Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985940
S. A. Shah, L. Bowman
This paper presents and discusses the Defense Information Service Network (DISN) global mobile wireless networking architecture to extend the range of broadband services to mobile users available to fixed users. The roaming and mobile users will have to operate across a wide range of network performance, and choosing among alternative media and overlays for best performance. Diverse wireless and wired networks are integrated through software that mediates between the mobile terminal and the networks it could possibly connect to, supporting the mobile users as it roams among the multiple networks. The overall objective of the paper is to introduce and resolve technical issues and problems in the development of a mobile and wireless DISN network services, and answer some of the questions on the implementation of the new services and systems.
{"title":"DISN global mobile broadband wireless networking services","authors":"S. A. Shah, L. Bowman","doi":"10.1109/MILCOM.2001.985940","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985940","url":null,"abstract":"This paper presents and discusses the Defense Information Service Network (DISN) global mobile wireless networking architecture to extend the range of broadband services to mobile users available to fixed users. The roaming and mobile users will have to operate across a wide range of network performance, and choosing among alternative media and overlays for best performance. Diverse wireless and wired networks are integrated through software that mediates between the mobile terminal and the networks it could possibly connect to, supporting the mobile users as it roams among the multiple networks. The overall objective of the paper is to introduce and resolve technical issues and problems in the development of a mobile and wireless DISN network services, and answer some of the questions on the implementation of the new services and systems.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.986017
S. Sud, W. Myrick, J. S. Goldstein, M. Zoltowski
A new reduced rank adaptive algorithm, for asynchronous DS-CDMA interference suppression in the presence of frequency selective multipath interference is presented. The algorithm employs a computationally efficient, correlation-subtraction architecture based on the multistage Wiener filter. It is shown that with enough sample support, this reduced rank technique performs as well as the full rank MMSE solution without requiring matrix inversion, eigendecomposition, or the construction of blocking matrices. At low sample support, the MWF performance is shown to exceed that of MMSE with the additional bonus of reduced complexity. System performance is characterized for a highly loaded asynchronous DS-CDMA system in the presence of multipath interference and the performance of the multistage Wiener filter is compared to the MMSE and RAKE receivers.
{"title":"A reduced rank MMSE receiver for a DS-CDMA system in frequency selective multipath","authors":"S. Sud, W. Myrick, J. S. Goldstein, M. Zoltowski","doi":"10.1109/MILCOM.2001.986017","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986017","url":null,"abstract":"A new reduced rank adaptive algorithm, for asynchronous DS-CDMA interference suppression in the presence of frequency selective multipath interference is presented. The algorithm employs a computationally efficient, correlation-subtraction architecture based on the multistage Wiener filter. It is shown that with enough sample support, this reduced rank technique performs as well as the full rank MMSE solution without requiring matrix inversion, eigendecomposition, or the construction of blocking matrices. At low sample support, the MWF performance is shown to exceed that of MMSE with the additional bonus of reduced complexity. System performance is characterized for a highly loaded asynchronous DS-CDMA system in the presence of multipath interference and the performance of the multistage Wiener filter is compared to the MMSE and RAKE receivers.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985825
David H. Stewart, Verizon Cleveland Ohio, W. Ivancic, T. L. Bell, B. A. Kachmar, D. Shell, K. Leung, Cisco Systems, Nasa Glenn
Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile router is software code that resides in a network router. A mobile router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both government and commercial sectors. This technology can be applied to the wireless battlefield and for near-planetary observation and sensing spacecraft. It enables communication via the Internet or intranets to aircraft. The mobile router can be incorporated into emergency vehicles, particularly ambulances and life-flight aircraft, to provide real-time connectivity back to hospital healthcare experts. Commercial applications include entertainment services, IP telephone and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft and, eventually, cars. This paper briefly describes the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications is described. The paper also highlights military and government networks that can benefit from the deployment of the mobile router and its associated applications.
{"title":"Application of mobile router to military communications","authors":"David H. Stewart, Verizon Cleveland Ohio, W. Ivancic, T. L. Bell, B. A. Kachmar, D. Shell, K. Leung, Cisco Systems, Nasa Glenn","doi":"10.1109/MILCOM.2001.985825","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985825","url":null,"abstract":"Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile router is software code that resides in a network router. A mobile router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both government and commercial sectors. This technology can be applied to the wireless battlefield and for near-planetary observation and sensing spacecraft. It enables communication via the Internet or intranets to aircraft. The mobile router can be incorporated into emergency vehicles, particularly ambulances and life-flight aircraft, to provide real-time connectivity back to hospital healthcare experts. Commercial applications include entertainment services, IP telephone and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft and, eventually, cars. This paper briefly describes the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications is described. The paper also highlights military and government networks that can benefit from the deployment of the mobile router and its associated applications.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115821611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985870
A. N. Zadeh, B. Jabbari
Wireless multihop networks with a cellular structure have the potential to support high data rate traffic at a reasonable degree of implementation complexity. We consider a cellular network architecture composed of base stations, routers, and terminals and focus on its throughput modeling. Simply adding routers to the current cellular networks may not improve the throughput, since relaying the packets by routers may generate the same amount of interference at the receivers. We derive a closed form formula for the probability density function of interference at each receiver and compare the numerical and simulation results for different path loss parameters.
{"title":"On the capacity modeling of multi-hop cellular packet CDMA networks","authors":"A. N. Zadeh, B. Jabbari","doi":"10.1109/MILCOM.2001.985870","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985870","url":null,"abstract":"Wireless multihop networks with a cellular structure have the potential to support high data rate traffic at a reasonable degree of implementation complexity. We consider a cellular network architecture composed of base stations, routers, and terminals and focus on its throughput modeling. Simply adding routers to the current cellular networks may not improve the throughput, since relaying the packets by routers may generate the same amount of interference at the receivers. We derive a closed form formula for the probability density function of interference at each receiver and compare the numerical and simulation results for different path loss parameters.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985772
M. Grzywa, W. Yurcik, L. Brumbaugh
Internet attacks are moving up the protocol stack to the application layer, effectively blinding lower-layer security prevention and detection techniques. It has been estimated that 40% of unplanned system downtime is due to software application failures. This paper describes a project to demonstrate survivability at the application layer. The goal is to replace a lost essential service by another service that supports mission fulfillment in a different but equivalent way. Application-level survivability, the ability to reconfigure an application to transparently maintain services when part of a system becomes unavailable, is the most flexible and comprehensive approach to supporting mission fulfillment since it can provide assurance over all lower layers within a networked system. We have developed resumable FTP, an application based on RFC 959, which has the ability to resume the download of a file after the download has been interrupted by users or by lower layers (loss of connection). FTP continues to be the most common method for bulk data transfer across networks and as high-performance network infrastructures have become established, default implementations of FTP have not kept pace. More importantly, FTP is similar to a class of future applications that use separate channels for data and control enabling long-lasting sessions. We present the design and use of rFTP and conclude with future architectures for providing application-layer survivability in other domains.
{"title":"Application-level survivability: resumable FTP","authors":"M. Grzywa, W. Yurcik, L. Brumbaugh","doi":"10.1109/MILCOM.2001.985772","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985772","url":null,"abstract":"Internet attacks are moving up the protocol stack to the application layer, effectively blinding lower-layer security prevention and detection techniques. It has been estimated that 40% of unplanned system downtime is due to software application failures. This paper describes a project to demonstrate survivability at the application layer. The goal is to replace a lost essential service by another service that supports mission fulfillment in a different but equivalent way. Application-level survivability, the ability to reconfigure an application to transparently maintain services when part of a system becomes unavailable, is the most flexible and comprehensive approach to supporting mission fulfillment since it can provide assurance over all lower layers within a networked system. We have developed resumable FTP, an application based on RFC 959, which has the ability to resume the download of a file after the download has been interrupted by users or by lower layers (loss of connection). FTP continues to be the most common method for bulk data transfer across networks and as high-performance network infrastructures have become established, default implementations of FTP have not kept pace. More importantly, FTP is similar to a class of future applications that use separate channels for data and control enabling long-lasting sessions. We present the design and use of rFTP and conclude with future architectures for providing application-layer survivability in other domains.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114719664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985768
K. Rohwer, T. Krout
Tactical internets (TI) present security challenges both consistent with and simultaneously unique to terrestrial based networks. Few large-scale TI demonstrations have occurred where security was a primary concern, and fewer yet have achieved Classified Type 1 and Sensitive But Unclassified (SBU) enclave connectivity to significant numbers of highly mobile Marine Corp squads, Army units, and ships at sea simultaneously. The Extending the Littoral Battlespace (ELB) Advanced Concept Technology Development (ACTD) demonstrated such a TI in 2001. ELB's overarching direction was to provide robust, reliable, and secure wireless, highly mobile TI. The TI focuses on providing a common tactical picture as well as other functions between shipboard command and control systems and the ground force end user, comprising Maine Corps and Army units. To meet the security challenges, ELB developed an unique security architecture and concepts to insure both data integrity and security. The security architecture included COTS and DoD type 1 wireless encryption, hardened Windows NT workstations, on-the-fly hard disk encryption, firewalls, and intrusion detection systems. This paper discusses the security concepts employed as a component of the ELB TI demonstration.
{"title":"Multiple levels of security in support of highly mobile tactical internets-ELB ACTD","authors":"K. Rohwer, T. Krout","doi":"10.1109/MILCOM.2001.985768","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985768","url":null,"abstract":"Tactical internets (TI) present security challenges both consistent with and simultaneously unique to terrestrial based networks. Few large-scale TI demonstrations have occurred where security was a primary concern, and fewer yet have achieved Classified Type 1 and Sensitive But Unclassified (SBU) enclave connectivity to significant numbers of highly mobile Marine Corp squads, Army units, and ships at sea simultaneously. The Extending the Littoral Battlespace (ELB) Advanced Concept Technology Development (ACTD) demonstrated such a TI in 2001. ELB's overarching direction was to provide robust, reliable, and secure wireless, highly mobile TI. The TI focuses on providing a common tactical picture as well as other functions between shipboard command and control systems and the ground force end user, comprising Maine Corps and Army units. To meet the security challenges, ELB developed an unique security architecture and concepts to insure both data integrity and security. The security architecture included COTS and DoD type 1 wireless encryption, hardened Windows NT workstations, on-the-fly hard disk encryption, firewalls, and intrusion detection systems. This paper discusses the security concepts employed as a component of the ELB TI demonstration.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985820
F. J. Block, C. Baum
A challenge in the design of wireless microsensor networks is the preservation of battery life in the microsensor nodes. Energy is expended not only in transmitting packets, but also in listening to the channel. This paper presents energy-preserving channel-access and routing protocols for self-organized communication in a wireless microsensor network containing a large number of low-cost nodes and a base station. The routing protocols are designed to use the remaining energy of the radios in making routing decisions. Performance is compared to a protocol that does not utilize energy information.
{"title":"Energy-efficient self-organizing communication protocols for wireless sensor networks","authors":"F. J. Block, C. Baum","doi":"10.1109/MILCOM.2001.985820","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985820","url":null,"abstract":"A challenge in the design of wireless microsensor networks is the preservation of battery life in the microsensor nodes. Energy is expended not only in transmitting packets, but also in listening to the channel. This paper presents energy-preserving channel-access and routing protocols for self-organized communication in a wireless microsensor network containing a large number of low-cost nodes and a base station. The routing protocols are designed to use the remaining energy of the radios in making routing decisions. Performance is compared to a protocol that does not utilize energy information.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985754
L. Jones
Advanced RF systems such as sofware-defined radio (SDR), given a high degree of agility, in spectrum access, modulation and routing discipline, offer new opportunities to achieve expanding mission requirements while optimizing spectrum utilization. Agile RF systems may be employed within a military environment to intelligently minimize the value-limiting effects of interference if we define "interference" to include all aspects of signal orthogonality. To fully exploit these opportunities, system acquisition principals need measures to evaluate alternative technical approaches and field users need a means to manage the employment of these systems. This paper suggests some directions for the development of measures of operational spectrum effectiveness (OSE) to aid the deployment of advanced wireless technology, including software-defined radio, by the DoD.
{"title":"Operational spectrum effectiveness: a performance metric for software defined radio","authors":"L. Jones","doi":"10.1109/MILCOM.2001.985754","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985754","url":null,"abstract":"Advanced RF systems such as sofware-defined radio (SDR), given a high degree of agility, in spectrum access, modulation and routing discipline, offer new opportunities to achieve expanding mission requirements while optimizing spectrum utilization. Agile RF systems may be employed within a military environment to intelligently minimize the value-limiting effects of interference if we define \"interference\" to include all aspects of signal orthogonality. To fully exploit these opportunities, system acquisition principals need measures to evaluate alternative technical approaches and field users need a means to manage the employment of these systems. This paper suggests some directions for the development of measures of operational spectrum effectiveness (OSE) to aid the deployment of advanced wireless technology, including software-defined radio, by the DoD.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985965
A. Tsirigos, Z. Haas
We propose a framework for multipath routing in mobile ad hoc networks (MANETs) and provide its analytical evaluation. The instability of the topology (e.g., failure of links) in this type of network, due to nodal mobility and changes in wireless propagation conditions, makes transmission of time-sensitive information a challenging problem. To combat the inherent unreliability of these networks, we propose a routing scheme that uses multiple paths simultaneously by splitting the information among the multitude of paths, so as to increase the probability that the essential portion of the information is received at the destination without incurring excessive delay. Our scheme works by adding an overhead to each packet, which is calculated as a linear function of the original packet bits. The resulting packet (information and overhead) is fragmented into smaller blocks and distributed over the available paths. Our goal, given the failure probabilities of the paths, is to find the optimal way to fragment and then distribute the blocks to the paths, so that the probability of reconstructing the original information at the destination is maximized. Our algorithm has low time-complexity, which is crucial since the path failure characteristics vary with time and the optimal block distribution has to be recalculated in real-time.
{"title":"Multipath routing in mobile ad hoc networks or how to route in the presence of frequent topology changes","authors":"A. Tsirigos, Z. Haas","doi":"10.1109/MILCOM.2001.985965","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985965","url":null,"abstract":"We propose a framework for multipath routing in mobile ad hoc networks (MANETs) and provide its analytical evaluation. The instability of the topology (e.g., failure of links) in this type of network, due to nodal mobility and changes in wireless propagation conditions, makes transmission of time-sensitive information a challenging problem. To combat the inherent unreliability of these networks, we propose a routing scheme that uses multiple paths simultaneously by splitting the information among the multitude of paths, so as to increase the probability that the essential portion of the information is received at the destination without incurring excessive delay. Our scheme works by adding an overhead to each packet, which is calculated as a linear function of the original packet bits. The resulting packet (information and overhead) is fragmented into smaller blocks and distributed over the available paths. Our goal, given the failure probabilities of the paths, is to find the optimal way to fragment and then distribute the blocks to the paths, so that the probability of reconstructing the original information at the destination is maximized. Our algorithm has low time-complexity, which is crucial since the path failure characteristics vary with time and the optimal block distribution has to be recalculated in real-time.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985960
L. Higgins, K. Hsu, G. McDowell, G. Nakamoto, W. Sax
The DoD needs reliable networks to support real-time, mission-critical applications and newer technologies such as IP-based voice and video. Network performance is sometimes reduced to unacceptable levels due to events such as congestion, equipment failure and information-warfare attacks. A popular solution to these problems is to increase available bandwidth within local area networks and across the wide area network. For the DoD, this option is often unavailable, especially for in-theater forces. It has been demonstrated that quality of service (QoS) policies, created with currently available commercial products, can improve the performance of IP-based networks by orders of magnitude. However, different QoS policies are needed to address specific scenarios such as a particular operational mission, a denial-of-service attack or bandwidth saturation. The network administrator must implement the appropriate QoS policy on an as-needed basis. This paper describes a prototype QoS event manager that automates the process of QoS policy implementation. Based on inputs from network monitoring devices, routers and humans, the QoS event manager selects an appropriate QoS policy and deploys it across the network. We discuss the QoS event manager design and consider issues regarding automated prioritization, tracking and deconfliction of QoS policies.
{"title":"The quality of service (QoS) event manager - automated implementation of QoS policies","authors":"L. Higgins, K. Hsu, G. McDowell, G. Nakamoto, W. Sax","doi":"10.1109/MILCOM.2001.985960","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985960","url":null,"abstract":"The DoD needs reliable networks to support real-time, mission-critical applications and newer technologies such as IP-based voice and video. Network performance is sometimes reduced to unacceptable levels due to events such as congestion, equipment failure and information-warfare attacks. A popular solution to these problems is to increase available bandwidth within local area networks and across the wide area network. For the DoD, this option is often unavailable, especially for in-theater forces. It has been demonstrated that quality of service (QoS) policies, created with currently available commercial products, can improve the performance of IP-based networks by orders of magnitude. However, different QoS policies are needed to address specific scenarios such as a particular operational mission, a denial-of-service attack or bandwidth saturation. The network administrator must implement the appropriate QoS policy on an as-needed basis. This paper describes a prototype QoS event manager that automates the process of QoS policy implementation. Based on inputs from network monitoring devices, routers and humans, the QoS event manager selects an appropriate QoS policy and deploys it across the network. We discuss the QoS event manager design and consider issues regarding automated prioritization, tracking and deconfliction of QoS policies.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}