Military Mobile Ad-Hoc Networking Research Proposal

advertisement
Military Mobile
Ad-Hoc Networking
Research Proposal
Performance Metric Evaluation and Commercial Availability
Thomas Moscon
6/15/2014
1|Page
Contents
1
2
Introduction ................................................................................................................................ 4
Literature Review ............................................................................................................................ 5
2.1
Networking Fundamentals...................................................................................................... 6
2.1.1
3
OSI Model........................................................................................................................ 6
2.2
Ad-hoc Networking ................................................................................................................. 7
2.3
MANETs ................................................................................................................................... 7
2.4
MANET History ........................................................................................................................ 8
2.5
MANET Achievements ............................................................................................................ 9
2.6
MANET Challenges .................................................................................................................. 9
2.7
MANET Performance .............................................................................................................. 9
2.8
MANET Metric Evaluation ....................................................................................................... 9
2.9
MANET Challenges for Military use ...................................................................................... 10
2.10
Combat-net Radios ............................................................................................................... 10
2.11
Multi-hop vs. Single-hop ....................................................................................................... 10
2.12
Metrics .................................................................................................................................. 11
2.13
Commercial-Off-The-Shelf Products ..................................................................................... 11
2.14
COTS Products ....................................................................................................................... 12
Methodology................................................................................................................................. 13
3.1
Literature Comparison .......................................................................................................... 13
3.2
Simulations............................................................................................................................ 13
4
Conclusion ..................................................................................................................................... 14
5
Bibliography .................................................................................................................................. 15
Student address: mosta002@unisa.edu.au
Student ID number: 110043629
Award: Bachelor of Information Technology: Network and Security
Provisional thesis title: Military Mobile Ad-hoc Networking: Performance Metric Evaluation and
Commercial Availability
Supervisors’ names: Grant Wigley
Date of submission: June 15th 2014
Thesis Questions:
What are the key metrics in evaluating performance for Military MANETs?
Thesis Sub-Question
What commercially available products suit the needs for a Military based Combat Net Radio
MANET?
1
Introduction
The Defense Science and Technology Organisation (DSTO) are currently undergoing research on
Military Mobile Ad-hoc Networks or MANETs for tactical warfare purposes due to the need for an
infrastructure-less network communication platform. Currently, the Australian Defence Force (ADF)
is using legacy communications hardware with limited bandwidth capabilities and requires a tactical
communication solution that allows convergence with speeds as low as sub megabit.
Unlike other countries like the United States, the ADF does not have the resources to deploy a fully
converged network infrastructure using satellites and other infrastructure to aid communications
within a short timeline on the battlefield. Instead, ‘Combat Net Radios’ and ‘Man packs’
communicating over UHF and VHF frequencies make up the bulk of the network, most of which is
either carried by soldiers or mounted in vehicles.
MANETs have been used and developed around the world for different tactical purposes and even
spawned from the need for better and more robust tactical networks. The reason Militaries look
towards MANETs is that they provide an infrastructure-less, easy and rapidly deployed network with
little to no management. This type of solution proves to be invaluable since there isn’t always the
time or money to setup network infrastructures on the battlefield for warfare. Instead of routers and
switches forwarding packets between layers of the network, all packets are forwarded by the
Combat Net Radios and Man Packs, making every soldier and vehicle a router in essence.
However there are still many challenges and unsolved issues relating to MANETs with research and
development being an ongoing process, one major issue is the scalability of the network. MANETs
have proven to work for small networks or networks with lots of nodes passing information between
neighbors or back to a server, but a fully converged brigade in the army with up to 1500 nodes
would require an extremely robust system. On top of that, the path of the data through the network
can be altered by the design of the Combat Net Radios and how they interface with the other
hardware.
For this, MANETs as a solution needs to be analyzed and tested thoroughly in order to produce solid
evidence about how to evaluate the performance of a network, and what are the key metrics
involved with the overall performance.
2
Literature Review
This research is dedicated to the findings on how to evaluate networking performance for Military
Mobile Ad-Hoc networks and what commercial-off-the-shelf (COTS) products are available as a
solution to this problem. Ad-Hoc networks can be designed for many purposes, but for each
different purpose, they are designed differently in order to suit networking needs in a very specific
way. The nature of the topic is looking to answer what performance metrics are more important for
a Military scenario and how we know those metrics are important.
The basis for this research is on a Military based MANET with up to 1500 nodes/soldiers in at least a
100x100km square block of mountainous and harsh terrain where nodes are constantly moving.
These types of network parameters are hard to build a network around, but so far, it is theorized
that ad-hoc networking is plausible for this type of tactical warfare.
The research will include looking at previous simulations that have been carried out in the same field
to examine how they weigh metrics, evaluation models and frameworks that outline how to
generally evaluate MANET performance, and a comparison of commercially available products to
determine what type of hardware best suits the needs of a Military MANET and what that hardware
does to perform that way.
2.1
Networking Fundamentals
Generic Local Area Network (LAN) or Wide Area Network (WAN) networks designed for office
buildings and enterprises usually consist of a hierarchical infrastructure. The most basic of these
infrastructures are the three layer hierarchical model, consisting of a core layer providing high speed
routing between major regions of the network, the distribution layer which provides most of the
routing, security and policies and is usually situated at a branch office connecting to the core and the
final layer, the access layer, which connects user devices and servers to the network. This design
model is shown in the figure 1 [12].
2.1.1 OSI Model
Not all networks are designed like this, however they all share a model known in networking as the
‘Open Systems Interconnection model’ (OSI Model) seen in Figure 2 [13].
The OSI Model consists of seven layers of networking each responsible for different tasks in data
transmission within a network.
Application Layer
Reserved for application protocols such as HTTP and FTP. It acts as a user-interface for the user
responsible for displaying images and data in a human-readable format by communicating with both
the presentation and session layer.
Transport Layer
The foundation for TCP, this layers main task is to provide end-to-end communication for
applications within or between networks. It provides reliability and flow-control to ensure data is
transmitted between hosts without failures, corruption or congestion.
Network Layer
Responsible for the routing and forwarding of packets between intermediate routers under
protocols such as Internet Protocol (IPv4/6) and Internet Control Message Protocol (ICMP) through
the utilization of host addressing to distinguish a packets destination.
Data Link Layer
The layer responsible for Ethernet on Local Area Networks (LAN). This layer provides encapsulation
of packets into frames and forwarding data between nodes on the same network with additional
functions such as error detection and correction.
Physical Layer
One of the most complex layers, responsible for network hardware transmission technologies of a
network. Digital Subscriber Line (DSL), Integrated Services for Digital Network (ISDN) and Wi-Fi are
three technologies that reside on the physical layer. Unlike the network layer, the physical layer
transmits raw bits instead of packets over physical links such as copper wires or Cat5 cables.
2.2
Ad-hoc Networking
Ad-hoc networks are an infrastructure-less and decentralized approach to network design. The word
Ad-hoc meaning ‘for this purpose’ assumes that the network is setup for a specific situation or
purpose. In our case, it is for Tactical Warfare. The network is ad-hoc because it does not rely on an
underlying infrastructure with managed routers, servers, access points like a traditional Wireless
Area Network would. Instead, each and every node in the network acts as a router-device,
responsible for forwarding and controlling traffic flow around the network [2].
2.3
MANETs
Mobile Ad-Hoc Networks were originally developed for tactical network communication due to the
dynamic nature of tactical warfare. Military networks have always required a mobile and dynamic
design without reliance on a fixed pre-configured infrastructure, not only to ensure rapid
deployment, but also to keep costs and complexity to a minimum and autonomy at a maximum.
MANETs create a framework suitable for this type of network design by providing an infrastructureless network built mainly upon multi-hop peer-to-peer technology that allows nodes to
communication over long distances and beyond Line of Sight.
2.4
MANET History
The concept of a military MANET over radio originated from an agency known as the Defense
Advanced Research Projects Agency (DARPA). In 1973, the group researched packet-switched radio
communication in order to provide mobile network access to computers and terminals within a
mobile environment [1]. This research was motivated by the need for tactical communication on the
battlefield, and to this day is still being researched for both military and commercial markets.
Packet Radio Networks were the first generation of ad-hoc networks back in 1973. The network
consisted of firmware pre-loaded packet radios that had minimal functionality, but was able to
communicate to other radios using early radio frequency technology. This technology implemented
the physical layer, data link layer and network layer of the OSI model.
The firmware was capable of providing network metrics such as power usage, signal to noise ratio
and even had a basic error detection system which forced a retransmission of dropped packets. The
routing, although primitive at the time, allowed for rapid and automatic deployment of the network,
which was and still is a key factor for tactical communication [6][14].
Second generation ad-hoc networks arrived in the 1980s up to 1993, which were developed and
implemented as a part of SURAN (Survivable Adaptive Radio Network Programs). This enhancement
improved radio performance by making the networks smaller, cheaper, efficient and more secure
[6][14].
A project by the name of GloMo (Global Mobile Information Systems) further enhanced mobile
networking by researching self organizing/self healing networks aimed at intelligence information
systems for the deployment of forces.
The next development in the second generation of ad hoc networks was NTDR (Near Term Digital
Radio Systems), the purpose of which was to provide self-organizing mobile communication
between Army Battle Command System automated systems and units at a brigade level and below
[6].
Finally third generation MANETs, from the 1990s until present day exploded with the invention of
portable laptops and other commercial communication devices based on packet radio systems [6].
MANETS were implemented during this generation and have since been developed for an array of
applications.
2.5
MANET Achievements
Despite the Military background of MANETs, in modern day society, MANETs are used for many
different applications in order to pass information around users. In a lecture by Kim Smith [3], one
particular example of a MANET is Dieselnet, which monitors users who get on and off buses in order
to map out where people are coming and going so that the bus system can create better routes.
2.6
MANET Challenges
MANETs propose many challenges due to the way it is inherently designed. In a MANET, all nodes
are independent of each other, and all operate in a peer-to-peer mode. This infrastructure-less
design adds difficulty to network management, making it challenging to detect and manage faults.
Because nodes in a MANET will always be moving, the topology of the network will be dynamic,
causing frequent route changes which can result in packet losses.
2.7
MANET Performance
The routing performance for MANETs differs for each routing protocol. For example, a routing
protocol such as Dynamic Source Routing (DSR) may incur less overhead than a protocol such as
Optimised Link State Routing Protocol (OLSR) due to the fact that it will transmit traffic data only
when there is data to be sent, where as OLSR floods the network with control and traffic data aimed
at keeping the routing tables updated as much as possible [7][17][26].
However this doesn’t always mean that certain routing protocols are better than others, they may
perform better in certain scenarios and for different purposes.
2.8
MANET Metric Evaluation
In an RFC written by S. Corson and J Macker [4], the authors distinguish a difference in metrics
between a routing protocol and the network context itself. To a further degree, it is also stated that
separate qualitative and quantitative metrics are evaluated for a network protocol.
Qualitative metrics explained were sleep and security, etc., where as quantitative metrics include
throughput and delay, efficiency which looks at data/control bits sent and received, and route
acquisition time. Finally, metrics that are important to a routing protocols overall context are
network size, network connectivity, traffic patterns, mobility, link capacity, and topological rate of
change and others.
There are two main ways to evaluate the performance of a MANET. The first approach uses
measurement techniques in order to evaluate a real prototype network, usually a test bed, which is
important in realising constraints and issues with a network that may not show up in simulations.
One of the largest testbeds with up to 30 nodes is the Uppsala University APE testbed which
revealed problems relating to different transmission ranges for control and data frames, a problem
known as the ‘communication gray zones’ [2].
The other approach to evaluating the performance of a MANET is via a simulation model, usually
simulated on either OPNET or NS-2. Many simulation models have been constructed in order to test
the performance of a MANET [8][9][10][11][23][24][25], but it is important to note that a
simulations do not accurately represent the actual performance of an entire network, rather they
aid us in answering specific questions about the network or help us to diagnose imperatives in the
design. Mobility models in particular aid in discovering the effects of mobility on a network, though
limited, the results these types of models can still provide useful and intelligence evidence.
Lastly, using simulations as a method of evaluating a large network can sometimes be deceiving and
a large understanding of networking is required in order to evaluate the data correctly. Many
researchers delve into the credibility of simulations for MANETs because of this issue [15].
2.9
MANET Challenges for Military use
Many popular MANET algorithms that were designed were done so for small fixed networks,
however a lot of tactical MANETs are designed with thousands of nodes in mind which makes
scalability still an issue that has unresolved challenges that range from configuration management,
security, interoperability, addressing and most of all routing.
In the Military, a term coined SWAP (Size, Weight and Power) is an extremely important aspect for
operating in tactical warfare and adds an extra budget for the types of physical networking devices
plausible out on the field [5][16]. Reducing the size, weight and power of each device on a soldier is
crucial for a more mobile and logistical mission. However, this limits the amount of processing
power allowed on each node which in turn limits the effectiveness of the MANET since every node
must act as a router as well as an end-user device. This proposes a tradeoff between efficiency and
reliability.
2.10 Combat-net Radios
Radio’s used for tactical purposes are generally known as ‘Combat-net Radios’ (CNRs). These radios
are primarily push-to-talk handheld devices that utilize certain waveforms in order to transmit and
receive radio signals. CNRs most popularly operate on the Very High Frequency (VHF band) and the
Ultra High Frequency (UHF) band, meaning they only transmit radio signals between the frequencies
of 30-300 MHz and 300-3,000 MHz respectively.
There are many factors that determine the performance of a CNR. These include power, frequency,
line of sight and environmental interference. For the factors we as humans can control, the more
power used, the greater the range of transmission, but most radios reach up to 10 watts.
2.11 Multi-hop vs. Single-hop
Networks can be also be defined into single-hop or multi-hop. Single-hop refers to a network where
there is only one hop between the source and destination, usually a default gateway or router.
Multi-hop networks are used when there is no default router available, much like a traditional
MANET where every node acts as a router to forward data around the network.
This approach is usually preferable for rapid deployment in hard-to-wire areas making it ideal for
tactical MANETs as it is impossible for the military to wire a network backbone in every location of
operation. It is also required in order to extend coverage of the network through multi-hop
forwarding.
2.12 Metrics
In networking, there are many parameters that can affect the performance of a network, which are
known as metrics. Some metrics are more important to analyse than others when diagnosing issues
or slowness within a network, making it a network administrator’s job to know which metrics are
important for what type of application or network usage. When diagnosing the performance of a
network, network tools are commonly used to display metrics between devices and the overall
network, but can also be output from simulations in order to analyse the performance of a network
in the scenario being simulated.
In the simplest cases, downloading large files from somewhere is a scenario in which a large
throughput is desired, making the speed in which the files are received quicker. Alternatively,
playing a video game over the internet requires extremely low latency, where no delays are present
and the actions/data sent by the client to the server and vice versa and almost synced. With a high
latency, lag would occur and the game would become unplayable.
OPNET, one of the most common networking simulators, is able to output a variety of metrics
including throughput, utilization, number of hops per route, route discovery time, average power
and retransmission attempts. Some of these metrics may affect the performance of the network
more, and others may be barely useful at all. These types of simulators can tell us valuable
information about how a network would perform in a certain scenario, but require a decent
knowledge of the network being simulated in order to properly diagnose the results to make
decisions and answer questions based upon them.
2.13 Commercial-Off-The-Shelf Products
Many Governments purchase what is known as Commercial-off-the-shelf products, meaning
products that are publicly available which can be bought under a government contract. The
advantage of this purchase is the reduction of development, maintenance time and a saving on cost.
Notably, COTS products can also provide a standardized approach instead of a custom in-house
development approach which would add a significant cost to time and money. Standardization also
means that there is already more than enough documentation and support for the product.
It is believed that COTS products are of a higher quality than custom developed products due to the
competitive nature of the marketplace, however true, it may lead to some security issues with the
purchase. Notably in IT especially, COTS products can pose security risks due to the public nature of
the product and the integration with other products. Although this is more prominent for software
products than hardware it is still worth noting that COTS products have been the cause of safety
concerns for the Military in the past.
2.14 COTS Products
Few companies design commercial products for MANET solutions, as they are not a popular choice
for industry networks, however there is still Research and Development carried out for Tactical
MANETs, below are a few examples of some MANET technologies.
Cisco
- Radio Aware Routing for Mobile Networking
Bluetronix (Bluestar)
- R&D for Government Military MANET solutions
- SWARM Intelligent Routing
Trellisware
- Military MANET development, Robust Hardware
- Converged physical/network layer waveform
- Tactical Scalable MANET (TSM) Waveform
Harris
- Another Military hardware provider
- Joint Tactical Radio System (JTRS) certified products
3
Methodology
3.1
Literature Comparison
The first pool of results will aim to compare the simulations and data gathered from existing public
papers to get a rough overview of the most important and key metrics involved with the
performance of MANETs. Only quantitative data will be collected as qualitative data is not relevant
in a Military scenario. The only significant qualitative metric would be security which is a non-issue
for the military.
Metric rankings will be collected from at least 10 different sources, the sources being mostly
conference papers, journal articles and published books. Points will be given to each metric based on
their effect on the performance for each scenario tested.
As this method is unreliable in giving a sure answer to the question with the possibility of mixed
results and a mixture of different test scenarios, it is only done for interests sake, and to see if any
patterns emerge that may provide me with useful information.
3.2
Simulations
Simulations will be conducted using one of the two popular network simulators NS-2 or OPNET. The
conditions for the simulations will be 1 test with a chosen best routing algorithm. First, a base
simulation will be conducted with 1500 nodes in order to achieve a decent network benchmark.
From there, each different network metric will be purposefully interfered with in order to observe
the effect that metric has on the performance of the network.
The effect on the performance of the network will be measured by sending the same artificial traffic
around the network for each test, and analyzing performance metrics such as packet loss, speed of
packets, total control/data traffic sent/received, etc.
Once all the simulations have been carried out as carefully as possible, the data gathered will
hopefully show which metric affects performance the most, and which one affects it the least. From
this, graphs and tables can be deduced that show each metrics affect on the performance of the
network and if there is enough convincing evidence, a ranking table will be formulated.
4
Conclusion
It is obvious that MANETs have potential as a solution for tactical communications but not without
many issues and challenges to overcome such as scalability, network management, terrain
interference, bandwidth and hardware limitations, and overall performance.
However there is no doubt a need for this type of network in the military due to the lack of possible
ways to deploy networking infrastructure on the fly. Utilizing MANETs means cheap and rapid
deployment for the army in the easiest way possible.
Using Commercial-off-the-shelf products is an obvious choice for governments as it cuts cost,
development and maintenance time. As well it provides a more standardized approach allowing for
better support for the product and a better performance guarantee.
Much of the research done for MANETs however doesn’t explain exactly how to measure its
performance. Most of this is done by network tools through the use of algorithms, but a lot of those
tools were intended to measure the performance of generic LAN scenarios and not MANET scenarios
where mobility plays an overarching factor on the performance, as well as the conditions that are
added due to a military setting.
This advocates the question “What are the key metrics in evaluating performance for Military
MANETs”.
5
Bibliography
1. J Jubin, JD Tomow, The DARPA packet radio network protocol, IEEE vol 75, no. 1 Jan 1987, pp2132.
2. 12. Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and
challenges,” Volume 1, Issue 1, July 2003, Pages 13–64
3. Computing@Derby / Kim Smith (Dec 5, 2013) Introduction to Ad-Hoc Wireless Networks, posted
to https://www.youtube.com/watch?v=Jmfd4KPGPp0
4. 5. S. Corson and J Macker, J 1999, “Mobile Ad hoc Networking (MANET): Routing Protocol
Performance Issues and Evaluation Considerations”, Viewed March 20th 2014,
<http://tools.ietf.org/html/rfc2501>
5. 3. Dave Barker, Extreme Engineering Solutions, August 3rd 2012, ‘Bringing Mobile Ad Hoc
Networks to the battlefield using COTS open standards’, viewed March 20th 2014,
<http://eecatalog.com/military/2012/08/03/bringing-mobile-ad-hoc-networks-to-the-battlefieldusing-cots-open-standards/>
6. Humayun Bakht, School of Computing and Mathematical Sciences, Liverpool John Moores
University, ‘History of Mobile Ad hoc Networks’, viewed March 20th 2014,
<http://www.oocities.org/humayunbakht/HMANET.pdf>
7. S. Ahmed and M. S. Alam, “Performance Evaluation of Important Ad Hoc Network Protocols,”
EURASIP Journal on Wireless Communications and Networking, Volume 2006, Article ID 78645,
Pages 1–11
8. J. Lee , O 2007, “An Analytical Modelling Approach for a Large Scale Mobile Ad Hoc Network,“
Military Communications Conference, 2007. MILCOM 2007. IEEE, Pages 1 – 4
9. Broch, Josh, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. "A performance
comparison of multi-hop wireless ad hoc network routing protocols." In Proceedings of the 4th
annual ACM/IEEE international conference on Mobile computing and networking, pp. 85-97. ACM,
1998.
10. Das, Samir R., Robert Castañeda, and Jiangtao Yan. "Simulation-based performance evaluation of
routing protocols for mobile ad hoc networks." Mobile networks and applications 5, no. 3 (2000):
179-189.
11. Perkins, Charles E., Elizabeth M. Royer, Samir R. Das, and Mahesh K. Marina. "Performance
comparison of two on-demand routing protocols for ad hoc networks." IEEE Personal
Communications 8, no. 1 (2001): 16-28.
12. http://wiki.hill.com/wiki/index.php?title=Image:G3525_Hierarchical-Model-Ex.jpg
13. http://edugeeks.in/wp-content/uploads/2013/10/osi-model-.gif
14. Misra, Sudip, Isaac Woungang, and Subhas Chandra Misra. Guide to wireless ad hoc networks.
Berlin: Springer, 2009, Page 61.
15. Todd R. Andel and Alec Yasinsac, “On the credibility of manet simulations,” Computer (Volume:
39, Issue: 7), Pages 48 – 54
16. Burbank, J.L. ; Chimento, P.F. ; Haberman, B.K. ; Kasch, W., “Key Challenges of Military Tactical
Networking and the Elusive Promise of MANET Technology,” Communications Magazine, IEEE
(Volume:44, Issue: 11), Pages 39 – 45
17. T. Plessea, C. Adjihb, P. Minetb, A. Laouitib, A. Plakoob, M. Badelb, P.Muhlethalerb, P. Jacquetb,
J. Lecomtea, “OLSR Performance Measurement in a Military Mobile Ad-hoc Network,” Ad Hoc
Networks, Volume 3, Issue 5, September 2005, Pages 575–588
18. Haidong Wang ; Crilly, Brian ; Zhao, Wei ; Autry, Chris ; Swank, Sean, “Implementing Mobile Ad
Hoc Networking (MANET) over Legacy Tactical Radio Links,” Military Communications Conference,
2007. MILCOM 2007. IEEE, Pages 1 – 7
19. Royer, E.M. ; Melliar-Smith, P.M. ; Moser, L.E. “An analysis of the optimum node density for ad
hoc mobile networks,” Communications, 2001. ICC 2001. IEEE International Conference on (Volume:
3), Pages 857 - 861
21. J. B. Cain, R. C. Bernhardt, W. A. Windham, "Mobile ad hoc network (MANET) providing qualityof-service (QoS) based unicast and multicast features," US Patent 7,394,826, 2008,
http://www.google.com/patents/US7394826
22. Asokan, R., "A review of Quality of Service (QoS) routing protocols for mobile Ad hoc networks,"
Wireless Communication and Sensor Computing, 2010. ICWCSC 2010. International Conference on,
Pages 1-6
23. Fan Bai ; Sadagopan, N. ; Helmy, A., "IMPORTANT: a framework to systematically analyze the
Impact of Mobility on Performance of Routing Protocols for Adhoc Networks," INFOCOM 2003.
Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
(Volume: 2), Pages 825 – 835
24. S. Kurkowski ; T. Camp ; M. Colagrosso, "MANET simulation studies: the incredibles," ACM
SIGMOBILE Mobile Computing and Communications Review - Special Issue on Medium Access and
Call Admission Control Algorithms for Next Generation Wireless Networks, Volume 9 Issue 4,
October 2005, Pages 50 – 61
25. Holliday, P., "SWARMM - a mobility modelling tool for tactical military networks," Military
Communications Conference, 2008. MILCOM 2008. IEEE, Pages 1 – 7
26. JM Choi ; YB Ko, "A performance evaluation for ad hoc routing protocols in realistic military
scenarios", Proceedings of the 9th International Conference on Cellular and Intelligent
Communications (CIC 2004), http://uns.ajou.ac.kr/publications/paper/C2004/cic2004.pdf
Download