The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile free space optical (FSO) links suffer from frequent link blockages due to opaque obstructions or link degradations that can result in degraded or failed networks. In this paper, a dynamic layer-1 based topology and routing control methodology is presented for assuring connectivity in networks with fragile links. Core components of this methodology are described with special emphasis on the...
A future satellite communications system is envisioned that will provide a number of enhancements over predecessor satellite communication systems. It will employ high capacity packet switched service in space, high rate circuits between terminals, and utilize Dynamic Bandwidth Resource Allocation which dynamically assigns resources to terminals based on current channel conditions and traffic demand...
This paper explores the robust routing of messages among individuals. Traditional routing assumes individuals provide messages to a device connected to a communications network that assumes all responsibility for message delivery. Although each individual may have links to multiple communication devices (office computer, PDA, cell phone), messages are delivered only if there is an end-to-end communication...
Applications such as situational awareness are becoming more prevalent in highly dynamic tactical mesh networks and are placing high demand on existing RF network capacity. These applications require high aggregate data capacity but have some flexibility in packet by packet latency. Combined radio frequency and free space optical communication within a heavily scintillated atmospheric path behaves...
The desirable features of future optical high-capacity networks include higher stability, reconfigurability and security. In order to enable robust and self-managed automated operation, the network itself should be able to monitor the physical state of the network, automatically diagnose and repair the network, dynamically allocate resources, and redirect traffic. Optical performance monitoring can...
We investigate the risk associated with multihop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon ??cumulative security...
Similar to the customer / service provider network model that exists in the Internet today, the Department of Defense's (DoD's) Global Information Grid (GIG) will consist of various customer networks (Army, Navy, etc.) that interconnect over a common core. Customer networks will source and sink IP traffic, and a transit network(s) will provide connectivity between geographically disparate customer...
We study end-to-end delay performance of different routing algorithms in networks with random failures. Specifically, we compare delay performances of differential backlog (DB) and shortest path (SP) routing algorithms and show that DB routing outperforms SP routing in terms of throughput when the network is heavily loaded and/or the failure rate is high while SP routing achieves better delay performance...
In this paper, we investigate the packet transmission delay in a time varying satellite uplink. Specifically, we are interested in bounding the packet transmission delay within the terminal router for uplink traffic in a future satellite network. Previous work has provided delay bounds for wireline networks with a fixed transmission rate. However, these bounds do not apply to the time-varying satellite...
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
Frequency hopping provides some protection against multiple access interference in random-access ad hoc networks. Power control and the use of short routing hops can further reduce interference by promoting spatial reuse. If the network is fully connected, frequency hopping and power control alone may be sufficient to allow good throughput without the use of routing. This approach is particularly...
One of the major QoS goals for future battlefield networks (FBN) is to ensure multi-level precedence and preemption (MLPP). Ensuring MLPP is difficult, partly due to the networking architecture for FBN which consists of wired ??red?? network connected by encrypted wireless ??black?? network. The security requirements for FBN do not allow passing information from black to red networks. So when congestion...
Traditional approaches for testing MANET protocols and applications prior to field experimentation often involve simulation tools or small-sized physical testbeds. However, simulation tools typically do not run in real-time and rely on simplified models rather than a real system, while physical testbeds are prohibitively expensive to build and operate. A more practical method is to use emulation tools...
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
In this paper, we propose a distributed power management algorithm that will adaptively optimize network performance, reduce interference and preserve network connectivity with changing physical environment and network topology. The physical environment is modeled with log-distance path loss model, log-normal shadowing model and Rayleigh fading model. Interference is a prominent problem in multi-user...
This work addresses the development of an ECN-based MBAC algorithm for use over HAIPE. The proposed MBAC resides at the red enclaves, but leverages the ECN, which is defined in RFC 3168 and can be activated at the existing black routers. With these MBAC capabilities, ad-mission control policies are generated at the red enclaves to react to the black core congestion without the need to pass information...
In wireless networks, the conventional routing approach is to pre-select the next-hop receiver for a packet based on knowledge of the network topology. However, when the nodes experience fading that changes on the order of the packet duration, a conventional routing approach will often offer poor performance because the pre-selected receiver may not be able to recover the packet because of fading...
We propose a new class of message routing schemes for mobile wireless networks with intermittent network connectivity. The proposed schemes are based on swarm intelligence (SI) and exploit the statistical properties of time-varying network connectivity for opportunistic message forwarding. We also consider a special form of our proposed schemes which can be viewed as a marriage between the SI and...
We describe the key design concepts of domain area planning utility (DAPU) developed by the PILSNER program to perform high-speed automated planning of future battlefield networks (FBNs). DAPU processes multiple inputs from resource planning such as nodes and their trajectories, planned ground- and air-tier nets, unit task organization (UTO) relationships, and typical communication requirements. It...
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.