Optimizing Military Tactical MANETs efficiently using PSO by Younchol Cho A dissertation submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Auburn, Alabama December 18, 2009 Keywords: mobile ad-hoc network, hop-count, shortest path, particle swarm optimization, network centric warfare Copyright 2009 by Younchol Cho Approved by Alice E. Smith, Co-chair, Professor of Industrial & Systems Engineering Jeffrey S. Smith, Co-chair, Professor of Industrial & Systems Engineering Abdullah Konak, Associate Professor of Information Science & Technology, Penn State Berks Abstract A mobile ad-hoc network (MANET) is a self-configuring network of autonomous agents designed to continuously support users who change the topology of the network dynamically and independently. The dynamic mobility of user nodes can cause communication links to disconnect if the network is not managed correctly. The autonomous agents are controlled to maximize the connectivity of user nodes considering military aspects. Military operations require the efficient use of limited resources and sometimes sacrifice network performance to accomplish given missions. Especially, military MANETs are exposed to a dangerous environment due to the enemy activities, so these hostile effects should be considered. Under these requirements and circumstances, the primary objective of the agents is to maximize the connection and quality of communication between user nodes and a control node. This is formulated as a shortest path problem using a hop-count metric. A population based heuristic algorithm, Particle Swarm Optimization (PSO), is developed to solve the military MANET problem. To best accommodate the aspects of military MANETs several crucial constructs are devised and tested. These are the Pre-deployed Agent Level (PAL), the Messenger Agent and the Priority node. Testing involves the common random waypoint model and two specific military scenarios - search and rescue and patrol. The proposed model in this thesis tries better represents military MANETs by considering enemy obstacles and military operation characteristics. It can be used to evaluate network performance before deploying an actual network in the battlefield and to properly size the ii iii number of agent nodes. Also, the proposed approach could be used for commercial applications by slight modification of the objective function. Acknowledgments I want to thank God who allowed me to experience many valuable things through the difficulties I faced while studying for my doctoral degree at Auburn University. I will try to keep the teachings of the Lord in my heart forever. I would like to thank my country and Navy for giving me this great opportunity. I will dedicate my life to the Republic of Korea as a Korean navy officer to repay the benefits given by my country and Navy. I would like to thank my wife Yokyung Kim, and my children, Eunju and Mansu for their love and support in the pursuit of this degree. This work would not have been possible without their understanding and support. I would also like to thank my parents, Younghwan Cho and Jonghwa Lim for their help and encouragement throughout my life. Finally, I would like to thank Dr. Alice Smith and Jeffrey Smith, my thesis advisors and Dr. Abdullah Konak, a committee member for their great help in my research throughout my years at Auburn. iv Table of Contents Abstract ......................................................................................................................................... ii Acknowledgments ....................................................................................................................... iv List of Tables ............................................................................................................................. viii List of Figures .............................................................................................................................. ix Chapter 1 Introduction ................................................................................................................. 1 1.1 Background ............................................................................................................... 1 1.2 Research Objectives .................................................................................................. 8 1.3 Dissertation Overview ............................................................................................ 11 Chapter 2 Literature review ....................................................................................................... 13 2.1 MANET performance ............................................................................................. 13 2.2 Network connection ................................................................................................ 16 2.3 MANET performance metrics ................................................................................ 17 2.4 MANET routing ...................................................................................................... 22 2.5 Mobility ................................................................................................................... 25 2.6 Particle Swarm Optimization (PSO) ....................................................................... 30 2.7 Optimization in dynamic environments .................................................................. 39 Chapter 3 Understanding Network-Centric Warfare (NCW) .................................................... 42 3.1 What is NCW ? ....................................................................................................... 43 3.2 Tenets and governing principles for NCW ............................................................. 47 v 3.3 Domains of conflict in NCW .................................................................................. 48 3.4 Information warfare ................................................................................................. 51 3.5 Decision making and security in NCW environment ............................................. 52 3.6 Wireless networks ................................................................................................... 55 3.7 Tactical battlefield network .................................................................................... 58 Chapter 4 Military MANET description and mathematical model ........................................... 62 4.1 Proposed military MANET operation system ......................................................... 62 4.2 Military MANET nodes .......................................................................................... 64 4.3 Network states ......................................................................................................... 66 4.4 Military MANET optimizer ..................................................................................... 67 4.5 Mathematical formulation ....................................................................................... 74 Chapter 5 Military MANET system and simulation environment .............................................. 81 5.1 Routing by network state ........................................................................................ 82 5.2 User node mobility model ....................................................................................... 83 5.3 Isolated agent behavior ........................................................................................... 86 5.4 Enemy behavior ....................................................................................................... 86 5.5 Prediction of user future location ............................................................................ 90 5.6 Messenger agent behavior ....................................................................................... 92 5.7 Network node behavior in an enemy effect ranges ................................................. 94 5.8 PSO parameters ....................................................................................................... 97 Chapter 6 Simulation experiments and analysis ......................................................................... 98 6.1 Simulation environment .......................................................................................... 99 6.2 Test mobility models ............................................................................................. 100 vi vii 6.3 Performance measures .......................................................................................... 106 6.4 Effect of metrics under different mobility ............................................................. 109 6.5 Effect of metrics for medium and large sized problem with RW .......................... 128 6.6 Cost benefit analysis .............................................................................................. 137 Chapter 7 Conclusions .............................................................................................................. 155 References ............................................................................................................................... 158 List of Tables Table 4-1 Path Loss vs. Data rate ............................................................................................... 73 Table 5-1 Distance vs. Jamming effect level ............................................................................. 90 Table 5-2 Combat power of resources and Index probability .................................................... 95 Table 6-1 Test problems ............................................................................................................ 99 Table 6-2 PAL effect with the hop-count based algorithm ...................................................... 110 Table 6-3 PAL effect with the shortest distance based algorithm ........................................... 113 Table 6-4 Efficiency of algorithms as measured by number of hops per connected user ........ 126 Table 6-5 PAL effect with medium and large problem ............................................................ 129 Table 6-6 Efficiency (#hops/connected user) of algorithms with medium and large problems ................................................................................................................................................... 131 viii List of Figures Figure 2-1 PSO basic mechanism ............................................................................................... 33 Figure 2-2 Common topologies in PSO ..................................................................................... 39 Figure 3-1 Domain of conflict ................................................................................................... 50 Figure 3-2 Wireless networks and their coverage ...................................................................... 56 Figure 3-3 MANET interoperability ........................................................................................... 60 Figure 5-1 Main optimization framework .................................................................................. 81 Figure 5-2 Optimization by network states ................................................................................. 83 Figure 5-3 Enemy effect zones .................................................................................................. 88 Figure 5-4 Pseudo code for a messenger ................................................................................... 93 Figure 5-5 Kill probability of resources in a kill effect zone ..................................................... 96 Figure 5-6 Agent behavior in the kill zone ................................................................................. 96 Figure 6-1 Initial formation with RW ...................................................................................... 101 Figure 6-2 Operation formation with RW ................................................................................ 102 Figure 6-3 Initial formation with CD ........................................................................................ 103 Figure 6-4 Operation formation with RW ................................................................................ 104 Figure 6-5 Initial formation with SR ........................................................................................ 105 Figure 6-6 Operation formation with SR .................................................................................. 106 Figure 6-7 Comparison of PAL and No PAL (RW, 1E) .......................................................... 111 Figure 6-8 Comparison of PAL and No PAL (CD, 1E) ........................................................... 112 ix Figure 6-9 Comparison of PAL and No PAL (SR, 1E) ............................................................ 113 Figure 6-10 Messenger effect (RW) ........................................................................................ 115 Figure 6-11 Comparison of Messenger and No messenger (RW) ........................................... 115 Figure 6-12 Messenger effect (CD) ......................................................................................... 116 Figure 6-13 Comparison of Messenger and No messenger (CD, 1E) ..................................... 117 Figure 6-14 Messenger effect (SR) .......................................................................................... 118 Figure 6-15 Comparison of Messenger and No messenger (SR, 1E) ...................................... 119 Figure 6-16 MCR changes by priority node weights (RW) ..................................................... 120 Figure 6-17 Priority node effect (RW, 1E) ............................................................................. 121 Figure 6-18 Priority node effect (RW, 2E) ............................................................................. 121 Figure 6-19 Priority node effect (RW, 3E) ............................................................................. 122 Figure 6-20 MCR changes by priority node weights (CD) ...................................................... 123 Figure 6-21 NCU changes by priority node weights (CD) ..................................................... 124 Figure 6-22 MCR changes by priority node weights (SR) ...................................................... 124 Figure 6-23 NCU changes by priority node weights (SR) ...................................................... 125 Figure 6-24 Comparison of number of hops used for user a user connection (RW, 2E) ........ 127 Figure 6-25 Comparison of number of hops used for user a user connection (CD, 2E) ........ 127 Figure 6-26 Comparison of number of hops used for user a user connection (SR, 2E) ......... 128 Figure 6-27 Comparison of PAL and No PAL (Medium, no enemy) .................................... 130 Figure 6-28 Comparison of PAL and No PAL (Large, no enemy) ........................................ 130 Figure 6-29 Comparison of number of hops used for a user connection (Medium) ............... 131 Figure 6-30 Comparison of number of hops used for a user connection (Large) ................... 132 Figure 6-31 Messenger effect (Medium, 2E) .......................................................................... 133 x Figure 6-32 Messenger effect (Medium, 4E) .......................................................................... 133 Figure 6-33 Messenger effect (Large, 2E) .............................................................................. 134 Figure 6-34 Messenger effect (Large, 2E) .............................................................................. 134 Figure 6-35 Priority node effect (Medium, 2E) ...................................................................... 135 Figure 6-36 Priority node effect (Medium, 4E) ...................................................................... 135 Figure 6-37 Priority node effect (Large, 2E) .......................................................................... 136 Figure 6-38 Priority node effect (Large, 4E) .......................................................................... 136 Figure 6-39 Messenger effect (S1) .......................................................................................... 139 Figure 6-40 Comparison of network performance by messenger (S1) .................................... 139 Figure 6-41 Efficient number of agents in the no enemy case (S1) ......................................... 140 Figure 6-42 Efficient number of agents in the enemy case (S1) ............................................. 141 Figure 6-43 Network performance and number of killed resources (S1) ............................... 141 Figure 6-44 Messenger effect (S2) ......................................................................................... 142 Figure 6-45 Comparison of network performance by messenger (S2) ................................... 143 Figure 6-46 Efficient number of agents in the no enemy case (S2) ........................................ 143 Figure 6-47 Efficient number of agents in the enemy case (S2) ............................................. 144 Figure 6-48 Network performance and number of killed resources (S2) ............................... 145 Figure 6-49 Animation picture of combat scenario 2 (Red: user, Green: agent, Blue: control, Black: enemy) ........................................................................................................................... 146 Figure 6-50 Efficient number of agents in the no enemy case (S3) ........................................ 147 Figure 6-51 Messenger effect (S3) ......................................................................................... 148 Figure 6-52 Comparison of network performance by messenger (S3) .................................... 148 Figure 6-53 Network performance and number of killed resources (S2) ............................... 149 xi xii Figure 6-54 Efficient number of agents in the enemy case (S3) ............................................. 150 Figure 6-55 Messenger effect in the combat scenario with CD .............................................. 151 Figure 6-56 Comparison of network performance by messenger in the combat scenario with CD ................................................................................................................................................... 151 Figure 6-57 Efficient number of agents in the combat scenario with CD ................................ 152 Figure 6-58 Network performance and number of killed resources in the combat scenario with CD ............................................................................................................................................ 153 Figure 6-59 Efficient number of agents in the combat scenario with SR ............................... 154 Chapter 1 Introduction 1.1 Background Today, most people carry at least one portable information device, such as laptops, mobile phones and PDAs, for use in their professional and private lives. The purpose of these devices is to exchange and acquire valuable information through well established communication technology. Let us imagine what would happen to the world if we could not use those devices for a day. It would seriously affect our normal life, and the world would immediately fall into disorder due to cessation of normal functioning of the technological infrastructure that supports many important parts of our world. The dependence of modern human life on information technology (IT) based on telecommunication networks is so prevalent that we cannot imagine a life without them [34]. The rapid development of information technology has integrated most parts of the world into one well organized system. Networking is a complex part of computing that makes up most of the IT industries. Without networks, almost all communication in the world would cease. A telecommunications network is a network of links and nodes arranged in a way that messages may be passed from one part of the network to another through those links. These telecommunication networks can be split into two categories: wireline and wireless networks [105]. Wireline networks have provided users with very fast and reliable communications, and a large portion of the world economy now relies completely on these telecommunication networks. 1 Although a wireline network has the benefits of speed and security, it requires a great deal of time and cost for installation and maintenance. Moreover, it cannot respond to a dynamic situation or environment because of its requirement for infrastructure [26]. Therefore, wireless technologies are becoming quite popular and mobile internet service is a big trend. According to the survey conducted by the Pew Internet & American Life Project, 54% of those who have internet-ready phones have used their phone to go online. Also, 56% of PDA owners have used their portable device to connect to the internet [78]. Wireless networks include infrastructure-based networks and ad-hoc networks. Infrastructure-based wireless networks need some infrastructure, such as access points or base stations. So, they have a similar limitation to wireline networks, although not as severe. Most wireless infrastructure-based networks are established by a one hop radio connection, which is an intermediate connection within a string of connections linking two network devices in a network, to a wired network. On the other hand, mobile ad-hoc networks are decentralized networks that develop through self- organization, in which multi-hop communication is normal [76]. A wireless network is basically the same as a Local Area Network (LAN) or a Wide Area Network (WAN) of a wireline network, but there are no wires between hosts and servers. A Wireless LAN (WLAN) is a wireless local area network that links two or more computers or network devices without using wires. This gives users the mobility to move around within a broad coverage area and still be connected to the network. The most common WLAN, IEEE 802.11, covers ranges from hundreds of meters to a few kilometers, depending on antennas [86]. A Wireless Wide Area Network (WWAN) is different from a WLAN because it uses cellular network technologies. These cellular technologies are offered regionally, 2 nationwide, or even globally and are provided by many different wireless service companies. Cellular modems and mobile phones are good examples of this technology. Wireless cellular systems have been in use since the 1980s. Wireless systems operate with the aid of a centralized supporting structure such as an access point. These access points assist the wireless users to keep connected with the wireless system when they roam from one place to the other [6]. Mobile Ad-hoc Networks (MANET) have been developed from the wireless cellular system to overcome the limitation for use in an environment that does not have readily available infrastructure [18]. There are different types of agents which can be classified depending on the agent?s abilities into static or mobile, reactionary or not; work alone or with other agents, autonomous or not,. A MANET is an autonomous collection of mobile nodes, users and agents forming a dynamic wireless network. Autonomous agents can independently respond to events, network state changes, and move to other locations and adjust their behavior accordingly to accomplish goals [8]. So, agents can work more intelligently when they are well informed about a network state and its users. Autonomous mobile agents in a military MANET placed in an unknown terrain is challenging under the following conditions of military applications [85]: 1) Dramatic change of geographical area (mission area) over time since dynamic nature of tasks, 2) Network nodes may be decreased by hostile attacks or malfunctions, 3) Isolation of network nodes, and 4) Intermittent communication due to a hostile environment 3 Mobile ad-hoc networks operate without any fixed infrastructure and offer quick and easy network deployment in situations where infrastructure is not possible [6]. In these networks, nodes typically cooperate with each other by forwarding packets for nodes which are not within the direct communication range of the source node. A MANET provides a practical way to rapidly build a decentralized communication network in an area where there is no existing infrastructure or where temporary connectivity is needed, e.g. emergency situations, disaster relief scenarios, and military applications. The distribution/routing technique used depends on multi-hop protocols in order to deliver messages between nodes connected to the network [65, 84, 96]. Nodes in a mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. The path between each pair of users may have multiple links and the radio between them can be heterogeneous if the network devices have different configurations. This allows an association of various links to be a part of the same network. Mobile ad-hoc networks can operate in a standalone fashion or be connected to a larger network such as the Internet. Mobile ad-hoc networks can turn the dream of getting connected "anywhere and at any time" into reality [6]. Historically, mobile ad-hoc networks have primarily been used for tactical network related applications to improve battlefield communications/survivability and rescue operation in disaster sites. In cases where group members have specific tasks to accomplish, group communication and synchronization are required. In military situations, for example, the members of a group of users have different targets. Thus, communication among group elements is an important issue and must be maintained for as long as possible [65]. MANET is a wireless network that continually re-organizes itself in response to environmental changes without using any 4 infrastructure. In order to accomplish assigned missions for a group like a military force or a rescue team, MANETs continuously communicate, collaborate, and interact among members in the network. MANET is a key enabler for achieving the goals of Network-Centric Warfare (NCW) [69] that represent modern warfare trends. Advanced technology in combat can provide the right information at the right place and time, and shorten the ?kill chain? (targeting cycle consisting of detecting a target, attacking it and assessing the result of the attack) by combining the several tactical levels of MANETs into a large strategic level of MANET. An example of this would be the U.S. armed forces? Global Information Grid (GIG) [27]. The ability to make more informed decisions faster is a central theme in the network centric warfare concept, since the key element for victory in modern warfare depends on the capability to deal with information related to the situation at hand [93]. The major challenges of MANET are to provide wireless, high-capability, secure, and networked connectivity. Compared with wired links and infrastructure based networks providing stable service, MANET capability is restrictive and has the potential for intermittent connectivity failure. So, participants must communicate using limited bandwidth through wireless links [82]. Military operations are usually performed in highly deteriorated and varied conditions due to natural and artificial obstacles. The effort for maintaining robust communication in a network or among networks in these military environments is an essential element. In fact, a network is the most important weapon for modern military operations. The information superiority based on a network will enable agile deployment of a lighter, leaner, more lethal combat enterprise that overwhelms any potential adversary before it responds [69]. In order to 5 meet the above practical needs, the performance of MANETs should be evaluated accurately under more realistic environments for before deployment. We will focus on developing a more realistic and robust military MANET model in this study. The needs and problems encountered in developing a realistic military MANET model are related to simulating its operation environment as follows: First, the representation of enemy effects in a military MANET operation is an indispensible factor for accurate evaluation before commissioning it into an actual tactical operation. However, hostile effects of enemies in the military MANET operation have not been fully studied in the literature, as far as we know. The enemies in the operation area attack the MANET nodes electrically or physically. Most research has focused only on electrical attack limiting the communication capability of MANET nodes [15, 50]. The transmission range of MANET nodes in a tactical battlefield fluctuate by an electrical attack (such as jamming), and transmission of radio signals by enemy forces to disrupt communications among MANET nodes, or the nodes could be destroyed by a physical attack. Also, the quality of wireless channels in the real world is variable due to a variety of propagation phenomenon based on the surrounding conditions, such as multipath resulting in radio signals reaching the destination node by two or more paths, atmospheric effects like fading and reflection, and obstacles [40]. As a result, the transmission range of network nodes cannot be constant, but varies depending on the surrounding conditions. So, implementing these characteristics to military MANET modeling is necessary to represent a realistic operational environment, which will help evaluate network performance more accurately. Second, military MANETs have different operation objectives and functional characteristics from commercial ones. Maximizing connectivity between nodes in the mobile 6 wireless network is an important and common performance measure for MANETs. However, military MANETs, unlike commercial ones, may often pursue other objectives. The accomplishment of a given mission could be more important than other performance measures. Also, military MANET nodes need to be specified in terms of functions within the military unit structure. User (client node) and agent (service node) is a common classification for commercial networks. The military MANET may not be represented by this simple classification. Third, the military MANET is required to be more efficient for longer operation since it tends to be operated with limited resources. Situation awareness established by robust networking is an effective weapon for the forces and commanders in waging war in a tactical operation area. This dramatically increases combat power [46]. However, because of the dynamic and unpredictable nature of military combat operations, it may be impossible to maintain full connection continuously. Especially, inefficient use of the network may shorten the operation time since battery capacity is limited. Sometimes, this situation forces military commanders to think about how to operate limited resources to maximize their networking capability. Finally, MANET nodes? mobility in wireless networks should also be examined as a major consideration since it plays a key role in the performance evaluation of MANET [68]. The main role of a mobility model is to emulate the movement behavior of actual users in a network. There are many mobility models proposed in the literature such as random walk, random waypoint, group mobility, and reference point group mobility [5, 13, 58, 83, 87]. These models vary widely in their movement characteristics. Among those, the random waypoint model has generally been used as the default mobility model in many network simulations regardless of application since it describes the movement pattern of independent nodes by simple terms. 7 However, some military operations show different movement patterns from the random waypoint, in which the users? movement may be directed or coherent by operation purposes instead of moving randomly and independently. Zhou et al. (2004) suggest that users? mobility patterns in military scenarios may not be independent, but are related to one another. In other words, the mobility of nodes in a military network is much more coherent and directed than in civilian applications. One typical example is group mobility. In battlefields, nodes with the same mission usually move in groups such as swarms or tank battalions [109]. Consequently, the mobility pattern in military operation depends on the mission. Therefore, the mobility of a military MANET should represent the movement characteristics of a given mission. The issues above are necessary for realistic representation of military MANET to test the effective operation of military MANETs under varied challenging conditions. In this thesis, a military MANET model which can deal with these issues is devised. 1.2 Research objectives The primary objective of this dissertation is to develop a solvable realistic military MANET with autonomous agents under more realistic environments including employed enemy obstacles, and to develop a heuristic algorithm using Particle Swarm Optimization (PSO) to solve the model. The developed heuristic optimizer is expected to deploy the autonomous agents to the best locations at each time step based on given information such as MANET nodes? and obstacles? locations. MANET nodes have limited velocity and transmission ranges and user nodes are especially free to move around the tactical operation area. The decision variables which define the optimal solution are the agents? directions and magnitudes of motion. In order 8 to accomplish these objectives, the focus of the research has centered on the following detailed objectives: To begin with, for a realistic military MANET model, we will implement three realistic considerations as follows: First, the military network nodes are categorized to describe the different units under a command node in the military operation. Most MANET routing studies in the literature use two types of network node: user and agent. But in this study these are four types of network node: user, priority, agent, and control. Each node has a different responsibility and characteristic in the network. The control node is responsible for controlling the network nodes and also performs as an agent. An agent node is only responsible for supporting network connections. The priority node is basically the same type of node as the user. The difference between a user node and a priority node is the preference to be connected to the control node due to any urgent or crucial operation situation. That is, if a user node faces a situational event such as positioning in a dangerous location, fighting against enemies, and obtaining important operational information needed to be reported or broadcasted through the network immediately, it would be designated as a priority node. The priority node is converted to a user node when it gets out of the situational event. Second, enemy obstacles constraining network nodes? capability electrically or physically are included. The network nodes? communication capabilities are degraded or destroyed by the enemy?s hostile activities, such as electrical or physical attacks. These effects are modeled using the distance between a network node and enemies and the combat power of each node. The insertion of enemies to an operation environment will help increase the realism of the MANET model. 9 Third, a messenger option is implemented. The messenger is not a new resource, but an agent which has a temporary mission to search for disconnected users. During operation, users could be disconnected from the network. The agent node closest to the lost contact point is designated as a messenger searching for the disconnected user for an allowed time. This allowed time depends on the network state. That is, if there is extra capability of agents for the search, messenger operation time would be increased, otherwise it would be shorten by the capacity available. The main purpose of messenger implementation is to increase the performance of military MANETs. Sometimes, messenger agents are expected to improve network performance by reconnecting the disconnected users from the network. Fourth, based on the realistic environment constructed above for a better military MANET evaluation, a heuristic algorithm is developed to find the efficient network paths in terms of military perspective by using proper network performance metrics such as hop-count, bandwidth, and a newly defined metric, Pre-deployed Agent Level (PAL). Routing by the minimum hop route has been used for a long time in wireless networks. The strong points of this method are simplicity and lower consumption of network resources than the shortest-distance path [80]. Minimum hop based routing is one of the popular methods in mobile ad-hoc networks and is suitable for the military MANETs. However, minimum hop routing does not take into account the link quality and stability [24]. So, it sometimes lacks response to network changes. We employ an important metric, PAL, to make up for this weakness. The hop-count based algorithm may not respond quickly to network changes as mentioned above since it uses the hop as its primary network performance metric. It does not consider the pre-deployment of agent nodes to the proper locations to prepare for abrupt needs. That is, a link between network nodes may be broken if it is not properly supported by agent nodes. The disconnection of the link 10 between users is more frequent quicker than other links due to users? free movement. Also, an agent node cannot immediately be deployed anywhere it is needed because of its velocity limitation. Consequently, hop-count alone may worsen network performance. So, PAL is developed and used in this study to deal with this problem. Finally, in addition to the mechanisms proposed above to represent actual movement of specific military operation scenarios, two other mobility models are used. This expands our study beyond the random waypoint model which has been used as the default user mobility model in MANET research. The experiments in this study are divided into two parts, the verification of proposed mechanisms effect and a cost benefit analysis. The three important mechanisms, PAL, messenger, and priority node, developed and for better network performance and representation of military MANETs are first assessed using different mobility models and scenarios without the physical destruction of network resources by combat. Then, a cost benefit analysis for computing the most efficient number of agents for a given operational scenario is performed, in which the physical destruction effect is included. 1.3 Dissertation overview Chapter 2 reviews previous studies and knowledge related to military mobile ad-hoc networks and particle swarm optimization. Chapter 3 discusses network-centric warfare (NCW) to increase understanding of new war paradigm. The key concept of modern warfare is NCW, and the mobile ad-hoc network as a tactical battlefield network is a basic component to enable NCW. Chapters 4 and 5 present the military MANET developed for this study. Chapter 4 11 12 describes problems in a military operation environment and the mathematical models representing them and the detailed model description is shown in Chapter 5. In Chapter 6, experiments are described and simulation results are provided with detailed analysis. Chapter 7 presents a brief conclusion along with some suggestions for further study. Chapter 2 Literature review 2.1 MANET performance A wireless ad-hoc network allows network nodes to communicate with each other over a common wireless channel without support from a fixed infrastructure. The basic parameter for the MANET performance measure is the link, also called the arc, between nodes in a network. Regardless of what type of routing protocol is used, the first and most important requirement for communication between the nodes in a network is to have at least one path linking them. Network nodes can directly talk to other network nodes if they are within their communication range, but in many cases in order to talk with a specific node they are required to communicate through other network nodes within transmission range. The transmission range of network devices in a network is affected by factors such as transmission power of the devices and environmental conditions. In particular, military MANETs may operate under vulnerable environmental conditions, in which network nodes? capabilities may be limited. Especially, the enemy?s hostile activities in a battlefield can seriously affect network communications. So, under these dynamic environments, the connectivity may not be guaranteed at all times for network nodes that are moving around the operation area continuously. In order to maintain the connectivity between the nodes exceeding their communication capability we can add more relay nodes into the network. However, by simply doing this we may not improve the MANET performance as expected, since additional nodes may cause a traffic burden to the network. As an alternative, we can extend the transmission range by increasing the 13 signal strength but this may cause increased interference among the nodes. Consequently, the capacity of MANET may be decreased by the mutual interference of concurrent transmissions among network nodes. Grossglauser and Tse [36] propose a communication model to improve the capacity of an ad-hoc network under various conditions affecting the MANET performance, with which a number of relay nodes are used to relay data and the data is relayed only when the relay node is closer to the destination, within a two-hop path. The drawback of this proposal is that the applications need to be delay tolerant because the communication is delayed until the mobile relay nodes are close to the destination nodes. This causes large delays when the size of the system is increased. Therefore, it is unsuitable for real time applications such as voice communications or remote control. A fundamental characteristic of mobile wireless networks is the time variation of the channel strength of the underlying communication links. Such time variation is due to multipath fading, path loss via distance attenuation, shadowing by obstacles, and interference from other users. By considering such variations, a variety of properties have been proposed to evaluate a routing protocol. The metrics are usually divided into two groups: qualitative and quantitative. These property metrics used for evaluation of protocols should be independent from the routing protocols and represent the properties of given protocols [60]. Distributed operation, demand- based/proactive operation, security, bidirectional/unidirectional routing and sleep period operation are categorized into the qualitative property group. In particular, sleep period operation is required to avoid detection/jamming by an enemy. During the sleeping period, transmitting and/or receiving are stopped. On the other hand, for quantitative property, data throughput and delay, routing acquisition time and efficiency are considered. Data throughput and delay are 14 usually used for measuring network performance. Routing acquisition time indicates the time required to establish a route in a network. MANET?s performance should be measured using proper performance metrics based on properties due to the dynamic nature of mobile ad-hoc networks. In this research, the number of connected user nodes to the control node and the network bandwidth are the primary metrics are used to evaluate network performance. This research will focus on developing a method to model and optimize military MANETs under vulnerable situations, such as enemies in the operation area. Some different routing algorithms which evaluate network performance based on the network connectivity have been described in the literature [1, 3, 28, 41, 47, 55, 75, 76, 79, 101]. The MANET performance of a military MANET in this study is evaluated in a vulnerable environment added by hostile forces? jamming and physical attacks. It is not well known how well MANET can perform in a vulnerable environment. Jamming can be as simple as sending out a strong noise signal in order to prevent data packets in the network from being received. Hostile effects in military MANET operations are important considerations for planning and efficient use of limited resources since hostile action may seriously affect MANET performance. Providing efficient networking services in military MANETs is also very challenging in presence of mobility of users, unpredictable radio channel due to surrounding conditions and interference among network nodes. Karhima et al. (1996) address the vulnerability of 802.11b (a set of IEEE standards that govern wireless networking transmission methods) based MANET to intentional jamming by Unattended Jammer (UAJ) and Unmanned Aerial Vehicle (UAV). These jammers use higher transmit powers than MANET nodes to obstruct the connectivity. In this research, the jammers 15 are fixed at locations through the simulation time span and have abilities to attack the MANET nodes based on the predefined combat power. 2.2 Network connection A graph G = G (V, E) consists of a set of nodes (vertices) and a set of edges (links, arcs). Graph theory is the study of graphs of mathematical structures that are used to model pair wise relations between objects from a certain collection in mathematics and computer science [34]. The set of nodes, denoted by V = {v 1 , ..., v n }, represents the ad-hoc network devices; and the set of edges, denoted by E = {e 1 , ..., e m }, represents the wireless communication links between nodes. Wireless multi-hop networks are generally modeled as communication graphs. In a wireless multi-hop network, each node has a certain transmission range, and is able to send messages to other nodes within its own transmission range. A wireless network can be viewed as a communication graph, where the existence of each edge is decided by the transmission range of related nodes. Therefore, the connectivity of a network depends on the transmission ranges of all nodes. So, two nodes are able to communicate directly via a wireless link if they are within the range of each other. In terms of communication networks, all nodes of a connected network can communicate with each other over one hop or multiple hops, whereas in a disconnected network we may have several isolated sub networks which cannot communicate with one another. Connectivity is a function of the number and locations of the nodes and wireless transmission range [6]. 16 2.3 MANET performance metrics Mobile networks have employed a variety of routing strategies to improve their performance under given environmental and operational conditions. The process of selecting a path among possible ones between two end users in a network depends on the variable link state over time. The link state can be expressed by costs or quality parameters that are computed based on many common types of network performance metrics such as hop-count, bandwidth, propagation delay and jitter [61, 72]. Furthermore, in many cases, the combined use of the metrics can improve the network performance as well as reduce the computation complexity. Various combinations of metrics are possible according to the application. The combination of hop-count and bandwidth is one of the most popular ones in the literature. However, the metrics should be able to represent the network properties of the system under consideration and be practical. Some metrics, such as delay and jitter, are not preferable due to their difficult computation. So, the metrics for a network must be combined together carefully by considering the complexity of computing paths based on them and the quality requirements of network flows [80]. In the long run, network routing can be chosen using either a single metric or a combination of metrics. To help the computation of combined metrics, the sequential filtering method has been utilized in many studies [80, 48, 49]. With the sequential filtering method, the metrics are divided into primary and secondary ones. Paths are computed first based on the primary metrics. Many routes are eliminated from the candidate set by the primary metrics. The candidate set of possible routes will be narrowed down using secondary metrics until a single path is found. The number of steps of the sequential filtering could be different with each application. 17 2.3.1 Hop-count Mobile nodes in a wireless network are operating on a battery supply. So, mobile nodes naturally have strong power constraints and network life depends on the efficient use of this resource. In the real world, the number of relay nodes tends to be small. Therefore wireless communications share this limited number of relay nodes. Thus, each additional transmission causes the relay device to be busy for the length of the transmission and use beyond capacity prevents other nodes from transmitting. Therefore, unnecessary transmission should be minimized since additional hops or communications increase the delay of transporting the data packet due to the additional buffering, contention for resources, and transmission time required. Furthermore, efficient resource management can result in additional benefits other than reducing power consumption. For example, under a combat situation the least amount of transmission power minimizes the probability of detection or interception by enemy forces. As a result, a MANET routing protocol should be power efficient [39]. The hop-count is the number of hops separating a source node from its destination along the minimum path [97]. That is to say, it is the number of links passed by a packet between a source and a destination node. The hop-count based routing approach is one of the popular routing protocols for efficient use of the network. Most MANET protocols try to minimize the hop-count of the selected route. This is important in multi-hop wireless networks. For example, if a link between two nodes in a network requires at least 6 Mb/s bandwidth for delivering a data packet the more number of links on a selected shortest path, the more additional cost in terms of total amount of network resources consumed [37]. Under the situation of limited resources and battery efficiency issues, the hop-count based approach could be more effective than alternatives since it minimizes resource consumption. 18 However, the major drawback of this approach is potentially uneven network traffic. In addition, link quality may vary during the lifetime of a network because of the distance between the network nodes, transmitting power, antenna shape and orientation, radio interference, and environmental conditions. The links may be asymmetric by such variation. For instance, connectivity may change even under nodes at fixed locations and configured with the same transmission power. Connectivity could be affected by surrounding conditions other than location and transmission power factors. Due to these drawbacks, link quality based routing methods (e.g. QoS) have been considered and used [96]. The nodes in a MANET change location over time because of the dynamic nature. This mobility of MANET nodes may break the connection between nodes and lead to failure of the communication between them. Therefore, the consideration of link quality and stability in the context of link connection is as important as the selection of the shortest path. In the following section we will discuss this issue. 2.3.2 Link quality (Bandwidth) As a network performance parameter, quality represents the state of a link by using metrics such as bandwidth, delay, etc. In this respect quality based routing is a method for traffic flow to meet quality requirements. The main purposes of this approach are to select routes satisfying a particular quality requirement and to provide efficient utilization of the network. There are three popular quality based routing algorithms based on the hop-count and bandwidth, which are Shortest-Widest Path (SWP), Widest-Shortest Path (WSP) and Shortest-Distance Path (SDP). WSP and SWP are relatively simple routing approaches [74]. 19 WSP first considers the minimum hop-count as a primary metric, but if there is more than one such path it uses bandwidth to break the tie. That is, the shortest path which has maximum bandwidth will be chosen. Conversely, SWP chooses a path with maximum bandwidth as a primary metric, and then consider the minimum hop-count as a secondary metric. Preferring the shorter path (such as WSP) will minimize the consumption of network resources, while preferring the widest path (such as SWP) will balance network load as well as maximize the chance to meet the required bandwidth in case of inaccurate network state information [72]. Here, the bandwidth of a path indicates the minimum available bandwidth along the path. For example, if there is a path consisting of three links and each link?s bandwidth is 10, 8 and 5 Mb/s, this path?s bandwidth will be 5 Mb/s. SDP can dynamically balance the effect of hop-count and path load using a distance function. However, resource consumption and load distribution conflict with each other and both objectives in network operation cannot be accomplished at the same time. So, we should pick the one most suitable for a given situation, condition or operational objective [37]. 2.3.3 Link stability Link stability refers to the ability of a link to survive for a certain time period. In this respect link stability based routing is unique to wireless networks. The stability of a link has a direct relationship to the distance and signal strength between two nodes. That is, it depends on how long the two nodes remain within each other?s communication range or signal strength is above a threshold. Sridhar et al. (2005) propose an algorithm called Stability and Hop-count based algorithm for Route Computing (SHARC) that uses hop-count and residual lifetime of the link as 20 performance metrics. SHARC uses the shortest path algorithm by hop-count as the initial filter to narrow down route selections and then uses path stability by residual lifetime, a less robust indication, to choose the best route from among the available routes. Here, link stability is represented by the residual lifetime computed based on link age. The residual lifetime can be computed by the following equation [96]: alilR aiai iia ??= ?? >> )/)(( (2?1) Where: Ra: the average residual link lifetime when the current link age is a i: the link duration in seconds li: the number of links with link duration in seconds Link stability can be much more important in military MANETs in combat situations than in commercial networks since combat operations require a robust network connection to respond quickly and to maintain operational continuity. Because of these military aspects, some user nodes need to be supported with a higher priority than others even though it may sacrifice network performance. So, we designate priority nodes in this study. We will discuss this in more detail in Chapter 4. In order to make a more efficient algorithm for maximizing network performance it is important to decide on proper metrics for network characteristics which are correspond to the surrounding conditions and operational properties. This will enable the routing algorithm to find the most available path efficiently and in a less expensive manner. Although a great variety of routing approaches have been employed, many previous studies have shown that algorithms with 21 a strong preference for minimum-hop routes almost always outperform algorithms that do not consider path length. The WSP is a good example. The shortest-path routing is particularly attractive in a large, distributed network, since path length is a relatively stable metric, compared with dynamic measurements of link delay or loss rate. The completeness of the specified missions is usually the primary goal in military operations. So, network performance could be sacrificed under certain circumstances to accomplish a given mission. Successful mission performance under the modern warfare paradigm could be enhanced by maintaining a tight communication network for real time information exchange. That is, link connections in the networks should be able to be guaranteed. Hop-count, quality and stability are the most common considerations for network algorithms. For a better solution we have to combine those factors properly using the strong point of each factor [96]. 2.4 MANET routing Routing is the mechanism of directing data packet flow from the source to the destination [26] and is very crucial in the MANET, because changes in network topology and other states occur frequently and continuously. One common and traditional way of achieving routes in mobile Ad-hoc routing is to consider each host as a router [12]. Ad-hoc mobile routing protocols can usually be categorized into three types: Table driven proactive, On-demand-driven reactive/Source initiated, and Hybrid protocols. 22 2.4.1 Table-driven routing (Proactive) Table-driven routing is a proactive protocol. The most distinguishing characteristic of this routing is to continuously search for routing information within a network to keep routing tables available anytime they are needed, so it is called table-driven routing [28]. These routing protocols react to any change in the topology even if no traffic is affected by the change, and they require periodic control messages to maintain routes to every node in the network. The rate at which these control messages are sent must reflect the dynamics of the network in order to maintain valid routes. Thus, the maintenance of the routing tables requires significant bandwidth [17]. Representatives of this protocol category are briefly listed below. ? Destination-Sequenced Distance Vector Routing (DSDV): each node maintains a list of all destinations and number of hops to each destination [74]. ? Clustered Gateway Switch Routing Protocol (CGSR): each node maintains a cluster member and a routing table [16]. ? Wireless Routing Protocol (WRP): each node maintains four tables; distance, routing, link cost and message retransmission list [62]. 2.4.2 On Demand-driven routing (Reactive) As an alternative to proactive routing, On Demand-driven routing was introduced, which constructs paths when they are explicitly needed to route packets. This prevents the nodes from updating every possible route in the network, and instead allows them to focus either on routes that are being used, or on routes that are in the process of being set up. The best routing can be found based on the available information about link state at the moment. In other words the routing decision depends much on the current information. Link 23 state information can be propagated by two ways, periodic and responding to a significant change in the link state metric. For example, the amount of change required for triggering an update could be decided by the user and any link advertises its available bandwidth metric whenever it changes by more than the set amount since the previous update message. However, network performance could be affected by the frequency of propagating updated information. That is, frequent messaging of the information may cause too much network overhead, which may make an accurate routing decision not worth the expensive costs. So, a careful understanding of the trade-off between network overheads and an accurate routing decision should be required for adjusting the frequency of the link state update message [56, 90]. The proactive approach depletes too many resources by updating. If the update interval is too long, the network will simply contain a large amount of stale routes in the nodes, which results in a significant loss of packets. In every test case these reactive routing algorithms outperformed the proactive algorithms in terms of throughput and delay [17, 25]. Moreover, the reactive protocol is more realistic than the proactive way, considering limited resources available in the real world. ? Ad-hoc-On Demand Distance Vector (AODV): This routing protocol builds on the DSDV algorithm but improves it by minimizing the number of required broadcasts by creating routes on an on-demand basis, as opposed to maintaining a complete list of routes [76]. ? Dynamic Source Routing (DSR): DSR is a routing protocol for wireless mesh networks and is similar to AODV. However, DSR uses source routing instead of relying on the routing table at each intermediate device [47]. 24 ? Signal Stability Routing (SSR): SSR selects the route based on signal strength and stability. A path that has stronger power and longer duration is chosen as the best route [1, 12]. 2.4.3 Hybrid Hybrid protocols try to combine proactive and reactive protocols. Zone Routing Protocol (ZRP) is a good example of a hybrid protocol, which divides the topology into zones and seeks to utilize different routing protocols within and between the zones based on the weaknesses and strengths of these protocols. Any routing protocol can be used within and between zones since ZRP is modular [70, 71]. As discussed before, common classification of routing protocols is to divide them into proactive, reactive and hybrid routing. However, in [96] the authors classify routing protocols into hop-count based, QoS (e.g. bandwidth) based, and stability (or availability) based. Each of these classes of routing protocols can be either proactive or reactive [7]. 2.5 Mobility The introduction of relatively low-cost mobile computing devices is having a profound impact on everyday life. Commerce and family life are both affected by the ability to remain connected to other people and to exchange an ever increasing amount of information [88, 93]. The continuous improvement of mobile computing devices will extend the service range of mobile wireless networks and enable users? more dynamic movements. In a MANET we assume that nodes are free to move. The network topology and wireless link status are changed due to the mobility of nodes. 25 Many different measures of mobility for evaluating mobile ad-hoc network performance have been proposed, since a mobility model is imperative to evaluate a routing protocol of MANET using simulation [38, 93]. The most important characteristic of a mobility model is the degree of realism with respect to the movement of users, because more realistic models enable more accurate simulation and evaluation of network parameters. There are two broad categories of mobility models, trace-driven models and synthetic models. Trace-driven models use recorded histories of real users? traces. However, movement traces are unavailable in ad-hoc networks due to their decentralized nature. Therefore, we have to employ mobility models that determine the movement patterns of mobility nodes synthetically. These models supply the movement behaviors of mobile users using particular constraints or mathematical equations [68]. Other researchers [54] classify mobility models into stochastic and event-based group. They state that regardless of the selection of a mobility model, being able to measure the amount of mobility is as important as the realism of the model itself. To achieve the greatest realism, mobility modeling must take into consideration three essential factors [97], which are spatial environments, user travel decisions and user movement dynamics. Moreover, a mobility model must address both regular and random components of a user?s movement. Signaling cost for maintenance of routes for a MANET is proportional to the rate of link changes and can be expressed as a function of the mobility of the nodes. Therefore, the performance of a MANET is closely related with the efficiency of the routing protocol in adapting to changes to the network topology and the link status. For assessing different routing protocols for MANETs, it is important to use mobility model with some index or quantitative measure that is relevant to the performance of the network [11, 76, 107]. 26 Many authors have used different measures of mobility in their research. In [13, 93] the average speed of the nodes is used to represent their mobility, while the maximum speed is used in [39, 107]. The problem with using average or maximum speed as a measure of mobility is that the relative motion between the nodes is not reflected. Also, the same average or maximum speed in different mobility models or in networks with different physical dimensions often results from different rates of route changes [54]. Some researchers [39, 56] propose a remoteness function as a mobility measure for MANET. The remoteness is generally defined by the distance between two nodes, i and j simply. ))(()( tdFtR ijij = (2?2) However, a more sophisticated definition is more useful for MANETs. For example, if a wireless node has R communication range and is located at a 3R distance, it can be considered as remote as a node located at a 10R distance. Similarly, if a node is well within communication range R, the node would not seem very remote even if the distance were doubled. The remoteness is changeable as the movement of the node may change the wireless link status with the node. Based on these observations, they present requirements that F satisfies: .0 )()( )( 0 )( lim )( 0 )( )( 0 0 )( )( 1)(lim ,0)0( )( 0 ?? = = ?? == = ?? = ?? xallfor dx xdF dx xdF e dx xdF d dx xdF c xallfor dx xdF b xFFa Rx x x x (2?3) 27 Requirement (a) normalizes F to have unity maximum value and Requirement (b) guarantees that the remoteness is a monotonically increasing function of distance, and as a result 0 ? F ? 1 from (a). Requirements (c) and (d) describe the boundary condition of F, which guarantee that the remoteness of a node at extreme locations does not change with the movement of the node. Finally, the remoteness is the most sensitive to the movement of the node by Requirement (e). The signal strength of a node in this study is described by the distance it can communicate with other node in the network. So, the remoteness of a node can be measured by its Euclidian distance to other nodes. Using this, our heuristic optimizer responds to links at the edge of a communication range. Ishibashi and Boutaba [39] represent the relationship between mobility and MANET topology, where average link lifetimes exponentially decrease with increasing maximum velocity. Chu and Nikolaidis [19] analyze the relationship between mobility and connectivity, where the higher the velocities, the better the connectivity. Although it seems contradictory at first glance, basically it represents the same thing from a different perspective. The lifetime of a link has been described with three different definitions. First, the lifetime of a link is the time from when the nodes first move into each other?s range so the link can be formed until the link is broken when they move out of communication range. However, it does not mean actual time that the link is available for use since it has to be detected by a node first to be used. This is true for breakage of the link. The second definition is the perceived link lifetime, which represents the elapsed time from the first detection to the link breakage detection. This usually extends beyond the end of the existence of a usable link. As a final definition they propose the time the link is first included in a path by the routing protocol. A failure not due to a network device but the nodes moving out of transmission range has the expected time to failure equal to half of the perceived link lifetime. 28 Military MANET is usually much more coherent and directed when it is compared with commercial ad-hoc networks and nodes will, in general, be more concentrated, rather than dispersed. Typical mobility models (e.g, random waypoint) used in most MANET analyses may not be sufficient for military MANETs [40]. The random waypoint model is an extension of a random walk, in which a user randomly selects a direction and a speed from a distribution within the problem space, and then randomly moves to the destination with the selected speed. When it reaches the destination, it pauses for some time and then this process is repeated again. The movement of one user node in this mobility model is modeled independently from all others [43]. The mobility of a military tactical battlefield network depends on the nature of the assigned mission. Perisa et al. (2007) analyze a military war game exercise and assert that many assumptions of random mobility models from the literature do not hold in military MANETs [73]. Although this is true, a recent survey of MANET simulation studies found that 65.8% of studies used the random waypoint model for mobility [68]. Chlamtac et al. (2005), in [18], present three essential factors for mobility modeling to achieve the greatest realism for military MANETs. There are spatial environments, user travel decisions and user movement dynamics. Moreover, a mobility model must address both the regular and the random components of a user?s movement. For an accurate evaluation of the performance of a protocol, the mobility model must supply a stable movement pattern during the simulation time and attain its steady state for most of the simulation time [68]. In this thesis, two military operation based mobility models and the random waypoint model are used to represent military MANETs. 29 2.6 Particle Swarm Optimization (PSO) Particle Swarm Optimization (PSO) is a population based stochastic optimization tool and this optimization technique is generally used for continuous nonlinear functions. PSO was first introduced by James Kennedy and Russ Eberhart in 1995 [28, 30, 53, 92]. PSO is based on social-psychological principles and includes two important concepts: experience and knowledge [29]. It has roots in artificial life in general, and particularly bird flocking, fish schooling, and swarming theory. It is also related to evolutionary computation, and has ties to both genetic algorithms and evolutionary programming [30, 52]. However, there is no survival of the fittest concept in PSO. In [52] the authors state that "In theory at least, individual members of the school can profit from the discoveries and previous experience of all other members of the school during the search for food. This advantage can become decisive, outweighing the disadvantages of competition for food items, whenever the resource is unpredictably distributed in patches". This statement suggests that social sharing of information among conspeciates offers an evolutionary advantage: this hypothesis was fundamental to the development of particle swarm optimization. 2.6.1 Basic concept PSO is initialized with a group of random particles which are candidate solutions chosen randomly within the problem space. Each particle in the swarm is represented by three component vectors: X, P and V and two fitness values. The vector X represents the current location of the particle in the search space, P records the particle?s best location found so far by the particle and V is the gradient vector that defines the direction and magnitude the particle will travel if not disturbed. V is used to update X every iteration [26]. On the other hand, the two 30 fitness values are the x-fitness and p-fitness. The x-fitness records the fitness of the vector X and the p-fitness records the fitness of the vector P. These particles interact with one another through the communication structure or defined social network. Each particle is evaluated by a fitness function and updated by the best fitness obtained by itself and by the swarm at each time step. Each particle keeps track of its coordinates in the problem space which are associated with its best solution so far. There are three aspects to evaluate solutions as follows: ? A global best that is known to all and immediately updated when a new best position is found by any particle in the swarm. ? A neighborhood best that the particle obtains by communicating with a subset of the swarm (in case of neighbor topology). ? The local best (or particle best), which is the best solution that the particle itself has been forced. After each iteration, the particle updates its velocity and positions as shown in the following equations. As seen below the velocity of particles is updated by one of three different equations in equation (2-4) and then the position is updated based on the velocity. The desire to better control the scope of the problem space motivated researchers to implement an inertia weight (?) or a constriction coefficient (K). The first equation among those represents the standard case that does not use either parameter, whereas the second and third equations are modified by using inertia weight (?) or constriction coefficient (K), respectively. We will discuss these parameters in more detail in the next section. 31 )()( )1(22)1(11)1( ?????? ?+??+= tttt XGrandXPrandVV ?? )()( )1(22)1(11)1( ?????? ?+??+?= tttt XGrandXPrandVV ??? [])()( )1(22)1(11)1( ?????? ?+??+= tttt XGrandXPrandVKV ?? (2?4) VXX tt += ? )1( (2?5) Where, ? Vt: velocity of a agent at time t ? Xt: current location of a agent at time t ? ?: inertia weight ? K: constriction coefficient ? ?1: control parameter representing experience information by itself ? ?2: control parameter representing knowledge information about other agents ? P: local best of an particle ? G: global best of the swarm Each particle modifies its position using its current position, current velocity (Vx, Vy), distance between the current position and particle personal best (P) and distance between the current position and global best (G). Two main steps in the PSO are initialization of swarm particles and fitness evaluation. The pseudo code in the Figure 2-1 shows the basic mechanism of PSO. 32 Initialize swarm particles { X = U (Xmin, Xmax) V = U (Vmin, Vmax) P = X } Do { )()( 2211 XGrandXPrandVV ?+??+= ??? ?? VXX += If (f(X) ? f(P)) then P = X If (f(X) ? f(G)) then G = X } While (Stopping criteria not met) Figure 2-1 PSO basic mechanism Particles have two essential reasoning capabilities: memory of their own best position and knowledge of the global or their neighborhood's best. Members of a swarm communicate good positions to each other and adjust their own velocity and position based on these good positions [103]. As shown in the pseudo code the fitness evaluation of solutions is performed at every time step. The two best locations, P and G, are tracked by the particles while flying through the problem space. 33 Maintaining the G vector relies on a communication scheme within the swarm. As mentioned above, G is the best found in its neighborhood of particles or G is the global best if the swarm employs a global neighborhood. Although different neighborhood topologies have been studied in the literature, global neighborhoods seem to perform better in terms of computational costs [14]. For this reason, in this research, we use a global neighborhood. There are two methods to determine the global best, synchronous and asynchronous. With the synchronous method, the global best location is updated after updating all particles. On the other hand, the asynchronous method determines the global best after each particle has been updated. In terms of number of iterations the asynchronous method finds solutions quicker because it uses a newly found global best location in subsequent particle updates immediately. This advantage usually makes asynchronous updates a better choice for a standard PSO. However, the synchronous method is easier to implement than the asynchronous method since it does not require evaluation of particles one by one. We use the synchronous method in this research. PSO has been successfully applied in many research and application areas and often got better results more quickly than other methods. There are few parameters to adjust and it can be implemented easily and works well in a wide variety of applications with only slight parameter variation. The use of real numbers for decision variables leads it to be one of the most popular global optimizers [14, 52, 110]. Dengiz [26] develop a strategy optimizing the location of autonomous mobile agents in MANETs to maintain network connectivity using PSO. These mobile agents try to maximize network data flow, which is formulated as an all-pair maximum flow problem. 34 Baburaj and Vasudevan [4] propose a new PSO using the On Demand Multicast Routing Protocol (PSO-ODMRP) to improve the performance in routing messages in mobile ad-hoc networks. ODMRP is a mesh?based demand driven multicast protocol, where a mesh consists of a set of nodes, called forwarding nodes, responsible for forwarding data packets between a source and a receiver. PSO-ODMRP is well suited for MANETs that have a constrained power and frequently change topology. Ji et al. (2004) describe how PSO algorithms can be applied to clustering techniques in MANETs. Here, the Weighted Clustering Algorithm (WCA), in which cluster heads are selected based on the weight of each node, is revised to be suitable for dense mobile nodes. A Divided Range PSO, in which particles are divided into groups and each group has four neighborhood nodes, is applied for the revised WCA above. It can assign different weights to and consider a combined effect of the transmission power, mobility and battery power of network nodes. This approach is efficient and effective when the distribution of mobile nodes is dense according to the simulation study [44]. 2.6.2 PSO Parameters As discussed above, particles update themselves with the internal velocity while going through problem space seeking best solutions. Thus, the velocity is the most important factor deciding the search process. Particles? velocities are limited by a maximum velocity. So in case where velocity exceeds the limit, it is reset to the specified maximum velocity [54]. Velocity changes in PSO are due to three parts, social, cognitive and momentum. The balance among these parts determines the balance of the global and local search ability. If all velocities are at the 35 maximum, particles will tend to search the periphery of the problem space. To control this problem PSO has introduced several parameters. Shi and Eberhart [91] have shown that PSO searches wide areas effectively, but usually lacks precision for local search. Their suggestion for solving this issue is to implement an inertia weight (?) in the standard equation that adjusts the velocity correction over time, gradually concentrating the algorithm into a local search, as shown in the following equation. iter iter current ? ? ?= max minmax max ?? ? ? (2?6) Where, ? ?max : initial weight ? ?min : final weight ? iter max : maximum iteration number ? iter current : current iteration number The inertia weight is used to balance global and local search abilities. A large inertia weight facilitates global searches while a small inertia weight facilitates local searches. The introduction of the inertia weight also eliminates the requirement of setting the maximum velocity each time the PSO algorithm is used. There are other strategies to adjust the inertia weight. Eberhart and Shi (2000) describe that a fuzzy inertia weight improved PSO performance. Also, Eberhart and Shi (2001) suggest the adaptation of inertia weight with a random component, rather than time-decreasing [33]. In [77, 108], the authors assert that an increasing inertia weight obtained good PSO performance. 36 Another parameter, called the constriction coefficient, was introduced with the hope that it could ensure a PSO to converge to the optimal solution. Maurice Clerc [22] introduced the constriction factor (K) that improves the control of the velocities, as given by the following equation: ??? 42 2 2 ??? =K , where ? (=? 1 + ? 2 ) > 4 (2?7) The constriction factor approach controls system behavior, and results in convergence of the PSO over time. Unlike other methods, the constriction factor approach ensures the convergence of the search procedures based on mathematical theory. The amplitude of each particle?s oscillation decreases as it focuses on a previous best point. The constriction factor approach can generate higher quality solutions than the conventional PSO approach [32, 67, 76, 91]. The PSO algorithm with a constriction factor can be considered as a special case of the PSO algorithm with inertia weight [22, 23, 31]. With use of an inertia weight or a constriction coefficient, Vmax is no longer necessary for damping the swarm?s dynamic. A PSO with a constriction coefficient is algebraically equivalent to a PSO with an inertia weight. Eberhart and Shi (2000) describe the best approach to use with PSO as a ?rule of thumb? is to implement the constriction factor (K) approach while limiting Vmax (Maximum velocity) to Xmax (Maximum distance), or implement the inertia factor approach while selecting ?, ?1, and ?2. 37 2.6.3 PSO Topology There are static and dynamic versions of topology. The neighbors and neighborhood in a static topology are not changed during a run. However, the neighborhood changes in the dynamic version topology. The most common topologies applied in PSO are global (star) and local (ring) topology [81]. In star topology, each particle flies through the search space with a velocity that is dynamically adjusted according to the particle?s personal best and by the global best by all particles achieved so far. In the ring topology, each particle?s velocity is adjusted according to its personal best and the best performance achieved within its neighborhood. The neighborhood of each particle in the local topology is generally defined as topologically near particles to the particle. The global topology also can be considered as a local topology with each particle?s neighborhood the whole population. The number of particles in the neighborhood set can be expanded or contracted by adding particles that are two positions away, three positions away, etc. If the neighborhood set includes every single particle in the swarm, then the neighborhood is fully-connected, or global. Local topology has the benefit of allowing parallel search, which results in a more thorough search strategy. Thus, it might have improved chances to find better solutions but converges more slowly than the global topology. Figure 2-2 shows an example of both topologies. 38 Local topology (Ring) Global Topology (Star) Figure 2-2 Common topologies in PSO 2.7 Optimization in dynamic environments The military mobile ad-hoc network is very dynamic due to its movement and variables concerning the natural or artificial factors existing in the operation space. Network performance is varied by changes in environment or condition, which should be managed by an optimizer. Change in environment requires re-optimizing the MANET system and a continuous tracking of the changing optimum [9]. Consequently, the optimal solutions are changed over time in the dynamic MANET environment. Uncertainties in optimization are categorized into four classes by Jin and Branke [45]. 1) Time-varying fitness functions: The evolutionary algorithm should be able to continuously track the changing optimum rather than requiring a repeated restart of the optimization process because the fitness function is deterministic at any time point but is dependent on time. The most difficult part here is to reuse information from previous environments to speed up the optimization process after a change. I1 I6 I3 I4 I0 I7 I1 I7 I6 I2 I0 I2 I5 I3 I5 I4 39 2) Noise: Sensory measurement errors or randomized simulations in the fitness evaluation bring about noise. 3) Robustness: A common requirement in evolutionary optimization is that a solution should still work satisfactorily when the design variables change slightly since the design variables are subject to perturbations or changes after the optimal solution has been determined. 4) Fitness approximation: The fitness function can be approximated when the function is very expensive to evaluate, or an analytical fitness function is not available. Military MANET problems are very dynamic. The optimal solution should be recomputed to respond to the dynamic changes. Therefore, our military MANET optimization problem falls into the first class of the category. A MANET continues to face changes of the network topology and state over time due to dynamic factors in the environment such as mobility, various variables and obstacles, etc. The most distinctive and simplest way to respond to the changes is to consider each change as a new optimization problem that has to be solved from scratch. However, it may be inefficient under a limited time frame and not even applicable. So, using information transferred from previous time step helps increase the search speed after a change. There are many different ways to transfer information from the previous search step. A common way is to keep the individual particles in the final population of the previous time step. However, in order to have populations respond properly and find the new optimum easily some special attention should be put on the changes in the environment at each time [10, 26, 45]. 40 Similarly, in this study the best swarm particles? information at current time step is transferred to next time step. The algorithm to solve the problem of optimizing the location for mobile agents should be flexible enough to react to network changes even though useful knowledge can be transferred from previous search step. Some meta-heuristics have been applied to dynamic optimization problems. PSO is one of those. Most meta-heuristics lose their adaptability to changes because of convergence during the run. Thus, a successful meta-heuristic should be able to maintain adaptability by introducing other metrics besides transferring knowledge [45]. If it is not supplemented, the hop-count based approach used in this research may lack adaptability when it is not required to maintain network connectivity at the moment. In other words, agent nodes may be placed at locations distant from the optimal ones near from future. That is, the mobile agents need to be within the proximity of the new optimal locations which need agents for network connection. If not, network cannot respond quickly to changes and network performance will degrade. The maximum available velocity of the agents and other possible constraints limit the search in a MANET. Therefore, the mobile agent optimization problem is appropriate to dynamic environment solution methods because of these intrinsic characteristics. In this research, a PSO with dynamic objective functions is developed to dynamically manage the motion of the mobile agents operated under various environments including some obstacles. This is expected to improve network performance. We will discuss this in more detail in Chapter 4 41 Chapter 3 Understanding Network-Centric Warfare (NCW) Without distinction of field, information has played a key role as a means to improve current status or performance in each field throughout history. The 21 st century is called the ?Information Age? since its usage and importance in all fields, particularly military operations, has greatly increased. It is clear that that we must consider information as the most important means to survive in the competitive world and to assure victory in military combat. There are many limitations for military forces to combat effectively in the past when the communication and information systems were not developed sufficiently. All communications for information sharing or support were done by conventional methods such as express messenger or signal fire, etc. As a result, the geographically dispersed force was weak since it is almost impossible to respond to any operational changes immediately. In [15], the author states that ?one purpose of network-centric warfare is to eliminate the geo-locational constraints by networking the forces using the most advanced technologies available.? With the rapid development of information, communication and other associated technologies, these limitations are being reduced. Today, we can easily see and experience many remarkable changes in our daily life due to technological innovations. Particularly, combat performed by U.S. forces in Iraq and Afghanistan demonstrated the changes in military operations and the trends in modern warfighting. It is time consuming work for a force to defeat an enemy using a poor network system providing only low level and delayed information. In this Chapter, we will figure out the importance of maintaining the individual network for real time information flow in modern military operation and combat. 42 3.1 What is NCW? NCW is a new military theory of war pioneered by the U.S. DoD and is the term used by military personnel to define information-based warfighting. The Office of Force Transformation (OFT) was established in 2001 by the Office of Secretary of Defense to transform U.S. military capabilities. OFT describes that ?NCW represents a powerful set of warfighting concepts and associated military capabilities that allow warfighters to take full advantage of all available information and bring all available assets to bear in a rapid and flexible manner?[64]. McKenna [99] addresses that network-centric warfare is a theory which proposes that the application of the ?Information Age? concepts speed, communications and increased situational awareness through networking improves both the efficiency and effectiveness of military operations. Alberts et al. (2000) describe that NCW is an information superiority-enabled concept of operations that generates increased combat power by networking sensors, platforms, shooters and other military forces within a battle space. The increased combat power is obtained by shared awareness, increased speed of command, higher tempo of operations, greater lethality, increased survivability, and self synchronization [2]. In [66], authors describe the common picture of the combat situation enabled by NCW, which is available for all forces in a tactical network. This common picture can play the critical role of reducing uncertainty. In addition, military forces wherever they are, in air, ground and sea, once they are connected to the network can self-synchronize, or rapidly and effectively respond to combat situations. The ultimate objective of NCW is to combine all forces in a network in order to obtain information superiority and increased combat power over enemy forces. This can be 43 accomplished by employing well developed information and related technologies. Most potential power comes from the proper combination of those available technologies. Walter (1997) describes three concurrent technical revolutions for the technological combination: information, sensor, and weapons technology [100]. The first, information technology, is the most basic one to multiply the military forces? power. Information can be produced using information technologies such as communication devices and various sensors to collect data from a battlefield. Under well developed and combined information technologies, information distribution to forces anywhere in the operation area is possible in real-time. The second technological revolution required for the network centric operations is in sensors. The technology of sensors pursues smaller, cheaper and numerous sensors for real-time surveillance over wide operation areas, so that much good quality data can be collected and provided. The third one is in weapons technology. The weapons revolution is a matter of increasing numbers of precise munitions by reducing costs. These technical revolutions will interact and multiply each other?s impacts and maximize the effects that will change the character of war as we know it. These revolutions and changes in how we think about war have come to be embodied in the idea of network-centric operations. Information was also used in traditional military operations in the past. The application level was comparatively lower than in modern military operations. In [95], the author addresses the difference between traditional military operations and network-centric operations. The traditional operation is performed by a set of steps: assign, plan, generate, and operation, whereas, network-centric operation is conducted based on the continuation concept. That is, between each step in a set of stepped cycle of traditional operations is a period of relative inaction for coordination. Thus, conventional operation cannot keep the continuation between steps. However, 44 the network-centric operation is not required to pause before deciding on further action thanks to the real-time situational awareness developed by networked forces in the tactical space. NCW translates information advantages by a networking force in battle into combat power. It also enables more rapid, effective decision making and more precise power deployment at all levels of warfare and military operations. Consequently, new forms of organizational behavior may be expected under the NCW concept [59, 64]. The tactical environment of battlefields has been getting more complicated and requires fast reaction to environment changes. Under this circumstance, information superiority over an adversary can be achieved by NCW based on well developed information and communication technologies. Information through the network system can effectively be collected and distributed over large geographical areas in near real-time. As a result of effective use of information in military operations, the warfighting paradigm has shifted from mass and platform centricity to information and effective network-centricity. Platform-centric forces lack the ability to leverage the synergies created through a network, while network-centric forces are more adaptive and ready to respond to uncertainty in a very dynamic environment at all levels of warfare and across the range of military operations [15, 64]. In short, the collaboration among networked forces by enabling the free flow of information and quickly providing it to combat units in the battle space increases the forces? power in waging war. NCW is also commonly called network-centric operations (NCO). However, we can specify the relation between them as NCW is the theory, while NCO is the theory put into action. In other words, NCO represents the implementation of NCW. The goal of NCO is to maximize the effectiveness of an operation by effective use of power, which is called Effective Based Operation (EBO). The meaning of effective use of power 45 includes faster, fewer, and lighter weapons, fewer losses, higher accuracy, etc. Commanders can decide faster and provide optimal power in a timely manner and control the deployed forces better with accurate situational information. Consequently, they can go one step ahead of enemy forces and perform combat under more advantageous conditions [64]. EBO is a trend in military operations and is possible only by network-centric operation. In [94], Smith presents that effective-based operations are ?sets of actions directed at shaping the behavior of friends, neutrals, and foes in peace, crisis, and war.? OFT also describes that ?EBO is a methodology for planning, executing, and assessing military operations designed to attain specific effects that achieve desired national security outcomes.? As a result, network-centric operations are really about optimizing combat power for effective use [95]. The real payoff in network-centric operations is minimizing combat by causing the enemy to yield, or forestalling the foes by effective and accurate attacks on the enemy?s critical targets. This efficiency revolves around the ability of network centric forces to perform precise EBO which focus on enemy behavior. Therefore, these operations are psychological rather than physical. That is why the enemy?s decision-making process and ability to take action should be primary targets for attack. U.S. forces experienced and proved the importance of effective-based operations based on information superiority through two recent combats, Operation Enduring Freedom (OEF) in Afghanistan and Operation Iraq Freedom (OIF) in Iraq, as mentioned before. U.S. armed forces were networked better based on the relatively advanced technologies than enemy forces in those conflicts. A well established network provided U.S. forces with shared awareness, supporting forces to be effective and protecting forces from external risks. It eventually enhances their lethality and survivability in those operations. That is, a commander of a well networked force 46 can quickly develop an operational picture, distributing critical information to his own forces, and use power to the maximum effectiveness [64]. The most important change with NCW is precision and real time data distribution through the network. Many advantages for forces operating on the basis of this concept were created. Therefore, military forces waging modern war should be able to adapt to new environments enabled by the network-centric warfare concept. 3.2 Tenets and governing principles for NCW The Office of Force Transformation under the U.S. DoD presents four tenets for NCW [64]: Information sharing based on robust networking, Situational awareness, increased collaboration and self-synchronization, and Mission effectiveness. In addition to these four tenets, the following principles are also proposed in order to guide the application of NCW: 1) Fight first for information superiority: All combat starts from information warfare. Therefore, regardless of conflict or peace time, information superiority should be maintained over the enemy or potential adversary. By using all sources, our information capability should be maximized to reduce our own information needs. Conversely, increasing the enemy?s information needs, reduce his ability to access information and raises his uncertainty. 2) Shared Awareness: All forces within a network should be able to obtain a common understanding and situational awareness. To do so, all information users are responsible for posting correct information without delay as suppliers. 3) Rapid decision, command, and effective operation: Make faster decisions and commands, and enhance the capabilities for effective operation on the basis of information superiority. Information superiority assured by shared awareness eliminates procedural boundaries 47 between services and within processes. It eventually enables the lowest organizational levels to be able to conduct joint operations and to achieve rapid and decisive effects. 4) Self-Synchronization: Adapt rapidly to changes in the battlefield without performing the slow functional steps from the traditional military operations. It eventually increases the operational tempo by improving the subordinate level of the commander?s common understanding about the operational situation. 5) Dispersed forces and demassification: Move combat power from the linear battles pace to non-contiguous operations, and also move from mass centricity to information centricity for effectiveness. That is to say, modern combat is conducted simultaneously in many locations and maximize the effect with minimum power use. 6) Deep sensor reach: Detect high quality and valuable information on items or enemy forces of interest to achieve decisive effects. 7) Alter initial conditions at higher rates of change: Change operation conditions at a high rate by using information advantage. It confuses the enemy and forces it to redo all operation decisions and plans. As a result, the operation speed of enemy forces is delayed. 3.3 Domains of conflict in NCW The office of Force Transformation developed a construct for NCW in which four domains are recognized, as follows: 1) Physical domain As a traditional domain of warfare, there are four different environments in the physical domain, which are the land, sea, air and space. That is, the physical platforms and 48 communication networks that connect military forces reside in one of the environments of physical domain. 2) Information Information collected, manipulated and shared by networked forces, the commander?s intent and command and control of military forces belong to this domain. 3) Cognitive There are many abstract, invisible and intangible components in a military operation such as: leadership, training and experience level, fighting spirit, cohesion, and the commander?s intent, doctrine, tactics, techniques and procedures. Although these are spiritual components, they directly affect combat. That is, the victory or defeat is decided by the cognitive level of a military force. The cognitive domain consists of the mind of warfighters. 4) Social The necessary human elements for NCW belong to this domain. In this social domain, humans interact to exchange information, get situational understanding, and make collaborative decisions. A commander?s intent and will is conveyed to the subordinate forces. 49 Figure 3-1 Domain of conflict [65] The information and cognitive domains intersect to form shared awareness and the commander?s intent is conveyed at this intersection. Speed and access at the intersection between the physical domain and the information domain enable a precision force which is very important to the conduct of successful joint operations. The intersection between the physical and the cognitive domain enables compressed operations. As shown in the figure all four domains intersect to form NCW at the very center. In the past most innovations that created significant warfighting advantages were concentrated on the physical domain, and were translated into the tactical level of advantages. Even though those ideas were considered as platform-centric warfare, there were also many innovations focusing on information advantages. Today, with the development of communication and information technologies, the military warfighting paradigm is shifting from platform-centric 50 to network-centric warfare. The implementation of NCW brings about information advantages in military warfighting. The common tactical picture created by the combination of advanced technologies and networking reduces the uncertainty about the operational situation. As a result, successful employment of information under the new war paradigm increases combat power. We will discuss more about this in the next section. 3.4 Information warfare The physical strength and skills of the players in a sports team decide the game. For example a quarterback?s fast and precise passing skill in a football team and a boxer?s agility and punch power may directly affect the result of the match. Similarly, the advanced weapon system of a military force which has long range and strong power is one of the most important components to assure victory in combat. However, this physical level of power strength cannot guarantee that they will always defeat their adversary. Actually, we have known some historical warfare in which powerful force is defeated by a weaker force. The primary reason of its defeat is that it neglected collecting information about its adversary and implementing it, on the other hand, the other force used information effectively to overcome its physical weakness. Using information in warfare is not new. Sun Tzu [98] and Clausewitz [20] both were very emphatic about using it in warfare. Sun Tzu states that if you know your enemy and you know yourself, you will win a hundred battles. Also, Clausewitz describes warfare by using the term ?fog and friction?. Fog refers to the commander?s lack of clear information and friction means physical difficulties to military action. That is, uncertainty and impediments to the effective use of military force due to unforeseeable incidents in combat tend to lower the level of performance. The traditional role of information in military combat was to identify the enemy?s 51 location and power strength. That is, it was just knowledge at the level of intelligence. However, thanks to the development of information and communication technology, its role has changed. Information itself has become a target or weapon. The identification of the change has given rise to the term of information warfare. Information warfare is not about technology but about using information. The purpose of using information in a conflict is to influence the adversary?s decision making and operational capability, and public opinion, in order to achieve specific objectives. During the conflict, each side tries to take actions to affect adversary information and information systems while protecting its own information and information systems. Today, many different types of attack on information systems are available. The most common attack, as an external attack, is to spread viruses through the enemy?s network in order to deny his information processing. There exist many solutions such as firewalls, intrusion detection and prevention systems, anti-virus software, anti-spyware software, cryptographic protocols, and access control mechanisms to protect the information systems from these kinds of attacks. However, internal attacks by compromised users are always difficult to handle because they bypass traditional security solutions. The Libicki model that is referred to most commonly presents seven information types of warfare: Command and control warfare (C2W), Intelligence based warfare, Electronic warfare, Psychological warfare, Hacker warfare, Economic information warfare, and Cyber warfare [57]. 3.5 Decision making and security in NCW environment Schechtmann (2002) analyzed information warfare according to the OODA loop. U.S. Air Force Colonel John Boyd developed the OODA loop based on his previous work on a fast- transient brief which suggests keeping a faster operation tempo than the enemy to assure a 52 victory from conflict. OODA is an abbreviation of Observe, Orient, Decide, and Act. The brief description of each component is as follows [89]: 1) Observation: It is the behavior of becoming aware of the operational situation and environment by careful and directed attention. 2) Orientation: It is the process of converting the collected raw data to valuable information supporting the forces by using analysis and synthesis. The human brain forms a mental image of the environment. 3) Decision: The information from the orientation phase is analyzed and various options of action are formed. The options are considered to the extent allowed by time, and a choice is made. 4) Act: The decision is implemented. It leads to unfolding interaction within the environment. The OODA is a model to address human decision making. As the first step of the OODA loop, the operational environment is scanned for data. This is possible by robust networking of forces in the area. All forces within the network share what they know at the current time and location. This collected data, or intelligence, is processed further for creating information and a mental image of the situation. Then, a decision is made among alternatives identified through the orientation, and it is carried out. In short, it is possible to perform compressed operations by OODA. The force can cause the enemy, to be confused and disoriented by changing the environment rapidly. This confusion and disorientation causes the enemy to pause frequently for reprocessing. Consequently, the enemy is more delayed in making accurate decisions and is eventually defeated. 53 Each party in a conflict tries to confuse the opposite party as much as it can by using all possible means. Fog and friction increased by frequent environment change affects the operation tempo of the enemy. One of the most practical ways is to destroy the enemy?s communication and information system so that its network cannot function properly any more. At the same time, our decision making process should be protected from this kind of attack. Needless to say, the decision making process is very important, so it always becomes a primary target of the enemy. To secure the decision process and its accuracy, it is crucial that the network is not vulnerable to friction and fog by the enemy. For example, data collection in the observation phase can be obstructed by offensive actions such as physical attack or deceptive actions. And the input from observation will have direct effects on the orientation phase and the decision phase. Especially, action could be impaired by disrupting communications using various negative actions such as jamming the network, delaying and modifying packets, and injecting erroneous packets into the network. These security problems have been an issue in both commercial and military networks since the internet was commercialized for network communications [89]. Network security is divided into three categories: Content, Communication, and Network security. Content security is to protect the content between the two communicating peers, and communication security is about protecting the data between each source and destination over the network. The difference between content and communication security is that the end user in communication security can be more than two users while there is only one in content security. Network security is to protect the network itself so that it can perform properly. The main purpose of the network is to function as a tool for command, control, and communication. 54 Therefore, the network must be secured to protect the decision making process from enemy attacks in a network-centric environment. In the past, military technologies in most fields have led commercial ones. However, this has been reversed and no barrier between the two fields exists. Many IT equipment and weapon systems for military use are also used in civilian organizations. Due to this fact, military networks are vulnerable to attack since they use open standards and commercially off the shelf (COTS) products. Furthermore, the distinctive characteristics of military operation environments such as terrain, weather condition, wireless, and enemy forces increase the burden of security. Failure in securing the network from various negative activities by the enemy can lead to defeat in warfighting. The enemy can easily access the network when security measures fail. As a result, the decision making process, information sharing and situational awareness are more vulnerable. Future military systems under the new paradigm of NCW will be based on a network of heterogeneous networks wired and wireless access networks, sensor networks, ad-hoc networks, and fixed and temporary backbone networks. Among these, military networks have a close connection with wireless networks. We will discuss wireless networks in the following section. 3.6 Wireless networks Today, military and commercial networks are increasingly mobile and wireless. Furthermore, in the military operation, ad-hoc networks are relied on to ensure communication in difficult environments such as a battlefield. Both the military and civilian environments depend on the same technology. However, many military requirements are different due to its nature. Wireless networks introduced by innovated communication and information technology have 55 changed our living pattern and method of waging. Now military forces can operate in a distributed manner while maintaining communication. The shared awareness system based on the wireless networking brings many remarkable benefits to forces operating under a high level of uncertain battle situations. Candolin [15] defines wireless networks in five categories based on the communication coverage. The wireless network spectrum is specified as seen in Figure 3-2 below. Figure 3-2 Wireless networks and their coverage [15]. Satellite communication at the highest level is considered as the most important communication network in modern warfare. The dream of getting connected "anywhere and at any time" is able to come true by the full implementation of satellite communication. Especially, the direct connection between satellites and networks can maximize the flexibility of military operations by information flow in real time. Among those in the lower levels of networks, 56 Wireless LAN is useful for a small military force operation and practical for fighting with terrorists currently. Wireless LAN is a network linking two or more computers without cables in a limited local area such as a company or home. WLAN gives users the mobility to move around within a broad coverage area when connecting to the network. The transmission range of WLAN is about 100m, and the rate is specified between 1 Mbps and 108Mbps. WLAN is defined in the IEEE 802.11 standard and specified into infrastructure and ad-hoc modes. Network nodes in the infrastructure mode are connected to a wireless access point which typically is connected to a wired network, while in the ad-hoc mode they communicate in a peer-to-peer fashion. Wi-Fi, which stands for Wireless Fidelity, is a WLAN technology defined in the IEEE 802.11 standards and promoted by the Wi-Fi forum, an online community dedicating to the exchange of technical or non-technical ideas related to Wi-Fi. One of the benefits of Wi-Fi is that it is able to provide high speed internet access with low requirements for transmission power. Thus, it is a feasible technology even for small, battery driven devices. It also adds flexibility to local area networking, as it supports user mobility. Wi-Fi is the most cost-efficient wireless technology today [15, 106]. The disadvantage is the lack of support for QoS, and the lack of privacy protection for users. Satellites are important communication assets for enabling mobile communications in remote areas, as well as for providing imagery, navigation, weather information, missile warning capability, etc. A communication satellite is stationed in space for the purposes of telecommunications. Modern communications satellites use a variety of orbits including geostationary orbits, Molniya orbits, other elliptical orbits and low (polar and non- polar) earth orbits. As we know, the coverage by satellite communication is huge and even the 57 whole earth can be covered. At first satellite communications could not be available to all users because of high usage fees and the limitation of two-way high-speed communication requiring only short time delay, but the decrease in cost and developed technology has made it possible even for individuals to take advantage of satellite communications. Therefore, it is no longer limited to governments, military, and large corporations. INMASAT is one of examples which have been used for military operations and provides communications over geostationary satellites. The U.S. Armed forces have used 28 satellites for global positioning support and six orbital constellations for Intelligence, Surveillance, and Reconnaissance (ISR): one for early warning, two for imagery, and three for signals intelligence [102]. Despite the growing number of military satellites, 84 percent of satellite communications bandwidth in the Operation Iraqi Freedom (OIF) Theater was provided by commercial satellites. Communication services by commercial satellites may face problems related to interoperability and security. The U.S. DoD has made efforts to build a satellite-based military internet in the future to reduce or remove currently identified network problems. As a part of this plan, the Transformational Satellite Communications (TSAT) program is being run by the Air Force. With this program, five geosynchronous orbit satellites will be launched and provide warfighters worldwide with high- speed, high-capacity communications [21, 42, 102]. 3.7 Tactical battlefield network Speed and precision are vital factors in the modern warfighting paradigm as discussed previously. A scout from a remote place, which is very close to an enemy?s camp, is observing the camp and flies a small unmanned aerial vehicle (UAV) to collect more detailed information. 58 The small UAV flies in the sky over the enemy?s camp and scans targets of interest without being detected by the enemy. This data from the critical area is directly sent to a control center in real time, through satellite communications, where a decision maker and his staff are located. They analyze the data to get exact information on the target and discuss what to do. They are looking for the leader of a terrorist organization at the moment. At last, they find the target, terrorist leader, and decide to kill him. The mission is assigned to a responsible force in that area. A predator UAV charged with a precision guided missile takes off and launches a missile to the target area. This is a scene from a recent movie. This simply summarizes the important characteristics of modern combat. As we identified from the movie scene, the place where the scout was operating is a deep location close to the enemy camp but far away from his camp. Naturally, no predefined infrastructures are available there. Only satellite communications or another wireless network can connect the scout with the control center. This is an ad-hoc network which is a collection of nodes that do not need to rely on a predefined infrastructure to establish and maintain communications [14]. Therefore, the coverage of an ad-hoc network depends on the locations of the network participants. An ad-hoc network is also referred to as a tactical battlefield network in the military. Although nodes in the ad-hoc network may be connected to a wired infrastructure, ad-hoc network nodes are most likely wireless. Military forces in many different operations have experienced the fact that networking is always constrained by time. That is, the speed of establishing a network in a tactical space cannot catch up with the operational movement of forces in the area. Military forces have already moved ahead when network infrastructures are ready for use. This had motivated the military to innovate the networking technology for their forces so they can be networked robustly where and 59 when needed. The DARPA Packet Radio Networks and the Survivable Adaptive Networks (SURAN) programs sponsored by the U.S. government in 1970s and 1980s were the predecessors of today?s mobile ad-hoc networks. The forces of a network and given mission usually determine the required network technology and size. Members of a tactical battlefield network are diverse in the capability of moving speed and transmission range. Human soldiers, trucks, air fighters, and battle ships as network nodes have different capabilities. This heterogeneousness is a trend in military mobile ad-hoc network. Figure 3-3 MANET interoperability [82] In summary, there exist networks of various size and technology in military battle fields. The real-time free flow of information vertically and horizontally among networked forces in a theater are the first priority to assure victory in waging modern war. NCW focuses on the combat 60 power that can be generated from the effective networking of the combat forces. Shared awareness and collaboration in a battlefield, which are given by robust communications and rapid exchange of data via one or more networks, provide the forces in battle with potential power. Well networked forces show the NCW characteristics of speed of command, high tempo and responsiveness, massing of effects, cooperative engagement, and self-synchronization to a degree that cannot be matched by any non-NCW capable opponent. All of the individual warfighting entities such as satellite, aircrafts, UAVs, ships and unattended sensors, and all tactical warfighting nodes in Figure 3-3 must be integrated into the grid to achieve the goals of NCW. So, all forces and networks are able to maintain the connectivity with each other and minimize the uncertainty. Consequently, this NCW-compliant integration can provide a common picture of the battlefield to all network nodes, even to the tactical edge nodes. Interconnecting these edge nodes will rely upon mobile ad-hoc networking (MANET) technologies [69]. Achieving this tactical edge connectivity will depend on the development of significantly improved MANET technologies. The tactical battle field is the basic level in an entire network. A top command network is made up of several tactical battlefield networks. Therefore, as a basic network, each tactical battlefield network is required to maintain robust communication with other networks under varied military operation environments. 61 Chapter 4 Military MANET Description and mathematical model There are many different types of obstacles in military combat and operation areas which limit network performance naturally or artificially. Unlike obstacles due to natural causes such as weather conditions or terrain shape some obstacles are intentionally produced by enemy forces. We call those kinds of obstacles ?Enemy? in this research. A military MANET model representing military operation scenarios including enemies? hostile activities in the operation area is developed in this chapter. The optimizer under combat conditions should be able to effectively deploy the agent nodes to the best locations so that network performance can be maximized every time step. Two decision variables are the agent?s direction and velocity. The network performance is evaluated at each time step during the operation. The network objective function can be evaluated when the node coordinates of agents are known. 4.1 Proposed military MANET operation system The mobile agents play key roles in maintaining network connectivity in a network, particularly when the client nodes are positioned beyond their communication range with the control node. The network performance in this research is mainly evaluated by the number of connected user nodes to the control node and the network bandwidth among connected users at each time step. Therefore, the proper positioning of the mobile agents to maximize those 62 performance parameters is crucial in the optimizing process of military MANETs, since it determines the links among nodes in a network. The basic operation method for deploying agents is to control their directions and magnitudes of velocities. This is possible when the location information of the MANET nodes is given. A global positioning system (GPS), which is implemented by many mobile phones or mobile network devices, provides all network nodes with valuable location information. The mobile network nodes change their locations to perform the given mission in the tactical theater over time. However, we assume that paths of users are not known in advance. The military MANET should be able to respond to these changes of location of the network nodes. That is, the required system should be able to use the location information from previous environments and continuously adapt to the change of network environment conditions as well. This is a non-linear problem which requires a heuristic algorithm with a continuously changing objective function. As a result, the PSO algorithm, which is a population based heuristic with a time varying fitness function, is applied to solve the military operation problem. We assume that the location information is always available if the network nodes are connected with the control node since a GPS can be mounted on the network nodes. And this could technically be possible by broadcasting the location information provided by the GPS. Also an ESM sensor to detect the direction of jamming coming from an unknown location of enemy is available for each network node. As we addressed before, four different types of nodes are used in the study to represent real military operation scenarios, which are different from commercial ones. Especially, the control and agent nodes are considered as service nodes which should be controlled by the 63 MANET control system throughout the operation period to maintain network connectivity. These MANET nodes are discussed in the following section. 4.2 Military MANET nodes For military MANETs, we functionally divide military operation units into three groups: command/control, execution, and support. The command/control unit, which is represented by a control node, manages all of its assigned subordinate units. Before performing the command/control function, it is important to collect data by using available information acquisition assets, analyze the data within a given time frame, and distribute information through a network for proper and quick decision making. Consequently, effective command/control would be possible over subordinate units only through a robust networking of forces in the network. Execution units, which are represented by user nodes, perform the commands received from the control center or the higher unit in the command/control hierarchy. They also report operation situations at their current locations to the control center to support drawing a common picture of the tactical space, which will be provided for all networked forces. Of course, the execution units could exchange valuable information with each other over the network, but the decision making of important actions directly related to a given mission is performed through communication with the control center. Finally, support or service units, which are represented by agent nodes, seek to provide all units in an operation network with a tight communication relay service for enabling military operation functions such as command/control, information acquisition and exchange, and execution required for mission accomplishment. 64 The nodes representing network devices in the mobile ad-hoc network are generally divided into user (client) and agent (server) nodes in the literature reference. But considering the nature of military operation discussed above, those nodes need to be further specified to represent realistic scenarios. So, we have extended the general classification with four different types of node: control, agent, user and priority node. The classification and brief descriptions of each category are given as follows: 1) Agent node The support unit described above is represented by an agent node. The agent node is responsible for connecting network nodes positioned beyond their communication ranges in a network to maintain the network at the best condition possible. For this purpose, agent nodes are repositioned based on the information about the location of the network nodes and the communication capabilities using the distances between nodes. 2) Control node The command/control center is represented by the control node. The command/control center in military operations plays a key role of controlling agents in the network to perform a given mission. Particularly, the control node in this research performs two additional tasks. It is responsible for supporting user nodes like other agent nodes and it designates any user node required for a tighter connection with the control node as a priority node, which has priority for network service. Unlike traditional MANET models, user nodes are divided into two types, user and priority in this military MANET. The user and priority nodes represent a variety of combat or forward military units from individual soldier to battalion military unit level or greater. These 65 user nodes are free to move according to their mobility characteristics within a tactical theater. 3) User node User nodes represent an individual soldier or a military combat unit at a variety of organizational levels. The user nodes require network service while moving around the tactical space. 4) Priority node Because of the dynamic and unpredictable nature of military operations, it is impossible to guarantee full connectivity among nodes all of the time. So, this unavoidable limitation forces the operation planner or manager (military commander) to classify users into priority based on the tactical situation. Any user node which is considered as an important node related to the tactical situation can be designated as a priority node by the control center. Priority nodes should have preference over user nodes to be connected to the control node since MANET has a limited number of agent nodes. 4.3 Network states The connections between network nodes are decided by their signal strengths and the network connection for a network node in this research means that the network node is able to communicate with the control. Therefore, any network node which is disconnected from the control node is referred to as an isolated node. However, in order to represent effectively the network states corresponding to an environment change, more distinctive definitions for possible cases are required. First, the exact definitions regarding isolation are as follows: ? Isolated user: Disconnected with the control and all agents ? Isolated agent: Disconnected with the control and all users 66 ? Isolated user-agent cluster: One or more agents and/or one or more users connected together, but disconnected from the control node Based on these definitions of isolated nodes, two network states, State 1 and 2, are defined in this research. If there is no isolated user in the network, the network is State 1. Otherwise, it is categorized into State 2. There are two different ways to evaluate the network performance in this research, and these depend on the network state. According to the network state, the objective function required for the fitness evaluation is decided. That is, objective function 1 in equation (4-7) is used to evaluate the network under the network state 1 and the objective function 2 is used in equation (4-8) under the state 2. We will discuss more about the objective functions in Section 4.4. 4.4 Military MANET optimizer The movements of the mobile agents are under the control of the location optimizer that is responsible for maximizing the performance objectives as a function of the current coordinates of the nodes and enemy?s hostile activities in a MANET operation space. The objective function gauges the network performance based on predefined parameters such as number of connected user nodes, number of connected agent nodes and network bandwidth. These performance parameters can be computed using detailed performance measures such as hop-count or bandwidth. The network performance measures typically show flat behavior over large portions of the search space. However, the measures may also show sudden changes in certain regions of the search space depending on the network states. In order to overcome this issue, the objective 67 function on which network performance is evaluated, should be able to respond to any small changes in the network environment. In this research, this is accomplished by using a hop-count based algorithm with additional performance metrics which can help improve network performance. 4.4.1 Performance metrics As we discussed above, the objective function for the evaluation of a network should be made up of proper performance metrics which represent the network characteristics and respond well to the network changes. In order to do that, some different parameters are employed to evaluate the military MANETs in this research and also two different objective functions are used for evaluating the networks under different network conditions. The evaluation of network performance is conducted by sequential filtering based on the metrics, which are divided into two categories, primary and secondary. The primary metrics category evaluates the networked level (NWL) of a network. NWL includes four metrics, the Number of Connected Users (NCU), the Number of Connected Agents (NCA), the Pre-deployed Agent Level (PAL), and the Number of Agent-User Links (NAUL). These primary metrics are common in both objective functions. On the other hand, the network evaluation by secondary metrics is divided into two and depends on the network states mentioned previously. There are two different network states as discussed before previously, State 1 and State 2, in this study. The network state at every step is decided by whether there is any isolated user node in the network. If any user node is isolated, it is State 2, otherwise, State 1. Under the desired network state (State 1) the network is evaluated for network quality (NQ) using bandwidth (BW) and control centered (CC) metrics, while the 68 network evaluation for State 2 is performed by the Search Range (SR). The definitions of these metrics used here are given as follows: 1) NWL: Networked Level which is computed by sum of NCU, NCA, PAL, and NAUL. The priority among these metrics is represented by the assigned weight to each metric. The highest weighted parameter is NCU, the lowest one is NAUL. NCU is used as a primary performance measure in this study due to its importance in the military. PAL is also an important parameter, but it is weighted by a relatively smaller number than NCU and NCA since it is just to maximize network connection. As a result, the optimizer can maximize network performance using these weighted differentiated metrics. 2) NCU: Number of Connected Users. The number of connected user nodes which maintain connection with the control node at the moment. NCU includes both connected user nodes and connected priority nodes (NCP). 3) NCA: Number of Connected Agents. The number of connected agent nodes which maintain connection with the control node at the moment. 4) PAL: Pre-deployed Agent Level. PAL is the indication of the agent nodes? performance. Under PAL, each agent is required to support at least two user nodes and the user nodes being supported by that agent are different from those being supported by other agents. Similarly, a user node is required to have at least one agent support and the agent node supporting a user node should be different from those supporting other user nodes. PAL enables the agents to be distributed through the network to support more user nodes over time. Each network node meeting above 69 conditions represents one unit of PAL. The mathematical formula of PAL is given in Section 4.5.? 5) NAUL: Number of Agent-User Links. NAUL is a direct link between agent and user. This parameter is used for maintaining a high quality connection within a cluster which might be isolated from the main network.? 6) BW: Total bandwidth of a network. Bandwidth represents the signal strength between a network node and the control node. It is computed based on the distance between the two nodes. We will discuss this in more detail in the next section.? 7) CC: Control Centered. The sum of the distances between the agents and the control node. By this metric all agents can be controlled to stay close to the control node as much as possible under a given network condition. The purpose of this metric is to respond quickly to network needs. For example, an extra agent is needed to be deployed to other location to improve network connections when the user has been supported by the agent is killed or disconnected for long time. Under this kind of situation, CC metric help deploy the agent to any proper location. 8) SR: Search Range. The distance between a messenger and the estimated destination of an isolated user. The messenger is an agent that is designated for isolated user node search by the control node. We will discuss this later in this chapter. The optimizer continues to evaluate the network based on the above performance metrics and optimize the location of agent nodes to keep maximizing the network connection during the operation. In the following section, we will discuss a hop-count based algorithm and how to compute the network bandwidth. Bandwidth is used to check the connectivity and quality of the path between two nodes in a network. 70 4.4.2 Hop-count based algorithm Finding the shortest path from a source to a destination in a network is a common problem and there are many ways to do it. Here, the meaning of ?shortest path" may be the least number of hops (links or arcs) or the least total weight [58, 96]. In [68] the shortest path problem is simply defined as the problem of finding a path between two nodes such that the sum of the weights of its constituent edges is minimized. For finding the shortest path between two designated nodes in a network, the minimum hop-count is used in this research. The hop-count approach considers only the minimum number of hops, or links, required to establish a path between two nodes regardless of the link quality or stability or distance. As described before, it can minimize the waste of limited resources in the longer term. However, it may select an inferior route when there are more than two paths available, since it considers only the minimum hop. In order to improve this measure we introduce other metrics representing network quality and stability as subsidiary ones. The shortest path is evaluated by the primary metric, hop-count. If there are two or more shortest paths which have same number of hops, the tie among the paths is broken using the second metric based on the bandwidth. Each link?s bandwidth for fitness evaluation is different from the one measured by the distance alone. In order to measure the level of the quality and stability of a link, the jamming Effect Level is also used. The description of these metrics will be given in the following section. Bandwidth (not including Jamming Effect Level) is the most common metric to measure the network performance and is measured as a bit rate expressed in bits/s or multiples of it (kb/s, Mb/s etc.). We use bandwidth to measure the quality of a path. Connections among nodes in a network depend on the transmission ranges based on each other?s signal strength. That is to say, 71 the transmission range of a link between two nodes is decided by the one having the smaller transmission strength. The basic goal of the links in a network is to deliver sufficient signal strength from a source node to a destination node to achieve some performance requirements. However, signal strength could be varied by environmental conditions. The estimation of the signal power under a great variety of existing conditions is not easy work and it may be impossible to predict exactly. Also, this is beyond our research scope. Therefore, we assume that the estimation of the path loss in this research follows the propagation model for free space scenario. However, this propagation model could be replaced by another propagation model corresponding to the application. To represent the tactical battlefield network in the lower level of military mobile network, the wireless local area network is considered in this research. The wireless IEEE 802.11 is a set of standards for wireless local area network computer communication. It is technically possible to create a multi-hop network that covers several square kilometers and operates in the 5GHz and 2.4GHz radio band [26]. The free space path loss equations are given in two ways as seen in following equations depending on the distance measure unit, km or mile. km)in MHz,in ( log20log204.32 ijijp dfdfL ++= (4?1) or miles)in MHz,in ( log20log206.36 ijijp dfdfL ++= (4?2) Where Lp is the path loss in decibels (dB), dij represents the distance between two nodes and f is the signal frequency. For the path loss model, Dengiz (2007) applies equation (4-1) to an industry company?s product specification sheet to compute the data transfer rate versus distance [26]. The relationship between path loss and data rate is shown in Table 4-1. 72 Table 4-1 Path loss vs. data rate Data rate (Mbps) Receive Sensitivity (dBm) 54 48 36 24 18 12 9 6 2 -75 -76 -80 -84 -88 -90 -90 -93 -93 For a normalized wireless transmission range, he uses equation (4-3) to estimate the normalized data rate from the Euclidean distance (dij) between two nodes, i and j. To calculate the normalized bandwidth of each link the following equation is used in this research as well. ( ) () 1 5.010 1),( ? ?? += ij d ejiDataRate (4?3) So, once we get the Euclidean distance between nodes, the available data rate can be easily computed using equation (4-3). There is another factor affecting network bandwidth in military MANET scenarios, and this is an electrical attack (jamming) by enemy forces existing in the operation area. The communication capability of the network nodes are constrained by this jamming effect. In addition, nodes which are located near jammers could be attacked and killed by their attack. This 73 is referred to as the Kill Effect Zone (KEZ). We will discuss enemy effects in more detail in Section 5.4.1. 4.5 Mathematical formulation In order to construct the network graph G = (N, E) at each step, the Euclidean distances among network nodes are measured. 22 )()( jtitjtitijt yyxxd ?+?= (4?4) If the Euclidean distance between two nodes in a free space environment is less than the minimum possible communication range of those, the nodes are connected to each other as shown in the following equation. ( ) ? ? ? ? = otherwise 0 dTR,TR inm if e ijtjtit ijt 1 (4?5) In the real world, the transmission capabilities of network nodes can be limited by environmental conditions as discussed. Although there are many possible factors causing this limitation such as terrain shape, weather condition, and electrical attacks by enemy forces. All of these are not studied in this research. We consider only the jamming effect by enemy forces. The possible bandwidth for a link is computed based on the Euclidean distance and jamming effective level. And then if the possible bandwidth for the link is larger than the minimum bandwidth required under current environmental condition, they can be connected with each 74 other. However, the minimum bandwidth is assumed as one distance unit here since we do not consider reduction of bandwidth by environmental conditions in this research. Notation r it Rotation angle from x-axis of the i th agent node at time t v it Speed of the i th agent node at time t v max Maximum speed of the agent node (x it, y it ) x and y coordinates of the i th agent node at time t (X min, X max ) x-axis boundaries (Y min, Y max ) y-axis boundaries M Weight for the swarm having at least one of its particles within the kill effect range. If all particles are out of the kill effect range, M is 0 NN User and agent node set AN Agent node set UN User node set CN Control node IU t Isolated user node set at time t PN t Priority node set at time t MA t Messenger agent set at time t TN t Total number of alive user or agent nodes at time t TU t Total number of alive user nodes at time t TA t Total number of alive agent nodes at time t TP t Total number of priority nodes at time t 75 d ijt Euclidean distance between node i and j at time t TR it Transmission range of node i at time t Pn Weight for priority node e ijt e ijt is 1 if there is a link (single hop) between node i and j at time t, otherwise is 0 P t (i, j) P t (i, j) is 1 if there is a path between nodes i and j at time t, otherwise is 0 SU it The set of user nodes supported by agent node i at time t SA it The set of agent nodes supporting user node i at time t BW ijt Bandwidth of a link between node i and j at time t, i?j JL ijt Jamming effect Level for the link between node i and j at time t, i?j ShortestPathBW t (i,j) Shortest path bandwidth between node i and j at time t )j,i(PathBW k t k th path bandwidth between node i and j at time t )j,i(N k t A set of nodes on the k th path between nodes i and j at time t The purpose of the optimizer is to deploy the agents into the best locations in order to provide MANETs with maximum communication quality. To meet this goal, different metrics representing military MANET characteristics are employed to evaluate network performance; these are hop-count, bandwidth, and jamming effect level. For instance, let?s say we want to find a path between nodes i and j. First, the link matrix is constructed based on the location information. Two different matrices are required to compute the cost for a link or path in the network, which are one hop-count matrix and bandwidth matrix. The hop-count matrix is used to search for the shortest hop path, while the bandwidth matrix is used to find the highest quality or cheapest cost path among the shortest paths which have the same number of hops. The link between two nodes is represented by the binary value (1 76 or -1) in the hop-count matrix. On the other hand, the cost of each link in the bandwidth matrix is represented by the computed bandwidth based on Euclidean distance and jamming effect level. As a result, each cost in the bandwidth matrix is real number representing the possible bandwidth of the link for fitness evaluation. The hop-count based algorithm first finds the possible paths between nodes i and j using minimum hop-count. The path which has the smallest number of hops is selected as the shortest path. If there is only one path, it will be the best route without requiring further consideration. However, in many cases, there exist two or more shortest paths which have same number of hops. So, the tie among the possible paths should be broken by the bandwidth of each path. That is, the path with the fewest hops and which has the largest bandwidth is selected as the best path. Each link?s bandwidth is calculated by equation (4-3). Euclidean distance between the nodes is first measured. Then, for the actual possible bandwidth calculation for fitness evaluation, jamming effective level, which is changed over time, is added to the computation. A path between any two end nodes could be composed of several different links. Among those, the link which has the smallest bandwidth is chosen for the path?s possible bandwidth. Finally, the path that has the smallest hop count and the largest actual bandwidth will be the best route for the connection between two end nodes, source and destination. Network performance depends on the location of the agent nodes, so the optimizer continually relocates the agent nodes to the locations which best improve the network performance. Consequently, the agent nodes? coordinates are decided by the direction and velocity randomly generated by PSO. So, these direction and velocity of agent are decision variables. Particularly, in the measurement of network performance, a priority node path is 77 weighted by a positive value (Pn) to represent its priority to the military operation, as described earlier. As we discussed, several network parameters are used to evaluate network performance and these parameters need to be differentiated by their importance in a network. So, different weights are introduced to represent these priorities for network connection as seen in equation 4- 6. Network parameters are NCU, NCA, PAL and NAUL in order of importance and weighted by ? 1 , ? 2 , ? 3 and ? 4 , respectively. Also, while optimizing a network if any particle in a swarm enters the kill effect range of an enemy, network performance at that moment will be penalized a big positive number (M). As a result, agent nodes would not be deployed into the kill effect range. The mathematical model based on the above concept is given as follow: (){} : MNAULPALNCANCUmaxO ??+?+?+? 43211 ???? (4?6) ) (if 12 ?= ? ? ? ? ? ? ? tIU CC BW max:SO (4?7) () ) (if 22 ??? tIUSRmin:SO (4?8) ?? ?? ?+= UNiPNi t t t Pn)CN,i(P)CN,i(P NCU ? ? = ANi t )CN,i(P NCA (4-9) ? ? ? ? ? ? += ?? == ttTU i TA i ii aPALuPAL PAL 11 (4-10) ? ?? = UNjUNi ijteNAUL , (4-11) ? ? = NNi t )CN,i(thBWShortestPaBW (4-12) 78 { } )CN,i(PathBWmax)CN,i(thBWShortestPa k t k t = { }mntmnt )CN,i(Nn,m k t JLBWmin)CN,i(PathBW k t ?= ? ? =? = CNj,ANi ijtdCC (4-13) ? ?? = tt MAjIUi ijtdSR , (4-14) Subject to ANr ANvv iit imaxit ???? ???? ?20 0 (4-15) ? ? ? ? ? ???+ ??>?+ ???+ ??