By Topic

Obscuration minimization in dynamic free space optical networks through topology control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Llorca, J. ; Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA ; Desai, A. ; Milner, Stuart

Free space optical (FSO) networks are emerging as a viable, cost effective technology for rapidly deployable broadband communication infrastructure. The main drawback of this type of networks is their dynamic performance, especially under adverse weather conditions and high nodes mobility. Topology control is used as the means to achieve survivable optical wireless networking under hostile conditions, based on dynamic and autonomous topology reconfiguration. The topology control process involves tracking and acquisition of nodes, assessment of link-state information, collection and distribution of topology data, and the algorithmic solution of an optimal topology. Design, analysis and comparison of algorithms and heuristics for configuring optimized topologies in dynamic environments are presented. Heuristics were developed for ring networks (2 optical transceivers per node) as well as for 3-degree networks (3 optical transceivers per node). This paper focuses on the design of efficient and scalable algorithms for physical layer topology optimization. That is, algorithms to select the topology configuration which optimizes a given physical layer objective. Performance and scalability results are shown for the various heuristics used, in different scenarios and for different network sizes.

Published in:

Military Communications Conference, 2004. MILCOM 2004. 2004 IEEE  (Volume:3 )

Date of Conference:

31 Oct.-3 Nov. 2004