The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Telecommunication networks spanning large areas are subject to various failures. A survivable network provisioning scheme addressing multiple levels of network failures, especially disaster failures which may take out many network components, is desirable in the future Internet. In this study, we propose and investigate the characteristics of a multistate multipath provisioning scheme for telecom...
Similar to the customer / service provider network model that exists in the Internet today, the Department of Defense's (DoD's) Global Information Grid (GIG) will consist of various customer networks (Army, Navy, etc.) that interconnect over a common core. Customer networks will source and sink IP traffic, and a transit network(s) will provide connectivity between geographically disparate customer...
In this paper I propose an approach to retrofit delay and disruption tolerance directly into the Internet Protocol. I discuss the benefits, limitations, and architectural implications - within the context of end-to-end arguments for the Internet and secure IP-based black core networks - of this retrofit.
Inter-domain routing for MANETs (mobile ad hoc networks) draws increasing attention because of military and vehicular applications. The existing border gateway protocol (BGP) is the de facto inter-domain routing protocol for the Internet. But BGP is not applicable to MANETs because the BGP design is based on a static Internet which does not support dynamic discovery of members, and cannot scale to...
The Transmission Control Protocol (TCP) is ubiquitous, sophisticated, and effective. It also prevents the innovation needed to improve delivery of Internet services to the wireless tactical edge of DOD operations. We argue in this paper that TCP should be used as a short-range local access protocol for COTS compatibility rather than as the primary end-to-end transport protocol for the tactical GIG...
A number of Intrusion Detection Systems (IDS) research efforts have demonstrated that network-based attacks can be detected by modeling normal network packet payloads and watching for anomalies. In this paper, we explore a data mining technique based on Principal Component Analysis that can identify specific features within packet payloads that are highly representative of the network traffic. of...
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication capability. Unlike previously proposed schemes that...
This work addresses the development of an ECN-based MBAC algorithm for use over HAIPE. The proposed MBAC resides at the red enclaves, but leverages the ECN, which is defined in RFC 3168 and can be activated at the existing black routers. With these MBAC capabilities, ad-mission control policies are generated at the red enclaves to react to the black core congestion without the need to pass information...
It is widely known that TCP's congestion control algorithm can cause it to under-perform when round trip times and error rates are high. Performance Enhancing Proxies (PEPs) can improve performance by breaking end-to-end TCP connections and using a separate, tuned transport protocol to transit 'stressed' links. While PEPs can be tuned to work well when a single pair of PEPs bracket a fixed-rate link,...
In this paper, we study the network queuing effects on the VoIP delay and jitter. Two service polices, FIFO and Differentiated Service (DiffServ), are studied with repect to the queuing delays of VoIP packets. First, we present our assumptions for delay characterization. Then, we provide a model for the traffic flow. We create a ??Markovian+Deterministic (M+D)?? model in order to represent the traffic...
In the tactical Internet, inter-domain links consist mostly of unreliable and low bandwidth wireless links. To enable seamless routing across different Autonomous Systems (ASes), we propose an inter-domain Traffic Engineering (TE) scheme to reroute traffic when congestion occurs. There are two components for the TE scheme. First, a Traffic Splitting (TS) scheme is used for load balancing among parallel...
The net-centric vision for the global information grid (GIG) includes evolution toward Internet protocol (IP) based services. IP service profiles and in-service traffic flows in support of Warfighters in evolving deployments are highly variable, with end-to-end (E2E) flows typically spanning both terrestrial and satellite communications (SATCOM) networks. Communications planning, management and control...
Site multi-homing is an important capability in modern military networks. Resilience of a site is greatly enhanced when it has multiple upstream connections to the global information grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site can be important in reducing delays and packet loss over low-bandwidth and/or high-delay uplinks. Current approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.