider frequency
:N1 non-gateway node
has 1 ad hoc interface grouping and primary frequency assignment. We
N110
assume frequency grouping (i.e., grouping the
N19 i1 G25 frequency channels assigned to a waveform into
groups) and primary frequency assignment (i.e.,
i1 assigning the frequency groups to the MAC sub-
G21 i1 G22 i1 G24
i1 G23 i2 N15 nets) can be done several times within a mission.
N14 i2 i2 These decisions are based on factors like past
i2 i3
N12 and N112 i2 N114 traffic pattern and the anticipated network
N13 NOT in range, N111
so not need
behavior, and the results are distributed through
N11 N 6 N18 the entire network as policies.
orthogonal f’s
N113 N 14 and N1 6
N12 N112 1 1
in range, N17
so need
Order of Minutes (Once Every Minute or so)
orthogonal f’s — Consider dynamic secondary frequency access.
Subnet A (W1, Gα) Subnet B (W1, Gβ) Subnet C (W1, Gα) Although secondary channels must be released
H = F1, F2, F3, F4, F5 H = F2, F3, F4, F5 H = F1 immediately if primary users are detected, we do
not envision that spectrum opportunities will be
Figure 6. Frequency-set assignment. exploited every few seconds. We envision that in
a well-designed network, secondary spectrum
access would have ample damping or hysteresis
mechanisms so that secondary frequencies remain
:Gx gateway node has x
interfaces (i1,i2,...ix)
stable on the order of minutes.
Link cost = 1/BW
:N1 non-gateway node Order of Seconds — As an example, MAC
has 1 ad hoc interface 2
2 decisions could be made as frequently as once
N110
2 N19 i1 G25 per TDMA frame, based on instantaneous load-
2
2 2 2 ing (similarly for carrier sense multiple access
i1 1 1 [CSMA], in which it is also instantaneous). For
G21 i1 G22 i1 i2 20
i1 G23 G24 N15 most TDMA protocols used in waveforms like
N14 20 i2 i2
20 WNW or NCW, frame duration is on the order
i2 10
20
20 i2 N114 20i3 20 of a second or so. In addition, high mobility
N13 N111 20
requires analysis within seconds.
20 N11 20 20 N16 N18
20 20 N113 20 10 LEVELS OF DESIGN
N 12 N112 20
N17 Cognitive network design spanning the afore-
20
mentioned timescales can be performed using
the concept of a snapshot during which network
Figure 7. Routing path computation. status, including traffic loading and node loca-
tions, typically remains the same. Thus, a cogni-
tive algorithm cannot be invoked more
Subnet D (W2, G3) frequently than a snapshot. The frequency with
H = F6
which the design steps are taken will be deter-
F6 mined by the frequency of the snapshots. The
N110 frequency of the snapshots in turn determines
N19 i1 G25 the speed of adaptation and design runtime.
Based on this observation, we propose three
i1
G21 i1 G22 i1 G24 i2 main levels of design:
i1 G23 N15
Mission-level design: We envision that wave-
N14 i2 i2
F3 i2 F2 form frequency set design and frequency grouping
F2 i2 N114 F4i3 F1
N 13 N111 can potentially be performed once per mission.
F3 Phase-level design: We envision that MAC
N11 N18
N113
N16 subnet design, topology maintenance, and prima-
F1 N12 N112 F5 ry frequency assignment can potentially be done
N17
several times per mission (i.e., in phases).
A2 and B2 are B4 and C2 Snapshot-level design: We envision that sec-
Subnet A (W1, Gα) Subnet B (W1, Gβ) are in range, Subnet C
H = F1, F2, F3, F4, F5 NOT in range, H = F2, F3, F4, F5 so need (W1, Gα) ondary frequency access, routing, and MAC can
so not need
orthogonal f’s orthogonal f’s H = F1
potentially be performed once per snapshot.
Figure 9 shows our three phases of design.
Figure 8. MAC scheduling. Note also that the algorithms at a particular
In this article we have introduced a novel model KYRIAKOS MANOUSAKIS is a senior research scientist with the
Mobility Management Research Department at Telcordia
of cognitive tactical networks that encompasses Technologies. His research interests include mobile ad hoc
the peculiar features of troop deployment and networking, protocol design, and network optimization. He
channel scarcity. Based on this model, we have has been involved with the application of stochastic
formulated the cognitive network design prob- approximation techniques and, in particular, simulated
annealing, to the design and analysis of mobile ad hoc
lem, and showed its different design knobs and communications networks.
execution-level alternatives. We have used this
model and formulation in the development of a D AVID S HALLCROSS is a senior research scientist with the
new cognitive network design tool that allows Information Analysis and Services Department, Applied
Research, Telcordia. His research interests include research
the designer to rapidly answer what-if questions in and application of mathematical programming and opti-
and can also automatically tune cognitive net- mization in the context of telecommunications. This has
work parameters [7]. Such a tool can be very included developing prototype design tools for a variety of
useful, not only in assessing design feasibility, different sorts of networks, developing improved algo-
rithms for workforce scheduling, research into methods of
but also in exploring the vast space of parameter network topology inference from limited information, and
options and recommending which layers to opti- research into methods and consequences of routing in
mize. telecommunications networks.
K AUSTUBH S INKAR is a research scientist with the Mobility mobile technology under CERDEC’s Proactive Integrated
Management Research Department at Telcordia Technolo- Link Selection for Network Robustness program. He is a
gies. His research interests are in the areas of computer Telcordia Fellow.
networking with focus on cooperative networks, multi-
interface devices, mesh networks, and network security. He C HARLES G RAFF is senior project engineer at CERDEC, U.S.
has an M.S. from Brooklyn Polytechnic University. Army, RDECOM Fort Monmouth, New Jersey. As CERDEC
Lead for the Network Design project, he leads a team of
KIRK CHANG [SM] is a director in the Applied Research Area several engineers at Fort Monmouth who are working
of Telcordia Technologies. He received his Ph.D. degree jointly with the Telcordia team in developing portions of
from the Electrical Engineering Department of the Universi- the NEDAT program. As an expert on wireless and mobile
ty of California, Los Angeles. His research interest is in ad hoc networking, he also serves as an advisor to several
wireless communications, wireless ad hoc networking, IP key projects at CERDEC.
routing, and QoS, and he holds 12 U.S. patents in these
areas. M ITESH P ATEL is an electronics engineer at the U.S. Army
CERDEC Aberdeen Proving Ground, Maryland. He received
KENNETH YOUNG [SM] is executive director for government his B.E. in electrical engineering from the City College of
project development in the Applied Research organization New York in 1995 and his M.S. in electrical engineering
at Telcordia, where he leads projects on mobile ad hoc from Stevens Institute of Technology in 1999. His research
networking technology. He is the program manager for interests include tactical mobile ad hoc networks, quality
the Army Research Laboratory’s Communications and Net- of service, and secured wireless networks. He has worked
works Collaborative Technology Alliance, a consortium on prior programs including the TMSIP, MOSAIC, and PIL-
that performs basic research in survivable wireless mobile SNER ATO program providing test and evaluation support.
networking, signal processing, and tactical information He is currently supporting the Cognitive Networking Tech-
protection. He heads another team developing advanced nologies program at CERDEC.