The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper , we present a flexible, modular architecture to combine various link state related measurements and prediction algorithms in order to accurately predict link failure in MANETs, while keeping bandwidth and energy overhead low. Our architecture can automatically adjust to varying environment, measurement availability, and prediction algorithm accuracy by dynamically adjusting and learning...
This paper presents an integrated approach to IP fast reroute (IPFRR) of both unicast and multicast paths in wireless mobile networks. A distinct feature of the proposed approach is that, instead of modifying existing routing protocols, it employs a soft handoff technique, i.e., temporarily installs pre-computed Loop Free Alternative Paths (LFAPs) until the co-existing routing protocol converges to...
In this paper, we propose a novel approach, which is termed heterogeneous intelligent filtering (HIF), for intelligent control and application data filtering in multi-domain heterogeneous networks. HIF creates intelligent gateways to rapidly and autonomously adapt the flow of information content to the changing mission needs and network characteristics. HIF employs a MANET management protocol (termed...
One of the major QoS goals for future battlefield networks (FBN) is to ensure multi-level precedence and preemption (MLPP). Ensuring MLPP is difficult, partly due to the networking architecture for FBN which consists of wired ??red?? network connected by encrypted wireless ??black?? network. The security requirements for FBN do not allow passing information from black to red networks. So when congestion...
Traditional approaches for testing MANET protocols and applications prior to field experimentation often involve simulation tools or small-sized physical testbeds. However, simulation tools typically do not run in real-time and rely on simplified models rather than a real system, while physical testbeds are prohibitively expensive to build and operate. A more practical method is to use emulation tools...
We describe the key design concepts of domain area planning utility (DAPU) developed by the PILSNER program to perform high-speed automated planning of future battlefield networks (FBNs). DAPU processes multiple inputs from resource planning such as nodes and their trajectories, planned ground- and air-tier nets, unit task organization (UTO) relationships, and typical communication requirements. It...
Routing for link state routing protocols such as OSPF is determined by computing shortest-paths on the network topology graph. In conventional routing the OSPF link costs are configured a-priori before the network is deployed, and remain fixed until manually changed. If subsequently, link quality degrades or alternate links become available, routing paths may become sub-optimal in terms of throughput...
In the tactical Internet, inter-domain links consist mostly of unreliable and low bandwidth wireless links. To enable seamless routing across different Autonomous Systems (ASes), we propose an inter-domain Traffic Engineering (TE) scheme to reroute traffic when congestion occurs. There are two components for the TE scheme. First, a Traffic Splitting (TS) scheme is used for load balancing among parallel...
In this paper, we investigate general handoff problem for ad hoc wireless networks in face of multiple heterogeneous wireless interfaces and non-trivial node mobility. The handoff problem in ad hoc networks has major differences with respect to its counterpart in infrastructure networks, as handoff decisions are not restricted to simple evaluation of single-hop performances of available link interfaces...
There exist a large amount of research efforts that claim cross-layer design in multi-hop wireless networks. However, almost all of such works use the idea of cross-layering in some ad hoc manner, and different cross-layer designs generally do not work together. To this end, we argue that cross-layer design in such networks should follow some systematic approach, in order to provide a common ground...
In our papers for MILCOM 2006 and 2007, we have presented an integrated architecture for seamless soft handoff in mobile ad hoc networks and demonstrated the good performance via showing that our handoff scheme can provide equivalent results as the benchmark with no handoff. In this position paper, we aim to investigate the general handoff problem in face of multiple heterogeneous wireless interfaces...
In this paper, we present two loop free alternative path (LFAP) computation algorithms for the seamless soft handoff (SHO) architecture proposed in [5] and its performance for tactical wireless mobile ad hoc networks. The proposed handoff architecture consists of several key components such as LFAP computation module, link quality prediction module, and link monitoring module. The key idea of the...
The CECOM MOSAIC ATD encompasses an integrated set of diverse technologies to demonstrate rapidly deployable, secure, robust, assured-QoS communications among mobile ad hoc nodes. The assured IP QoS technology solution integrates DiffServ based QoS resource management with centralized admission control over a dynamic tactical network environment. We describe an outdoor demonstration of our QoS technology...
To perform optimizations as the network changes dynamically, distributed network agents rely on information that is dispersed in the network. A data dissemination service for the agents can benefit from data filtering at selected nodes in a data distribution tree. Controlled dissemination filter (CDF) offers an efficient filtering functionality such as sifting, collection, aggregation, and scoping...
In this paper the network architecture under consideration is secure networking, in which an IPSec tunneling encryption device is located at the boundary between the insecure LAN and the secure WAN. This architecture has been used in many DoD tactical networks to satisfy the COMSEC requirements. This makes providing end-to-end QoS support in this type of network very challenging. To address this,...
To achieve a scalable open shortest path first (OSPF) routing domain, an OSPF autonomous system is partitioned into a number of non-backbone areas interconnected by a backbone area. While the design of scalable OSPF domains represents a network engineering challenge that is important to both civilian and military environments, very little has been published about how the process of OSPF area design...
The goals of URCA are two-fold: 1) to ensure that links are evenly loaded. URCA attempts to set link costs that ensure that most links are utilized for carrying traffic. This has the result of maximizing the effective capacity or increasing the number of users that can be supported by a given network infrastructure and 2) to ensure that the effect of soft link failures is minimized. These goals must...
The Dynamic Domain Optimization Agent (DDOA) is a novel network design agent that has been proposed in the PILSNER program to interact with a link topology manager to automate assignment of links to OSPF areas and the selection of area border routers. This paper describes a preliminary design of DDOA functionalities during mission execution, where a distributed community of DDOA agents uses the area...
We present an integrated architecture for seamless soft handoff in mobile ad hoc networks, where various managers residing on multiple layers are proposed to tackle handoff issues in a cross-layer and cooperative manner. At the link adaptation layer, the virtual interface provides link transparency to the upper layers and session management is handled at the interface manager. At the network layer,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.