Open Access Paper
21 October 2024 Self-organizing network preference method based on hierarchical model and ant colony algorithm
Jie Tao, Xin Wang, Huixian Sun, Baofeng Guo, Bin Ji
Author Affiliations +
Proceedings Volume 13401, International Conference on Automation and Intelligent Technology (ICAIT 2024); 134010B (2024) https://doi.org/10.1117/12.3049420
Event: 2024 International Conference on Automation and Intelligent Technology (ICAIT 2024), 2024, Wuhan, China
Abstract
In this paper, we borrow the idea of AdHoc to improve the traditional AdHoc network into a hierarchical network, i.e., each core node only serves as an access point and transmission point, and the real terminal is still the miner's handheld terminal. Firstly, a number of wireless access points (WPs) are randomly arranged in the tunnel, and the WPs accomplish two functions: one is to communicate with users, that is, mobile terminals (MTs, mobileterminals), which are required to have the wireless access and frequency allocation functions of a base station; the other is to complete the data storage and forwarding between them and other WPs, similar to the router function in a computer network. Then, a selforganizing network based on the improved ant colony algorithm protocol communication routing is proposed, which takes the movement speed and load situation of the core nodes as the routing considerations and proposes a routing performance function to measure the merits of communication routing, and the algorithm establishes two communication routes, the primary route and the backup route, simultaneously. Finally, for the special environment of the tunnel, the dynamic routing table is established with the lowest loss between two points by considering channel fading and multipath. Simulation results show that the self-organizing network preference method based on hierarchical model and ant colony algorithm proposed in this paper can improve the success rate of packet forwarding, reduce the average path delay, save the resources of the network, and thus improve the performance of the network.

1.

INTRODUCTION

With the increasing investment in national infrastructure, transportation is becoming faster and more convenient, and tunnel as an important link of road traffic, its network communication is receiving more and more attention. For the tunnel scenario, due to its own structural characteristics, it makes the transmission of wireless signals different from that in ordinary scenarios. In order to design and evaluate tunnel wireless communication systems, this paper proposes a tunnel communication method based on mobile self-organizing networks.

Mobile self-organizing networks, also known as self-organizing networks [1,2] (Mobile Adhoc NETworks, MANET for short), are at the forefront of the current communication direction and are a network technology in development. AdHoc networks, formerly known as packet radio networks, originated from the need for military communications and were adopted by the IEEE 802.11 standards committee established in 1991 The term “AdHoc network” was adopted by the IEEE 802.11 standards committee established in 1991 to describe this particular peer-to-peer wireless mobile network. The Internet Engineering Task Force (IETF), the leading organization for mobile wireless network research, established a special Mobile Working Group (MANET) in 1997 to study routing algorithms in wireless AdHoc networks. Mobile wireless self-organizing networks are dynamic self-organizing network systems with arbitrary and AdHoc network topologies composed of wireless mobile nodes, each of which can be used as a host and a router. The communication between the nodes can be single-hop or multi-hop. So the mobile nodes in the self-organizing network should have two functions at the same time: multi-access function and relay capability of network routing, that is, the nodes can first realize wireless resource sharing with the help of multi-access protocol; secondly, the nodes can store and forward the data through the corresponding routing protocol. Its main feature is that it does not need any infrastructure and can achieve free network interconnection through the corresponding self-organizing inter-network protocols, which is a kind of self-regulating and self-healing network. And its self-regulation and self-healing are essential for tunnel communication.

2.

RELATED KNOWLEDGE

2.1

Self-organizing network

A self-organizing network is a multi-hop AdHoc autonomous system composed of a group of (mobile) terminal nodes with wireless communication transceivers; each (mobile) terminal has both router and host functions: as a host, the terminal needs to run user-oriented applications; as a router, the terminal needs to run the corresponding routing protocol; inter-node routing usually consists of multi-hops (Hop); no network infrastructure and can be built quickly anywhere, anywhere. Because of this, AdHoc networks have the following characteristics compared to other networks [3,4].

  • (1) Independent networking. AdHoc networks do not require any prior network infrastructure and are free and flexible.

  • (2) Dynamic topology. Mobile nodes in AdHoc networks have arbitrary mobility in addition to switching, which, together with the influence of wireless propagation conditions such as changes in the transmitting power of wireless transmitting devices, mutual interference factors between wireless channels, and terrain factors, leads to arbitrary and rapid changes in the network topology in an unpredictable manner.

  • (3) Self-organization. AdHoc network has no control center, each node can join or leave the network arbitrarily, and node failure will not affect the whole network.

  • (4) Multi-hop routing. The multi-hop routing mechanism of AdHoc allows the receiver and the sender to communicate using much less power than the direct communication between them, thus saving energy consumption. In addition, through the intermediate nodes involved in packet forwarding, it can effectively reduce the design difficulty and cost of wireless transmission equipment, while expanding the coverage of self-organized networks.

  • (5) Special wireless channel characteristics. Wireless AdHoc uses wireless transmission technology as the underlying communication means, and the network bandwidth provided by the wireless channel is much lower than that of the wired channel. In addition, there are collisions due to competing wireless shared channels in the network, as well as signal fading, noise interference and interference between channels, making the actual bandwidth much smaller.

  • (6) Terminal limitations. Mobile user terminals in AdHoc networks are limited in energy, storage, computing and other resources, making the design of AdHoc networks very difficult, and reducing power consumption is a very important goal of routing protocol design.

  • (7) Poor security. AdHoc network is a wireless way of distributed structure, due to the openness of wireless links and the change of trust relationship between nodes due to mobility, making it more vulnerable to security threats such as eavesdropping, intrusion, network attacks and denial of service than wired networks.

  • (8) Scalability is not strong. Mutual interference between nodes causes a decrease in network capacity, and the throughput of each node decreases with the increase in the total number of network nodes.

  • (9) There are unidirectional wireless channels affected by the different transmitting power of terminals and the terrain environment.

2.2

Wireless channel fading and multipath

In the cellular mobile communication system, the base station is generally set very high (about 30 meters above the ground), while the mobile station is buried deep in the building. Take the downlink as an example, the radio wave is launched from the base station and then experiences distance loss (pathloss) and blocking loss (shadowingloss) to reach the near side of the user node. Near the user node due to the scattering and refraction of trees, buildings, vehicles, etc., the waves will become multiplexed spurious waves (we call these spurious waves as plain waves). These prime waves are superimposed on the receiving antenna of the user node, forming a fast fading phenomenon, and the signals passing through different paths arrive at the receiving end at different times, which will form a time delay extension. Suppose the power of the transmit signal is P(t)t, let the power of the receive signal be Pr (t), the transmit power is Pt(t), the distance fading is Ωd(t), the blocking fading is Ωs(t), and the multipath fading is g 2(t), then the power is calculated as shown below.

00025_PSISDG13401_134010B_page_2_1.jpg

where the shading fading Ωs(t) is due to the shadowing effect and fits the slow fading of the log-normal distribution. When discussing multipath fading, what must be considered is the fading rate, which is relative to the signal code duration (T). In narrowband transmission, the signal code duration (T) is much larger than the multipath delay spread [5] (DMS), and the multipath signal arriving at the antenna can be approximated by a one-way signal. The signal arriving from the base station is refracted, reflected and scattered by the objects around the mobile body, and the multiple prime waves, which reach the mobile station with a very small time difference (DLS), cause mutual interference. The fading of the received signal caused by the composite wave depends on the signal code duration (T), the number of prime waves (N), the moving speed of the mobile station (v), and the digital rate (R) of the transmitted signal. The amplitude of this fading obeys the Rayleigh distribution, and the phase obeys a uniform distribution between (0, 2π).

The radio signal in the tunnel is mainly transmitted by direct, transmitting and scattering to reach the receiver. The walls of the tunnel have shielding, absorption and scattering effects on radio waves, and theoretically, the straight tunnel is a non-ideal waveguide of oversized. The waveguide has a cutoff frequency, and only waves operating at frequencies higher than its cutoff frequency can propagate through it, otherwise they will rapidly decay. Strictly speaking, only the ideal conductive wall waveguide exists cutoff frequency fC, frequency above the cutoff frequency electromagnetic wave without attenuation propagation, so the attenuation constant α=0; below the cutoff frequency electromagnetic wave attenuation infinity, so there is α =∞, at this time in the full frequency domain is clearly divided into cutoff and transmission areas [6-8].

2.3

Ant colony algorithm and AODV routing protocol

AODV routing protocol belongs to on-demand driven routing protocol, which is the most researched and widely used routing protocol for AdHoc network routing protocols, AODV routing protocol uses the form of broadcast for route finding, based on distance vector, and the minimum number of hops as the routing criteria, AODV routing protocol is an RFC standard [9-11].

The AODV protocol is divided into two main phases: route discovery and route maintenance, when data transmission is required, AODV initiates route discovery and propagates datagrams in the network to establish communication routes. Route discovery is when two user nodes in the network need to perform data transmission, the source node will first check whether there is an available route to the destination node from the routing table, if it exists, the source node will communicate directly through the route in the routing table, otherwise, the source node will initiate the route discovery process.

The ant colony algorithm uses ants to release pheromones to find the optimal path, which is very suitable for multi-user nodes to find the optimal routing problem, and the mathematical model is as follows.

Let there be n network nodes in the AdHoc network, C = {c1, c2,…, cn} denotes the set of n nodes, the total number of ants in the colony is m, the set of neighboring nodes of node i is N1(i), the set of pheromone values between two network nodes is denoted as Г = {τij (t) | ciC, jN1(i)}, and at the initial moment, the pheromones on each path are the same, let τij (0) = const. In the process of pathfinding, ant k decides the next direction to go based on the pheromone values on each path and the distance of the path for each network node. 00025_PSISDG13401_134010B_page_3_1.jpg denotes the state transfer probability of ant k from node i to node j at moment t in the ant colony algorithm, and its formula is shown below.

00025_PSISDG13401_134010B_page_3_2.jpg

where τij (t) is the pheromone value on the path from node i to node j at moment t, 00025_PSISDG13401_134010B_page_3_3.jpg is the heuristic function, where dij is the distance from node i to node j. The heuristic function represents the degree of expectation of ant k from node i to node j. denotes the pheromone heuristic factor, the larger it is, the greater the chance of selecting a route with a large pheromone value, and is the expectation heuristic factor, the larger it is, the greater the chance of selecting a route with a short path distance. Each ant needs to update the pheromone on the path after a section of the path, and the pheromone value on the path from node i to node j at moment t+1 is adjusted as:

00025_PSISDG13401_134010B_page_4_1.jpg

where τij(t + 1) is the pheromone value on the path from node i to node j at moment t+1, 00025_PSISDG13401_134010B_page_4_2.jpg is the pheromone increment of ants passing through the path from node i to node j, and τij (0) = 0, 00025_PSISDG13401_134010B_page_4_3.jpg are the pheromone values of ant k remaining on the path from node i to node j at moment t. ρ is the pheromone volatility factor.

3.

MODEL OF THIS PAPER

3.1

Layered structure

The network construction of tunnel self-organizing network is only borrowed from the idea of AdHoc, which is not the same as the traditional AdHoc network. The main differences are two.

One, the network levels are different. The mobile nodes of traditional AdHoc networks function as both hosts and routers, and can be used as sources or hosts, while the research model of tunnel self-organizing network proposed in this paper is a hierarchical network, i.e., each node only serves as an access point and a transmission point, as shown in Figure 1.

Figure 1.

Network hierarchy of tunneled self-organizing network

00025_PSISDG13401_134010B_page_4_4.jpg

The network hierarchy of the tunneled self-organizing network can be divided into three layers: L1: the bottom layer, which refers to the terminals, either cell phones available in the existing network or other dedicated mobile terminals. The WPs are the core devices of the tunnel network, providing both wireless access to terminals and wireless transmission between nodes. Depending on the number of WPs in the L2 layer and the actual terrain, it can be decided whether L3 is needed or not. L3: Cluster management layer. When the number of WPs in L2 layer is too many, or the actual fading model of different terrains is very different, a cluster management layer can be considered, i.e., the WPs in L2 are divided into clusters by range or traffic volume, and each cluster has a cluster head. The cluster management layer manages the mobile nodes through the cluster head, and multi-hop control management, etc. It can also act as a gateway for communication with the external network.

The network structure level of the tunnel self-organizing network is affected by the actual environment of the tunnel, such as the size of the tunnel, the number of bifurcated branches, the distribution of equipment, the size of the space and many other complex factors, which determine the number of Wps that need to be cast in the tunnel and whether cluster management is required or not. For the convenience of consideration, this paper assumes that the tunnel model referred to is a flat and more uniform tunnel, and then its simple network structure is shown in Figure 2.

Figure 2.

Network structure of tunnel self-organizing network

00025_PSISDG13401_134010B_page_5_1.jpg

As shown in the figure above, according to the tunnel environment can be randomly arranged some wireless access points (such as WPi, WPm, WPn, etc.), the distribution of these access points can be based on the actual environment using different mathematical models, the distribution model discussed in this paper is uniform distribution. These wireless access points randomly arranged according to uniform distribution WPs (Wireless Points) have two main functions: one is to communicate with the user nodes, that is, to complete the user access and paging functions; the other is to complete the relay transmission of information from the source mobile station to the destination mobile station together with other WPs through store-and-forward, these WPs is equivalent to the traditional cellular These JTTs5 are equivalent to virtual extensions of traditional cellular base stations, i.e., they are used to complete comprehensive coverage of the area through multiple WPs.

The process is as follows.

  • 1. each user node with communication needs is connected to the nearest WP based on the principle of shortest distance.

  • 2. the best route is then constructed between WPs by means of a routing algorithm.

  • 3. relay transmission through WPs on this route, and finally connect to the target MT to complete data communication.

Since the multi-hop approach is used for data transmission, the distance between adjacent nodes is short, so the transmitting power can be greatly saved. At the same time, the interruption of individual nodes will only cause the reselection of routes, but not the network interruption, so it has a high degree of self-healing and anti-destructive properties. In order to enhance the self-organization of the network, MTs can be allowed to conditionally join the process of relay transmission under the condition that the WP assumes a fixed position, i.e., MTs can be certified by application, so that they have dual functions of MT and WP, which can increase the flexibility of the system and further save system power.

3.2

Ant colony algorithm based network optimization

Ant colony algorithm can prevent falling into local optimal solution, but the ant colony algorithm selects the next node according to the transfer probability, which has certain randomness and slow convergence speed, and the pheromone gap on each path in the initial stage is not large, the core nodes in multi-user node system often move, the system is unstable, and the slow convergence speed will increase the routing overhead, so the ant colony algorithm needs to be improved and then applied to multi-user node and multi-core node system. Traditional AdHoc network routing protocols focus more on how to establish the communication route from the source node to the destination node, and most of them maintain only one route, and AODV, as the most widely used routing protocol, also establishes only one route from the source node to the destination node, which may lead to network overload and increase the end-to-end delay, and if the route to the destination node fails, all links through that node will be dropped. Therefore, this paper focuses on the following three design points.

  • (1) Adding load balancing and movement speed of core nodes to the consideration of selecting the optimal route, AODV protocol takes the minimum number of hops as the basis for route selection and does not consider the congestion of nodes and the impact of movement speed on the link, which leads to instability of communication links.

  • (2) Establish a routing performance function as a criterion for judging the merits of routing, which combines the state transfer probability, load balancing and movement speed of the AODV algorithm and solves the situation that the AODV algorithm easily falls into the local optimal solution.

  • (3) Adding alternate routes, when the user node initiates routing, the optimal route to the core node is selected by the routing performance function, and in addition, the route with the next best value of the routing performance function is used as the alternate route, and the alternate route takes on the task of communication when the primary route is interrupted, and only after both the primary route and the alternate route fail, the source node will re-initiate the routing request to re-establish the primary route and the alternate route for reduce the routing overhead of the system.

In equation 2, and referring to the literature [12] modifies dij as the user node i to core node j. The delay is used as a heuristic function factor, aiming to select the path with lower transmission delay, denoting the pheromone heuristic factor, the larger, the greater the chance of selecting a route with a large pheromone value, and the expectation heuristic factor, the larger, the greater the chance of selecting a route with a small path delay. When the core node in the system receives a route request, route response or transmits data, the pheromone on the path needs to be updated, in order to avoid the excessive concentration of data due to too much pheromone on a path and fall into the local optimal solution, the concept of maximum and minimum ant is introduced to set the maximum and minimum pheromone values on the path, define τmin as the minimum value of pheromone, τmax as the maximum value of pheromone, the pheromone update of the path through which the message passes, and the pheromone update on the path from user node i to core node j is shown in the following equation.

00025_PSISDG13401_134010B_page_6_1.jpg

Where, ρ ∈[0,1) is the pheromone volatility factor, τij(t +1) is the pheromone value on the path from user node i to core node j after the update, □τij(t) is the pheromone increment on the path from user node i to core node j for this update, and the Ant-Quantity model is modified so that if the message passes from robot node i to node j, the increment is defined as 00025_PSISDG13401_134010B_page_6_2.jpg,otherwise it is 0.

where Q denotes the strength of the pheromone carried by this update and is a constant, dij is the delay from user node i to core node j, and τij (0) = 0. Next, consider the core node load balancing problem, load balancing is based on the distribution of data transmission traffic in a multi-node system network, so that all nodes are enough to share the network transmission tasks evenly, to avoid concentrating communication tasks in individual nodes making these core nodes consume energy too fast, effective congestion control can extend the survival time of core nodes and improve the overall performance of the system. For multi-node systems, the user node data cache queue is detected to determine whether congestion occurs, and each user node monitors its current MAC layer data queue in real time and calculates the normalized remaining capacity.

00025_PSISDG13401_134010B_page_6_3.jpg

where 00025_PSISDG13401_134010B_page_6_4.jpg denotes the remaining capacity of the normalized data cache of user node i, Li denotes the capacity in the current data cache queue of user node i, and Lmax denotes the maximum capacity of the data cache queue of the core node. For a core node, the smaller 00025_PSISDG13401_134010B_page_6_5.jpg is, the more data is cached in the current data cache queue, the higher the possibility of congestion in that node, and the lower the possibility of being selected as an intermediate node.

3.3

Self-organizing network communication optimization based on signal attenuation

Through the analysis of the relationship between attenuation and frequency, we can see that the attenuation of VLF, UHF, VHF and UHF bands is small, and the relative attenuation of IF band is large, when the working band is very low, it is easy to be subject to industrial frequency electromagnetic interference, and the channel capacity is small, requiring large transmitter power and large antenna volume. Therefore, do not choose the lower frequency band. Table 1 shows the loss of some frequencies in the flat lane [13,14]. From Table 1, it can be seen that 1000 MHz loss is always the smallest when the transmission is greater than 150 m.

Table 1.

Losses of radio waves in a flat and straight alleyway

Operating frequency f(MHz)4000300020001000415200100
Single loss per 30m (dB) L Diffraction0.060.10.230.915.3423.0092.00
Single loss per 30m (dB) L roughness0.050.070.10.210.51.042.08
Single loss per 30m (dB) L tilt5.333.992.661.330.550.270.14
Single loss per 30m (dB) L propagation5.444.162.992.456.3924.3194.20
Antenna insertion loss (dB)69.964.8857.8645.8230.4817.805.80
30m total loss L(dB)756961483742100
150m total loss L(dB)9786735862139477
300m total loss L(dB)124107887094261948
600m total loss L(dB)179148118931585041890

Table 2 shows the loss of some frequencies when there is an inflection. From the table, we can see that 1000MHz loss is the smallest when transmitting more than 300m. Considering the compatibility of mobile communication systems, it is more appropriate to choose 1000Hz as the operating frequency band for tunnel communication.

Table 2.

Loss of radio waves in the presence of a bend in the tunnel

Operating frequency (MHz)4000300020001000415200
Loss per bend (dB)80.277.674.167.657.747.3
150m total loss L (dB)177163147126120187
300m total loss L (dB)205184162138152306
450m total loss L (dB)232205177148184430
600m total loss L (dB)259226192161216551

After designing the routing algorithm, the algorithm also needs to be optimized accordingly. Optimization means the ability of the routing algorithm to select the best path, based on the value of the metric and the weight value. A good routing algorithm is the result of several optimizations.

The route establishment mechanism of the routing self-organization based tunneling wireless communication system designed in this paper is based on the principle of minimum power loss, which means that the metric here is the power loss. According to the special environment of the tunnel network, the routing is required to be highly self-healing and energy efficient, so the following factors are considered for the designed routing.

First, the principle of selecting the best route is based on the least power loss between two points, rather than the shortest propagation path. The tunnel environment is complex, the size of the tunnel, the number and size of the surrounding equipment, and the influence of the tunnel facilities will affect the propagation loss of the radio waves to varying degrees. The overall loss of the radio waves, although related to the propagation distance, is not a simple one-to-one correspondence.

Second, due to the harsh environment of the tunnel, the power of each wireless access point is limited, so its workload should be minimized, so consider that a centralized routing algorithm can be used, and then sent to each WP through the guide frequency information.

Finally, as to whether the network is a virtual circuit or datagram format, as well as traffic and latency, are related to the actual amount of data transmitted and the required quality of service. Combining the actual environment of the tunnel network and the frequency allocation scheme of the core nodes.

4.

NETWORK PERFORMANCE SIMULATION

The simulation phase is performed for the self-organizing network algorithm proposed in this paper, using a complete network stack to simulate the network nodes up to the application layer that generates the traffic. This subsection simulates an integrated system with different node densities and user node speeds of 0 and different network size cases to better study the control overhead, and the size of each simulated node can be experimented from the corresponding network size and node density. To study the reliability of the inter-node behavior, this section runs random core nodes throughout the network and studies the success rate of packet forwarding, where the destination of each packet is chosen randomly from all other nodes. This subsection focuses on the accuracy and integrity of user node message delivery in the network, etc.

4.1

Simulation analysis

(1) Reachability of user node packets

Reachability is one of the main metrics studied in this simulation. The experimental simulation focuses on the average reachability under the whole system, and this chapter conducts experiments in terms of node network size on message exchange.

Figure 3 shows the average reachability of packets for different network sizes. The figure compares the reachability of packets at different network sizes. A reachability node of 0.9 means that 90% of the network nodes are reachable.

Figure 3.

Reachability of packets at different network sizes

00025_PSISDG13401_134010B_page_8_1.jpg

(2) Accuracy of information

Since the experiment simulates a distributed system, the propagation of information causes inaccurate information to the user nodes due to delays. The core nodes selectively forward information because of limited energy, making the information forwarded to the user nodes incomplete.

Figure 4 shows the average accuracy and completeness of the network-wide information collected during a given simulation time for different network sizes. As the graphs show, the average accuracy and completeness of the data is above 97% for all network sizes. However, the integrity of the information deteriorates in small-scale networks, especially in high-density networks, where direct communication is possible due to being in small and dense networks.

Figure 4.

Accuracy of data and integrity of data

00025_PSISDG13401_134010B_page_8_2.jpg

(3) Reliability of nodes

The experiment evaluates the reliability reached by the core nodes by observing the success rate of packet forwarding (PDR) with a packet forwarding rate of 1m/s.

The Figure 5 shows the success rate of packet forwarding under different algorithms. In all the simulated algorithms, the success rate of packet forwarding of the core nodes in this paper can be improved well for networks with low or medium node density. This is because there are more distances beyond 1 hop in low-density networks, which gives opportunities to the node ant colony algorithm mechanism. The improvement in packet forwarding success rate gradually increases in larger networks, showing the scalability of the node ant colony algorithm mechanism.

Figure 5.

Success rate of packet forwarding for 2,4,6 and 8core nodes

00025_PSISDG13401_134010B_page_9_1.jpg

To fully verify the effectiveness of the method, this section compares it with the original AdHoc algorithm and the original ant colony algorithm, which are used to test the optimization of self-organized networks under the same parameter conditions.

(4) Core node selection efficiency

Figure 6 shows the three self-organizing network methods. The average detection probability of 60 runs increases with the detection time, and the proposed method in this section outperforms the other two methods as the detection time progresses. This advantage is mainly due to the introduction of the hierarchical structure and the improvement of the ant colony algorithm, while considering the signal attenuation least strategy. Therefore, the method enables the core nodes to search the DEM region with a high occupancy probability of user nodes in a short period of time, effectively improving the search capability.

Figure 6.

Average detection efficiency and regional coverage

00025_PSISDG13401_134010B_page_9_2.jpg

The area coverage percentage is defined as the proportion of the search area of the current user node in the whole search area. As shown in the figure, the improved AdHoc algorithm can expand the probability of the search area. Therefore, it can better coordinate the search behavior of the core nodes, which can search user nodes in a larger range.

The proposed self-organizing network optimization algorithm based on hierarchical model and ant colony algorithm is shown in Figure 7.

Figure 7.

Algorithm flow of this paper

00025_PSISDG13401_134010B_page_10_1.jpg

5.

SUMMARY

The current self-organized network routing algorithm has certain limitations when applied to multi-user node and multicore node systems: (1) The nodes in multi-user node and multi-core node systems are highly mobile, and the routing algorithm does not consider the mobility of the core nodes, which cannot guarantee the stability of the network when the network topology changes significantly. (2) In multi-user node and multi-core node systems, the expected transmission time is greatly influenced by the network environment in which multiple users are located, and cannot be accurately predicted.

In this paper, the study of a tunnel wireless communication system based on routing self-organization makes full use of the flexibility, self-regulation, self-healing, and anti-destructiveness of self-organized networks, combined with the specific tunnel harsh environment, resulting in a new tunnel wireless communication system. Further simulation results show that the algorithm achieves better results in terms of improved packet delivery success rate and reduced end-to-end delay compared to the conventional AODV. This paper has some reference in AdHoc network optimization, and the AODV algorithm can be further improved in the future to enhance the optimization effect of this algorithm and be more widely applied. In the practical application of tunnel AdHoc network system, this paper only deals with the algorithmic aspects, and future research in this direction can be coupled with hardware localization modules for experiments.

ACKNOWLEDGEMENTS

The authors declare that they have no conflicts of interest or personal relationships that could have appeared to influence the work reported in this paper. And all authors have read and agreed to the published version of the manuscript. This research received no external funding.

REFERENCES

[1] 

Chen Linxing et al, “Mobile AdHoc Networks-Self-organizing Packet Radio Network Technology [M],” 125 –131 Electronic Industry Press,2006). Google Scholar

[2] 

J. Broch, D. B. Johnson, and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile AdHoc Networks,” Internet Draft draft-ietf-manet-dsr-07.txt, (2002). Google Scholar

[3] 

Wang Chunjiang, “Research on CDMA-based mobile self-organizing network [D],” 67 –72 Beijing University of Posts and Telecommunications,2005). Google Scholar

[4] 

Cao Changyi, “AdHoc technology [J],” Telecommunications Engineering Technology and Standardization, (05), 13 –19 (2002). Google Scholar

[5] 

J. G. Proakis, “Digital communications [M],” 169 –177 4th edMcGraw Hill, New York (2000). Google Scholar

[6] 

Z. Y. Wei, “Exploration of electromagnetic wave cutoff frequency in mine tunnels [J],” Coal Science and Technology., 2005 (33), 72 –74 Google Scholar

[7] 

Zhang Changsen, “Propagation characteristics of electromagnetic waves in semicircular arch tunnels [J],” Coal Science and Technology., 2004 (32), 58 –60 Google Scholar

[8] 

Y. P. Zhang and Y. Hwang, “Theory of the Radio-wave Propagation in Railway Tunnels[J],” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 47 (3), 1027 –1036 (1998). https://doi.org/10.1109/25.704857 Google Scholar

[9] 

Y. P. Zhang, “. Novel Model for Propagation Loss Prediction in Tunnels[J],” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 52 (5), 1308 –1314 (2003). https://doi.org/10.1109/TVT.2003.816647 Google Scholar

[10] 

Chakeres I D, Beldingroyer E M., “AODV Routing Protocol Implementation Design[C],” in International Conference on Distributed Computing Systems Workshops - W7: Ec. IEEE Computer Society, 698 –703 (2004). Google Scholar

[11] 

Kaur K, Kad S., “Enhanced clustering based AODV-R protocol using Ant Colony Optimization in VANETS[C],” in IEEE International Conference on Power Electronics. IEEE, 1 –5 (2016). Google Scholar

[12] 

Li W., “Study on the fading of GSM signal in underground tunnel transmission[J],” Mining Research and Development., 25 (5), 62 –64 (2005). Google Scholar

[13] 

Zhao H, Sun JP., “Selection of mobile communication frequency in mines [J],” Coal Mine Automation, (4), 44 –46 (1997). Google Scholar

[14] 

Robert Sedgewick, “An Introduction to the Analysis Algorithmic [M],” 314 –321 China Machine Press,2006). Google Scholar
© (2024) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jie Tao, Xin Wang, Huixian Sun, Baofeng Guo, and Bin Ji "Self-organizing network preference method based on hierarchical model and ant colony algorithm", Proc. SPIE 13401, International Conference on Automation and Intelligent Technology (ICAIT 2024), 134010B (21 October 2024); https://doi.org/10.1117/12.3049420
Advertisement
Advertisement
KEYWORDS
Data transmission

Telecommunications

Wireless communications

Signal attenuation

Mathematical optimization

Mobile communications

Computer simulations

Back to Top