Professional Documents
Culture Documents
IN AD HOC NETWORK
Overview
Introduction Related Work The CBM Multicast Protocol Performance Evaluation Future Work
Battlefield Networks
Model Overview
The model assumes that nodes are interested in information about threats and resources that are:
t time away from the current location, and/or d distance away
Example Scenario
Effects of Mobility
The direction of movement of a threat influences the conduct of the multicast Personal personnel specifications influence distance of multicast
Reduces the number of warning messages by ensuring that only nodes that need warnings receive them
Geographic Regions
The area is divided into regions
The regions are determined based on density of nodes, terrain, and mobility considerations Each region has a leader
Push Protocol
When a sensor detects the presence of a threat, it generates a limited broadcast message for nodes that will lie in the path of the threat
The node sends a PULL_REQUEST to the leader of the block it expects to be in The leader sends back information about potential threats
Let skmax be the max speed of a threat of type k The leader sends a pull request to leaders of blocks that are skmaxtn away These leaders determine if they know about threats that are moving to that area
Future Work
When the last node leaves a block, what if the neighboring blocks are also empty? How does the protocol account for connectivity losses? What is the correct way to predict threat mobility?
How should the protocol model gas cloud dispersion? What are the energy/message efficiency tradeoffs in this domain?
conclusion
After studying this topic,I conclude that, this is vary useful system for Disaster relief network ,Battle field network
Every nodes are interested in information about threat and resource with time t and distance d.
THANKING YOU