SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
DOI : 10.5121/ijcnc.2015.7309 119
RADIO PROPAGATION MODELS IN WIRELESS
NETWORKS OF UNMANNED AERIAL VEHICLES
Jun Peng
Electrical Engineering Department
University of Texas – Rio Grande Valley
Edinburg, Texas, USA
ABSTRACT
Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they
have become very popular recently for both civil uses, such as law enforcement and crop survey, and for
potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new
networking protocols for UAV networks usually need the help of simulations to test their protocol designs,
particularly when networks of large scales are desired in their tests. One choice that researchers need to
make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we
compare the three radio propagation models that are available in the ns2 network simulation package and
investigate if the choice of one particular model would have a significant impact on the simulation results
for UAV networks.
KEYWORDS
Radio propagation models, unmanned aerial vehicles (UAV), network simulation, protocols
1.INTRODUCTION
As hardware and software become more advanced but even cheaper, unmanned aerial vehicles
have evolved from being used only in military applications to being used in both civil and
commercial applications. For example, people enthusiastic about photographing started to use
UAVs to take videos or pictures of subjects from perspectives that they could not imagine or
reach before due to the mounting costs of renting a plane or helicopter. Besides costs, it is much
safer, faster and more environmentally friendly to use an UAV instead of a plane or helicopter in
such an application. UAVs have also been used for law enforcement, surveillance, search and
rescue, scientific research, and other applications [1].
As UAVs are used in more and more civil and commercial applications and become more and
more popular, it will become inevitable that UAVs need to communicate with each other for
purposes of coordination and collaborations. For example, UAVs will likely need some type of
coordination in the future to avoid collisions among them. Besides, applications that require a
large amount of UAVs working together dynamically, such as surveilling a large geographical
area without interruption, also need the UAVs to be able to communicate with each other timely
and effectively.
To enable UAVs to network themselves and communication with each other, researchers have
been investigating topics at various layers of UAV networks. Asadpour et al. [2] studied the
performance of IEEE 802.11n interfaces in UAV networks and they found that 802.11n
performed poorly in highly mobile scenarios. Cai et cal. [3] proposed a medium access control
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
120
(MAC) protocol for UAV ad-hoc networks with full-duplex radios. They proposed a token-based
technique to update information in the network for efficiently handling the high mobility of
UAVs. Ollero et al. [4] presented a platform that enables autonomous aerial vehicles to cooperate
with ground wireless sensor-actuator networks. Alshbatat et al. [5] used the approach of cross
layer design to deal with the high dynamics in UAV networks. Alshbatat et al. [6] also proposed
an adaptive medium access control protocol for UAV networks using directional antennas. Gu et
al. [7] proposed a routing scheme for multi-layer ad hoc networks that use UAVs in their
backbones. Gu et al. [8] also presented a multiple access protocol for such type of network.
In summary, researchers have been actively investigating all types of topics in UAV networks.
When UAV networks of large scales are needed in testing communication and networking
protocols, simulations are usually the only practical method that would be available to most
investigators. One important element in simulating an UAV network is the radio propagation
model used in the network. There are three radio propagation models that are available in the ns-2
network simulation platform. Although there are studies on some of these radio propagation
models for vehicular networks [2], the studies focused on terrestrial networks. In this paper we
compare the three models for UAV networks and study if the choice of a particular model would
have a significant impact on simulation results.
The rest of the paper is organized as follows. Section 2 introduces the three radio propagation
models that are available in the ns-2 simulation platform. Section 3 presents our simulation results
comparing these three models. Section 4 summarizes our findings.
2. THE THREE RADIO PROPAGATION MODELS IN NS2
2.1. The Free Space Propagation Model
The free space radio propagation model assumes, as its’ name indicates, that the transmitter and
the receiver are in free space without obstacles. The propagation formula is as follows [9]:
22
λd
AA
P
P tr
t
r
= (1)
where rP is the signal power at the receiving antenna, tP is the signal power at the transmitting
antenna, rA is the effective area of the receiving antenna, tA is the effective area of the
transmitting antenna, d is the distance between the transmitting antenna and the receiving
antenna, and λ is the wavelength of the signal.
When we have an isotropic antenna, the effective area is πλ 4/ . Equation 1 thus becomes:
2
2
)4( dP
P
t
r
π
λ
= (2)
In a general case where we have an antenna gain that is not 1 for both the transmitting antenna
and the receiving antenna, Equation 1 becomes:
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
121
2
2
)4( d
GG
P
P
rt
t
r
π
λ
= (3)
where tG is the antenna gain of the transmitting antenna and rG is the antenna gain of the
receiving antenna.
Note that Equations 1 to 3 only apply, in general, under the following condition [9]:
λ
2
2a
d ≥ (4)
where a is the largest linear dimension of either of the antennas.
2.2. The Two-Ray Ground Propagation Model
The two-ray ground propagation model [10] assumes that there are two signal paths from the
transmitter to the receiver. One is the direct line-of-sight path while the other is the reflection path
from the ground. The formula is as follows:
4
22
d
hh
GG
P
P rt
rt
t
r
= (5)
where th is the height of the transmitting antenna and rh is the height of the receiving antenna.
Note that Equation 5 applies under the following condition:
λ
π rt hh
d
4
≥ (6)
2.3. The Shadowing Model
Due to multipath propagation effects, the received power at a receiving antenna is not a
deterministic function of the communication distance as shown in the two models introduced
earlier. Instead, the received power fluctuates as a random variable. The shadowing model [10]
better reflects this characteristic of the received signal power than the other two models
introduced earlier. The path loss is usually expressed in dB as follows in the the shadowing
model:
[ ] dBdBrr X
d
d
dPdP +





−=−
0
0 log10)()( β (7)
where 0d is a reference distance, β is the path loss exponent, dBX is a Gaussian random
variable having a zero mean and a standard deviation of dBδ . The typical values of β and δ are
shown in Tables 1 and 2, respectively.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
122
Table 1 Typical value of β in different environment
Environment β
Outdoor, free space 2
Outdoor, shadowed urban area 2.7-5
In building, line-of-sight 1.6-1.8
In building, obstructed 4-6
Table 1 Typical value of δ in different environment
Environment δ
Outdoor 4-12
Office, hard partition 7
Office, soft partition 9.6
Factory, line-of-sight 3-6
Factory, obstructed 6.8
3. SIMULATION RESULTS
After introducing the three radio propagation models that are available in ns2 in the previous
section, in this section we investigate these three models for UAV networks and show simulation
results. The simulation package ns2 does not support simulations of three dimensional networks.
We modified the package for UAV networks.
The simulated test bed is shown in Figure 1. The test bed has the same size for its width, length,
and height, which is 500 meters. UAVs can fly freely in this defined space following the random
waypoint model. The UAVs in the test bed use the IEEE 802.11 air interface that uses the default
settings in the simulator. Each UAV sets up a CBR connection with another UAV at a random
time during each simulation. A CBR source sends out packets at a rate of 10 packets per second
and each packet has a size of 512 bytes. The routing protocol used in the test bed is DSR [11].
Figure 1 The simulated test bed
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
123
In our simulations we tested the three radio propagation models with varying node densities in the
test bed. Particularly, we varied the number of nodes in the test bed from 10 to 50 in our
simulations of UAV networks using each model. In each simulation we collected data to calculate
the average throughput and the average packet loss rate of the CBR flows in the network. We also
collected data on the packet delay distributions in the network. Our simulation results are shown
in Figures 2 to 6.
Figure 2. The average flow rate for the three propagation models
As shown in Figure 2, the average flow throughput in the network decreases as the node density
increases in the network. This decrease of flow throughput is mainly caused by two factors. One
is that the total traffic rate is higher in the network when there are more nodes in the network
because each node starts a CBR flow at a random time in each simulation. The other factor is that
the contention at the medium access control (MAC) layer is also higher when there are more
nodes in the network. The throughput results are also corroborated by the packet loss rate shown
in Figure 3. As shown in Figure 3, a higher node density in the network results in a higher packet
loss rate in the network.
Figure 3. The average packet loss rate for the three propagation models
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
124
Figure 4. The histogram of the packet delays for the free space loss model
As also shown in Figures 2 and 3, the flow throughput trend and the packet loss rate trend are
consistent for all three propagation models. The average flow throughput and the average packet
loss rate are similar for the free space propagation model and the two-ray ground propagation
model in all the cases of node density.
However, the average flow throughput for the shadowing model is significantly lower as
compared with that of the other two models. The difference can reach about thirty percent when
the node density is low. When the node density is high, however, the difference is smaller
because the network becomes very congested in such a case and lots of packets are dropped for
all the models.
Similar observations can be made in Figure 3 for packet losses for the three models. When the
node density is low, the difference between the packet loss rates for the shadowing model and the
other two models is big. When the node density becomes higher, however, the difference
becomes smaller. The flow throughput performance and the packet loss rate performance thus
corroborate each other in this case too.
The packet delay data shown in Figures 4 to 6 for the case of ten nodes also corroborate the
results shown in earlier figures for the three models. As shown by Figures 4 to 6, the distributions
of packet delays are similar for the free space propagation model and the two-ray ground model.
For these two models, most packets have a delay within 0.2 second. For the shadowing model,
however, much more packets have a delay beyond 0.2 second.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
125
Figure 5. The histogram of the packet delays for the two-ray ground loss model
Figure 6. The histogram of the packet delays for the shadowing loss model
In summary, the choice of one of the three radio propagation models that are available in the ns2
network simulation package does have significant impact on simulation results for UAV
networks. The differences between the results for the free space propagation model and the two-
ray ground model are small. The differences are more dramatic between the results for these two
models and the shadowing model. The good news is, however, that even the shadowing model
has simulation results that are very different from those of the other two models in each specific
case of simulation, the trend of the simulation results when observed as a whole does show
consistency for all three models.
4. CONCLUSIONS
We investigated the three radio propagation models that are available in the ns2 network
simulation package for UAV networks. Our investigation shows that the shadowing model may
generate simulation results that are significantly different from those of the free space loss model
and the two-ray ground model in each specific case of simulation. Particularly, the flow
throughput, the packet loss rate, and the packet delays consistently show much lower performance
for the shadowing model than for the other two models. However, our results also show that when
the simulation results are observed as a whole, the trend of flow throughput, packet loss rate, and
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
126
packet delays is consistent for all three models. In conclusion, the choice of a radio propagation
model in simulating UAV networks does have significant impact on the simulation results for
each individual case of simulation, but such a choice does not affect the interpretation of the
simulation data when performance trend is the only concern of investigation.
ACKNOWLEDGEMENTS
The authors would like to thank everyone who offered support to this project and the publication
of its results.
REFERENCES
[1] T. H. Cox, C. J. Nagy, M. A. Skoog, and I. A. Somers, “Civil UAV Capability Assessment,” NASA,
2004.
[2] M. Asadpour, D. Giustiniano, K. A. Hummel, and S. Heimlicher, “Characterizing 802.11N Aerial
Communication,” in Proceedings of the Second ACM MobiHoc Workshop on Airborne Networks
and Communications, 2013, pp. 7–12.
[3] Y. Cai, F. Yu, J. Li, Y. Zhou, and L. Lamont, “Medium Access Control for Unmanned Aerial Vehicle
(UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability,”
Vehicular Technology, IEEE Transactions on, vol. 62, pp. 390–394, Jan 2013.
[4] A. Ollero, M. Bernard, M. La Civita, L. van Hoesel, P. Marron, J. Lepley, and E. de Andres,
“AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator
networks cooperating with unmanned AeRial vehiclEs,” in Safety, Security and Rescue Robotics,
2007, IEEE International Workshop on, Sept 2007, pp. 1–6.
[5] A. Alshbatat and L. Dong, “Adaptive MAC protocol for UAV communication networks using
directional antennas,” in Networking, Sensing and Control (ICNSC), 2010 International Conference
on, April 2010, pp. 598–603.
[6] A. Alshbatat and L. Dong, “Cross layer design for mobile Ad-Hoc Unmanned Aerial Vehicle
communication networks,” in Networking, Sensing and Control (ICNSC), 2010 International
Conference on, April 2010, pp. 331–336.
[7] D. Gu, G. Pei, H. Ly, M. Gerla, and X. Hong, “Hierarchical routing for multi-layer ad-hoc wireless
networks with UAVs,” in MILCOM 2000, vol. 1, 2000, pp. 310–314.
[8] D. Gu, H. Ly, X. Hong, M. Gerla, G. Pei, and Y.-Z. Lee, “C-ICAMA, a centralized intelligent channel
assigned multiple access for multi-layer ad-hoc wireless networks with UAVs,” in Wireless
Communications and Networking Conference, 2000, IEEE, vol. 2, 2000, pp. 879–884.
[9] H. T. Friis, “A note on a simple transmission formula,” in Proceedings of the I.R.E. and Waves and
Electrons, 1946, pp. 254–256.
[10] T. S. Rappaport, “Wireless Communications, Principles and Practice,” Prentice Hall, 1996.
[11] D. B. Johnson, D. A. Maltz, and Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad
Hoc Networks (DSR),” IETF Interet draft,draft-ietf-manet-dsr-10.txt, July 2004.
Authors
Jun Peng received his Ph.D. degree from the Department of Electrical, Computer & Systems Engineering
at Rensselaer Polytechnic Institute, Troy, New York, United States. He is currently an associate professor
at the Electrical Engineering Department of University of Texas – Rio Grande Valley, Edinburg, Texas,
United States. His research interests are in computer and communication networks.

More Related Content

What's hot (20)

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Wdm and dwdm ppt
Wdm and dwdm pptWdm and dwdm ppt
Wdm and dwdm ppt
 
Training on microwave communication
Training on microwave communicationTraining on microwave communication
Training on microwave communication
 
Path Loss and Shadowing
Path Loss and ShadowingPath Loss and Shadowing
Path Loss and Shadowing
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
1g to 5g technologies
1g to 5g technologies1g to 5g technologies
1g to 5g technologies
 
Demodulation (communication engineering)
Demodulation (communication engineering)Demodulation (communication engineering)
Demodulation (communication engineering)
 
Indoor propagation model (IPM)
Indoor propagation model (IPM)Indoor propagation model (IPM)
Indoor propagation model (IPM)
 
LTE Basic
LTE BasicLTE Basic
LTE Basic
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 
Transmission characteristics of optical fibers
Transmission characteristics of optical fibersTransmission characteristics of optical fibers
Transmission characteristics of optical fibers
 
MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 
3G System
3G System3G System
3G System
 
cellular wireless networks
cellular wireless networkscellular wireless networks
cellular wireless networks
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Microwave link budget
Microwave link budgetMicrowave link budget
Microwave link budget
 
7. log distance and log normal shadowing
7. log distance and log normal shadowing7. log distance and log normal shadowing
7. log distance and log normal shadowing
 

Viewers also liked

Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemIJCNCJournal
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of theIJCNCJournal
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security onIJCNCJournal
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withIJCNCJournal
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamicIJCNCJournal
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsIJCNCJournal
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoringIJCNCJournal
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server forIJCNCJournal
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 

Viewers also liked (19)

Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor system
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security on
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets with
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamic
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumns
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoring
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server for
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 

Similar to Radio propagation models in wireless

The shadowing propagation model
The shadowing propagation modelThe shadowing propagation model
The shadowing propagation modelijwmn
 
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...IJCNCJournal
 
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Nazmul Hossain Rakib
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networksaroosa khan
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...cscpconf
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...ijrap
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYTHE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYIJCNCJournal
 
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)IJEEE
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 

Similar to Radio propagation models in wireless (20)

The shadowing propagation model
The shadowing propagation modelThe shadowing propagation model
The shadowing propagation model
 
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
 
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networks
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYTHE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
 
Id103
Id103Id103
Id103
 
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Radio propagation models in wireless

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 DOI : 10.5121/ijcnc.2015.7309 119 RADIO PROPAGATION MODELS IN WIRELESS NETWORKS OF UNMANNED AERIAL VEHICLES Jun Peng Electrical Engineering Department University of Texas – Rio Grande Valley Edinburg, Texas, USA ABSTRACT Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they have become very popular recently for both civil uses, such as law enforcement and crop survey, and for potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new networking protocols for UAV networks usually need the help of simulations to test their protocol designs, particularly when networks of large scales are desired in their tests. One choice that researchers need to make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we compare the three radio propagation models that are available in the ns2 network simulation package and investigate if the choice of one particular model would have a significant impact on the simulation results for UAV networks. KEYWORDS Radio propagation models, unmanned aerial vehicles (UAV), network simulation, protocols 1.INTRODUCTION As hardware and software become more advanced but even cheaper, unmanned aerial vehicles have evolved from being used only in military applications to being used in both civil and commercial applications. For example, people enthusiastic about photographing started to use UAVs to take videos or pictures of subjects from perspectives that they could not imagine or reach before due to the mounting costs of renting a plane or helicopter. Besides costs, it is much safer, faster and more environmentally friendly to use an UAV instead of a plane or helicopter in such an application. UAVs have also been used for law enforcement, surveillance, search and rescue, scientific research, and other applications [1]. As UAVs are used in more and more civil and commercial applications and become more and more popular, it will become inevitable that UAVs need to communicate with each other for purposes of coordination and collaborations. For example, UAVs will likely need some type of coordination in the future to avoid collisions among them. Besides, applications that require a large amount of UAVs working together dynamically, such as surveilling a large geographical area without interruption, also need the UAVs to be able to communicate with each other timely and effectively. To enable UAVs to network themselves and communication with each other, researchers have been investigating topics at various layers of UAV networks. Asadpour et al. [2] studied the performance of IEEE 802.11n interfaces in UAV networks and they found that 802.11n performed poorly in highly mobile scenarios. Cai et cal. [3] proposed a medium access control
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 120 (MAC) protocol for UAV ad-hoc networks with full-duplex radios. They proposed a token-based technique to update information in the network for efficiently handling the high mobility of UAVs. Ollero et al. [4] presented a platform that enables autonomous aerial vehicles to cooperate with ground wireless sensor-actuator networks. Alshbatat et al. [5] used the approach of cross layer design to deal with the high dynamics in UAV networks. Alshbatat et al. [6] also proposed an adaptive medium access control protocol for UAV networks using directional antennas. Gu et al. [7] proposed a routing scheme for multi-layer ad hoc networks that use UAVs in their backbones. Gu et al. [8] also presented a multiple access protocol for such type of network. In summary, researchers have been actively investigating all types of topics in UAV networks. When UAV networks of large scales are needed in testing communication and networking protocols, simulations are usually the only practical method that would be available to most investigators. One important element in simulating an UAV network is the radio propagation model used in the network. There are three radio propagation models that are available in the ns-2 network simulation platform. Although there are studies on some of these radio propagation models for vehicular networks [2], the studies focused on terrestrial networks. In this paper we compare the three models for UAV networks and study if the choice of a particular model would have a significant impact on simulation results. The rest of the paper is organized as follows. Section 2 introduces the three radio propagation models that are available in the ns-2 simulation platform. Section 3 presents our simulation results comparing these three models. Section 4 summarizes our findings. 2. THE THREE RADIO PROPAGATION MODELS IN NS2 2.1. The Free Space Propagation Model The free space radio propagation model assumes, as its’ name indicates, that the transmitter and the receiver are in free space without obstacles. The propagation formula is as follows [9]: 22 λd AA P P tr t r = (1) where rP is the signal power at the receiving antenna, tP is the signal power at the transmitting antenna, rA is the effective area of the receiving antenna, tA is the effective area of the transmitting antenna, d is the distance between the transmitting antenna and the receiving antenna, and λ is the wavelength of the signal. When we have an isotropic antenna, the effective area is πλ 4/ . Equation 1 thus becomes: 2 2 )4( dP P t r π λ = (2) In a general case where we have an antenna gain that is not 1 for both the transmitting antenna and the receiving antenna, Equation 1 becomes:
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 121 2 2 )4( d GG P P rt t r π λ = (3) where tG is the antenna gain of the transmitting antenna and rG is the antenna gain of the receiving antenna. Note that Equations 1 to 3 only apply, in general, under the following condition [9]: λ 2 2a d ≥ (4) where a is the largest linear dimension of either of the antennas. 2.2. The Two-Ray Ground Propagation Model The two-ray ground propagation model [10] assumes that there are two signal paths from the transmitter to the receiver. One is the direct line-of-sight path while the other is the reflection path from the ground. The formula is as follows: 4 22 d hh GG P P rt rt t r = (5) where th is the height of the transmitting antenna and rh is the height of the receiving antenna. Note that Equation 5 applies under the following condition: λ π rt hh d 4 ≥ (6) 2.3. The Shadowing Model Due to multipath propagation effects, the received power at a receiving antenna is not a deterministic function of the communication distance as shown in the two models introduced earlier. Instead, the received power fluctuates as a random variable. The shadowing model [10] better reflects this characteristic of the received signal power than the other two models introduced earlier. The path loss is usually expressed in dB as follows in the the shadowing model: [ ] dBdBrr X d d dPdP +      −=− 0 0 log10)()( β (7) where 0d is a reference distance, β is the path loss exponent, dBX is a Gaussian random variable having a zero mean and a standard deviation of dBδ . The typical values of β and δ are shown in Tables 1 and 2, respectively.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 122 Table 1 Typical value of β in different environment Environment β Outdoor, free space 2 Outdoor, shadowed urban area 2.7-5 In building, line-of-sight 1.6-1.8 In building, obstructed 4-6 Table 1 Typical value of δ in different environment Environment δ Outdoor 4-12 Office, hard partition 7 Office, soft partition 9.6 Factory, line-of-sight 3-6 Factory, obstructed 6.8 3. SIMULATION RESULTS After introducing the three radio propagation models that are available in ns2 in the previous section, in this section we investigate these three models for UAV networks and show simulation results. The simulation package ns2 does not support simulations of three dimensional networks. We modified the package for UAV networks. The simulated test bed is shown in Figure 1. The test bed has the same size for its width, length, and height, which is 500 meters. UAVs can fly freely in this defined space following the random waypoint model. The UAVs in the test bed use the IEEE 802.11 air interface that uses the default settings in the simulator. Each UAV sets up a CBR connection with another UAV at a random time during each simulation. A CBR source sends out packets at a rate of 10 packets per second and each packet has a size of 512 bytes. The routing protocol used in the test bed is DSR [11]. Figure 1 The simulated test bed
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 123 In our simulations we tested the three radio propagation models with varying node densities in the test bed. Particularly, we varied the number of nodes in the test bed from 10 to 50 in our simulations of UAV networks using each model. In each simulation we collected data to calculate the average throughput and the average packet loss rate of the CBR flows in the network. We also collected data on the packet delay distributions in the network. Our simulation results are shown in Figures 2 to 6. Figure 2. The average flow rate for the three propagation models As shown in Figure 2, the average flow throughput in the network decreases as the node density increases in the network. This decrease of flow throughput is mainly caused by two factors. One is that the total traffic rate is higher in the network when there are more nodes in the network because each node starts a CBR flow at a random time in each simulation. The other factor is that the contention at the medium access control (MAC) layer is also higher when there are more nodes in the network. The throughput results are also corroborated by the packet loss rate shown in Figure 3. As shown in Figure 3, a higher node density in the network results in a higher packet loss rate in the network. Figure 3. The average packet loss rate for the three propagation models
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 124 Figure 4. The histogram of the packet delays for the free space loss model As also shown in Figures 2 and 3, the flow throughput trend and the packet loss rate trend are consistent for all three propagation models. The average flow throughput and the average packet loss rate are similar for the free space propagation model and the two-ray ground propagation model in all the cases of node density. However, the average flow throughput for the shadowing model is significantly lower as compared with that of the other two models. The difference can reach about thirty percent when the node density is low. When the node density is high, however, the difference is smaller because the network becomes very congested in such a case and lots of packets are dropped for all the models. Similar observations can be made in Figure 3 for packet losses for the three models. When the node density is low, the difference between the packet loss rates for the shadowing model and the other two models is big. When the node density becomes higher, however, the difference becomes smaller. The flow throughput performance and the packet loss rate performance thus corroborate each other in this case too. The packet delay data shown in Figures 4 to 6 for the case of ten nodes also corroborate the results shown in earlier figures for the three models. As shown by Figures 4 to 6, the distributions of packet delays are similar for the free space propagation model and the two-ray ground model. For these two models, most packets have a delay within 0.2 second. For the shadowing model, however, much more packets have a delay beyond 0.2 second.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 125 Figure 5. The histogram of the packet delays for the two-ray ground loss model Figure 6. The histogram of the packet delays for the shadowing loss model In summary, the choice of one of the three radio propagation models that are available in the ns2 network simulation package does have significant impact on simulation results for UAV networks. The differences between the results for the free space propagation model and the two- ray ground model are small. The differences are more dramatic between the results for these two models and the shadowing model. The good news is, however, that even the shadowing model has simulation results that are very different from those of the other two models in each specific case of simulation, the trend of the simulation results when observed as a whole does show consistency for all three models. 4. CONCLUSIONS We investigated the three radio propagation models that are available in the ns2 network simulation package for UAV networks. Our investigation shows that the shadowing model may generate simulation results that are significantly different from those of the free space loss model and the two-ray ground model in each specific case of simulation. Particularly, the flow throughput, the packet loss rate, and the packet delays consistently show much lower performance for the shadowing model than for the other two models. However, our results also show that when the simulation results are observed as a whole, the trend of flow throughput, packet loss rate, and
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 126 packet delays is consistent for all three models. In conclusion, the choice of a radio propagation model in simulating UAV networks does have significant impact on the simulation results for each individual case of simulation, but such a choice does not affect the interpretation of the simulation data when performance trend is the only concern of investigation. ACKNOWLEDGEMENTS The authors would like to thank everyone who offered support to this project and the publication of its results. REFERENCES [1] T. H. Cox, C. J. Nagy, M. A. Skoog, and I. A. Somers, “Civil UAV Capability Assessment,” NASA, 2004. [2] M. Asadpour, D. Giustiniano, K. A. Hummel, and S. Heimlicher, “Characterizing 802.11N Aerial Communication,” in Proceedings of the Second ACM MobiHoc Workshop on Airborne Networks and Communications, 2013, pp. 7–12. [3] Y. Cai, F. Yu, J. Li, Y. Zhou, and L. Lamont, “Medium Access Control for Unmanned Aerial Vehicle (UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability,” Vehicular Technology, IEEE Transactions on, vol. 62, pp. 390–394, Jan 2013. [4] A. Ollero, M. Bernard, M. La Civita, L. van Hoesel, P. Marron, J. Lepley, and E. de Andres, “AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with unmanned AeRial vehiclEs,” in Safety, Security and Rescue Robotics, 2007, IEEE International Workshop on, Sept 2007, pp. 1–6. [5] A. Alshbatat and L. Dong, “Adaptive MAC protocol for UAV communication networks using directional antennas,” in Networking, Sensing and Control (ICNSC), 2010 International Conference on, April 2010, pp. 598–603. [6] A. Alshbatat and L. Dong, “Cross layer design for mobile Ad-Hoc Unmanned Aerial Vehicle communication networks,” in Networking, Sensing and Control (ICNSC), 2010 International Conference on, April 2010, pp. 331–336. [7] D. Gu, G. Pei, H. Ly, M. Gerla, and X. Hong, “Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs,” in MILCOM 2000, vol. 1, 2000, pp. 310–314. [8] D. Gu, H. Ly, X. Hong, M. Gerla, G. Pei, and Y.-Z. Lee, “C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs,” in Wireless Communications and Networking Conference, 2000, IEEE, vol. 2, 2000, pp. 879–884. [9] H. T. Friis, “A note on a simple transmission formula,” in Proceedings of the I.R.E. and Waves and Electrons, 1946, pp. 254–256. [10] T. S. Rappaport, “Wireless Communications, Principles and Practice,” Prentice Hall, 1996. [11] D. B. Johnson, D. A. Maltz, and Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” IETF Interet draft,draft-ietf-manet-dsr-10.txt, July 2004. Authors Jun Peng received his Ph.D. degree from the Department of Electrical, Computer & Systems Engineering at Rensselaer Polytechnic Institute, Troy, New York, United States. He is currently an associate professor at the Electrical Engineering Department of University of Texas – Rio Grande Valley, Edinburg, Texas, United States. His research interests are in computer and communication networks.