The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
A voice conversation quality over IP networks is mainly affected by the end-to-end delay and the packet-loss rate. Various delay channel environment can cause the early/late arrival packet loss without actual packet loss. To overcome time-variant dynamics of transmission channels for IP telephone services, an adaptive playout-buffer scheduling is proposed. Previous playout-buffer schedulers focused...
The Network Centric Operations Industry Consortium (NCOIC) provides guidance for network centric operations (NCO) interoperable systems. The NCO interoperability framework (NIF) [1] provides an organizational construct and repository for enabling this guidance. NIF is a framework that assists industry to design interoperable systems. NIF is based upon standards, including patterns, principles, and...
In this paper, we propose two modified proportional fair scheduling algorithms for multiuser multicarrier systems. Compared to the existing proportional fair scheduling algorithms, our proposed algorithms are devised to support the delay constraint for the real-time applications as well as to guarantee a certain level of fairness. The simulation results show that the proposed scheduling algorithms...
The foray of wireless sensor networks into time-sensitive applications demands support for emergency services with guaranteed quality of service (QoS) bounds. We introduced CP-EDCA, a channel preemptive enhancement to the IEEE 802.11e EDCA standard, for guaranteed emergency medium access in distributed wireless environments. The performance results for emergency traffic depicted 50% uniform decrease...
One of the major QoS goals for future battlefield networks (FBN) is to ensure multi-level precedence and preemption (MLPP). Ensuring MLPP is difficult, partly due to the networking architecture for FBN which consists of wired ??red?? network connected by encrypted wireless ??black?? network. The security requirements for FBN do not allow passing information from black to red networks. So when congestion...
This paper explores the robust routing of messages among individuals. Traditional routing assumes individuals provide messages to a device connected to a communications network that assumes all responsibility for message delivery. Although each individual may have links to multiple communication devices (office computer, PDA, cell phone), messages are delivered only if there is an end-to-end communication...
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
Cognitive Radio (CR) networks present a difficult set of challenges due to the fluctuating nature of the available spectrum and wide ranging number of applications, each having different Quality of Service (QoS) requirements. This paper studies the key enabling technologies of Cognitive Radio and makes contributions in two key areas: sensing and learning. We shall first present the software testbed...
In cryptographically-partitioned networks, data within a packet can be used by routers in the plain-text enclaves to make quality of service (QoS) and precedence and preemption (P&P) decisions in regards to forwarding the packet and allocating resources for flows. However, while in a cipher-text shared transit network, the packet is encrypted and is opaque to routers in the transit network and...
This paper addresses the use of Resource ReSerVation Protocol-Aggregate (RSVP-AGG) at the tactical edge of the Air Force's Airborne Network (AN). Since the AN tactical edge can have different types of stub-networks accessing the AN (i.e., non-IP based legacy networks like Link 16, DiffServ based networks and IntServ based net-works), RSVP-AGG offers a common access approach regardless of the differences...
Faced with intense competition, network service providers, supported by their respective network operations centers (NOCs), must ensure the best possible quality of service (QoS) and corresponding quality of experience (QoE) for end-users or face the loss of business. QoE represents the perception of quality experienced by end-users of a real-time system, such as VoIP. The QoE challenge becomes significant...
In this paper, we discuss a general multi protocol label switching (MPLS) based traffic engineering (TE) approach for providing QoS based transportation in a geostationary satellite constellation network. As satellite constellation networks become more and more common, with on-board packet processing capabilities providing backbone services to support thousands of airborne and terrestrial terminals,...
This paper presents an analysis of satellite communications (SATCOM) systems that use Internet protocol (IP) with quality of service (QoS) metrics, and addresses IP efficiency measures. Key contributing elements for the IP efficiency are network structure, provisional efficiency, and bandwidth-on-demand features. IP bandwidth gains will also depend on the network size, the level of hierarchy, and...
Traditional approaches for testing MANET protocols and applications prior to field experimentation often involve simulation tools or small-sized physical testbeds. However, simulation tools typically do not run in real-time and rely on simplified models rather than a real system, while physical testbeds are prohibitively expensive to build and operate. A more practical method is to use emulation tools...
With the increasing size and complexity of emerging military communication networks, low footprint emulation methods are required to evaluate protocols, algorithms and user performance. In this paper we describe a new emulation architecture that is scalable, modular, and responds to real-time changes in topology and link characteristics. We use this scalable emulation testbed to evaluate system performance...
Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed time division multiple access (TDMA) scheme where different users contend for time slots via a signaling mechanism. Several key performance criteria for such protocols are the...
This paper will present a comparison of the basic resource definition in an OFDMA MAC/PHY layers for WiMAX and the TDMA/OFDM MAC/PHY. The majority of current radios in development for the US Army use TDMA/OFDM. This comparison will be conducted by defining and discussing the basic unit of system resource, e.g. the ??slot??. Following the protocol comparison, some simulation results comparing the performance...
Automatic dynamic resource management (AutoDRM) architecture is a framework to efficiently manage shared resources in the tactical network environments without human operator intervention. The autoDRM architecture was developed to resolve the resource contention issues and to improve the quality of service in the tactical network environments. The information herein describes key components of the...
This paper presents a joint network management approach being studied for interfacing network management of different US future force networks. The approach attempts to pass information between the cipher text network managers of the army, the navy and the air force networks such that intelligent decisions can be made as traffic flows between these networks. As the first straw man approach, the paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.