Extension of the infrastructure supporting network-centric operations to the tactical edge relies primarily on wireless communications. The nature of these communications ensures that the channel will vary dramaticall...
详细信息
Extension of the infrastructure supporting network-centric operations to the tactical edge relies primarily on wireless communications. The nature of these communications ensures that the channel will vary dramatically due to environmental and propagation effects, as well as potential interferers. Tactical operations introduce additional impairment due to mobility. With convergence to Internet protocol (IP) centric networking, voice communications at the tactical edge will be increasingly dependent on voice over IP (VoIP). In a packet-based protocol such as IP, two critical factors affecting latency sensitive applications such as VoIP are end-to-end delay and packet loss. Making a tradeoff between these two factors is of prime consideration in designing the jitter buffer playout scheme. Since voice packets are delayed in the network randomly, the jitter buffer is required to maintain consistently spaced playout of voice samples. A deep buffer protects against packet loss due to late arrival of packets. However, a deep buffer introduces mouth-to-ear delay that ultimately degrades the perceived voice quality. We describe an algorithm for dynamically estimating network delay using time series models. This enables the VoIP application to manage the jitter buffer to maintain a minimum playout buffer, while keeping the packet loss rate above a minimal threshold to maintain consistent voice quality. Our proposed algorithm limits sensitivity to short-term delay jitter and is very reactive to bursty network traffic. Simulation results show an improvement of 11% to 15% using metrics based on the subjective ITU E-model (R-factor) when compared against currently used playout methods. The improvement gain from the proposed method may be of particular significance for the challenges of supporting bursty dynamic changing wireless communication channel.
This paper proposes a novel proxy network topology. The proposed network topology exhibits several attributes that strengthen the proxy network's resistance to DoS attacks. Additionally, a novel reconfiguration al...
详细信息
This paper proposes a novel proxy network topology. The proposed network topology exhibits several attributes that strengthen the proxy network's resistance to DoS attacks. Additionally, a novel reconfiguration algorithm for a class of proxy network topologies is proposed, and shown to decrease the topologies' vulnerability to DoS attacks. Proxy networks enable applications to communicate with users without disclosing their IP's. An application's resistance to DoS attacks is improved by hiding it behind a proxy network. We evaluate the proposed topology's fault tolerance and its effectiveness in the resistance to DoS attacks
Carefully designed and managed services are essential for quality-demanding traffic, especially in large-scale IP networks where the aggregation of flows and the variety of traffic types are extensive. Although indivi...
详细信息
Carefully designed and managed services are essential for quality-demanding traffic, especially in large-scale IP networks where the aggregation of flows and the variety of traffic types are extensive. Although individual mechanisms have been widely investigated, not much related work exists on integrated approaches to QoS provisioning that are also feasible to implement. This work presents a thorough approach to the design, dimensioning and provisioning of a high priority service for high-quality demanding traffic over an IP network. Our approach employs efficient scheduling and a dynamic admission control scheme while demonstrating novel characteristics in terms of the quality offered to IP flows.
Reinforcement learning has been extensively studied and applied for generating cooperative behaviours in multi-robot systems. However, traditional reinforcement learning algorithms assume discrete state and action spa...
详细信息
Electromagnetic (EM) simulation of electromagnetic band gap (EBG) structures is computationally expensive when multiple iterations are required. For the first time, in this paper, a novel synthesis method for designin...
详细信息
Electromagnetic (EM) simulation of electromagnetic band gap (EBG) structures is computationally expensive when multiple iterations are required. For the first time, in this paper, a novel synthesis method for designing EBG structures has been proposed. The method consists of three major approaches: current path approximation method (CPA-method), border to border radius (B2BR), and power loss method (PLM). CPA-method is based on the current flow on a periodically patterned power/ground plane. CPA-method gives a final dimension of EBG structure for a desired stop band frequency. B2BR determines the maximum number of patches implementable within a given area. PLM calculates isolation level of an EBG structure based on the transmitted power. The proposed approaches have been combined together to synthesize an EBG structure for a given specification. The synthesized EBG structure with these approaches has been fabricated and verified with EM simulation and measurement. The EBG structure has shown excellent stop band and isolation level agreements with the desired specification
We experimentally demonstrate all-optical generation of 40 GHz pulse trains with binary code profiles from a 10 GHz uniform input pulse train using a lattice-form Mach-Zehnder interferometer fabricated on a silica-bas...
详细信息
We experimentally demonstrate all-optical generation of 40 GHz pulse trains with binary code profiles from a 10 GHz uniform input pulse train using a lattice-form Mach-Zehnder interferometer fabricated on a silica-based planar lightwave circuit
A novel approach to geo-locate sensor-nodes in a Ricean fading environment is presented. For localization, this work considers autocorrelation characteristics of short term fading that are typically averaged out in tr...
详细信息
A novel approach to geo-locate sensor-nodes in a Ricean fading environment is presented. For localization, this work considers autocorrelation characteristics of short term fading that are typically averaged out in traditional signal-strength based algorithms. Location attributes of the sensor nodes are determined by minimizing the squared error between the estimated autocorrelation function and its theoretical approximation. The theoretical approximation of the autocorrelation function is derived in closed form from Aulin's three-dimensional channel model. It is shown that despite noisy measurements and weak line-of-sight signal, the proposed method estimates coordinates of sensor nodes within an error of less than plusmn5% for signal-to-noise ratios higher than 20 dB.
Grid computing provides new solutions for numerous complex problems. It is an inevitable trend to implement the distributed parallel computing of large-scale problems with the grid. This paper presents two implementat...
详细信息
Grid computing provides new solutions for numerous complex problems. It is an inevitable trend to implement the distributed parallel computing of large-scale problems with the grid. This paper presents two implementations for distributed parallel computing on globus toolkit, a wide-used grid environment. The first implementation, loosely coupled parallel services is used to achieve the large-scale parallel computing that can be broken down into independent sub-jobs by using the corresponding implementation framework, and the second implementation, grid MPI parallel program is able to deal with specialized applications, which can't easily be split up into numerous independent chunks, by using the proposed implementation framework. Finally, two examples of large-scale parallel computing based on proposed implementations are achieved and the experimental results are shown. We make a beneficial attempt to implement distributed parallel computing on grid computing environments
As the IPv6 networks rapidly deployed, the transition problem has been changed. Because the transition of applications is a steady process with a far longer duration in comparison to the transition of infrastructure, ...
详细信息
As the IPv6 networks rapidly deployed, the transition problem has been changed. Because the transition of applications is a steady process with a far longer duration in comparison to the transition of infrastructure, providers cannot give up the duty of serving IPv4 traffics for the time being. On the other hand, operating a dual-stack backbone is highly costing for large-scale deployment of new networks. In this paper, a new technique of forwarding IPv4 traffics in IPv6-only backbone is developed. Rather than the ever-existing tunneling approaches, the proposed one is automatic and stateless for end nodes, without explicit tunneling. The route entries for delivering IPv4 traffics are well aggregated on the borders of IPv6 autonomous systems. This makes the technique suitable for large-scale deployment in an inter-domain networking environment
暂无评论