Acessibilidade / Reportar erro

Assessment of Indicators for Updating Adjacency Matrix of Self-Organizing Flying Ad Hoc Network

ABSTRACT

The concept of a swarm of drones assumes the presence of a wireless ad hoc network, in which drones are network nodes and exchanging information with each other. This article is devoted to studying the behavior of an ad hoc network in a transient mode and assessing the characteristics of updating local adjacency matrices (LAM), which allow network nodes to autonomously form packet transmission routes. Using a simulation model, a comparison was made of two multiple access methods to a common data transmission channel in the process of updating matrices: cyclic and random (slotted ALOHA). The simulation results made it possible to determine areas of their effective application: slotted ALOHA is advisable to use with relatively high probabilities of packet distortion (of the order of 0.1 and higher), a numerous nodes (more than 40), and low network connectivity, and cyclic access (CA) is effective at a low level of distortion. It is shown that the completion of the process of updating adjacency matrices (AM) can be judged by such indicators of the exchange of routing information as the achievement of a certain threshold of the number of transmissions and a decrease in the level of network traffic.

Keywords
Unmanned aerial vehicle; Swarm; Flying Ad Hoc Network; Adjacency matrix; Cyclic access; Slotted ALOHA

INTRODUCTION

The development of telecommunication technologies and robotics has led to the practical implementation of the concept of a swarm of drones that act in concert and perform a common task. This approach opens up new opportunities and advantages in the field of unmanned systems, as it is shown in the Table 1 (Chen et al. 2020Chen X, Tang J, Lao S (2020) Review of unmanned aerial vehicle swarm communication architectures and routing protocols. Appl Sci 10(10):3661. https://doi.org/10.3390/app10103661
https://doi.org/10.3390/app10103661...
).

To perform the target function of the swarm, it is necessary to organize the rapid exchange of information between drones using an appropriate communication network. Since drones are constantly moving in space, the communication network must automatically adjust to changes in their position. In the scientific and technical literature, such networks are called wireless ad hoc networks, in which drones are network nodes and exchanging information with each other (Agrawal et al. 2022Agrawal R, Faujdar N, Romero C, Sharma O, Abdulsaheb, Khalaf O, Mansoor R, Ghoneim O (2022) Classification and comparison of ad hoc networks: a review. Egypt Inform J 24(1):1-25. https://doi.org/10.1016/j.eij.2022.10.004
https://doi.org/10.1016/j.eij.2022.10.00...
; Cheng et al. 2013Cheng X, Huang X, Du D-Z (2013) Ad hoc wireless networking. New York: Springer Science & Business Media.). If in wired networks and managed wireless networks data flows are controlled using routers and access points, then in ad hoc networks such control is carried out decentralized using various dynamic routing protocols.

Table 1
Comparative characteristics of a system with a single drone and a swarm.

There are three main types of ad hoc networks: Mobile Ad Hoc Network (MANET) (Gupta et al. 2018Gupta A, Verma P, Sambyal R (2018) An overview of MANET: features, challenges and applications. International Journal of Scientific Research of Computer Science, Engineering Information Technology 4(1):122-125.; Hasan et al. 2020Hasan MZ, Hussain MZ, Hasan MZ, Ullah Z (2020) Mobile ad-hoc networking (MANET). J Comput Sci (1)3:9-18.), Vehicular Ad Hoc Network (VANET) (Rehman et al. 2013Rehman S, Khan MA, Zia T, Zheng L (2013) Vehicular ad-Hoc networks (VANETs) –An overview and challenges. J Wirel Netw Comm 3:29-38. Available at: http://article.sapub.org/10.5923.j.jwnc.20130303.02.html
http://article.sapub.org/10.5923.j.jwnc....
; Zeadally et al. 2010Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular Ad Hoc Networks (VANETS): status, results, and challenges. Telecomm Syst 50: 1-25. https://doi.org/10.1007/s11235-010-9400-5
https://doi.org/10.1007/s11235-010-9400-...
), and Flying Ad Hoc Network (FANET) (Bekmezci et al. 2013Bekmezci I, Sahingoz OK, Temel S (2013) Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw 11(3):1254-1270. https://doi.org/10.1016/j.adhoc.2012.12.004
https://doi.org/10.1016/j.adhoc.2012.12....
; Sahingoz 2014Sahingoz OK (2014) Networking models in flying ad-hoc networks (FANETs): concepts and challenges. J Intell Robot Syst 74(1-2):513-527.; Sobhy et al. 2016Sobhy RA, Elfaham M, Hashad A (2016) FANET cloud computing. International Journal of Computer Science and Information Security 14(10):88-93.). Table 2 (Tareque et al. 2015Tareque MH, Hossain MS, Atiquzzaman M (2015) On the routing in Flying Ad Hoc Networks. Paper presented 2015 Proceedings of the Federal Conference on Computer Science and Information Systems. AIS; Fort Worth, United States. http://doi.org/10.15439/2015F002
https://doi.org/10.15439/2015F002...
) shows a comparative assessment of these networks according to various criteria, from which it follows that FANET, whose subscribers are unmanned aerial vehicle (UAV), has the most rapidly changing topology. At the same time, the node density in it is low, i.e., subscribers are located at a fairly large distance from each other.

Table 2
Comparative evaluation of FANET, VANET, and MANET.

For FANET, as for other types of ad hoc networks, a pressing scientific and technical challenge is the development of routing protocols that quickly adapt to frequent and unpredictable changes in the network topology. There are quite a few approaches to the development of routing protocols in FANET, a detailed review of which is given in (Guillen-Perez et al. 2021Guillen-Perez A, Montoya A-M, Sanchez-Aarnoutse J, Cano M-D (2021) A comparative performance evaluation of routing protocols for flying ad-hoc networks in real conditions. Appl Sci 11(10):4363. https://doi.org/10.3390/app11104363
https://doi.org/10.3390/app11104363...
; Khan et al. 2019Khan F, Yau K-LA, Noor RM, Imran MA (2019) Routing schemes in FANETs: a survey. Sensors 20(1):38. https://doi.org/10.3390/s20010038
https://doi.org/10.3390/s20010038...
; Leonov 2017Leonov A (2017) Applying bio-inspired algorithms to routing problem solution in FANET. Bull South Ural Stat University. Series Computer Technologies, Automatic Control and Radioelectronics 17:5-23. https://doi.org/10.14529/ctcr170201
https://doi.org/10.14529/ctcr170201...
; Mahalakshmi and Nithya 2018Mahalakshmi B, Nithya A (2018) Survey on routing protocols on FANET. International Journal of Advanced Research in Computer and Communication Engineering 7(2):261-265.; Yadav et al. 2015Yadav K, Nain A, Maakar S (2015) Routing protocols in FANET: survey. Paper presented 2015 Proceedings of International Conference on Innovation and Technology in Computer Science Education. Vilnius, Lithuania.). In this regard, it is also necessary to note the works (Kaur et al. 2021Kaur M, Singh A, Verma S, Kavita Jhanjhi NZ, Talib MN (2021) FANET: Efficient routing in Flying Ad Hoc Networks (FANETs) using firefly algorithm. In: Peng SL, Hsieh SY, Gopalakrishnan S, Duraisamy B, editors. Intelligent computing and innovation on data science. Lecture notes in networks and systems. Vol. 248. Singapore, Springer. https://doi.org/10.1007/978-981-16-3153-5_51
https://doi.org/10.1007/978-981-16-3153-...
; Li et al. 2019Li Y, Chen M, Dou Z, Zheng X, Cheng Y, Mebarki A (2019) A review of cellular automata models for crowd evacuation. Phys A Stat Mech Appl 526:120752. https://doi.org/10.1016/j.physa.2019.03.117
https://doi.org/10.1016/j.physa.2019.03....
; Madridano et al. 2020Madridano A, Al-Kaff A, Gomez DM, Escalera A (2020) 3D trajectory planning method for UAVs swarm in building emergencies. Sensors 20(3):642.; Malecki et al. 2021Malecki K, Kaminski M, Wąs J (2021) A multi-cellular automata model of traffic flow with emergency vehicles: effect of a corridor of life. In: Paszynski M, Kranzlmüller D, Krzhizhanovskaya VV, Dongarra JJ, Sloot PMA, editors. Computational Science – ICCS 2021. Lecture notes in computer science. Vol 12742. Cham, Springer. p. 430-436. https://doi.org/10.1007/978-3-030-77961-0_4
https://doi.org/10.1007/978-3-030-77961-...
; Wu et al. 2022Wu X, Liu X, Zhang D, Zhang J, He J, Xu X (2022) Simulating mixed land-use change under multi-label concept by integrating a convolutional neural network and cellular automata: a case study of Huizhou, China. GIScience & Remote Sensing 59(1):609-632. https://doi.org/10.1080/15481603.2022.2049493
https://doi.org/10.1080/15481603.2022.20...
) that consider the issues of adapting a swarm to the failure of individual network nodes and methods of route planning using various algorithms.

Also, a numerous works are devoted to analyze the effectiveness of various routing protocols in FANET. In Kim et al. (2023)Kim T, Lee S, Kim KH, Jo Y-I (2023) FANET routing protocol analysis for multi-UAV-based reconnaissance mobility Models. Drones 7:161. https://doi.org/10.3390/drones7030161
https://doi.org/10.3390/drones7030161...
, a study was carried out on the influence on the characteristics of FANET of such parameters as the density of UAV and the speed of their movement for various protocols and mobility models. In Yang and Liu (2019)Yang H, Liu Z (2019) An optimization routing protocol for FANETs. J Wireless Com Network 120. https://doi.org/10.1186/s13638-019-1442-0
https://doi.org/10.1186/s13638-019-1442-...
, a FANET network with the Dynamic Source Routing (DSR) protocol operating in conjunction with a continuous Hopfield neural network was simulated. It is shown that the use of artificial intelligence can increase network throughput and reduce the average network delay when transmitting data from UAV. Modeling the behavior of FANET with Ad Hoc On-Demand Distance Vector (AODV) and Location-Aided Routing (LAR) protocols using the NS2 simulator, carried out in (Kumar et al. 2020Kumar S, Bansal A, Raw RS (2020) Analysis of effective routing protocols for flying ad-hoc networks. International Journal of Smart Vehicles and Smart Transportation 3(2):1-18. https://doi.org/10.4018/IJSVST.2020070101
https://doi.org/10.4018/IJSVST.202007010...
), made it possible to compare these protocols in terms of the probability of packet delivery, their average delay time and network throughput. In Guillen-Perez et al. (2021), a comparative analysis of the probability of packet loss and network throughput of routing protocols Babel (based on distance-vector), Better Approach to Mobile Ad-hoc Networking (BATMAN) and Optimized Link State Routing Protocol (OLSR) was conducted. A similar study was carried out in (Alkhatieb and Felemban 2020Alkhatieb A, Felemban E (2020) Performance evaluation of ad hoc routing protocols in FANETs. Paper presented 2020 International Conference on Advances in the Emerging Computing Technologies. AECT; Al Madinah Al Munawwarah, Saudi Arabia. https://doi.org/10.1109/AECT47998.2020.9194201
https://doi.org/10.1109/AECT47998.2020.9...
) for OLSR, AODV, DSR, Temporally Ordered Routing Algorithm (TORA), and Geographic Routing Protocol (GRP) under different mobility models: Random Waypoint Mobility, Manhattan Grid Mobility Model, Semi-Random Circular Movement and Pursue Mobility Model.

These and several other works analyze the behavior of FANET for various routing protocols, data rates, and models of subscriber behavior in the stationary mode. However, the analysis of FANET characteristics not only in the stationary mode, but also in non-stationary conditions, i.e., when it’s topological structure changes, is of great scientific and practical interest. This article is devoted to the analysis of the characteristics of updating local adjacency matrices (LAM), which allow network subscribers to autonomously form packet transmission routes. The need to periodically update information about the current network configuration in LAM is due to the fact that its topology changes due to the mutual movement of UAV. To transmit this routing information, it is necessary to either allocate part of the communication channel capacity (with frequency-division multiplexing [FDM]) or interrupt the transmission of information packets to exchange routing information (with time division multiplexing [TDM]). The purpose of this work is to estimate the time required to update LAM in FANET with TDM when using various algorithms for accessing the communication channel and in the presence of distortions in the transmitted data.

Theoretical basis

The effectiveness of using a UAV swarm is significantly increased when the following basic conditions are met (Campion et al. 2018Campion MJ, Prakash R, Faruque S (2018) A review and future directions of UAV swarm communication architectures. Paper presented 2018. IEEE International Conference on Electro/Information Technology. IEEE; Rochester, United States. https://doi.org/10.1109/EIT.2018.8500274
https://doi.org/10.1109/EIT.2018.8500274...
; Chen et al. 2020Chen X, Tang J, Lao S (2020) Review of unmanned aerial vehicle swarm communication architectures and routing protocols. Appl Sci 10(10):3661. https://doi.org/10.3390/app10103661
https://doi.org/10.3390/app10103661...
; Pirmagomedov et al. 2019Pirmagomedov R, Kirichek R, Blinnikov M, Koucheryavy A (2019) UAV-based gateways for wireless nanosensor networks deployed over large areas. Comp Comm 146:55-62. https://doi.org/10.1016/J.COMCOM.2019.07.026
https://doi.org/10.1016/J.COMCOM.2019.07...
): the group is autonomous, i.e., information interaction with a remote-control point is minimal or absent; data exchange within the swarm is carried out using a communication network, the nodes of which are UAV themselves that are part of the swarm.

The presence of a communication network allows each UAV to transmit information to any other UAV in two possible ways: directly via a direct communication channel (we will call such UAV adjacent); by relaying through other UAV if the transmitting and receiving UAV do not have a direct communication channel.

Possible data transmission routes (directly over the forward link or through relay nodes) are determined by the network structure, which is constantly changing due to the movement of UAV relative to each other. Thus, each node must have up-to-date information about the network structure and the ability to route both its own and transit packets. The basis for constructing a route is the LAM (Liu et al. 2008Liu Z, Kim J, Lee B, Kim C (2008) A routing protocol based on adjacency matrix in ad hoc mobile networks. Paper presented 2008 International Conference on Advanced Language Processing and Web Information Technology. Dalian, China. https://doi.org/10.1109/ALPIT.2008.53
https://doi.org/10.1109/ALPIT.2008.53...
; Singh and Sharma 2012Singh H, Sharma R (2012) Role of adjacency matrix & adjacency list in graph theory. Int J Comp Technol 3:179-183. Available at: https://rajpub.com/index.php/ijct/article/view/2775
https://rajpub.com/index.php/ijct/articl...
), which contains information about the characteristics of communication channels between adjacent nodes (i.e., those that currently have a direct communication channel). The mutual movement of UAV changes the network topology, so there is a need for each node to periodically update information about the current network configuration.

To solve the problem of updating LAM, it is necessary to organize the exchange of this information between network nodes. Since the speed of information transmission over a communication channel is finite, it is necessary to allocate a certain amount of time for TDM or part of the bandwidth for FDM to update the matrices. The lack of clear LAM update frequency criteria can result in: to an unjustified increase in the time allotted for updating matrices, which accordingly reduces the time for transmitting packets; to the premature start of transmission of information packets, which accordingly does not allow LAM to be completely updated.

In both cases, these factors lead to a decrease in the efficiency of FANET operation. Therefore, an urgent scientific and practical task is to estimate the time required to update LAM network with dynamic routing when using various access algorithms.

Below we will consider such a network of N nodes, communication between which is carried out via a radio link with TDM. We will also assume that the communication channel between nodes is half-duplex. The model of such a network can be represented as a graph, the vertices of which are the network nodes, and the edges of the graph model the communication channel between the corresponding nodes (Diestel 2005Diestel R (2005) Graph theory. Berlin: Springer.; Wilson 1996Wilson RJ (1996) Introduction to graph theory. Harlow: Longman.). Since the channels are half-duplex, the edges of the graph are bidirectional.

In the general case, the graph can have markings that reflect the technical parameters of the communication channel: its load, cost, transmission time, etc. In this article, we will only take into account the fact of the presence of a channel between two nodes – there is a direct channel between the corresponding nodes or there is none.

The network graph can be represented as an NxN size LAM. The element М(k,n) of this matrix is equal to one if nodes numbered k and n are connected by a channel, and equal to 0 otherwise (Aldous and Wilson 2003Aldous JM, Wilson RJ (2003) Graphs and applications. New York: Springer Science & Business Media.). Since the arcs are non-directional, the matrix will be symmetrical. From adjacency matrices (AM), all nodes associated with a selected node can be determined. The procedure for determining connected nodes is iterative, the procedure of which is described below.

We denote by: А(k) the set of nodes that are directly connected to node Yk, by KAC the average adjacency coefficient of nodes, which is defined as the ratio of the number of nodes directly connected to an arbitrary node to the total number of nodes in the network, and by Сj(k) the set of nodes connected to node Yk at the j-th iteration step.

Thus, at the first step we have C1(k)= A(k). At the second step, the set C2(k) of nodes connected to node K will be equal to the set of connected nodes in the previous step (i.e., the set C1(k)) combined with the set of nodes that are directly connected to these nodes, i.e.:

C 2 ( k ) = C 1 ( k ) n A ( n ) , n C 1 ( k ) (1)

Continuing for j = 2,3, … we obtain the following expression for the set С­­j at the j-th iteration step can be defined as follows:

C j ( k ) = C j 1 ( k ) n A ( n ) , n C j 1 ( k ) (2)

where Un is the sign of the union of sets A(i), i changes from 1 to n.

We note an important property of undirected graphs. We denote by R(k,n) the relation of connectivity between nodes Yn and Yk (Chekuri et al. 2011Chekuri C, Even G, Gupta A, Segev D (2011) Set connectivity problems in undirected graphs and the directed Steiner network problem. ACM T Algorithms 7(2):18. https://doi.org/10.1145/1921659.1921664
https://doi.org/10.1145/1921659.1921664...
). This relation is symmetrical because the communication channels are bidirectional. In addition, it is transitive, i.e., if the condition R(k,n) and R(n,l) are true, then R(k,l). It is also obvious that each node is connected to itself, i.e., R(k,k) is true. The presence of these three properties shows that the connection relation is an equivalence relation (Engelking 1977Engelking R (1977) General topology. Wisconsin: PWN.; Kolmogorov and Fomin 1976Kolmogorov AN, Fomin SV (1976) Elements of function theory and functional analysis. Moscow: Science.). In turn, this means that the entire set of network nodes can generally be represented as a set of areas, in each of which the nodes are interconnected. Nodes belonging to different areas are not connected to each other.

We will call a network fully connected if all its nodes are connected, i.e., there is a path from any network node to any other. Otherwise, the network will be called partially connected. In what follows, we will only consider only a fully connected network.

An important consequence of this result is that the sets Сj defined by Eq. 2 are monotonically increasing and, due to the finite number of nodes, the sequence {Сj} is bounded (Eq. 3):

C 1 ( k ) C 2 ( k ) C ( k ) (3)

where С(k) is a limit set.

Therefore, the number of iterations r can be defined as follows (Eq. 4):

r = min J : C j + 1 = C j (4)

The relations (2)-(4) obtained above allow, firstly, to establish the existence of a route between arbitrary nodes and, secondly, to determine all the shortest routes between these nodes. The presented algorithm is used in a simulation model to construct the optimal route between the packet source and the receiver.

METHODOLOGY

The complexity of the processes occurring in FANET does not allow the use of analytical methods to calculate its characteristics and necessitates the use of simulation modeling (Kleinrock 1976Kleinrock L (1976) Queueing systems. Vol. 2. Computer applications. New York: John Wiley & Sons.). Well-known modeling packages, such as General Purpose Simulation System (GPSS) (Schriber 1974Schriber TJ (1974) Simulation using GPSS. New York: Wiley.), OPNET (Mittal 2012Mittal S (2012) OPNET: an integrated design paradigm for simulations. Int J Softw Eng 2(2):57-67.), NS2 (Issariyakul and Hossain 2009Issariyakul T, Hossain E (2009) Introduction to network simulator NS2. New York: Springer.), and a number of others, do not fully take into account the main features of FANET, particularly the rapid variability of the network topology and the presence of dynamic routing. Therefore, the authors refined the simulation model for sensor networks, a detailed description of which is given in Borodin et al. (2023)Borodin VV, Kolesnichenko VE, Shevtsov VA (2023) Analysis of the efficiency of various receipting multiple access methods with acknowledgement in IoT Networks. Inventions 8(4):105. https://doi.org/10.3390/inventions8040105
https://doi.org/10.3390/inventions804010...
, taking into account the variability of the network structure (movement of subscribers in space), the presence of packet distortions, multiple channel access methods, and a number of other parameters.

This model consists of three functional blocks: a block for setting initial data for modeling, a modeling block, and blocks for processing and displaying simulation results.

The block for setting initial data for modeling corresponds to the Open Systems Interconnection model (OSI) and sets the values of the input parameters in all levels of this model.

At the Physical layer, the following main parameters are defined: number of network nodes; energy potentials of the radio link; number of transmission channels, methods of sealing and fixing channels; models for calculating the probability of packet distortion.

The following parameters are defined at the Link layer: access methods; packet acknowledgment methods; operation algorithms and service channel parameters.

The Network layer defines composition of metrics for packet routing, parameters of network structure changes (various mobility models for UAV), and routing methods.

The Transport layer defines structure of the transmitted messages and the method of splitting the message into packets and redundancy options for channels for data exchange between nodes.

At the layer of Application Processes are set characteristics of the message source (intensity of message flow, distribution of message size, and distribution of time between adjacent packets in a message); for each source of messages, the recipient node of the corresponding message is indicated.

The process of modeling in the modeling block is carried out by events on a given time interval of the network operation. It is possible to study stationary and non-stationary processes of network behavior with a given allowable statistical error.

The model allows determining the statistical characteristics of the following quantities: packet transmission waiting time in the node; packet transmission time over the network from the source to the consumer; packet retransmission time and number of retransmissions; probability of packet loss, etc.

The model includes mechanisms for recognition of the network transition to an unstable state, reduction of modeling time and obtaining express results, optimization of network parameters, and display during the simulation of the network parameters.

Blocks for processing and displaying modelling results form given statistics based on the obtained results (distribution laws, average values, dispersions, etc.) and display the obtained results in the form of graphs and tables.

Below there is a brief description of the main results obtained using this model: multiple access methods and the process of updating AM used to organize efficient dynamic routing in the network.

Methods for accessing the information transmission channel between UAV

When conducting research, we will consider the following two options for multiple access to the data exchange channel between UAV: cyclic access (CA) with TDM and random synchronous access – slotted ALOHA.

In the first case, deterministic access to the channel is carried out and each UAV is allocated one time interval (slot), during which it completely transmits AM data. Time slots follow each other, with each slot assigned to one specific UAV. With random synchronous access, the channel is divided into successive slots, the duration of which is sufficient to transmit data about AM. Each UAV randomly selects a slot to transmit AM information. If multiple UAV select the same slot, a data collision occurs and the corrupted data is not retransmitted (an uncorrupted transmission is possible on the next data transmission).

This article does not discuss the technical aspects of organizing a synchronous radio channel for data exchange between UAV, since solving this problem is the subject of a separate study.

Description of the process of updating LAM

To build an optimal route, each node must have LAM that is identical to the network (actual) AM. The algorithm for each node to form its own LAM is described below. It is assumed that the total number of nodes is N and each node has its own number in the network (from 0 to N-1).

At the initial moment, each network node has its own (local) 0 LAM, i.e., all elements of these matrices are equal to 0. As information is received from other nodes, LAM is updated to fully match the network matrix. The formation of LAM is carried out as follows. An arbitrary node of YK network sends a broadcast routing message containing the number of this node. This message is received by all nodes that node YK is connected to. Each YL node that received this message updates its LAM. In it, in particular, units appear at the intersection of the K-th column and the L-th row (L is the number of the receiving node).

Next, each node determines the change in its LAM that occurred after receiving the message from node YK. This change contains those connections between nodes that were not previously marked in LAM of the corresponding node. If the changes are non-0, then the node broadcasts a message containing LAM changes and its number.

Messages are transmitted to adjacent nodes, and this procedure is repeated cyclically. Thus, in one cycle, a message containing LAM change is transmitted from one node. In this case, nodes transmit their messages in response to an incoming message only if the received message leads to a change in their internal LAM. In accordance with the described algorithm, the process of updating matrices ends after the completion of changes to LAM.

When studying the efficiency of data transmission in FANET, the following key indicators of the LAM update process are of particular interest: share of adjacency areas – the number of nodes for which all adjacent nodes are defined in relation to the total number of nodes; share of created LAM – the number of nodes for which LAM is fully defined in relation to the total number of nodes; distribution function of the number of transmissions in which the node has completely determined LAM; and network traffic – the number of nodes transmitting LAM update messages in relation to the total number of nodes.

The next section of the article provides some numerical simulation results that allow us to assess the impact of data transmission network parameters (including the probability of data corruption) on the above indicators. It identifies areas of effective application for each of the considered access method and proposes indicators for determining whether the LAM update process has been completed.

RESULTS

Description of the process of updating LAM

The results of modeling the process of updating matrices in the absence of distortions in the transmitted data are shown in the Fig. 1, where the following symbols are given: D is the proportion of certain adjacency areas; Q is the share of created LAM; F is the distribution function (histogram) of the number of gears; S is the network traffic; and R is the number of gears.

Figure 1
Change in LAM update rates over time (proportion D of certain adjacency areas, share Q of created LAM, distribution function F of the number of gears, network traffic S) in the absence of transmission distortion.

Graphs depicting dependence of LAM update indicators are plotted against the current execution time of the matrix update task. As a unit of time in these and the following graphs, a time slot is selected, within the boundaries of which information is transmitted between nodes, and KAC adjacency coefficient and the number N of network nodes are parameters.

The obtained results lead to drawing an important conclusion that the number of data transmissions before a complete LAM construction is practically independent of the number of nodes and the network adjacency coefficient. As depicted in Fig. 1, the average number of gears does not exceed three, and the dispersion of the distribution of the number of gears is small and amounts to 0.1-0.2 from the average value. This allows concluding that one of the possible indicators that determine the completion of LAM update data transfers can be such a parameter as reaching a certain threshold of the number of transfers.

After the LAM update is completed, the network continues to transmit data for a certain time, but this does not lead to a change in LAM. Therefore, another indicator of the completion of updating LAM is a decrease in network traffic. Additionally, the update time of LAM is an almost linear function of the number of nodes and weakly depends on the adjacency coefficient. Figure 1 shows that for two values of N (40 and 80), the time to construct the matrix in the second case is approximately two times longer. As the calculation results showed, such a dependence of the matrix update time on the number of network nodes is also valid for other values of N.

Analysis of network traffic over time shows that in the initial section all transmitted messages are significant, i.e., containing new information to update AM. This suggests that when forming AM, access via dedicated channels is effective, since it is in this case that the data transmission channels are fully loaded.

Now we consider the characteristics of updating matrices in the presence of distortions in transmitted data caused by noise and interference.

As the simulation results showed, the presence of distortions during data transmission, provided that each node transmits data about LAM only if there are changes in its LAM, leads to the impossibility of completely constructing LAM. These changes themselves are formed based on data received from other nodes. If there are no errors during transmission, then with probability one all changes will sooner or later reach all nodes. However, in the presence of distortions, there is always the possibility that any node will not receive all changes to LAM of other nodes and, as a result, will not be able to fully form its LAM.

In this regard, in the presence of distortions, it is advisable to use another mechanism for updating matrices, in which each node transmits its data regularly without taking into account changes in LAM in relation to the previous transmission. The results of modeling the process of updating matrices in the presence of distortions and using such LAM update mechanism are shown in the Fig. 2. During the simulation, the assumption was made that each message could distorted with probability q, with distortions occurring independently of each other.

Figure 2
Change in LAM update rates (proportion D of certain adjacency areas, share Q of created LAM, distribution function F of the number of gears, network traffic S) in the presence of transmission distortions.

The results suggest that LAM update time in the presence of distortions depends on the number of network nodes and weakly depends on the adjacency coefficient. Experiments were also carried out with the model for various values of q, which showed that the effect of interference significantly affects LAM update time and the number of transmissions before LAM is completely updated. Moreover, the greater the amount of data distortion, the greater the increase in LAM update time and the number of transmissions. In other words, a non-linear relation can be traced, for example, when q doubles, LAM update time and the number of transmissions increase from three to five times depending on the value of q. Generally, the average number of transmissions before a complete update of LAM per node does not exceed 10, with the coefficient of variation weakly depends on the probability of distortion and does not exceeding 0.15.

It should also be noted that with a high probability of corruption, a decrease in network traffic is no longer an indicator of the completion of LAM update, as was observed in the case of no corruption. LAM are formed during the entire transmission of significant messages.

Random access (RA) LAM update rates

Since in some cases the use of CA may not be possible, it is advisable to use slotted ALOHA without handshake as an alternative (Abramson 1970Abramson N (1970) The ALOHA system: another alternative for computer communications. Paper presented 1970. Proceedings of the November 17-19, 1970, Fall Joint Computer Conference. Association for Computing Machinery; New York, United States. https://doi.org/10.1145/1478462.1478502
https://doi.org/10.1145/1478462.1478502...
; Tobagi 1982Tobagi FA (1982) Distributions of packet delay and interdeparture time in slotted ALOHA and carrier sense multiple access. Journal of the Assentation for Computing Machinery 29:907-927.). In this case, time windows (slots) are continuously transmitted over the channel, with sufficient duration for packet transmission. A network node with a packet to transmit randomly selects a slot and transmits its packet there. Since the slot selection mechanism is random, collisions may occur due to the simultaneous transmission of packets by two or more nodes in the same slot, leading to packet loss.

During simulation, it was assumed that the network contains N nodes connected to each other by a duplex data exchange channel. The transmission of packets by nodes is carried out in broadcast mode without acknowledgment and each node transmits messages after a random time with an exponential distribution. The total traffic (message flow from all nodes) was assumed to be Poisson, with an intensity per slot is equal to G.

Simulation results are depicted in the Fig. 3, where W is the average LAM update time normalized with respect to the duration of the time slot for data transmission.

Figure 3
Change in LAM update time from the size of G of total network traffic with the RA and different number values of N (40 and 80) of network nodes.

Analysis of the results shows that LAM update time significantly depends on the value of G network traffic, while there is an optimal traffic value at which the update time is minimal. For a fixed value N of the number of nodes, as the network adjacency coefficient increases, the optimal value of traffic decreases. It should also be noted that with KAC < 1, the total traffic may well be greater than one, while network congestion is not observed.

Comparative analysis of the dependencies presented in the Figs. 1 and 3 shows that LAM update time with RA and no errors is considerably greater than the update time with CA.

It should be noted that with RA, the matrix update time decreases as the adjacency coefficient decreases. This is due to the fact that high network connectivity also means a high probability of message collision, which leads to an increase in matrix update time. This circumstance indicates that RA is advisable to use at low KAC values.

Figure 4 shows the dependence of the average LAM update time for the adjacency coefficient KAC = 0.1 on the probability of distortion for various values of N and the optimal network traffic value.

Figure 4
Average LAM update time versus corruption probability.

If during CA distortions significantly affect LAM update time, then RA is much less sensitive to distortions. This trend is also true for the number of transmissions for updating LAM, which is illustrated by the dependences of the average number of transmissions for RA on the value of q shown in the Fig. 5.

Figure 5
Dependence of the average number of transmissions for LAM update on the probability of distortion at the optimal traffic value.

The average number of transmissions per network node with RA (Fig. 5) significantly exceeds the similar characteristics when using CA (Figs. 1 and 2). Moreover, additional studies have shown that the coefficient of variation in the number of transmissions does not exceed 0.15 and almost coincides with this characteristic of CA.

Also, the simulation results showed that the lower the adjacency coefficient, the smaller the difference in the characteristics of networks with RA and CA. To confirm this fact, the Fig. 6 shows the dependences of the average LAM update time for RA and CA with the adjacency coefficient KAC = 0.1 and various values of the number of nodes and the probability of packet distortion.

Figure 6
Comparative characteristics of the average LAM update time with RA and CA.

A comparison of network characteristics with RA and CA shows that with a low adjacency coefficient, RA provides better performance, and the greater the number of nodes and the greater the probability of distortion, the higher the difference.

DISCUSSION

The simulation results showed that LAM update time depends almost linearly on the number of network nodes: the more there are, the longer the matrix update procedure. As a discussion, the authors propose one of the possible options for reducing their update time through network segmentation.

The following approach is proposed. The original network is divided into Р1 subnets, each of which has the same number of nodes. Each of these subnets is in turn divided into Р2 subnets. Through М partitions (M is the partition depth) we obtain that each subnetwork contains N/P nodes, where Р = Р1 * Р2 * … * РМ (“*” sign means multiplication).

The process for updating AM would proceed as follows: first, the matrices of nodes included in subnets of depth M are updated; then the matrices of subnets at level M-1 are updated, etc.

The total matrix update time will be proportional to (Eq. 5):

t = N / P + P 1 + P 2 + + P M (5)

The update time takes a minimum value if (Eq. 6):

P 1 = P 2 = = P M = N M + 1 (6)

Substituting (Eq. 6) into (Eq. 5) we obtain the following expression for the minimum update time (Eq. 7):

t M = ( M + 1 ) N M + 1 (7)

The resulting expression determines the minimum LAM update time at the partition depth M. Differentiating (Eq. 7) with respect to M and equating the derivative to 0, we obtain an estimate for the optimal partition depth equal to (Eq. 8):

M i p t = ln   N 1 (8)

And finally (Eq. 9):

t min = N ln   N ln   N = e ln   N (9)

The obtained result shows that in this case the dependence of the update time is a logarithmic function of N, i.e., depends much less on the number of nodes than in the absence of segmentation.

As directions for further research into the efficiency indicators of routing methods in self-organizing networks, the authors consider it relevant to solve the following problems: assessment of the impact of failure of individual network nodes on its connectivity and, accordingly, on the time of updating routing information; development of routing algorithms and assessment of routing quality with partial correspondence of LAM to the network AM; development of methods for generating AM taking into account the actual route traveled by the packet from the source to the location; assessment of the influence of the speed of node movement on LAM update time; assessment of the influence on the network characteristics of the characteristics of radio wave propagation in various environments and in the presence of screens (opaque or translucent).

CONCLUSION

The article studies the characteristics of updating LAM in FANET, the presence of which allows each UAV to autonomously form message transmission routes. An approach is proposed to the formation of LAM in the process of multiple exchanges between UAV, which are FANET nodes.

To assess LAM update performance, a simulation model has been developed that adequately reflects such main features of FANET, such as high UAV mobility and the rate of change in network topology, the presence of dynamic routing, multiple channel access methods, and a number of other parameters.

An analysis of FANET characteristics was carried out using two mechanisms for accessing a common data transmission channel in the process of updating matrices: deterministic (CA) and RA. For these two access methods, the behavior of the network is considered in the absence and presence of distortions in transmitted messages.

As follows from the simulation results described in the Results section, with CA and no distortion, the update time of local matrices is an almost linear function of the number of nodes and weakly depends on the adjacency coefficient. In the presence of distortions, LAM update time depends on the number of network nodes and weakly depends on the adjacency coefficient. Moreover, with an increasing q of message distortion, a nonlinear increase in LAM update time and the number of transmissions is observed.

It also follows from the simulation results that with RA and no errors, LAM update time is considerably longer than with CA. The presence of distortions leads to deterioration of network characteristics (increase in time and number of transmissions for updating LAM) with RA, although this tendency does not appear as sharply as with CA.

A comparative analysis of modeling results for cyclic and RA has shown that in the absence of distortions (or with a small amount of distortion), CA provides higher efficiency compared to RA. RA is advisable to use with relatively high probabilities of data corruption (of the order of 0.1 and above), a numerous nodes (more than 40) and low network connectivity.

One of the important results of the work is the identification of indicators (reaching a certain threshold of the number of transmissions, reducing the level of network traffic), by which one can judge the completion of the LAM update process. However, this statement is true mainly for CA with a sufficiently small amount of message distortion.

An option has been proposed to reduce the update time of LAM through FANET segmentation, which is especially effective with a numerous network nodes.

ACKNOWLEDGEMENTS

Not applicable.

  • Peer Review History: Single Blind Peer Review.
  • FUNDING

    Russian Science Foundation
    Grant No: 23-69-10084

DATA AVAILABILITY STATEMENT

All data sets were generated or analyzed in the current study.

REFERENCES

  • Abramson N (1970) The ALOHA system: another alternative for computer communications. Paper presented 1970. Proceedings of the November 17-19, 1970, Fall Joint Computer Conference. Association for Computing Machinery; New York, United States. https://doi.org/10.1145/1478462.1478502
    » https://doi.org/10.1145/1478462.1478502
  • Agrawal R, Faujdar N, Romero C, Sharma O, Abdulsaheb, Khalaf O, Mansoor R, Ghoneim O (2022) Classification and comparison of ad hoc networks: a review. Egypt Inform J 24(1):1-25. https://doi.org/10.1016/j.eij.2022.10.004
    » https://doi.org/10.1016/j.eij.2022.10.004
  • Aldous JM, Wilson RJ (2003) Graphs and applications. New York: Springer Science & Business Media.
  • Alkhatieb A, Felemban E (2020) Performance evaluation of ad hoc routing protocols in FANETs. Paper presented 2020 International Conference on Advances in the Emerging Computing Technologies. AECT; Al Madinah Al Munawwarah, Saudi Arabia. https://doi.org/10.1109/AECT47998.2020.9194201
    » https://doi.org/10.1109/AECT47998.2020.9194201
  • Bekmezci I, Sahingoz OK, Temel S (2013) Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw 11(3):1254-1270. https://doi.org/10.1016/j.adhoc.2012.12.004
    » https://doi.org/10.1016/j.adhoc.2012.12.004
  • Borodin VV, Kolesnichenko VE, Shevtsov VA (2023) Analysis of the efficiency of various receipting multiple access methods with acknowledgement in IoT Networks. Inventions 8(4):105. https://doi.org/10.3390/inventions8040105
    » https://doi.org/10.3390/inventions8040105
  • Campion MJ, Prakash R, Faruque S (2018) A review and future directions of UAV swarm communication architectures. Paper presented 2018. IEEE International Conference on Electro/Information Technology IEEE; Rochester, United States. https://doi.org/10.1109/EIT.2018.8500274
    » https://doi.org/10.1109/EIT.2018.8500274
  • Chekuri C, Even G, Gupta A, Segev D (2011) Set connectivity problems in undirected graphs and the directed Steiner network problem. ACM T Algorithms 7(2):18. https://doi.org/10.1145/1921659.1921664
    » https://doi.org/10.1145/1921659.1921664
  • Chen X, Tang J, Lao S (2020) Review of unmanned aerial vehicle swarm communication architectures and routing protocols. Appl Sci 10(10):3661. https://doi.org/10.3390/app10103661
    » https://doi.org/10.3390/app10103661
  • Cheng X, Huang X, Du D-Z (2013) Ad hoc wireless networking. New York: Springer Science & Business Media.
  • Diestel R (2005) Graph theory. Berlin: Springer.
  • Engelking R (1977) General topology. Wisconsin: PWN.
  • Guillen-Perez A, Montoya A-M, Sanchez-Aarnoutse J, Cano M-D (2021) A comparative performance evaluation of routing protocols for flying ad-hoc networks in real conditions. Appl Sci 11(10):4363. https://doi.org/10.3390/app11104363
    » https://doi.org/10.3390/app11104363
  • Gupta A, Verma P, Sambyal R (2018) An overview of MANET: features, challenges and applications. International Journal of Scientific Research of Computer Science, Engineering Information Technology 4(1):122-125.
  • Hasan MZ, Hussain MZ, Hasan MZ, Ullah Z (2020) Mobile ad-hoc networking (MANET). J Comput Sci (1)3:9-18.
  • Issariyakul T, Hossain E (2009) Introduction to network simulator NS2. New York: Springer.
  • Kaur M, Singh A, Verma S, Kavita Jhanjhi NZ, Talib MN (2021) FANET: Efficient routing in Flying Ad Hoc Networks (FANETs) using firefly algorithm. In: Peng SL, Hsieh SY, Gopalakrishnan S, Duraisamy B, editors. Intelligent computing and innovation on data science. Lecture notes in networks and systems. Vol. 248. Singapore, Springer. https://doi.org/10.1007/978-981-16-3153-5_51
    » https://doi.org/10.1007/978-981-16-3153-5_51
  • Khan F, Yau K-LA, Noor RM, Imran MA (2019) Routing schemes in FANETs: a survey. Sensors 20(1):38. https://doi.org/10.3390/s20010038
    » https://doi.org/10.3390/s20010038
  • Kim T, Lee S, Kim KH, Jo Y-I (2023) FANET routing protocol analysis for multi-UAV-based reconnaissance mobility Models. Drones 7:161. https://doi.org/10.3390/drones7030161
    » https://doi.org/10.3390/drones7030161
  • Kleinrock L (1976) Queueing systems. Vol. 2. Computer applications. New York: John Wiley & Sons.
  • Kolmogorov AN, Fomin SV (1976) Elements of function theory and functional analysis. Moscow: Science.
  • Kumar S, Bansal A, Raw RS (2020) Analysis of effective routing protocols for flying ad-hoc networks. International Journal of Smart Vehicles and Smart Transportation 3(2):1-18. https://doi.org/10.4018/IJSVST.2020070101
    » https://doi.org/10.4018/IJSVST.2020070101
  • Leonov A (2017) Applying bio-inspired algorithms to routing problem solution in FANET. Bull South Ural Stat University. Series Computer Technologies, Automatic Control and Radioelectronics 17:5-23. https://doi.org/10.14529/ctcr170201
    » https://doi.org/10.14529/ctcr170201
  • Li Y, Chen M, Dou Z, Zheng X, Cheng Y, Mebarki A (2019) A review of cellular automata models for crowd evacuation. Phys A Stat Mech Appl 526:120752. https://doi.org/10.1016/j.physa.2019.03.117
    » https://doi.org/10.1016/j.physa.2019.03.117
  • Liu Z, Kim J, Lee B, Kim C (2008) A routing protocol based on adjacency matrix in ad hoc mobile networks. Paper presented 2008 International Conference on Advanced Language Processing and Web Information Technology Dalian, China. https://doi.org/10.1109/ALPIT.2008.53
    » https://doi.org/10.1109/ALPIT.2008.53
  • Madridano A, Al-Kaff A, Gomez DM, Escalera A (2020) 3D trajectory planning method for UAVs swarm in building emergencies. Sensors 20(3):642.
  • Mahalakshmi B, Nithya A (2018) Survey on routing protocols on FANET. International Journal of Advanced Research in Computer and Communication Engineering 7(2):261-265.
  • Malecki K, Kaminski M, Wąs J (2021) A multi-cellular automata model of traffic flow with emergency vehicles: effect of a corridor of life. In: Paszynski M, Kranzlmüller D, Krzhizhanovskaya VV, Dongarra JJ, Sloot PMA, editors. Computational Science – ICCS 2021. Lecture notes in computer science. Vol 12742. Cham, Springer. p. 430-436. https://doi.org/10.1007/978-3-030-77961-0_4
    » https://doi.org/10.1007/978-3-030-77961-0_4
  • Mittal S (2012) OPNET: an integrated design paradigm for simulations. Int J Softw Eng 2(2):57-67.
  • Pirmagomedov R, Kirichek R, Blinnikov M, Koucheryavy A (2019) UAV-based gateways for wireless nanosensor networks deployed over large areas. Comp Comm 146:55-62. https://doi.org/10.1016/J.COMCOM.2019.07.026
    » https://doi.org/10.1016/J.COMCOM.2019.07.026
  • Rehman S, Khan MA, Zia T, Zheng L (2013) Vehicular ad-Hoc networks (VANETs) –An overview and challenges. J Wirel Netw Comm 3:29-38. Available at: http://article.sapub.org/10.5923.j.jwnc.20130303.02.html
    » http://article.sapub.org/10.5923.j.jwnc.20130303.02.html
  • Sahingoz OK (2014) Networking models in flying ad-hoc networks (FANETs): concepts and challenges. J Intell Robot Syst 74(1-2):513-527.
  • Schriber TJ (1974) Simulation using GPSS. New York: Wiley.
  • Singh H, Sharma R (2012) Role of adjacency matrix & adjacency list in graph theory. Int J Comp Technol 3:179-183. Available at: https://rajpub.com/index.php/ijct/article/view/2775
    » https://rajpub.com/index.php/ijct/article/view/2775
  • Sobhy RA, Elfaham M, Hashad A (2016) FANET cloud computing. International Journal of Computer Science and Information Security 14(10):88-93.
  • Tareque MH, Hossain MS, Atiquzzaman M (2015) On the routing in Flying Ad Hoc Networks. Paper presented 2015 Proceedings of the Federal Conference on Computer Science and Information Systems. AIS; Fort Worth, United States. http://doi.org/10.15439/2015F002
    » https://doi.org/10.15439/2015F002
  • Tobagi FA (1982) Distributions of packet delay and interdeparture time in slotted ALOHA and carrier sense multiple access. Journal of the Assentation for Computing Machinery 29:907-927.
  • Wilson RJ (1996) Introduction to graph theory. Harlow: Longman.
  • Wu X, Liu X, Zhang D, Zhang J, He J, Xu X (2022) Simulating mixed land-use change under multi-label concept by integrating a convolutional neural network and cellular automata: a case study of Huizhou, China. GIScience & Remote Sensing 59(1):609-632. https://doi.org/10.1080/15481603.2022.2049493
    » https://doi.org/10.1080/15481603.2022.2049493
  • Yadav K, Nain A, Maakar S (2015) Routing protocols in FANET: survey. Paper presented 2015 Proceedings of International Conference on Innovation and Technology in Computer Science Education. Vilnius, Lithuania.
  • Yang H, Liu Z (2019) An optimization routing protocol for FANETs. J Wireless Com Network 120. https://doi.org/10.1186/s13638-019-1442-0
    » https://doi.org/10.1186/s13638-019-1442-0
  • Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular Ad Hoc Networks (VANETS): status, results, and challenges. Telecomm Syst 50: 1-25. https://doi.org/10.1007/s11235-010-9400-5
    » https://doi.org/10.1007/s11235-010-9400-5

Edited by

Section editor: Luiz Martins Filho https://orcid.org/0000-0002-7287-5979

Publication Dates

  • Publication in this collection
    08 July 2024
  • Date of issue
    2024

History

  • Received
    24 Jan 2024
  • Accepted
    01 May 2024
Departamento de Ciência e Tecnologia Aeroespacial Instituto de Aeronáutica e Espaço. Praça Marechal do Ar Eduardo Gomes, 50. Vila das Acácias, CEP: 12 228-901, tel (55) 12 99162 5609 - São José dos Campos - SP - Brazil
E-mail: submission.jatm@gmail.com