A Cautionary Tale on Testing and Evaluating Tactical Wireless Mobile Ad Hoc Networks
نویسنده
چکیده
Transformation dictates that the nature of future warfare will be network-centric where netcentricity is contingent on a ubiquitous network. At issue are the capabilities that this network must have to make network-centric operations (NCO) possible. Wireline and commercial wireless technologies have colored the expectations of what is possible and, in many cases, the requirements for the network and the applications as well. This article argues that these technologies are fundamentally different than what is required on the battlefield and, if caution is not exercised, these technologies could easily misdirect requirements and subsequent testing and evaluation strategies toward performance measures that are orthogonal to those required to enable NCO. The article reviews several contemporary discussions of NCO and networks to arrive at the thesis that the critical networking technology for the tactical edge is one that allows users to communicate with each other locally regardless of their organization and without dependence on connectivity to a network infrastructure. This article suggests test and evaluation approaches to validate this capability and to measure its effectiveness.
منابع مشابه
Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملImprovement of the mechanism of congestion avoidance in mobile networks
Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density ...
متن کامل