Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415881
Kei Kinoshita, H. Ochiai
Recent hardware advances allow more signal processing functionality to be integrated into a single chip. In sensor networks, the wireless nodes are typically operated with small batteries for which their replacement, when not impossible, is very difficult and expensive. Thus, minimizing the energy consumption of transmitting sensor nodes is an important issue on the design of such communication systems. The previous work in the literature proposes modulation as well as coding optimization considering uncoded and coded bit error rate (BER) of M-ary QAM as well as its average mutual information. However, these approaches do not address the coded case with finite frame length, which is always the case in practical systems. In this paper, we consider a design of coding and modulation that minimizes the transmit circuit energy under finite codeword length constraint of capacity-approaching channel codes and analyze its performance through simulation using regular low-density parity-check (LDPC) codes in a point-to-point communication link. The results are also compared with those of information-theoretic analysis based on the mutual information rate.
{"title":"Energy minimization of wireless sensor networks based on modulation and coding optimization under finite frame length constraint","authors":"Kei Kinoshita, H. Ochiai","doi":"10.1109/MILCOM.2012.6415881","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415881","url":null,"abstract":"Recent hardware advances allow more signal processing functionality to be integrated into a single chip. In sensor networks, the wireless nodes are typically operated with small batteries for which their replacement, when not impossible, is very difficult and expensive. Thus, minimizing the energy consumption of transmitting sensor nodes is an important issue on the design of such communication systems. The previous work in the literature proposes modulation as well as coding optimization considering uncoded and coded bit error rate (BER) of M-ary QAM as well as its average mutual information. However, these approaches do not address the coded case with finite frame length, which is always the case in practical systems. In this paper, we consider a design of coding and modulation that minimizes the transmit circuit energy under finite codeword length constraint of capacity-approaching channel codes and analyze its performance through simulation using regular low-density parity-check (LDPC) codes in a point-to-point communication link. The results are also compared with those of information-theoretic analysis based on the mutual information rate.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78377384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415756
Yi Shi, Y. Sagduyu, Jason H. Li
We design a low-complexity solution to multi-layer optimization in multi-hop wireless networks with throughput objectives. Considering channel sensing and power control at the physical layer, we formulate resource allocation as a non-convex throughput optimization problem that allows distributed implementation. We develop a genetic algorithm to solve this physical layer problem with local information only and then formulate a localized back-pressure algorithm to make routing, scheduling, and frequency band assignments at the link and network layers along with physical-layer considerations. We extend our multi-layer solution to cognitive radio networks with different user classes and evaluate our analytical solution via simulations. We also present hardware-in-the-loop emulation test results obtained with real radio transmissions over emulated channels and verify the performance of our distributed multilayer optimization solution for multi-hop wireless networks.
{"title":"Low complexity multi-layer optimization for multi-hop wireless networks","authors":"Yi Shi, Y. Sagduyu, Jason H. Li","doi":"10.1109/MILCOM.2012.6415756","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415756","url":null,"abstract":"We design a low-complexity solution to multi-layer optimization in multi-hop wireless networks with throughput objectives. Considering channel sensing and power control at the physical layer, we formulate resource allocation as a non-convex throughput optimization problem that allows distributed implementation. We develop a genetic algorithm to solve this physical layer problem with local information only and then formulate a localized back-pressure algorithm to make routing, scheduling, and frequency band assignments at the link and network layers along with physical-layer considerations. We extend our multi-layer solution to cognitive radio networks with different user classes and evaluate our analytical solution via simulations. We also present hardware-in-the-loop emulation test results obtained with real radio transmissions over emulated channels and verify the performance of our distributed multilayer optimization solution for multi-hop wireless networks.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78448306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415783
Jingwei Huang, D. Nicol
Modern military activities involve significant data sharing across security domains. We present the concepts and architecture of a Mission-oriented Multi-domain Multi-level security Graphics Server (M3GS) in the environment of GIG 2.0 and cloud computing. M3GS aims at providing information support for a dynamic team collaborating on a mission of warfighting, intelligence, anti-terrorism, or rescue and disaster relief; information providers input data (with various security labels in different security domains) into M3GS, and through M3GS, those data are displayed with proper widgets on the screens of information clients permitted to access; what data can flow to which screen is governed by security policies. While the Bell-LaPadula model is used to enforce traditional mandatory access control, a new challenge is that the data shared have different owners from different security domains, and are subject to their own security policies. We address this problem by using dynamic provenance-dependent attribute-based policies.
{"title":"Security and provenance in M3GS for cross-domain information sharing","authors":"Jingwei Huang, D. Nicol","doi":"10.1109/MILCOM.2012.6415783","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415783","url":null,"abstract":"Modern military activities involve significant data sharing across security domains. We present the concepts and architecture of a Mission-oriented Multi-domain Multi-level security Graphics Server (M3GS) in the environment of GIG 2.0 and cloud computing. M3GS aims at providing information support for a dynamic team collaborating on a mission of warfighting, intelligence, anti-terrorism, or rescue and disaster relief; information providers input data (with various security labels in different security domains) into M3GS, and through M3GS, those data are displayed with proper widgets on the screens of information clients permitted to access; what data can flow to which screen is governed by security policies. While the Bell-LaPadula model is used to enforce traditional mandatory access control, a new challenge is that the data shared have different owners from different security domains, and are subject to their own security policies. We address this problem by using dynamic provenance-dependent attribute-based policies.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77281742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415694
B. Ganguly, Buster O. Holzbauer, K. Kar, Kevin Battle
TCP is the ubiquitous transport protocol in the Internet. However, in a wireless ad-hoc environment where links are unreliable, TCP causes a number of performance issues. The key reason behind this is that TCP considers all packet losses to be due to congestion and reduces its send rate, which is not necessarily appropriate in a lossy ad-hoc environment. In prior work, we have designed Loss Tolerant TCP (LT-TCP) [1], [2], which extends TCP towards making it more efficient and robust in a wireless ad-hoc environment. LT-TCP uses Explicit Congestion Notification (ECN) and forward error correction (FEC) to mitigate the effects of random packet losses. The protocol uses these mechanisms to both distinguish between congestion and other losses, and recover from losses due to lossy wireless links. In this paper, we describe the implementation of LT-TCP in the Linux operating system kernel, and present and analyze initial performance results for the protocol on lossy links. Results show that LT-TCP provides much improved performance over TCP over lossy connections that model ad-hoc networks. In addition, it shows that performance of LT-TCP is nearly linear with loss rate, whereas TCP suffers disproportionately as loss rate increases. These promising implementation results point to further experimentation for LT-TCP, including a push towards Internet standards bodies.
{"title":"Loss-Tolerant TCP (LT-TCP): Implementation and experimental evaluation","authors":"B. Ganguly, Buster O. Holzbauer, K. Kar, Kevin Battle","doi":"10.1109/MILCOM.2012.6415694","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415694","url":null,"abstract":"TCP is the ubiquitous transport protocol in the Internet. However, in a wireless ad-hoc environment where links are unreliable, TCP causes a number of performance issues. The key reason behind this is that TCP considers all packet losses to be due to congestion and reduces its send rate, which is not necessarily appropriate in a lossy ad-hoc environment. In prior work, we have designed Loss Tolerant TCP (LT-TCP) [1], [2], which extends TCP towards making it more efficient and robust in a wireless ad-hoc environment. LT-TCP uses Explicit Congestion Notification (ECN) and forward error correction (FEC) to mitigate the effects of random packet losses. The protocol uses these mechanisms to both distinguish between congestion and other losses, and recover from losses due to lossy wireless links. In this paper, we describe the implementation of LT-TCP in the Linux operating system kernel, and present and analyze initial performance results for the protocol on lossy links. Results show that LT-TCP provides much improved performance over TCP over lossy connections that model ad-hoc networks. In addition, it shows that performance of LT-TCP is nearly linear with loss rate, whereas TCP suffers disproportionately as loss rate increases. These promising implementation results point to further experimentation for LT-TCP, including a push towards Internet standards bodies.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"240 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79147375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415570
Igor Pedan, Bow-Nan Cheng
Timely and accurate situational awareness is one of the key elements of any effective military campaign. As such, significant effort has been invested in the DoD to share location, blue force tracking, and other track data to enable commanders to make effective decisions. What has been less available are network and link visualization tools for network administrators at the tactical edge to quickly diagnose problems and assess the performance of highly intermittent networks. Although many radio systems have built-in proprietary tools that show connectivity diagrams, these tools are extremely difficult to adapt to other systems due to their closed nature. In this paper, we present a real-time open source network visualization tool for rapid network and link situational awareness on heterogeneous networks. Using widely available software such as Google Earth and various distribution systems, we show that network connectivity over several heterogeneous radio systems can be easily visualized to aid in decision making1.
{"title":"An open source situational awareness display for administering heterogeneous networks on the tactical edge","authors":"Igor Pedan, Bow-Nan Cheng","doi":"10.1109/MILCOM.2012.6415570","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415570","url":null,"abstract":"Timely and accurate situational awareness is one of the key elements of any effective military campaign. As such, significant effort has been invested in the DoD to share location, blue force tracking, and other track data to enable commanders to make effective decisions. What has been less available are network and link visualization tools for network administrators at the tactical edge to quickly diagnose problems and assess the performance of highly intermittent networks. Although many radio systems have built-in proprietary tools that show connectivity diagrams, these tools are extremely difficult to adapt to other systems due to their closed nature. In this paper, we present a real-time open source network visualization tool for rapid network and link situational awareness on heterogeneous networks. Using widely available software such as Google Earth and various distribution systems, we show that network connectivity over several heterogeneous radio systems can be easily visualized to aid in decision making1.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"58 5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79262305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415695
Xia Li, Zhen Hu, R. Qiu, M. Wicks
One of the major objectives of cognitive radar is to form a dynamic closed feedback loop to adapt the spectrum of transmit waveforms to avoid certain interference. In this paper, we build an automatic closed-loop cognitive radar to support experimental study of the radar system in real-world situations. Convex optimization is applied to jointly design sounding waveforms and the matched filters with spectral power suppressed in arbitrary bands and with low correlation sidelobes as well. Target localization is demonstrated under strong interferences. Experimental results are provided to evaluate the performance of the cognitive radar system.
{"title":"Experimental demonstration of cognitive radar for target localization under strong interference","authors":"Xia Li, Zhen Hu, R. Qiu, M. Wicks","doi":"10.1109/MILCOM.2012.6415695","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415695","url":null,"abstract":"One of the major objectives of cognitive radar is to form a dynamic closed feedback loop to adapt the spectrum of transmit waveforms to avoid certain interference. In this paper, we build an automatic closed-loop cognitive radar to support experimental study of the radar system in real-world situations. Convex optimization is applied to jointly design sounding waveforms and the matched filters with spectral power suppressed in arbitrary bands and with low correlation sidelobes as well. Target localization is demonstrated under strong interferences. Experimental results are provided to evaluate the performance of the cognitive radar system.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"117 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79318303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415788
H. Rutagemwa, Li Li, Phil J. Vigneron
In this paper, we develop a framework for studying the performance of guaranteed and best-effort data delivery services over wireless tactical networks with multiple relays and multiple clusters. In particular, we apply the analysis technique to a convoy topology and incorporate practical models for narrowband VHF radios and propagation to evaluate the network performance. The numerical results have demonstrated the performance tradeoffs between throughput and efficiency/robustness over a wide range of radio modes and network configurations. These results lead to approaches for wireless networking optimized for tactical radios in terrestrial environments.
{"title":"Cross-layer modeling and analysis of multihop tactical networking in convoy topology","authors":"H. Rutagemwa, Li Li, Phil J. Vigneron","doi":"10.1109/MILCOM.2012.6415788","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415788","url":null,"abstract":"In this paper, we develop a framework for studying the performance of guaranteed and best-effort data delivery services over wireless tactical networks with multiple relays and multiple clusters. In particular, we apply the analysis technique to a convoy topology and incorporate practical models for narrowband VHF radios and propagation to evaluate the network performance. The numerical results have demonstrated the performance tradeoffs between throughput and efficiency/robustness over a wide range of radio modes and network configurations. These results lead to approaches for wireless networking optimized for tactical radios in terrestrial environments.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84224914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415837
J. Ashdown, G. Saulnier, T. Lawry, K. Wilt, H. Scarton
This paper presents methods to achieve high data transmission rates through metallic barriers using ultrasonic signalling techniques. Due to the frequency selective nature of acoustic-electric channels, orthogonal frequency division multiplexing (OFDM) is employed which achieves high spectral efficiency. Multiple parallel channels are used to further increase data rates. Multiple-input multiple-output (MIMO) techniques are used to reduce crosstalk that would otherwise greatly limit performance and achievable data rates. Several crosstalk mitigation techniques are investigated and their theoretical capacity performances are determined for the general case of A transmitters and A receivers (i.e. A×A MIMO). A physical MIMO acoustic-electric channel array is formed using a 40 mm (1.575 in) thick steel barrier with seven pairs of 4 MHz nominal resonant frequency piezoelectric disk transducers, each with 10 mm (0.394 in) diameter. To investigate the effects of crosstalk, the transducers are closely spaced, and each transmitter-receiver pair is coaxially aligned on opposing sides of the metallic barrier. It is shown that, with the use of crosstalk mitigation techniques, the aggregate multichannel capacity performance scales linearly with the number of channels used and approaches 700 Mbps at high average signal-to-noise ratio (SNR) levels. Finally, the use of bit-loading techniques are explored using several levels of rectangular quadrature amplitude modulation (QAM), and the achievable data rates are compared with each other and to the multichannel theoretical capacity performances.
{"title":"High-rate ultrasonic communication through metallic barriers using MIMO-OFDM techniques","authors":"J. Ashdown, G. Saulnier, T. Lawry, K. Wilt, H. Scarton","doi":"10.1109/MILCOM.2012.6415837","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415837","url":null,"abstract":"This paper presents methods to achieve high data transmission rates through metallic barriers using ultrasonic signalling techniques. Due to the frequency selective nature of acoustic-electric channels, orthogonal frequency division multiplexing (OFDM) is employed which achieves high spectral efficiency. Multiple parallel channels are used to further increase data rates. Multiple-input multiple-output (MIMO) techniques are used to reduce crosstalk that would otherwise greatly limit performance and achievable data rates. Several crosstalk mitigation techniques are investigated and their theoretical capacity performances are determined for the general case of A transmitters and A receivers (i.e. A×A MIMO). A physical MIMO acoustic-electric channel array is formed using a 40 mm (1.575 in) thick steel barrier with seven pairs of 4 MHz nominal resonant frequency piezoelectric disk transducers, each with 10 mm (0.394 in) diameter. To investigate the effects of crosstalk, the transducers are closely spaced, and each transmitter-receiver pair is coaxially aligned on opposing sides of the metallic barrier. It is shown that, with the use of crosstalk mitigation techniques, the aggregate multichannel capacity performance scales linearly with the number of channels used and approaches 700 Mbps at high average signal-to-noise ratio (SNR) levels. Finally, the use of bit-loading techniques are explored using several levels of rectangular quadrature amplitude modulation (QAM), and the achievable data rates are compared with each other and to the multichannel theoretical capacity performances.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80906279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415809
Brittany Clore, M. Dunlop, R. Marchany, J. Tront
The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these needs; however, there are not many production IPv6 networks available for testing. Simulation solves this problem in a cost effective manner. Specifically, OPNET Modeler provides the capability to simulate an IPv6 network. Additionally, OPNET's System-in-the-Loop, an add-on module, allows for real devices to be tested over the simulated network. This software allows for custom IPv6 security applications to be tested before moving to a live network. This paper evaluates a custom IPv6 security application by simulating it using OPNET Modeler and the System-in-the-Loop module. The results show that the simulation was effective in pinpointing some flaws in design but ultimately it proved that the application is valid.
{"title":"Validating a custom IPv6 security application using OPNET modeler","authors":"Brittany Clore, M. Dunlop, R. Marchany, J. Tront","doi":"10.1109/MILCOM.2012.6415809","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415809","url":null,"abstract":"The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these needs; however, there are not many production IPv6 networks available for testing. Simulation solves this problem in a cost effective manner. Specifically, OPNET Modeler provides the capability to simulate an IPv6 network. Additionally, OPNET's System-in-the-Loop, an add-on module, allows for real devices to be tested over the simulated network. This software allows for custom IPv6 security applications to be tested before moving to a live network. This paper evaluates a custom IPv6 security application by simulating it using OPNET Modeler and the System-in-the-Loop module. The results show that the simulation was effective in pinpointing some flaws in design but ultimately it proved that the application is valid.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88240936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415828
O. Challa, J. Mcnair
CubeSat is a pico satellite weighing one kilogram, measuring one liter in volume and is used primarily for space research. Low data rate communication limits the use of CubeSats for missions like imaging and remote sensing. In this paper we study how power, volume and geometry constraints of a CubeSat satellite cripple CubeSat communications and introduce CubeSat Torrent, a Torrent like distributed communication system, for CubeSat clusters. CubeSat Torrent aims to increase the downlink and uplink speeds of large files by distributing pieces of the files to CubeSats in the cluster and downloading different pieces of the files simultaneously from different CubeSats. The proposed system proved, through simulation experiments, to substantially improve the download and upload times of large files by a factor of about the size of cluster. Future work will include Distributed File System and Distributed Processing Framework for CubeSat clusters to store large amounts of data and do large scale data processing.
{"title":"CubeSat Torrent: Torrent like distributed communications for CubeSat satellite clusters","authors":"O. Challa, J. Mcnair","doi":"10.1109/MILCOM.2012.6415828","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415828","url":null,"abstract":"CubeSat is a pico satellite weighing one kilogram, measuring one liter in volume and is used primarily for space research. Low data rate communication limits the use of CubeSats for missions like imaging and remote sensing. In this paper we study how power, volume and geometry constraints of a CubeSat satellite cripple CubeSat communications and introduce CubeSat Torrent, a Torrent like distributed communication system, for CubeSat clusters. CubeSat Torrent aims to increase the downlink and uplink speeds of large files by distributing pieces of the files to CubeSats in the cluster and downloading different pieces of the files simultaneously from different CubeSats. The proposed system proved, through simulation experiments, to substantially improve the download and upload times of large files by a factor of about the size of cluster. Future work will include Distributed File System and Distributed Processing Framework for CubeSat clusters to store large amounts of data and do large scale data processing.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86069864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}