Scalability analysis of tactical mobility patterns

Ertugrul Necdet Ciftcioglu, Ram Ramanathan, Thomas F. La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


Military networks are characterized by varying degrees and patterns of mobility. In this work, we consider the scalability of real-world mobile tactical networks, including the effects of protocols and bottlenecks, from a non-asymptotic viewpoint. Such analysis has been previously done for static networks [1], where the scalability of static scenarios was characterized by identifying the signature, which depends on the topology and traffic properties. We analyze the signature and scalability of a network consisting of two convoy groups moving according to the repeated traversal tactical mobility model. We observe that tactical mobility significantly reduces network scalability. Furthermore, we identify the instances in time where nodes of the network are loaded the most, preventing the network to scale to larger number of nodes. We demonstrate that this bottleneck instant depends on the routing algorithm considered. Finally, we demonstrate how the scalability is affected by the variation of network resources and traffic characteristics, and uncover significantly different trends compared with the static case.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 IEEE Military Communications Conference, MILCOM 2013
Number of pages6
StatePublished - 2013
Event2013 IEEE Military Communications Conference, MILCOM 2013 - San Diego, CA, United States
Duration: Nov 18 2013Nov 20 2013

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM


Other2013 IEEE Military Communications Conference, MILCOM 2013
Country/TerritoryUnited States
CitySan Diego, CA

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering


Dive into the research topics of 'Scalability analysis of tactical mobility patterns'. Together they form a unique fingerprint.

Cite this