Skip to main content

Warfare Message Communication in Tactical WMN Using HWMP

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

  • 2457 Accesses

Abstract

In wireless network technologies, Wireless Mesh Network (WMN) is decentralized, low cast and resilient. Hybrid WMN provides minimal configuration and infrastructure to communicate with large community networks like military networks. Since military networks are well planned networks, we can address them as tactical networks. The widely spread fighting forces in military networks have to share information about strategic situations quickly and with better clarity in rapidly changing network. Due to its mobility in terrain topology, network is suffering from suitable routing protocol. Hybrid Wireless Mesh network Protocol (HWMP) is one of the promising routing protocol for such tactical networks. In this paper authors are proposing a framework of analytical model for WMN network, queuing system and delay. The suggested analytical model is also better suited for tactical networks during warefare communication. Using HWMP the analytical delay model is compared with simulation model for 50 nodes. As the simulation proceeds End-to-end delay of delay model is same as simulation model. The authors also focus on analysis of HWMP using military application, against different parameters like Packet Delivery Fraction (PDF), End-to-end delay and routing overhead. The HWMP is compared against well-known protocols of wireless network AODV and DSDV. The results show that PDR and End-to-end delay of HWMP is better than AODV and DSDV as the network size increases. The routing overhead of HWMP is almost nil compared to other two.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nikolaidis, L.: The End of the Internet. IEEE Network (January/February 2008), In EDITOR’S NOTE

    Google Scholar 

  2. Akyildiz, I.F., Wang, X., Wangi, W.: Wireless mesh networks: a survey. Computer Networks and ISDN Systems 47(4), 445–487 (2005)

    Article  MATH  Google Scholar 

  3. Kim, B., et al.: Tactical network design and simulator with wireless mesh network-based backbone architecture. In: Applications and Technology Conference (LISAT), pp. 1–5 (May 2010)

    Google Scholar 

  4. ANSI/IEEE Std 802.11: IEEE Standard for Local and Metropolitan area networks Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1999 edition (r2003) edn. (2003)

    Google Scholar 

  5. IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001): IEEE. IEEE Standard for Local and Metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems (2004)

    Google Scholar 

  6. Campista, et al.: Routing metrics and protocols for wireless mesh networks. IEEE Network 22(1), 6–12 (2008)

    Article  Google Scholar 

  7. Baumann, Heimlicher, Plattner: Routing in large-scale wireless mesh networks using temperature fields. IEEE Network 22(1), 25–31 (2008)

    Article  Google Scholar 

  8. Bisnik, N., Abouzeid, A.: Dealy and throughput in random aceess wireless mesh networks. In: IEEE ICC 2006 Proceedings, pp. 403–408 (2006)

    Google Scholar 

  9. Sepehr, F.H., Ashtiani, F.: An analytical model for evaluation of wireless mesh networks. In: International Symposium on Telecommunications, pp. 295–300 (2008)

    Google Scholar 

  10. Liu, T., Liao, W.: Location-dependent throughput and delay in wireless mesh networks. IEEE Transactions on Vehicular Technology 57(2), 1188–1198 (2008)

    Article  Google Scholar 

  11. Zhou, P., et al.: Asymptotic capacity of infrastructure wireless mesh networks. IEEE Transactions on Mobile Computing 7(8), 1011–1024 (2008)

    Article  Google Scholar 

  12. Cornils, M., et al.: Simulative Analysis of the Hybrid Wireless Mesh Protocol (HWMP). In: European Wireless Conference, pp. 536–543 (2010)

    Google Scholar 

  13. Peppas, N., et al.: Hybrid routing protocol in wireless mesh networks. In: MILCOM, pp. 1–7 (2007)

    Google Scholar 

  14. Abomasan, M., Wysoeki, T., Lipman, J.: Performance investigation on three-classes of MANET routing protocols. In: Asia-Pacific Conference on Communications, October 3-5, pp. 774–778 (2005)

    Google Scholar 

  15. Pirzada, A.A., Mcdonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 5(6), 695–710 (2006)

    Article  Google Scholar 

  16. Bolch, G., Greiner, S., de Meer, H., Trivedi, K.S.: Queuing Networks and Markov Chains, ch. 6-7, pp. 212–214, 263–267. John Wiley and Sons (1998)

    Google Scholar 

  17. HWMP for NS-2. Wireless Software R&D Group of IITP RAS (February 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naragund, J.G., Banakar, R.M. (2014). Warfare Message Communication in Tactical WMN Using HWMP. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics