C-ICAMA, A Centralized Intelligent Channel Assigned Multiple Access for
Multi-Layer Ad-Hoc Wireless Networks with UAVs
Daniel Lihui Gu, Henry Ly, Xiaoyan Hong, Mario Gerla, Guangyu Pei and Yeng-Zhong Lee
Computer Science Department
University of California, Los Angeles
fgu,henryly,hxy,gerla,pei,yengleeg@cs.ucla.edu
Abstract
Multi-layer ad hoc wireless networks with UAVs is an ideal
infrastructure to establish a rapidly deployable wireless communication system any time any where in the world for military applications. In this tactical environment, information
traffic is quite asymmetric. Ground fighting units are information consumers and receive far more data than they transmit. The up-link is used for sending requests for information and some networking configuration overhead with a few
kilobits, while the down-link is used to return the data requested with megabits size (e.g. multimedia file of images
and charts). Centralized Intelligent Channel Assigned Multiple Access(C-ICAMA) is a MAC layer protocol proposed
for ground backbone nodes to access UAV (Unmanned Aeriel
Vehicle) to solve the highly asymmetric data traffic in this tactical environment. With it’s intelligent scheduling algorithm,
it can dynamically allocate bandwidth for up-link and downlink to fit the instantaneous status of asymmetric traffic. The
results of C-ICAMA is very promising, due to the dynamic
bandwidth allocation of asymmetric up-link and down-link,
the access delay is tremendously reduced.
1 Introduction and Background
To fulfill the Army’s vision of the 21st century digital
battlefield[10], we proposed a Multi-Layer Ad-Hoc Wireless Networks with UAVs [6], which will make extensive
use of wireless technology, with high bandwidth (45Mbps)
links transporting high volumes of multimedia information
to ground mobile backbone units. Ground mobile backbone
nodes transport to individual soldiers for the multi-area theater.
In this infrastructure using the embedded ad hoc networking mechanism, nodes are able to transport packets across
the network in a multi-hop fashion. On top of the multi-hop
ground radio network, we propose to construct dynamically
a point-to-point embedded mobile backbone network which
connects (using separate frequencies from the ground radio
network) properly elected backbone nodes using directive
antennas. The mobile, embedded backbone network serves
a single area (say, a few kilometers in diameter). Multiple
UAVs form a Aerial Mobile Backbone to connect different
ground mobile backbones. This multi-level physical heterogeneous multi-hop network will provide communications onthe-move for all fighting units in the entire multi-area theater while both “ground backbone” and “aerial backbone” are
moving.
Each UAV will support a single area with Phased Array
Antenna(PAA) technology to project multiple beams to the
ground in a typical cellular pattern. All mobile backbone
nodes on the ground within the same beam will use this channel to send and receive information to and from this UAV.
In the real tactical environment, ground mobile fighting units
are information consumers most of the time. They receive far
more data than they transmit. This will cause highly asymmetric traffic between up-link and down-link radio channel
of UAV access net. There are three different types of traffic through UAV, (1) UAV relays the traffic from one ground
mobile backbone node to another within the same area. (2)
UAV forwards the packets from the ground mobile backbone
node in it’s own area to the ground mobile backbone node in
another area. (3) ground nodes send request packets for information. For example, when soldiers get into a new area, they
might send requests with a few kilobits worth of IP packets
for geographic information, and the return data is most likely
a multimedia file of images and charts of megabits size. So it
will be very inefficient to assume in our design a symmetric
model for this full-duplex IP data connection.
In this paper we propose a new MAC Layer protocol,
Centralized Intelligent Channel Assigned Multiple Access
(C-ICAMA), for ground mobile backbone nodes to access
UAV. C-ICAMA is also a contention-based channel reservation protocol. All the mobile nodes will compete during the
This work was supported in part by Northrop Grumman, B-2 Division contention period by sending request packet to make reserva, in part by University of California Micro Program.
tion. A successful packet will join the polling queue and wait
UAV
Level 3
Level 2
Level 1
Figure 1: Multi-level UAV Heterogeneous Ad-Hoc Wireless
Network for Multi-area Theater
for the proper time to poll ground mobile nodes. A polled
mobile node will use the corresponding slot to send data information to UAV. At it’s core, C-ICAMA is an intelligent
scheduling algorithm that can dynamically adjust the bandwidth ratio between an up-link and down-link to fit the asymmetric data traffic.
The rest of the paper is organized as follows. In section
2, we introduce the architecture of the multi-level heterogeneous ad hoc wireless network with UAV. Section 3 describes
C-ICAMA MAC Layer protocol for UAV Access Net. Performance evaluation is presented in section 4 and we conclude our paper in section 5.
2 Architecture of the Multi-level Heterogeneous Ad-Hoc Wireless Network with
UAVs
Figure 1 shows the architecture of a multi-level heterogeneous ad hoc wireless network with UAVs. The hierarchical
infrastructure consists of the following three hierarchies:
1. level 1: Ground Ad-Hoc Wireless Network: Based on
the hop distance of packet transfers, wireless networks
can be divided into two types: single-hop and multihop. The multi-hop wireless network, also called “ad
hoc” wireless network , allows all mobile hosts to move
freely without any constraints by fixed communication
infrastructure. Due to the ad hoc topology, maintaining
efficient routes become very challenging.
At this level, we have both regular ground mobile nodes
and backbone nodes. A variety of clustering algorithms
have been proposed for the dynamic creation of clusters
and the election of cluster heads in ad hoc wireless networks [11]. The only modification needed here is, that
backbone nodes have higher priority to be selected as
cluster heads than regular nodes. Spread-spectrum radios permit code division multiple access (CDMA) and
spatial reuse across clusters. Within a cluster, we use
802.11 as the Medium Access Control (MAC) layer protocol.
2. level 2: Ground Embedded Mobile Backbone network: Due to the poor performance of ad hoc wireless network where many hops are involved, an embedded mobile backbone was introduced. In the tactical environment, special fighting units like trucks, tanks
may carry a lot more equipment than individual soldiers.
These mobile nodes , with the help of beam-forming antennas, can offer high-speed point-to-point direct wireless links. So if we select those mobile nodes as backbone nodes, we can establish a ground mobile backbone
embedded within the ground ad hoc wireless network.
In this level, we only have ground backbone nodes. Direct point-to-point wireless links are used for the communications among the neighboring backbone nodes.
3. level 3: Aerial Mobile Backbone Network: Each UAV
can maintain a station at an altitude of 50 to 60 thousands feet by flying in a circle with a diameter of around
8 nautical miles. With the help of Phased Array Antennas, it can provide the shared beam to the ground to
keep line-of-sight connectivity for one area of operation
down below. Multiple UAVs fly in the sky to form a
mobile backbone with beam-forming technology to connect to each other. With the aerial mobile backbone,
we can connect multiple areas of operations together
to provide theater-wide communication. All the ground
backbone nodes in the same area will access UAV using
the MAC layer protocol, Centralized Intelligent Channel Assigned Multiple Access (C-ICAMA). C-ICAMA
has an intelligent scheduling algorithm, which can dynamically allocate bandwidth for up-link and down-link
to fit the instantaneous status of asymmetric traffic.
Figure 2: Asymmetric Data Traffic for UAV Access Net
3 C-ICAMA in Multi-Layer Heterogeneous Ad Hoc Wireless Network with
UAVs
3.1 Existing MAC Layer Protocols
The access to the radio channel is a key issue in an efficient
design of UAV Access Net. The protocols used to determine
who transmits on a shared channel belongs to a sublayer of
the data link layer called the MAC (Medium Access Control)
sublayer. Among the many protocols, there are two extremes.
One is the ”purely- random access” type in which nodes normally send arrival packets right away. The other extreme is
the ”perfectly scheduled” type in which there is some order
allowing nodes receive reserved intervals for channel use.
The first approach has a very small delay, but suffers from
low throughput. The second approach will have the maximum throughput closed to 1, in order to achieve this, it must
pay the expense of the delay for making reservation.
Random access solutions have been widely used for single packet data access. They deal with contentions and collisions by using retransmission of a collided packet at the MAC
level. The most effective random access protocols, such as
CSMA-CD, can not be used for UAV Access Net because the
radio interface can not perform the Collision Detect function.
A good solution combine those two extremes, which is a
contention-based channel reservation protocol. Roberts [7]
is the first one to propose this type of multiaccess protocol for
satellite use in 1973. In his protocol, multiaccess channel is
partitioned into reservation and data subchannels by means of
time division. Using the Slotted Aloha protocol, each ready
station first sends a mini reservation request packet over the
reservation subchannel to join a global queue which schedules the reserved time on the data subchannel for the station
to transmit its data message. This protocol is very efficient for
long propagation delays. However, due to the fixed subframe
partition, data slots could lie idle when the global queue is
empty, decreasing the bandwidth efficiency of the protocol.
In 1989, Goodman proposed the Packet Reservation Multiple Access (PRMA) [5], which is a merger of slotted
ALOHA and TDMA. It uses a slotted channel structure, with
time slots grouped into frames. When a mobile station (MS)
becomes active, it randomly transmits the first packet of ”periodic” information in a nonreserved slots. Once its transmission is successful, the MS keeps that slot in subsequent
frames until the current message transmission is completed.
This protocol is good for voice, but it lacks the flexibility required to integrate data and voice. Based on PRMA,
Giuseppe Bianchi[2] etc. proposed the centralized PRMA,
a natural enhancement of PRMA, in which the base station
(BS) plays a central role in scheduling the transmissions of
mobile stations (MS’s). Unfortunately, neither of those two
can be directly applied to UAV Access Net due to the large
propagation delay. The assumption of the two separate physical channels make it very difficult to adjust the bandwidth
ratio of up-link and down-link based on the instantaneous
traffic condition.
Capture Division Packet Access (CDPA)[3] is a packetoriented architecture to support the constant bit rate traffic
and variable bandwidth on demand necessary for multimedia traffic. The modified version of CDPA for Aeronautical Telecommunication Network was proposed for this single physical channel environment[4]. It has two channels
ATG(Air to Ground) and GTA(Ground to Air), both of them
use the same frequency because all transmissions are under
control of the GS(Ground Station). The GS can decide when
using the frequency for GTA transmission and when using it
for ATG transmission (by using commands). However, it can
not scalable to support large number of ground mobile nodes
in tactical environment.
In this paper, we propose a new MAC Layer protocol, Centralized Intelligent Channel Assigned Multiple Access (CICAMA), for ground mobile backbone nodes to access UAV.
3.2 C-ICAMA Protocol
C-ICAMA is a packet-switching multiple-access protocol especially devised for the UAV Access Net of Multi-Layer Heterogeneous Ad Hoc Wireless Network with UAVs. Within a
single area, each UAV will provide multiple beams on the
ground. Withwin a single beam, there is a one physical chan-
Data Packets to/from UAVs
Scheduler:
•Based on Current Uplink list.
•Based on the Ratio of Quplink and
Qdownlink.
Î Dynamic allocate Uplink and
Downlink slots.
Î The Remaining slots are used for
reservation.
UAV
Downlink
Queue
Frame
(Nf slots)
UAV Downlink Queue,
Downlink Data Subframe
Uplink Data Subframe
(Nd slots)
(Nu slots)
Framing:
•Pack Data.
•Pack Reservation
status on last slot
Slotted Aloha
Reservation
Controller
Reservation Data
Subframe
(Nr slots)
Slotted Aloha
Competition Status
Tx From Ground Backbone Nodes
FRAME START Node 21 Node 4
Node 2
Node 16 Node 10
Node 5
Tx To Ground Back
Node 12
Figure 3: Frame Structure for C-ICAMA
Figure 4: Scheduler for C-ICAMA
nel for communication. The channel is divided into time slots
whose duration is equal to the transmission time of a data
packet. The slots are organized into frames with a fixed f
slots in each frame. Each frame consists of down-link data
subframe with d slots, up-link data subframe with u slots
and reservation subframe with r slots. All those sizes for
subframe are variable based on the traffic condition. Each
slot in the reservation subframe is further subdivided into
m minislots. The minislots are for reservation packets to
be used on a contention basis with the slotted ALOHA protocol. The slots in the two data subframes are for reserved data
packets.
When a ground mobile backbone node generates a packet
or a multipacket message, it transmits a reservation packet
which contains the number of packets for this message. If
the UAV receives this reservation packet successfully, it will
store the packet into UAV up-link queue. Any packet generated from UAV will be stored into UAV down-link queue.
The queue sizes for UAV up-link queue and down-link queue
represent the traffic load on this channel. Therefore, if we adjust subframe sizes based on the ratio of UAV up-link queue
size to down-link queue size, C-ICAMA will be able to dynamically allocate the bandwidth ratio between an up-link
and down-link to fit the asymmetric data traffic.
As in the figure 3, frame structure for C-ICAMA is a heterogeneous TDMA frame. The last subframe, reservation
frame, has all unused data slots grouped together. Each slot
in this subframe is further divided into minislots to allow all
ground backbone nodes sending reservation minipacket via
Slotted Aloha protocol for slot reservation.
The very first slot in the frame is specially for FRAMESTART packet. This packet has three fields as follow:
N
N
N
N
N
1. The first field contains the number of consecutive downlink slots in down-link data subframe.
2. The second field is the order list of up-link slots positions in up-link data subframe for all the active ground
nodes which have reserved the channel in the corresponding slots.
3. The third field has the number of slots in reservation
subframe. If this field is zero in any frame, that implies the channel is too busy and all backlog nodes have
to wait for later frame to compete. Whenever there
are some minislots advertised in the FRAME-START
packet, ground nodes which have backlog packets can
start to compete for reservation right after the end of uplink data transmission. UAV acknowledges whether the
reservation packet’s competition in last minislot is idle
(0), success (1), or collision (e).
4 Performance Evaluation
Channel Efficiency
1
0.9
0.8
0.7
0.6
C-ICAMA
DAMA
Slotted Aloha
0.5
0.4
0.3
0.2
0.1
0
0
0.2
0.4
0.6
0.8
1
1.2
Traffic Load
Figure 5: Efficiency vs Traffic Load
C-ICAMA Performance
1.0000
0.9000
0.8000
0.7000
Ratio
Efficiency
Our simulation environment is the GlomoSim library
1.2.3 [8] written in the parallel, discrete-event simulation language PARSEC [1]. The ground radios model reflects commercial radios, such as Lucent’s WaveLAN. The data rate is
2 Mbps. The MAC layer protocol used among ground radios
is IEEE802.11. Each ground backbone node has three different physical interfaces: (1) ground radio interface, which
is used for communications among regular ground nodes and
from regular ground nodes to backbone nodes; (2) directional
point-to-point wireless links among backbone nodes and (3)
radio interface for accessing UAV aerial backbone nodes.
In our simulation, we use one UAV with 100 ground backbone nodes in a single area. The backbone nodes are moving
at very slow speed at 2 m/sec. Traffic sources are CBR (continuous bit-rate). The size of data payload is 512 bytes. We
make each pair of CBRs on UAV and ground backbone node
with a different rate to generate asymmetric traffic for the
simulation. The network consists of 100 mobile nodes in a
1000x1000 meter square.
In figure 5, We compared the efficiency of our C-ICAMA
with DAMA and Slotted Aloha. C-ICAMA achievs high efficiency as other contention-based reservation protocols, like
DAMA. If we take look in detail, we will find something
more interesting as in figure 6. When the channel traffic increase from 0.8 to 0.94, the efficiencies of downlink (DL)
and uplink (UL) also increase. However, the efficiency of
reservation channel has something realy interesting. It got increased first then decreased when channel load is lager than
0.94. This is because, the more active nodes, the more collision in comptition minislots.
For most of the contention-based reservation protocols,
long access delay is the price they have to pay in order to
have high efficiency. C-ICAMA, with it’s capability of dynamic channel allocation, can adjust itself to fit any asymmetric traffic condition to retrieve low access delay as in figure 7.
From there, you will also see that access delay will suddenly
go high when traffic load is over 0.94. This is exactly the
same as the traffic load to retrieve the highest efficiency of
reservation channel. This is a very important trade-off point
for the performance of UAV Access Net.
0.6000
0.5000
0.4000
0.3000
0.2000
0.1000
0.0000
0.0000
0.2000
0.4000
0.6000
0.8000
Channel traffic
UL+DL Efficiency
DL Efficiency
UL Efficiency
Reservation Efficiency
5 Conclusion
We have introduced the Centralized Intelligent Channel Assigned Multiple Access (C-ICAMA) in hierarchical, heterogeneous multi-layer ad hoc wireless networks. The CICAMA is the contention-based reservation protocol with an
Figure 6: Efficiency for C-ICAMA
1.0000
chitecture for Future PCNs”, In IEEE Communications
Magazine, September 1996, pp. 154
[4] Flaminio Borgonova, Mario Gerla and Daniel Lihui Gu,
“ A Proposal for the ATN Radio Interface”, Internal
technical report, UCLA, Feb. 1997
C-ICAM A Performance
De la y (Slot_Tim e)
1500.0000
[5] D. J. Goodman, R. A. Valenzuela, K. T. Gayliard, and
B. Ramam urthi, “Packet reservation multiple access for
local wireless communications,” IEEE Trans. Commun,
vol. 37, no. 8, pp. 885-890, 1989
1000.0000
500.0000
0.0000
0.0000
0.2000
0.4000
0.6000
0.8000
1.0000
Traffic loa d
Delay
[6] Daniel Lihui Gu, Guangyu Pei, Henry Ly, Mario Gerla
and Xiaoyan Hong, “Hierarchical Routing for MultiLayer Ad-Hoc Wireless Networks with UAVs” , To appear in Proceedings of IEEE Milcom 2000.
[7] L. Roberts, “Dynamic Allocation of Satellite Capacity
Through Packet Reservation,” AFIPS Conference Proceedings. 1973. Vol. 42. pp.711-716.
Figure 7: Delay for C-ICAMA
[8] M. Takai, L. Bajaj, R, Ahuja, R. Bagrodia and M. Gerla,
“GloMoSim: A Scalable Network Simulation Environment,” Technical report 990027, UCLA, Computer Science Department, 1999.
intelligent scheduling algorithm. It can dynamically adjust
the bandwidth ratio between an up-link and down-link to fit
the highly asymmetric data traffic in this multi-layer hetero- [9] H.H. (Sam) Khatib. “Theater Wideband Communicageneous environment. From the simulation, we have seen it
tions.” IEEE MILCOM, page 378, November 1997.
can tremendously reduce the access delay and keep the high
efficiency as the same time. The trade-off point at 0.94 traffic [10] Ram Voruganti and Allen Levesque. “C 4 I Mobility Architectures for 21st Century Warfighters.” IEEE MILload can be used as reference for the system design. Since
COM, page 665, November 1997
this can guide us to decide the right number of ground backbone nodes the system can support in order the retrieve the
[11] C.-C. Chiang, H-K Wu, Winston Liu, and Mario Gerla.
best performance.
“Routing in Clustered Multi-hop, Mobile Wireless Networks”, The IEEE Singapore International Conference
on Networks, pp 197-211, 1997
References
[1] R. Bagrodia, R. Meyer, M. Takai, Y. Chen, X. Zeng, J.
Martin, and H.Y. Song, “PARSEC: A Parallel Simulation Environment for Complex Systems,” IEEE Computer, vol. 31, no. 10, Oct. 1998, pp.77-85.
[2] Giuseppe Bianchi, Flaminio Borgonovo, Luigi
Musumeci and Miche le Zorzi, “C-PRMA: A Centralized Packet Reservation Multiple Access for Local
Wireless Communications” , In IEEE Transactions on
Vehicular Technology, vol. 46, no. 2, May 1997
[3] Flaminio Borgonovo, Luigi Fratta, Politecnico di Milano, Michele Zorzi and Anthony Acampora, “Capture
Division Packet Access: A New Cellular Access Ar-