1. Introduction
Tactical networks are mobile ad hoc networks (MANETs) of self-organized, self-configured software-defined radios (SDRs) to guarantee mission-critical information exchange. Their autonomous behavior (including mobility, node failures, and link failures) strains connectivity, which requires decentralized solutions to assure network survivability and communications reliability. At the same time, there is a critical demand for communication capacity with services diversity. Examples include the need for wideband communications to transfer large volumes of data, narrowband communications for extended communication ranges, and bounded channel access latency to share mission-critical information [
1]. Other important perilous issues with regards to networked communication include communication-on-the-move and interoperability. A distributed system should address these issues with self-forming, self-healing, and self-organizing capabilities. The developed system should be intelligent enough to cater to tactical communication rudiments, be technically radical, and not rely on a central controlling hub.
In tactical networks, SDRs are provisional in mission-critical areas such as battlefields and catastrophic environments to meet immediate tactical needs. These SDRs autonomously communicate and keep track of each other to enable seamless single-hop and multihop communication by configuring and reconfiguring themselves through coordination with their neighbors. SDRs ensure flexibility for every particular scenario, and the communication among radios can be optimized using a specific waveform that can switch dynamically. It is capable of operating various wireless communication protocols without changing or updating the hardware. Since the radios keep changing their positions, neighbors must know the routes or at least the next hop toward a distant destination. In many cases, there is also a need for alternate paths to compensate for failed communications [
2]. Therefore, it is evident that the reliability of routes and the opportunity to make quick routing decisions are critical features.
In ad hoc networks, a message from a source node to a destination node may traverse many hops, multiplying network capacity consumption and usually in a larger network, resulting in a long chain of links. However, it is not just the hopping of data packets that contributes to capacity utilization but also the overhead associated with routing the data. For instance, many mainstream ad hoc routing protocols depend on frequent network-wide broadcasts to gain a picture of the network as it continues to change [
3,
4,
5]. These protocols may not be appropriate for tactical radio networks, as network-wide broadcasts can noticeably increase response latency in emergencies.
In tactical radio networks, quality-of-service (QoS) guarantees (confined transmission latency, minimum guaranteed data rate, bounded call setup delay, etc.) are rated higher than spectral efficiency and increased bandwidth. The contention-based (carrier sense multiple access (CSMA)) techniques for emergencies result in collisions that trigger retransmissions, further magnifying call setup delays and power loss [
6,
7,
8]. However, the noncontention-based approaches (such as time division multiple access (TDMA)) provide reliable communication but induce delays in the transmission where each node has its fixed slot that reduces spectral efficiency. Whereas frequency-division-multiple-access (FDMA) based approaches encounter cross-talk and signal interferences that are not adequate in military applications and should be handled precisely. However, a hybrid of TDMA/FDMA approaches can combine their strengths to overcome each other’s inadequacies.
Due to the dynamic nature of MANETs, higher layer functionalities are added depending on the complexity of the application or service. Since higher layers increase overhead and latency, the cross-layer approach is used to mitigate layering’s adverse effect in the mission-critical environment. It enables reliability and escalates network performance, i.e., better throughput, reduced latency, and less bit error rate through parameter controlling from a layer to another [
9].
To mark improvements in a tactical radio network, we propose a novel virtual sub-nets based cross-layer medium access control (VSCL-MAC) design that provides a self-forming and self-organizing intelligent approach to radio communications. It involves neighborhood discovery, which keeps nodes informed about their k-hop neighbors and helps nodes discover routes to these neighbors. Each SDR exchanges control frames to communicate intended transmission, establish routes for data transmission, and perform virtual confinement of radios, called sub-nets or subnetworks. This virtual division of the network enables simultaneous collision-free communication using a hybrid of TDMA/FDMA approaches. The distributed intelligent approach eliminates the neighbor discovery phase’s periodical runs and enables efficient route discovery and simultaneous data transmission using FDMA for non-intermittent high network throughput in a time-distributed manner.
The VSCL-MAC design supports unicasting and enables multihop communication within a uniform framework. It finds a route between source and destination using a common table, unlike other ad hoc routing protocols [
10]. The design also provides dynamic slot allocation to simultaneous data transmission and assigns multiple slots to SDRs according to the data size, such as text or multimedia data. The adapted time slot allocation for radio transmission over multiple FDMA carriers ensures throughput maximization and QoS in tactical communication.
Research Contributions
In designing efficient routing protocol for multihop networks, MAC protocols have a large influence in finding optimal routes to make it efficient and self-operating [
11,
12]. The proposed VSCL-MAC is designed to be the first to consider tactical network as a group of subnetworks and embeds route discovery as part of the MAC layer rather than the network layer. The design utilizes major contributions to the research field and provides
Intelligent distributed dynamic routing and data slot scheduling for multihop simultaneous data transmissions over non-overlapping frequency sub-bands.
Close interaction with the MAC layer to empower efficient multihop route discovery, allowing radios to have updated neighbor information without incorporating route discovery overheads.
Self-forming and self-regulatory virtual subnetworks for efficient utilization of resources without having any centralized control.
Reliable and interference-free channel access for control and data transmissions with maximization of network throughput, minimum call setup, and access delays.
2. Related Work
Few research studies based on cross-layer schemes have been carried out to support distributed communication in multihop ad hoc and tactical networks. A cross-layer framework CL-TDMA for tactical SDRs that provides self-forming and self-healing features was proposed in [
13]. The design uses TDMA as the MAC layer and ad-hoc on-demand distance vector(AODV) on network layer. control messages for multihop network routing and finds slots for collision-free data transmission. It performs better in throughput, call setup delay, and latency than traditional TDMA. A cross-layer scheme that offers decision-based routing is proposed in [
14], designed for unmanned flying ad hoc networks (UFANETs). The method uses cross-layer metrics such as signal-to-noise ratio (SNR), received signal strength indication (RSSI), and AODV routing packets to establish data transmission routes. It overcomes issues of latency, unsuccessful data transmission ratio, and high usage of AODV protocol messages. A cross-layer cognitive system designed by the authors of [
15] operates with distributed coordination and local information exchange among SDRs. The system integrates dynamic spectrum sensing (DSA), routing, and network coding for a multihop cognitive radio network. It also optimizes spectrum utility by joining the backpressure algorithm with network coding to support unicast and multicast traffic. A selective cross-layer-based routing scheme based on probabilistic technique combined with AODV to resolve route selection issues such as relay node selection and optimal route establishment based on energy and distance was proposed in [
16]. The scheme uses a population-based stochastic optimization technique to schedule slot assignment during data transmission.
A cross-layer routing protocol for visible light ad hoc networks (LANETs) was proposed in [
17]; it interacts closely with the MAC layer to maximize network throughput with the focus on the reliability of routes. The design uses route reliability scores (RSS), a utility-based three-way handshaking process computed on immediate neighbors’ information to reach the sink node and mitigate the effects of link and transmission failures. A link-adaptive multihop routing protocol for tactical combat radios was presented in [
18]. It adapts link state changes and selects a stable route to perform video streaming over TDMA. The design is compared with link adaptation protocols, AODV and optimized link state routing (OLSR) with carrier-sense multiple access/collision avoidance (CSMA/CA) structures. An application-centric network architecture for tactical communication systems that can applicably respond to the dynamic network topology, link quality at the link layer, and provide a solution to the limitations of conventional single-cost function-based routing protocols at the network layer was proposed in [
19]. The designed architecture offers better QoS and dynamic traffic distribution to all available paths. A robust cross-layer routing and resource allocation algorithm for orthogonal frequency-division multiplexing (OFDM) based wireless ad hoc networks was proposed in [
20]. The algorithm uses limited knowledge such as maximum transmit power and total bandwidth at the transmitting node to perform joint resource allocation and routing.
Another cross-layer autonomous route discovery mechanism was proposed in [
21] for vehicular networks (VANETs). The mechanism incorporates a cross-layer cluster-based routing protocol to set stable clusters up that improve routing path lifetime and decrease link breaks for multimedia data transmission. The design uses mobility metrics and the relative distance among nodes to find reliable relay nodes to the destination and improves reliability, throughput, and energy consumption depending on nodes velocity and density. A cross-layer neighbor discovery algorithm based on hexagonal clustering and GPS is proposed by [
22]. The algorithm uses hello messages at the MAC layer, sent in TDMA method combined with hexagonal clustering algorithm and GPS. A random back-off mechanism is used to improve the efficiency of sending hello messages. The design effectively finds the ratio of neighbors per cycle and reduces packet collision probability and throughput in the network.
An energy-efficient and position-aware routing protocol for wireless sensor networks (WSN) is proposed by [
23], which uses energy and hop-distance-based formulation for routing mechanism. The protocol selects a neighbor with maximum energy level and minimum hop distance for data forwarding, impacting network lifetime, packet delay, and throughput. An efficient route selection routing information protocol (ERS-RIP) is proposed by [
24] for multihop WSNs under a jamming environment. The design uses energy cost for route selection and performs routing on optimal paths using RIP that occasionally exchanges network updates. The system achieves better results in terms of end-to-end delay, throughput, packet delivery rate, and network lifetime compared to DSR and other protocols.
The designs mentioned above rely on other layer parameters to yield routing and slot assignment information incorporated in control frames [
25,
26]. This increases the control overhead in the execution of route discovery, channel, and slot assignment. In contrast, our design excels in radios’ autonomous behavior and performs all the mentioned operations in a distributed manner. The design fairly schedules collision-free simultaneous data transmission to all network nodes using virtual sub-nets. It employs a distributed neighbor and routes discovery algorithm for multihop routing using cross-layer design capabilities. The proposed VSCL-MAC design is unique in network organization and route establishment.
3. Proposed VSCL-MAC Architecture
The design predominantly comprises control and data units operating on TDMA frame cycles and enables multihop communication by maintaining
k-hop neighbor information at every network node. Therefore, the design includes the neighborhood discovery phase at the start of the network and follows with control frames and data transmissions, as shown in
Figure 1.
Given the limitations and importance of expeditious tactical communication, each unit of the protocol operates over TDMA. The neighbor discovery unit runs only once at the start of the network; hence, it is called the “one-time neighbor discovery” process. In the first TDMA frame, the initial slots are used to transmit neighbor discovery (NBR_DSCV) packets. Each node transmits the packets in its two-hop vicinity on fixed slots for k-hop neighbor discovery. After neighborhood discovery, control frames are transmitted for the node’s coordination on a non-contention based time-slotted common control channel. These frames are used to send REQ (request), REQ_ACK (request acknowledgment), or BRDSCT (broadcast) packets and perform route establishment for multihop data transmission. In the control unit, the number of control slots is fixed; each corresponds to the node MAC ID. These control slots’ duration is specified in bits that depend on the number of radios in the network. In the data unit, DATA packets are transmitted over dynamic time slot vectors to send actual messages, i.e., text, images, or voice. The duration of data slots for a node depends on the type of data the sender wants to transmit.
The following fundamental elements are used to descend a cross-layer MAC design for tactical SDR-based multihop communication network.
3.1. One-Time Neighborhood Discovery
As soon as the network starts functioning in tactical communication, each SDR sends NBR_DSCV packet to all its one-hop neighbor(s) in its slot. The format of NBR_DSCV packet is shown in
Figure 2, where transmitter ID is the MAC ID of sending node, i.e., for a network of
N nodes,
bits are required for the node’s MAC ID. The four-bit message type field identifies message format, i.e., NBR_DSCV, REQ, REQ_ACK, BRDSCT, combined_REQ or combined_ACK. The bits value 0000 indicates the NBR_DSCV packet, and NBR_MAP field gives hop count information of each neighbor, i.e., two-bit code for each node representing
possible combinations, with 01, 10, and 11 defining 1, 2, and 3-hop, respectively. The bit code 00 represents that the node is not in a 1-hop or 2-hop neighborhood; usually, it represents itself.
The transmission of NBR_DSCV packets begins with the lowest node ID, and in the first
N slots, each SDR broadcasts the NBR_DSCV packet. Each shares its NBR_MAP with minimum hop information of all its neighbor(s), including itself. Upon receiving the NBR_DSCV packet, each node extracts the bit code (hop count) of other nodes and inserts the entry (hop count + 1) in its neighbor table (NBR_table). In NBR_table, each node
saves the node ID of its 1-hop neighbors in the first column of the table, each in a separate row, and keeps 2, 3, and 4-hop neighbor(s) ID in the corresponding column and in the row of 1-hop neighbor from which it gets the entry, as depicted in
Table 1.
The process of neighbor discovery and the built-up NBR_table are described in
Figure 3 it repeats for the next
N slots, and radios that cannot get information in the first receive it in this round.
The proposed algorithm can maintain more than a 3-hop neighbor’s information, depending on the number of bits used to send hop information of neighbors. Tactical networks are congested; more than 4-hop is considered to be out of bounds for radios.
3.2. Route Discovery Using NBR_Table
Many of the ad hoc routing protocols rely on advertising HELLO packets for route discovery. Most of them use physical layer parameters such as a line of sight (LOS), energy levels, directional communication links, and signal-strength-based distance measurements [
27,
28]. However, these approaches consume significant time to operate and use extensive bandwidth resources to find neighbors rather than send data.
The proposed VSCL-MAC design uses the NBR_table to perform efficient route discovery and makes no assumption on prior knowledge, such as the number or relative position of neighbors. A source node searches its NBR_table for the 1-hop neighbor to reach the destination node involving minimum hops. Each node has confirmed a 2-hop destination path in its NBR_table, and further, it consents the next node that shows the minimum hop route to the destination to handle it.
In the proposed design, all nodes update the NBR_table using NBR_MAP received in NBR_DSCV packets and later in control messages that keep nodes aware of its active neighbors for route discovery. It eliminates the need for any other routing protocol, considerably reduces required neighbor discovery time, and eradicates route discovery packet transmissions. The proposed VSCL-MAC design uses a hybrid routing mechanism and enables continuous route maintenance without using extra signaling packets. It decreases the excessive overhead of hello packets; adaptive link connectivity improves connectivity and coverage when the node is far away from the destination.
3.3. Control Frames Transmission Unit
It is the foremost part of VSCL-MAC protocol and encompasses major design utilities. Therefore, before sending data, SDRs go through a control unit. In this unit, SDRs exchange intended transmissions using REQ and REQ_ACK packets, send in their respective time slots, and also establish a route for data transmissions. It enables single as well as multihop data transmission for which packets are sent to the next-hop node selected from the NBR_table, further transmitted to the next node until they are received by the destination. The format of REQ and REQ_ACK packets is shown in
Figure 4; they contain source, destination, and the next-hop node’s MAC ID. The NBR_MAP is the same as that of the NBR_DSCV packet, and the transmission table (TRANS_table) contains intended transmissions of the TX node as well as other nodes that help in forming sub-nets and time and frequency allocation in distributed manner.
The addition of NBR_MAP in control packets benefits when a node does not receive information on any of its k-hop neighbors during the neighbor discovery process and also when the neighborhood changes due to mobility or link failures. The concerned nodes can update and maintain their NBR_table by extracting the hop information of its k-hop neighbor(s) from received control packets.
When sending the REQ packet, the source node adds the intended transmission in TRANS_table, which contains all the route paths of the transmission perceived through NBR_table. The format of TRANS_table is shown in
Table 2 in which the first and second columns contain the transmitter’s and receiver’s MAC ID of the transmission, respectively.
Upon receipt of the REQ packet, all overhearing neighbor(s) add the shared transmissions in their TRANS_table. The receiving next-hop node of the REQ message can be the destination itself or a relay node. In the case of destination, the next-hop ID is the same as of destination ID, and the node responds with the REQ_ACK packet in its time slot, whereas, in another case, the next-hop relays REQ in its corresponding slot.
The proposed design can send combined REQ and REQ_ACK packets, or nodes can have multiple requests from different transmitters [
29]. This reduces the number of control packets and puts a marginal effect on control overhead, call setup delays, and network convergence. Furthermore, in SDRs communication, not all radios have messages all the time; therefore, if a node does not have any REQ or REQ_ACK message to send, it sends a broadcast (BRDCST) message in its time slot. The BRDCST packet contains NBR_MAP and TRANS_table to maintain similar neighbor and transmission information on every node when not received from REQ or REQ_ACK packets.
The TRANS_table alone helps form autonomous sub-nets, frequency selection, and time slot vectors for collision-free simultaneous data transmissions. For k-hop communication, the protocol runs multiple control frame cycles; it is essentially used to establish a route and maintain similar information on all nodes, as each frame can be heard within its two-hop vicinity.
3.4. Sub-Nets Formation for Simultaneous Data Transmission
The proposed protocol allows SDRs of the tactical network to be confined into multiple virtual sub-nets. These sub-nets are formed autonomously using entries of TRANS_table, which is similar at every radio; thus, it results in the same sub-nets structure and number. The transmission pattern of nodes shapes sub-nets’ structures and has a maximum diameter equal to the network’s total number of nodes. Each SDR looks its TRANS_table up and forms virtual sub-nets based on the following rules:
In the case of either rule, SDR belongs to the same sub-net and selects the data channel accordingly. After sub-nets formation, the proposed design uses the FDMA technique that assigns different frequencies to different nodes. The selection of frequency for data transmission is adhesive with the pattern of sub-nets formation. Each node selects a frequency
autonomously from a frequency band of range 0 to
and matches with the lowest ID of the sub-net members. There is no collision in frequency selection among sub-nets because each sub-net has a different lowest node ID, e.g., in
Figure 5, sub-net 1 has node4, sub-net 2 has node2, and sub-net 3 has node1 as the lowest member ID of the sub-nets; therefore, use frequency
, and
for data transmission, respectively. The control packets use one frequency from the same range, which is common and time-slotted.
This virtual confinement of nodes makes the network efficient in resource distribution in a dynamic multichannel network environment. In tactical communication, SDRs use adaptive frequency hopping techniques in which radios continuously hop over multiple frequencies; those techniques are out of this paper’s scope. It provides transmission security in jamming and other transmission attacks [
30,
31].
3.5. Time Slots Allocation for Data Transmission
The proposed VSCL-MAC design integrates an intelligent dynamic slot allocation algorithm that allows multihop data transmission. Each SDR can allocate multiple time slots on the channel depending on the type of data SDR wants to transmit, i.e., text or multimedia messages. The algorithm runs at each SDR and calculates the time slot vector (TSV) for all frequency sub-bands selected by each of the sub-nets using the same TRANS_table. The algorithm allocates time slots starting from the lowest node ID of the sub-net and ensures the source node of multihop transmissions gets the slot before the relay node; this is discussed in the next section. Rather than allocate multiple slots to a transmitter, there is a possibility of making the size of data slots variable for different data requirements, but this will create a time synchronization problem among radios.
3.6. Data Unit
In the data transmission unit, SDRs of each sub-net send data in time slots allocated on corresponding data channels. It enables all SDRs to execute collision-free and interference-free data transmission with efficient use of bandwidth. After completion of data transfer, all reserved time slots and frequencies are released and reserved again accordingly.
4. Working of Algorithm
We consider an ad hoc wireless tactical network comprised of N nodes, connected through wireless links of same-channel properties, and has a unique identifier denoted as ID. Each network node is connected to a set of neighbors, moves with consistent speed, and has low mobility during protocol functioning. In our network model, the NBR_table corresponds to discover 1- to 4-hop neighbors and routing paths. The algorithm can work for any number of SDRs, usually ranging from 10 to 80 radios. We assume that there are only Q nodes (half of the radios, ) which act as traffic sources, and the TRANS_table is maintained to list all intended transmissions involved.
Now, assume a topology of 10 SDRs with IDs 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10. In the first TDMA cycle, each SDR sends the NBR_DSCV packet in its time slot with the information they have in their NBR_table as depicted in
Figure 6. Suppose that
sends NBR_DSCV packet with no information in its NBR_table and that it made its entry in the NBR_table of SDRs
, and
as shown in
Table 3 (the colors of each transmission show entries, added by matching colored arrows in
Figure 6). Then,
sends the packet to its neighbors
, and
. Similarly,
transmits the discovery packet to not only announce itself to its 1-hop neighbors but also shares hop information of
to
and
to
, as they are not the neighbors of each other but of
. The NBR_DSCV packet of
is shown in
Figure 7, where the two-bit code is the hop information of each node which is at 1- or 3-hop away from
i.e.,
and
are represented at 1-hop with bit code 01. All other remaining SDRs similarly send NBR_DSCV packets. After one-time neighbor discovery, each SDR knows about its 1- to 4-hop neighbors.
For the control unit description, we consider five data messages sent by SDRs
,
, and
to SDRs
, and
, respectively. Each SDR has the next-hop information for the transmission perceived from its NBR_table, as shown in
Figure 8. In the control unit, all SDRs send control messages to exchange intended transmissions in their respective time slots, as shown in
Figure 9. Suppose
has data for
, sends REQ to its one-hop neighbor
, and is overheard by all its neighbors.
knows the path (
) to reach
from its NBR_table and adds this route in its TRANS_table. Upon reciept,
relays the REQ to destination
. The REQ packet of
, shown in
Figure 10, lets its neighbors
, and
update their TRANS_table, as shown in
Table 4 (Text color in
Table 4 is indicating the entries received from the packet flow shown in
Figure 9).
Corollary 01: REQ packets contain the information of the source, destination, and next-hop nodes. The neighbors of SDR can extract the 1-hop transmission directly from fields (source→next_hop). Hence, it is not shared in the TRANS_table field of the control message, i.e., only shares 3→7 in its REQ packet. The REQ packet receiver can add further path information itself, if available in its NBR_table, e.g., adds 1→3 from the REQ packet and 3→7 from its NBR_table. This enables SDRs to send more intended transmissions as maximum transmissions shared in a control packet is equal to M.
In the next time slot,
sends the REQ message to
for
that is at 3-hop away.
has confirmed 2-hop path information (2→3, 3→1) in its NBR_table but does not know whether
is directly connected to
or not. Therefore, it only adds a 2-hop path in its TRANS_table and sends the REQ message to
. All the neighbors of
update their TRANS_table as shown in
Table 5.
receives the REQ, knows the path to reach at
, and adds 1→9 in its TRANS_table later shares it with its neighbors in the next control slot. The other neighbors add the same information as
as they do not have the transmission route in their NBR_table.
In the third time slot,
has data for
and, at the same time, has two more transmissions to relay in its queue (3→7 and 3→1). In this condition,
sends a combined_REQ message with destinations and next-hops, as shown in
Figure 11. This reduces the number of control packets; otherwise, every time, SDR consumes one slot for each REQ message.
Corollary 02: The size of the combined_REQ packet is same as that of a REQ packet because the TRANS_table field can now hold transmission entries. Therefore, it can send more than one REQ message in a single packet.
Corollary 03: If an SDR does not have REQ or REQ to relay, then it can use the slot to send REQ_ACK if it has already received the request for it. In another case, SDR has a relay REQ and REQ_ACK in its queue; then, it uses the first-come, first-serve approach and transmits other packets in the next control frame slot. In neither case, SDR sends a BRDCST packet to synchronize both tables with updated information.
Similarly,
sends REQ to
, which should be traversed from
.
sends REQ to
and
relays the REQ of
to
in their time slots, whereas
has no REQ and sends REQ_ACK to
, according to Corollary 03. The first control frame contains control transmissions of all SDRs, as shown in
Table 6.
The second control frame contains REQ (direct and relayed), REQ_ACK, combined_ACK, and BRDCST packets transmission. In the sixth slot of the frame,
sends combined_ACK for both REQ messages received from
and
previously, as shown in
Table 7.
The third and last control frame of discussed topology contains REQ_ACK of
and
. In contrast, others transmit a BRDCST message to share those transmissions which were not sent previously, necessary to synchronize TRANS_table of all nodes, as shown in
Table 8.
After the transmission of all control frames, each SDR has all the intended transmissions in its TRANS_table, as shown in
Table 9 (due to the size of TRANS_table, transmission with same receivers are combined and written in ascending order).
On completion of the control frames transmission, all SDRs built the same TRANS_table using Algorithm 1, which runs on each network node and forms virtual sub-nets based on the transmission information in the table. For sub-nets formation, Algorithm 1 (line no. 17 to 23) matches each transmission with every other transmission of the table. If a TX of any transmission matches with the TX or RX of any other transmission, then the TXs and RXs of both transmissions belong to the same sub-net. If no match is found, then the TX and RX of transmission
i are the only members of the sub-net
. For the above topology, two sub-nets are formed,
and
, as shown in
Figure 12,which also shows the roles of each node played for the transmissions.
Algorithm 1: Route establishment and sub-nets formation in VSCL-MAC protocol. |
|
These virtual sub-nets perform an autonomous selection of the frequency channel. Each member of the sub-net uses the same frequency channel to communicate with each other. This virtual confinement of radios does not make any physical change in network topology; rather, it separates the communication paths between radios. For instance, the sub-nets in
Figure 13 represent a valued graph in which SDRs connected with links labeled by the same frequencies are members of the same sub-net, i.e., SDRs
, and
use frequency channel
, whereas
, and
use
for data transmission in a data unit.
Algorithm 1 describes the working of the control unit for route establishment, maintaining TRANS_table and sub-nets formation that privileges simultaneous collision-free data transmission.
After channel selection, all SDRs calculate time slot allocation vectors (TSVs) for each frequency channel. Algorithm 2 steps the time slot scheduling for TX(s) and relay SDRs down; they are identified in the TRANS_table. It first identifies relay SDRs and the TX(s) for their number of occurrences as the transmitter. The allocation starts from the lowest node ID to the highest. If an SDR is the only transmitter and not a relay SDR, then it gets the current slot in the vector, i.e., the sub-net2 members are
, and
and the allocation starts with
, which gets the first slot because it has data for
and needs to be relayed by
, as shown in
Figure 14.
Algorithm 2: Data slot scheduling. |
|
The allocation policy for relay SDR is different. The algorithm ensures that if the RX of transmission i and the TX of the transmission j are the same, then the TX of transmission i should get the prior slot of the relay SDR, i.e., in sub-net1, has data for that should be sent via . However, there is also a transmission in which has data for ; then, the algorithm schedules the transmission 3→2 before the transmission 2→3. These transmissions can be scheduled interchangeably, as both transmissions have no relation and has its data to transmit to , whereas first needs to send it to and then sends it to . The resultant TSV1 has the third slot scheduled for transmission 3→1, which carries data of .
The data slot allocation on each frequency channel is illustrated in
Figure 15. The transmission can hold multiple consecutive slots for data transmission, as discussed in the next section. Within allocated time slots of a slot vector, SDRs perform simultaneous data transmissions without disturbing each other’s transmissions.
The designed methodology makes every node aware of all the transmissions in the network. There are cases in which many nodes are not involved in any transmission; they may run the control phase at frequency parallel to the data transmissions.
The proposed VSCL-MAC cross-layer design embraces distributed intelligent algorithms, where nodes can discover communication routes without any upper-layer protocol support and perform simultaneous multihop data transmissions in a multichannel environment. In tactical communication, radios have a limited amount of data; therefore, they consume fewer time slots in data transmission.