The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method for analyzing the vulnerability of a power system using network theory. It locates fault by combining the travelling waves methodology with the network topology to isolate the faulty link first and then locate the fault distance. The algorithm is verified on a test power network using Alternate Transients Program/Electromagnetic Transients Program (ATP/EMTP) and Matlab...
The restoration requirements for backbone network design have historically been driven by the need to address link failures due, e.g., to accidental fiber cuts. Only in the last 5-7 years the requirements of recovery from cyber attacks induced network failures have surfaced. Both deployed and greenfield networks can benefit from systematic cyber-vulnerability and resiliency characterization which...
Mobile free space optical (FSO) links suffer from frequent link blockages due to opaque obstructions or link degradations that can result in degraded or failed networks. In this paper, a dynamic layer-1 based topology and routing control methodology is presented for assuring connectivity in networks with fragile links. Core components of this methodology are described with special emphasis on the...
Mobile free space optical (FSO) and directional RF communications links suffer from frequent link blockages due to opaque obstructions that can result in degraded or failed networks. In this paper, a methodology is presented for assuring connectivity in networks with fragile links. The frequency and duration of link blockages are characterized using modeling and emulation tools developed for realistic...
The tactical edge network emulation tool (TENET) hardware integration system (THIS) is designed to characterize higher layer responses to the dynamic physical layer topology of a tactical network utilizing directional communication links. THIS emulates the mobile, tactical, network environment using the hardware in a static infrastructure. MATLAB-based tools implement the TENET emulation to simulate...
Dynamic topology control schemes have been discussed earlier for continuously optimizing tactical mesh topologies to maximize the network connectivity. A dynamic optimization of the physical layer topology, however, is treated by layers-1 and 2 as a disruption and usually triggers re-computation of end-to-end paths. Higher layer routing algorithms may not always determine the same path as intended...
This paper presents the critical issues of optical network design and performance evaluation. The performance evaluation of the networks is measured in terms of packet loss probability or throughput with least amount of propagation time (delay). But as the network size grows it becomes cumbersome and hence some mechanism is required to handle stringent requirements of networks. This has been shown...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.