SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
DOI : 10.5121/ijcnc.2015.7309 119
RADIO PROPAGATION MODELS IN WIRELESS
NETWORKS OF UNMANNED AERIAL VEHICLES
Jun Peng
Electrical Engineering Department
University of Texas – Rio Grande Valley
Edinburg, Texas, USA
ABSTRACT
Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they
have become very popular recently for both civil uses, such as law enforcement and crop survey, and for
potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new
networking protocols for UAV networks usually need the help of simulations to test their protocol designs,
particularly when networks of large scales are desired in their tests. One choice that researchers need to
make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we
compare the three radio propagation models that are available in the ns2 network simulation package and
investigate if the choice of one particular model would have a significant impact on the simulation results
for UAV networks.
KEYWORDS
Radio propagation models, unmanned aerial vehicles (UAV), network simulation, protocols
1.INTRODUCTION
As hardware and software become more advanced but even cheaper, unmanned aerial vehicles
have evolved from being used only in military applications to being used in both civil and
commercial applications. For example, people enthusiastic about photographing started to use
UAVs to take videos or pictures of subjects from perspectives that they could not imagine or
reach before due to the mounting costs of renting a plane or helicopter. Besides costs, it is much
safer, faster and more environmentally friendly to use an UAV instead of a plane or helicopter in
such an application. UAVs have also been used for law enforcement, surveillance, search and
rescue, scientific research, and other applications [1].
As UAVs are used in more and more civil and commercial applications and become more and
more popular, it will become inevitable that UAVs need to communicate with each other for
purposes of coordination and collaborations. For example, UAVs will likely need some type of
coordination in the future to avoid collisions among them. Besides, applications that require a
large amount of UAVs working together dynamically, such as surveilling a large geographical
area without interruption, also need the UAVs to be able to communicate with each other timely
and effectively.
To enable UAVs to network themselves and communication with each other, researchers have
been investigating topics at various layers of UAV networks. Asadpour et al. [2] studied the
performance of IEEE 802.11n interfaces in UAV networks and they found that 802.11n
performed poorly in highly mobile scenarios. Cai et cal. [3] proposed a medium access control
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
120
(MAC) protocol for UAV ad-hoc networks with full-duplex radios. They proposed a token-based
technique to update information in the network for efficiently handling the high mobility of
UAVs. Ollero et al. [4] presented a platform that enables autonomous aerial vehicles to cooperate
with ground wireless sensor-actuator networks. Alshbatat et al. [5] used the approach of cross
layer design to deal with the high dynamics in UAV networks. Alshbatat et al. [6] also proposed
an adaptive medium access control protocol for UAV networks using directional antennas. Gu et
al. [7] proposed a routing scheme for multi-layer ad hoc networks that use UAVs in their
backbones. Gu et al. [8] also presented a multiple access protocol for such type of network.
In summary, researchers have been actively investigating all types of topics in UAV networks.
When UAV networks of large scales are needed in testing communication and networking
protocols, simulations are usually the only practical method that would be available to most
investigators. One important element in simulating an UAV network is the radio propagation
model used in the network. There are three radio propagation models that are available in the ns-2
network simulation platform. Although there are studies on some of these radio propagation
models for vehicular networks [2], the studies focused on terrestrial networks. In this paper we
compare the three models for UAV networks and study if the choice of a particular model would
have a significant impact on simulation results.
The rest of the paper is organized as follows. Section 2 introduces the three radio propagation
models that are available in the ns-2 simulation platform. Section 3 presents our simulation results
comparing these three models. Section 4 summarizes our findings.
2. THE THREE RADIO PROPAGATION MODELS IN NS2
2.1. The Free Space Propagation Model
The free space radio propagation model assumes, as its’ name indicates, that the transmitter and
the receiver are in free space without obstacles. The propagation formula is as follows [9]:
22
λd
AA
P
P tr
t
r
= (1)
where rP is the signal power at the receiving antenna, tP is the signal power at the transmitting
antenna, rA is the effective area of the receiving antenna, tA is the effective area of the
transmitting antenna, d is the distance between the transmitting antenna and the receiving
antenna, and λ is the wavelength of the signal.
When we have an isotropic antenna, the effective area is πλ 4/ . Equation 1 thus becomes:
2
2
)4( dP
P
t
r
π
λ
= (2)
In a general case where we have an antenna gain that is not 1 for both the transmitting antenna
and the receiving antenna, Equation 1 becomes:
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
121
2
2
)4( d
GG
P
P
rt
t
r
π
λ
= (3)
where tG is the antenna gain of the transmitting antenna and rG is the antenna gain of the
receiving antenna.
Note that Equations 1 to 3 only apply, in general, under the following condition [9]:
λ
2
2a
d ≥ (4)
where a is the largest linear dimension of either of the antennas.
2.2. The Two-Ray Ground Propagation Model
The two-ray ground propagation model [10] assumes that there are two signal paths from the
transmitter to the receiver. One is the direct line-of-sight path while the other is the reflection path
from the ground. The formula is as follows:
4
22
d
hh
GG
P
P rt
rt
t
r
= (5)
where th is the height of the transmitting antenna and rh is the height of the receiving antenna.
Note that Equation 5 applies under the following condition:
λ
π rt hh
d
4
≥ (6)
2.3. The Shadowing Model
Due to multipath propagation effects, the received power at a receiving antenna is not a
deterministic function of the communication distance as shown in the two models introduced
earlier. Instead, the received power fluctuates as a random variable. The shadowing model [10]
better reflects this characteristic of the received signal power than the other two models
introduced earlier. The path loss is usually expressed in dB as follows in the the shadowing
model:
[ ] dBdBrr X
d
d
dPdP +





−=−
0
0 log10)()( β (7)
where 0d is a reference distance, β is the path loss exponent, dBX is a Gaussian random
variable having a zero mean and a standard deviation of dBδ . The typical values of β and δ are
shown in Tables 1 and 2, respectively.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
122
Table 1 Typical value of β in different environment
Environment β
Outdoor, free space 2
Outdoor, shadowed urban area 2.7-5
In building, line-of-sight 1.6-1.8
In building, obstructed 4-6
Table 1 Typical value of δ in different environment
Environment δ
Outdoor 4-12
Office, hard partition 7
Office, soft partition 9.6
Factory, line-of-sight 3-6
Factory, obstructed 6.8
3. SIMULATION RESULTS
After introducing the three radio propagation models that are available in ns2 in the previous
section, in this section we investigate these three models for UAV networks and show simulation
results. The simulation package ns2 does not support simulations of three dimensional networks.
We modified the package for UAV networks.
The simulated test bed is shown in Figure 1. The test bed has the same size for its width, length,
and height, which is 500 meters. UAVs can fly freely in this defined space following the random
waypoint model. The UAVs in the test bed use the IEEE 802.11 air interface that uses the default
settings in the simulator. Each UAV sets up a CBR connection with another UAV at a random
time during each simulation. A CBR source sends out packets at a rate of 10 packets per second
and each packet has a size of 512 bytes. The routing protocol used in the test bed is DSR [11].
Figure 1 The simulated test bed
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
123
In our simulations we tested the three radio propagation models with varying node densities in the
test bed. Particularly, we varied the number of nodes in the test bed from 10 to 50 in our
simulations of UAV networks using each model. In each simulation we collected data to calculate
the average throughput and the average packet loss rate of the CBR flows in the network. We also
collected data on the packet delay distributions in the network. Our simulation results are shown
in Figures 2 to 6.
Figure 2. The average flow rate for the three propagation models
As shown in Figure 2, the average flow throughput in the network decreases as the node density
increases in the network. This decrease of flow throughput is mainly caused by two factors. One
is that the total traffic rate is higher in the network when there are more nodes in the network
because each node starts a CBR flow at a random time in each simulation. The other factor is that
the contention at the medium access control (MAC) layer is also higher when there are more
nodes in the network. The throughput results are also corroborated by the packet loss rate shown
in Figure 3. As shown in Figure 3, a higher node density in the network results in a higher packet
loss rate in the network.
Figure 3. The average packet loss rate for the three propagation models
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
124
Figure 4. The histogram of the packet delays for the free space loss model
As also shown in Figures 2 and 3, the flow throughput trend and the packet loss rate trend are
consistent for all three propagation models. The average flow throughput and the average packet
loss rate are similar for the free space propagation model and the two-ray ground propagation
model in all the cases of node density.
However, the average flow throughput for the shadowing model is significantly lower as
compared with that of the other two models. The difference can reach about thirty percent when
the node density is low. When the node density is high, however, the difference is smaller
because the network becomes very congested in such a case and lots of packets are dropped for
all the models.
Similar observations can be made in Figure 3 for packet losses for the three models. When the
node density is low, the difference between the packet loss rates for the shadowing model and the
other two models is big. When the node density becomes higher, however, the difference
becomes smaller. The flow throughput performance and the packet loss rate performance thus
corroborate each other in this case too.
The packet delay data shown in Figures 4 to 6 for the case of ten nodes also corroborate the
results shown in earlier figures for the three models. As shown by Figures 4 to 6, the distributions
of packet delays are similar for the free space propagation model and the two-ray ground model.
For these two models, most packets have a delay within 0.2 second. For the shadowing model,
however, much more packets have a delay beyond 0.2 second.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
125
Figure 5. The histogram of the packet delays for the two-ray ground loss model
Figure 6. The histogram of the packet delays for the shadowing loss model
In summary, the choice of one of the three radio propagation models that are available in the ns2
network simulation package does have significant impact on simulation results for UAV
networks. The differences between the results for the free space propagation model and the two-
ray ground model are small. The differences are more dramatic between the results for these two
models and the shadowing model. The good news is, however, that even the shadowing model
has simulation results that are very different from those of the other two models in each specific
case of simulation, the trend of the simulation results when observed as a whole does show
consistency for all three models.
4. CONCLUSIONS
We investigated the three radio propagation models that are available in the ns2 network
simulation package for UAV networks. Our investigation shows that the shadowing model may
generate simulation results that are significantly different from those of the free space loss model
and the two-ray ground model in each specific case of simulation. Particularly, the flow
throughput, the packet loss rate, and the packet delays consistently show much lower performance
for the shadowing model than for the other two models. However, our results also show that when
the simulation results are observed as a whole, the trend of flow throughput, packet loss rate, and
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
126
packet delays is consistent for all three models. In conclusion, the choice of a radio propagation
model in simulating UAV networks does have significant impact on the simulation results for
each individual case of simulation, but such a choice does not affect the interpretation of the
simulation data when performance trend is the only concern of investigation.
ACKNOWLEDGEMENTS
The authors would like to thank everyone who offered support to this project and the publication
of its results.
REFERENCES
[1] T. H. Cox, C. J. Nagy, M. A. Skoog, and I. A. Somers, “Civil UAV Capability Assessment,” NASA,
2004.
[2] M. Asadpour, D. Giustiniano, K. A. Hummel, and S. Heimlicher, “Characterizing 802.11N Aerial
Communication,” in Proceedings of the Second ACM MobiHoc Workshop on Airborne Networks
and Communications, 2013, pp. 7–12.
[3] Y. Cai, F. Yu, J. Li, Y. Zhou, and L. Lamont, “Medium Access Control for Unmanned Aerial Vehicle
(UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability,”
Vehicular Technology, IEEE Transactions on, vol. 62, pp. 390–394, Jan 2013.
[4] A. Ollero, M. Bernard, M. La Civita, L. van Hoesel, P. Marron, J. Lepley, and E. de Andres,
“AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator
networks cooperating with unmanned AeRial vehiclEs,” in Safety, Security and Rescue Robotics,
2007, IEEE International Workshop on, Sept 2007, pp. 1–6.
[5] A. Alshbatat and L. Dong, “Adaptive MAC protocol for UAV communication networks using
directional antennas,” in Networking, Sensing and Control (ICNSC), 2010 International Conference
on, April 2010, pp. 598–603.
[6] A. Alshbatat and L. Dong, “Cross layer design for mobile Ad-Hoc Unmanned Aerial Vehicle
communication networks,” in Networking, Sensing and Control (ICNSC), 2010 International
Conference on, April 2010, pp. 331–336.
[7] D. Gu, G. Pei, H. Ly, M. Gerla, and X. Hong, “Hierarchical routing for multi-layer ad-hoc wireless
networks with UAVs,” in MILCOM 2000, vol. 1, 2000, pp. 310–314.
[8] D. Gu, H. Ly, X. Hong, M. Gerla, G. Pei, and Y.-Z. Lee, “C-ICAMA, a centralized intelligent channel
assigned multiple access for multi-layer ad-hoc wireless networks with UAVs,” in Wireless
Communications and Networking Conference, 2000, IEEE, vol. 2, 2000, pp. 879–884.
[9] H. T. Friis, “A note on a simple transmission formula,” in Proceedings of the I.R.E. and Waves and
Electrons, 1946, pp. 254–256.
[10] T. S. Rappaport, “Wireless Communications, Principles and Practice,” Prentice Hall, 1996.
[11] D. B. Johnson, D. A. Maltz, and Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad
Hoc Networks (DSR),” IETF Interet draft,draft-ietf-manet-dsr-10.txt, July 2004.
Authors
Jun Peng received his Ph.D. degree from the Department of Electrical, Computer & Systems Engineering
at Rensselaer Polytechnic Institute, Troy, New York, United States. He is currently an associate professor
at the Electrical Engineering Department of University of Texas – Rio Grande Valley, Edinburg, Texas,
United States. His research interests are in computer and communication networks.

More Related Content

PPTX
Chap 4 (large scale propagation)
PDF
Propagation Model
PPTX
Fading & Doppler Effect
PPSX
Concepts of & cell sectoring and micro cell
PPT
Antennas wave and propagation
PDF
Wireless channels
PPTX
Digital signal processor architecture
Chap 4 (large scale propagation)
Propagation Model
Fading & Doppler Effect
Concepts of & cell sectoring and micro cell
Antennas wave and propagation
Wireless channels
Digital signal processor architecture

What's hot (20)

PPSX
Awp unit i a (1)
PPT
Microwave Coupler
PPTX
Handoff in Mobile Communication
PPTX
Frequency Reuse
DOCX
UNIT I- CPLD & FPGA ARCHITECTURE & APPLICATIONS
PPTX
Introduction to Wireless Communication
PPTX
Introduction to rf and microwave circuits
PPT
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
PPTX
LINE OF SIGHT PROPAGATION
DOCX
Introduccion a los sistema de comunicacion
PPTX
Directional couplers 22
PPT
Antenna PARAMETERS
PPT
Mobile cellular Communication.ppt
PPT
transmission-line-and-waveguide-ppt
PPT
Outdoor indoor Propagation
PPT
wirelessSlidesCh04 (2).ppt
PDF
Solved problems in waveguides
DOCX
ARM7-ARCHITECTURE
DOCX
BSNL Training Report
PPT
Embedded firmware
Awp unit i a (1)
Microwave Coupler
Handoff in Mobile Communication
Frequency Reuse
UNIT I- CPLD & FPGA ARCHITECTURE & APPLICATIONS
Introduction to Wireless Communication
Introduction to rf and microwave circuits
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
LINE OF SIGHT PROPAGATION
Introduccion a los sistema de comunicacion
Directional couplers 22
Antenna PARAMETERS
Mobile cellular Communication.ppt
transmission-line-and-waveguide-ppt
Outdoor indoor Propagation
wirelessSlidesCh04 (2).ppt
Solved problems in waveguides
ARM7-ARCHITECTURE
BSNL Training Report
Embedded firmware
Ad

Viewers also liked (19)

PDF
Multi hop distributed coordination in
PDF
Performance evaluation of zigbee transceiver for wireless body sensor system
PDF
Distribution of maximal clique size of the
PDF
Three dimension hamiltonian broadcast
PDF
Multi user performance on mc cdma single relay cooperative system by distribu...
PDF
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
PDF
A proposed architecture for network
PDF
The influence of information security on
PDF
Attack countermeasure tree (act) meets with
PDF
Server congestion control
PDF
Section based hex cell routing algorithm (sbhcr)
PDF
Analyzing the performance of the dynamic
PDF
A new dna based approach of generating keydependentmixcolumns
PDF
Real time wireless health monitoring
PDF
Broadcast wormhole routed 3-d mesh
PDF
Video contents prior storing server for
PDF
Data gathering in wireless sensor networks using intermediate nodes
PDF
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PDF
Fault tolerant routing scheme based on
Multi hop distributed coordination in
Performance evaluation of zigbee transceiver for wireless body sensor system
Distribution of maximal clique size of the
Three dimension hamiltonian broadcast
Multi user performance on mc cdma single relay cooperative system by distribu...
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
A proposed architecture for network
The influence of information security on
Attack countermeasure tree (act) meets with
Server congestion control
Section based hex cell routing algorithm (sbhcr)
Analyzing the performance of the dynamic
A new dna based approach of generating keydependentmixcolumns
Real time wireless health monitoring
Broadcast wormhole routed 3-d mesh
Video contents prior storing server for
Data gathering in wireless sensor networks using intermediate nodes
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
Fault tolerant routing scheme based on
Ad

Similar to Radio propagation models in wireless (20)

PDF
The shadowing propagation model
PDF
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
PDF
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
PDF
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
PDF
Secure data storage over distributed nodes in network through broadcast techn...
DOCX
Device to Device Communication in Cellular Networks
PDF
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
PDF
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
PDF
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
PDF
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
PDF
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
PDF
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
PDF
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
PDF
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
DOCX
PDF
Iaetsd game theory and auctions for cooperation in
PDF
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
PDF
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
PDF
Id103
PDF
Performance evaluation of different routing protocols in wsn using different ...
The shadowing propagation model
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Secure data storage over distributed nodes in network through broadcast techn...
Device to Device Communication in Cellular Networks
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
Iaetsd game theory and auctions for cooperation in
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
Capacity Improvement of Cellular System Using Fractional Frequency Reuse (FFR)
Id103
Performance evaluation of different routing protocols in wsn using different ...

More from IJCNCJournal (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Authenticated Key Agreement Protocol with Forward Secrecy for Securing Cyber ...
PDF
Enhancing IoT Cyberattack Detection via Hyperparameter Optimization Technique...
PDF
Analysis of LTE/5G Network Performance Parameters in Smartphone Use Cases: A ...
PDF
An Energy Hole Detection and Relay Repositioning in Cluster Based Routing Pro...
PDF
Performance of Multi-Hop FSO Systems Under Practical Conditions with Malaga T...
PDF
QoS Based Reliable Route in MANET for Military Applications
PDF
Conflict Flow Avoided Proactive Rerouting Algorithm using Online Active Learn...
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
PDF
Classification of Network Traffic using Machine Learning Models on the NetML ...
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
PDF
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
PDF
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
PDF
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Authenticated Key Agreement Protocol with Forward Secrecy for Securing Cyber ...
Enhancing IoT Cyberattack Detection via Hyperparameter Optimization Technique...
Analysis of LTE/5G Network Performance Parameters in Smartphone Use Cases: A ...
An Energy Hole Detection and Relay Repositioning in Cluster Based Routing Pro...
Performance of Multi-Hop FSO Systems Under Practical Conditions with Malaga T...
QoS Based Reliable Route in MANET for Military Applications
Conflict Flow Avoided Proactive Rerouting Algorithm using Online Active Learn...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
Classification of Network Traffic using Machine Learning Models on the NetML ...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
Visually Image Encryption and Compression using a CNN-Based Autoencoder

Recently uploaded (20)

PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Welding lecture in detail for understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
Mechanical Engineering MATERIALS Selection
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
bas. eng. economics group 4 presentation 1.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Lecture Notes Electrical Wiring System Components
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Welding lecture in detail for understanding
573137875-Attendance-Management-System-original
Model Code of Practice - Construction Work - 21102022 .pdf

Radio propagation models in wireless

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 DOI : 10.5121/ijcnc.2015.7309 119 RADIO PROPAGATION MODELS IN WIRELESS NETWORKS OF UNMANNED AERIAL VEHICLES Jun Peng Electrical Engineering Department University of Texas – Rio Grande Valley Edinburg, Texas, USA ABSTRACT Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they have become very popular recently for both civil uses, such as law enforcement and crop survey, and for potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new networking protocols for UAV networks usually need the help of simulations to test their protocol designs, particularly when networks of large scales are desired in their tests. One choice that researchers need to make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we compare the three radio propagation models that are available in the ns2 network simulation package and investigate if the choice of one particular model would have a significant impact on the simulation results for UAV networks. KEYWORDS Radio propagation models, unmanned aerial vehicles (UAV), network simulation, protocols 1.INTRODUCTION As hardware and software become more advanced but even cheaper, unmanned aerial vehicles have evolved from being used only in military applications to being used in both civil and commercial applications. For example, people enthusiastic about photographing started to use UAVs to take videos or pictures of subjects from perspectives that they could not imagine or reach before due to the mounting costs of renting a plane or helicopter. Besides costs, it is much safer, faster and more environmentally friendly to use an UAV instead of a plane or helicopter in such an application. UAVs have also been used for law enforcement, surveillance, search and rescue, scientific research, and other applications [1]. As UAVs are used in more and more civil and commercial applications and become more and more popular, it will become inevitable that UAVs need to communicate with each other for purposes of coordination and collaborations. For example, UAVs will likely need some type of coordination in the future to avoid collisions among them. Besides, applications that require a large amount of UAVs working together dynamically, such as surveilling a large geographical area without interruption, also need the UAVs to be able to communicate with each other timely and effectively. To enable UAVs to network themselves and communication with each other, researchers have been investigating topics at various layers of UAV networks. Asadpour et al. [2] studied the performance of IEEE 802.11n interfaces in UAV networks and they found that 802.11n performed poorly in highly mobile scenarios. Cai et cal. [3] proposed a medium access control
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 120 (MAC) protocol for UAV ad-hoc networks with full-duplex radios. They proposed a token-based technique to update information in the network for efficiently handling the high mobility of UAVs. Ollero et al. [4] presented a platform that enables autonomous aerial vehicles to cooperate with ground wireless sensor-actuator networks. Alshbatat et al. [5] used the approach of cross layer design to deal with the high dynamics in UAV networks. Alshbatat et al. [6] also proposed an adaptive medium access control protocol for UAV networks using directional antennas. Gu et al. [7] proposed a routing scheme for multi-layer ad hoc networks that use UAVs in their backbones. Gu et al. [8] also presented a multiple access protocol for such type of network. In summary, researchers have been actively investigating all types of topics in UAV networks. When UAV networks of large scales are needed in testing communication and networking protocols, simulations are usually the only practical method that would be available to most investigators. One important element in simulating an UAV network is the radio propagation model used in the network. There are three radio propagation models that are available in the ns-2 network simulation platform. Although there are studies on some of these radio propagation models for vehicular networks [2], the studies focused on terrestrial networks. In this paper we compare the three models for UAV networks and study if the choice of a particular model would have a significant impact on simulation results. The rest of the paper is organized as follows. Section 2 introduces the three radio propagation models that are available in the ns-2 simulation platform. Section 3 presents our simulation results comparing these three models. Section 4 summarizes our findings. 2. THE THREE RADIO PROPAGATION MODELS IN NS2 2.1. The Free Space Propagation Model The free space radio propagation model assumes, as its’ name indicates, that the transmitter and the receiver are in free space without obstacles. The propagation formula is as follows [9]: 22 λd AA P P tr t r = (1) where rP is the signal power at the receiving antenna, tP is the signal power at the transmitting antenna, rA is the effective area of the receiving antenna, tA is the effective area of the transmitting antenna, d is the distance between the transmitting antenna and the receiving antenna, and λ is the wavelength of the signal. When we have an isotropic antenna, the effective area is πλ 4/ . Equation 1 thus becomes: 2 2 )4( dP P t r π λ = (2) In a general case where we have an antenna gain that is not 1 for both the transmitting antenna and the receiving antenna, Equation 1 becomes:
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 121 2 2 )4( d GG P P rt t r π λ = (3) where tG is the antenna gain of the transmitting antenna and rG is the antenna gain of the receiving antenna. Note that Equations 1 to 3 only apply, in general, under the following condition [9]: λ 2 2a d ≥ (4) where a is the largest linear dimension of either of the antennas. 2.2. The Two-Ray Ground Propagation Model The two-ray ground propagation model [10] assumes that there are two signal paths from the transmitter to the receiver. One is the direct line-of-sight path while the other is the reflection path from the ground. The formula is as follows: 4 22 d hh GG P P rt rt t r = (5) where th is the height of the transmitting antenna and rh is the height of the receiving antenna. Note that Equation 5 applies under the following condition: λ π rt hh d 4 ≥ (6) 2.3. The Shadowing Model Due to multipath propagation effects, the received power at a receiving antenna is not a deterministic function of the communication distance as shown in the two models introduced earlier. Instead, the received power fluctuates as a random variable. The shadowing model [10] better reflects this characteristic of the received signal power than the other two models introduced earlier. The path loss is usually expressed in dB as follows in the the shadowing model: [ ] dBdBrr X d d dPdP +      −=− 0 0 log10)()( β (7) where 0d is a reference distance, β is the path loss exponent, dBX is a Gaussian random variable having a zero mean and a standard deviation of dBδ . The typical values of β and δ are shown in Tables 1 and 2, respectively.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 122 Table 1 Typical value of β in different environment Environment β Outdoor, free space 2 Outdoor, shadowed urban area 2.7-5 In building, line-of-sight 1.6-1.8 In building, obstructed 4-6 Table 1 Typical value of δ in different environment Environment δ Outdoor 4-12 Office, hard partition 7 Office, soft partition 9.6 Factory, line-of-sight 3-6 Factory, obstructed 6.8 3. SIMULATION RESULTS After introducing the three radio propagation models that are available in ns2 in the previous section, in this section we investigate these three models for UAV networks and show simulation results. The simulation package ns2 does not support simulations of three dimensional networks. We modified the package for UAV networks. The simulated test bed is shown in Figure 1. The test bed has the same size for its width, length, and height, which is 500 meters. UAVs can fly freely in this defined space following the random waypoint model. The UAVs in the test bed use the IEEE 802.11 air interface that uses the default settings in the simulator. Each UAV sets up a CBR connection with another UAV at a random time during each simulation. A CBR source sends out packets at a rate of 10 packets per second and each packet has a size of 512 bytes. The routing protocol used in the test bed is DSR [11]. Figure 1 The simulated test bed
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 123 In our simulations we tested the three radio propagation models with varying node densities in the test bed. Particularly, we varied the number of nodes in the test bed from 10 to 50 in our simulations of UAV networks using each model. In each simulation we collected data to calculate the average throughput and the average packet loss rate of the CBR flows in the network. We also collected data on the packet delay distributions in the network. Our simulation results are shown in Figures 2 to 6. Figure 2. The average flow rate for the three propagation models As shown in Figure 2, the average flow throughput in the network decreases as the node density increases in the network. This decrease of flow throughput is mainly caused by two factors. One is that the total traffic rate is higher in the network when there are more nodes in the network because each node starts a CBR flow at a random time in each simulation. The other factor is that the contention at the medium access control (MAC) layer is also higher when there are more nodes in the network. The throughput results are also corroborated by the packet loss rate shown in Figure 3. As shown in Figure 3, a higher node density in the network results in a higher packet loss rate in the network. Figure 3. The average packet loss rate for the three propagation models
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 124 Figure 4. The histogram of the packet delays for the free space loss model As also shown in Figures 2 and 3, the flow throughput trend and the packet loss rate trend are consistent for all three propagation models. The average flow throughput and the average packet loss rate are similar for the free space propagation model and the two-ray ground propagation model in all the cases of node density. However, the average flow throughput for the shadowing model is significantly lower as compared with that of the other two models. The difference can reach about thirty percent when the node density is low. When the node density is high, however, the difference is smaller because the network becomes very congested in such a case and lots of packets are dropped for all the models. Similar observations can be made in Figure 3 for packet losses for the three models. When the node density is low, the difference between the packet loss rates for the shadowing model and the other two models is big. When the node density becomes higher, however, the difference becomes smaller. The flow throughput performance and the packet loss rate performance thus corroborate each other in this case too. The packet delay data shown in Figures 4 to 6 for the case of ten nodes also corroborate the results shown in earlier figures for the three models. As shown by Figures 4 to 6, the distributions of packet delays are similar for the free space propagation model and the two-ray ground model. For these two models, most packets have a delay within 0.2 second. For the shadowing model, however, much more packets have a delay beyond 0.2 second.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 125 Figure 5. The histogram of the packet delays for the two-ray ground loss model Figure 6. The histogram of the packet delays for the shadowing loss model In summary, the choice of one of the three radio propagation models that are available in the ns2 network simulation package does have significant impact on simulation results for UAV networks. The differences between the results for the free space propagation model and the two- ray ground model are small. The differences are more dramatic between the results for these two models and the shadowing model. The good news is, however, that even the shadowing model has simulation results that are very different from those of the other two models in each specific case of simulation, the trend of the simulation results when observed as a whole does show consistency for all three models. 4. CONCLUSIONS We investigated the three radio propagation models that are available in the ns2 network simulation package for UAV networks. Our investigation shows that the shadowing model may generate simulation results that are significantly different from those of the free space loss model and the two-ray ground model in each specific case of simulation. Particularly, the flow throughput, the packet loss rate, and the packet delays consistently show much lower performance for the shadowing model than for the other two models. However, our results also show that when the simulation results are observed as a whole, the trend of flow throughput, packet loss rate, and
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015 126 packet delays is consistent for all three models. In conclusion, the choice of a radio propagation model in simulating UAV networks does have significant impact on the simulation results for each individual case of simulation, but such a choice does not affect the interpretation of the simulation data when performance trend is the only concern of investigation. ACKNOWLEDGEMENTS The authors would like to thank everyone who offered support to this project and the publication of its results. REFERENCES [1] T. H. Cox, C. J. Nagy, M. A. Skoog, and I. A. Somers, “Civil UAV Capability Assessment,” NASA, 2004. [2] M. Asadpour, D. Giustiniano, K. A. Hummel, and S. Heimlicher, “Characterizing 802.11N Aerial Communication,” in Proceedings of the Second ACM MobiHoc Workshop on Airborne Networks and Communications, 2013, pp. 7–12. [3] Y. Cai, F. Yu, J. Li, Y. Zhou, and L. Lamont, “Medium Access Control for Unmanned Aerial Vehicle (UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability,” Vehicular Technology, IEEE Transactions on, vol. 62, pp. 390–394, Jan 2013. [4] A. Ollero, M. Bernard, M. La Civita, L. van Hoesel, P. Marron, J. Lepley, and E. de Andres, “AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with unmanned AeRial vehiclEs,” in Safety, Security and Rescue Robotics, 2007, IEEE International Workshop on, Sept 2007, pp. 1–6. [5] A. Alshbatat and L. Dong, “Adaptive MAC protocol for UAV communication networks using directional antennas,” in Networking, Sensing and Control (ICNSC), 2010 International Conference on, April 2010, pp. 598–603. [6] A. Alshbatat and L. Dong, “Cross layer design for mobile Ad-Hoc Unmanned Aerial Vehicle communication networks,” in Networking, Sensing and Control (ICNSC), 2010 International Conference on, April 2010, pp. 331–336. [7] D. Gu, G. Pei, H. Ly, M. Gerla, and X. Hong, “Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs,” in MILCOM 2000, vol. 1, 2000, pp. 310–314. [8] D. Gu, H. Ly, X. Hong, M. Gerla, G. Pei, and Y.-Z. Lee, “C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs,” in Wireless Communications and Networking Conference, 2000, IEEE, vol. 2, 2000, pp. 879–884. [9] H. T. Friis, “A note on a simple transmission formula,” in Proceedings of the I.R.E. and Waves and Electrons, 1946, pp. 254–256. [10] T. S. Rappaport, “Wireless Communications, Principles and Practice,” Prentice Hall, 1996. [11] D. B. Johnson, D. A. Maltz, and Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” IETF Interet draft,draft-ietf-manet-dsr-10.txt, July 2004. Authors Jun Peng received his Ph.D. degree from the Department of Electrical, Computer & Systems Engineering at Rensselaer Polytechnic Institute, Troy, New York, United States. He is currently an associate professor at the Electrical Engineering Department of University of Texas – Rio Grande Valley, Edinburg, Texas, United States. His research interests are in computer and communication networks.