Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1606030
M. Donahoo, B. Steckler
Wireless networks using 802.16 WiMAX Technology in a "Fly-Away" Communications (FLAC) package. Terrestrial communication networks continue to evolve very fast, with the extension offered by new IEEE 802.16 promising critical advantages benefiting civilian, government, Homeland Security, and crisis management in addition to the commercial market. A real world situation, such as the recent Tsunami in South East Asia is a good example of a complete collapse of the existing communications infrastructure from a natural disaster. Remarkable results were achieved by a group led by the Naval Postgraduate School (NFS) in establishing an ad-hoc communications network using a satellite ground station, an IEEE 802.16 router servicing an 802.11 cell phone network in Thailand shortly after all communication infrastructure was lost to the recent Tsunami. This event gave rise to the concept that a standard "Fly-Away" mobile communications network was a critical asset for world associations such as the UN, FEMA, Red Cross, NATO, etc. that could be procured via a GSA catalog by anyone and used to support rural, and disaster areas that have either lost, or just do not have a communications infrastructure in place. Military versions would connect to future transformation communications systems being designed, such as TSAT, MUOS, JTRS, IWN, all designed to provide a high band width, multimedia communication backbone. The evolving capabilities of 802.16 are the natural extension of the terrestrial global information grid to mobile platforms, as well as taking the information that "Last mile" to provide basic communication, telemedicine and situational awareness.
{"title":"Emergency mobile wireless networks","authors":"M. Donahoo, B. Steckler","doi":"10.1109/MILCOM.2005.1606030","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606030","url":null,"abstract":"Wireless networks using 802.16 WiMAX Technology in a \"Fly-Away\" Communications (FLAC) package. Terrestrial communication networks continue to evolve very fast, with the extension offered by new IEEE 802.16 promising critical advantages benefiting civilian, government, Homeland Security, and crisis management in addition to the commercial market. A real world situation, such as the recent Tsunami in South East Asia is a good example of a complete collapse of the existing communications infrastructure from a natural disaster. Remarkable results were achieved by a group led by the Naval Postgraduate School (NFS) in establishing an ad-hoc communications network using a satellite ground station, an IEEE 802.16 router servicing an 802.11 cell phone network in Thailand shortly after all communication infrastructure was lost to the recent Tsunami. This event gave rise to the concept that a standard \"Fly-Away\" mobile communications network was a critical asset for world associations such as the UN, FEMA, Red Cross, NATO, etc. that could be procured via a GSA catalog by anyone and used to support rural, and disaster areas that have either lost, or just do not have a communications infrastructure in place. Military versions would connect to future transformation communications systems being designed, such as TSAT, MUOS, JTRS, IWN, all designed to provide a high band width, multimedia communication backbone. The evolving capabilities of 802.16 are the natural extension of the terrestrial global information grid to mobile platforms, as well as taking the information that \"Last mile\" to provide basic communication, telemedicine and situational awareness.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115794557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1605904
J. Thomas
Novel and conceptually simple scheduling and routing algorithms are proposed for unstructured (ad hoc) networks. These algorithms are based on an intelligent interference and power management paradigm that borrows notions from successive decoding and cancellation and transmission power control in order to exploit and thereby (or otherwise) suppress interference (thus departing from the "collision-avoidance" objective and its attendant burdens of eliminating hidden nodes) while supporting differential services based on preassigned traffic priorities. The application of the proposed algorithms to quasi-structured networks - where certain nodes may possess additional capabilities and thus alleviate any processing overheads - is also considered
{"title":"Cross-layer scheduling and routing for unstructured and quasi-structured wireless networks","authors":"J. Thomas","doi":"10.1109/MILCOM.2005.1605904","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605904","url":null,"abstract":"Novel and conceptually simple scheduling and routing algorithms are proposed for unstructured (ad hoc) networks. These algorithms are based on an intelligent interference and power management paradigm that borrows notions from successive decoding and cancellation and transmission power control in order to exploit and thereby (or otherwise) suppress interference (thus departing from the \"collision-avoidance\" objective and its attendant burdens of eliminating hidden nodes) while supporting differential services based on preassigned traffic priorities. The application of the proposed algorithms to quasi-structured networks - where certain nodes may possess additional capabilities and thus alleviate any processing overheads - is also considered","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124244990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1606137
K. Chugg, P. Thiennviboon, Georgios D. Dimou, Paul Gray, Jordan Melzer
Modern turbo-like codes (TLCs), including concatenated convolutional codes and low density parity check (LDPC) codes, have been shown to approach the Shannon limit on the additive white Gaussian noise (AWGN) channel Many design aspects remain relatively unexplored, however, including TLC design for maximum flexibility, very low error rate performance, and amenability to simple or very high-speed hardware codecs. In this paper we address these design issues by suggesting a new class of TLCs that we call systematic with serially concatenated parity (S-SCP) codes. One example member of this family is the Generalized (or Systematic) repeat accumulate code. We describe two other members of this family that both exhibit good performance over a wide range of block sizes, code rates, modulation, and target error probability. One of these provides error floor performance not previously demonstrated with any other TLC construction and the other is shown to offer very low complexity decoding with good performance. These two codes have been implemented in high-speed hardware codecs and performance curves based on these down to bit error rates below 10-10 are provided.
{"title":"New class of turbo-like codes with universally good performance and high-speed decoding","authors":"K. Chugg, P. Thiennviboon, Georgios D. Dimou, Paul Gray, Jordan Melzer","doi":"10.1109/MILCOM.2005.1606137","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606137","url":null,"abstract":"Modern turbo-like codes (TLCs), including concatenated convolutional codes and low density parity check (LDPC) codes, have been shown to approach the Shannon limit on the additive white Gaussian noise (AWGN) channel Many design aspects remain relatively unexplored, however, including TLC design for maximum flexibility, very low error rate performance, and amenability to simple or very high-speed hardware codecs. In this paper we address these design issues by suggesting a new class of TLCs that we call systematic with serially concatenated parity (S-SCP) codes. One example member of this family is the Generalized (or Systematic) repeat accumulate code. We describe two other members of this family that both exhibit good performance over a wide range of block sizes, code rates, modulation, and target error probability. One of these provides error floor performance not previously demonstrated with any other TLC construction and the other is shown to offer very low complexity decoding with good performance. These two codes have been implemented in high-speed hardware codecs and performance curves based on these down to bit error rates below 10-10 are provided.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1606028
K. Kowalske, R. Robertson, K. A. Waters
We investigate the ability of finite impulse response (FIR), and infinite impulse response (IIR) filters to remove narrowband interference from a frequency-hopped signal. It is possible to construct narrowband IIR filters with very few taps; however, these filters have a non-linear phase response, and Monte-Carlo simulations demonstrate that this increases the probability of bit error. FIR filters have a linear phase response, but require several orders of magnitude more taps to produce the same narrowband filter frequency response. Finally we consider forward and reverse processing with the IIR filter. By filtering the signal with an IIR filter and then time-reversing the signal and filtering it again, it is possible to have linear phase at the expense of an increase in processing complexity. Monte-Carlo simulations demonstrate that forward and reverse processing significantly reduces the probability of bit error when IIR filters are used.
{"title":"Effect of phase distortions caused by narrowband filtering frequency-hopped signals","authors":"K. Kowalske, R. Robertson, K. A. Waters","doi":"10.1109/MILCOM.2005.1606028","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606028","url":null,"abstract":"We investigate the ability of finite impulse response (FIR), and infinite impulse response (IIR) filters to remove narrowband interference from a frequency-hopped signal. It is possible to construct narrowband IIR filters with very few taps; however, these filters have a non-linear phase response, and Monte-Carlo simulations demonstrate that this increases the probability of bit error. FIR filters have a linear phase response, but require several orders of magnitude more taps to produce the same narrowband filter frequency response. Finally we consider forward and reverse processing with the IIR filter. By filtering the signal with an IIR filter and then time-reversing the signal and filtering it again, it is possible to have linear phase at the expense of an increase in processing complexity. Monte-Carlo simulations demonstrate that forward and reverse processing significantly reduces the probability of bit error when IIR filters are used.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124433611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1605772
Xiaodong Zhou, Jiandong Li, Jun Yang
A single busy tone code-division-multiple-access (SBT-CDMA) protocol for mobile ad hoc network (MANET) is proposed. The RTS/CTS handshake mechanism, busy tone and power control are integrated with CDMA to improve the network performance. The RTS/CTS dialogue is used for the CDMA-code allocation and exchange of the power control information. Based on the difference between the calculation value and measurement value of the received busy tone power, a node can ascertain whether could initialize a RTS packet transmission. Based on the estimation of the channel gain, the transmission power of a data packet sender can be controlled exactly not only to improve the anti-MAI (multiple access interference) ability of the desired receiver, but also to reduce the interference on the undesired receivers around the sender. Simulation results show that SBT-CDMA can significantly reduce the packet collision and increase the channel utilization with lower energy consumption
{"title":"A novel power control algorithm and MAC protocol for CDMA-based mobile ad hoc network","authors":"Xiaodong Zhou, Jiandong Li, Jun Yang","doi":"10.1109/MILCOM.2005.1605772","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605772","url":null,"abstract":"A single busy tone code-division-multiple-access (SBT-CDMA) protocol for mobile ad hoc network (MANET) is proposed. The RTS/CTS handshake mechanism, busy tone and power control are integrated with CDMA to improve the network performance. The RTS/CTS dialogue is used for the CDMA-code allocation and exchange of the power control information. Based on the difference between the calculation value and measurement value of the received busy tone power, a node can ascertain whether could initialize a RTS packet transmission. Based on the estimation of the channel gain, the transmission power of a data packet sender can be controlled exactly not only to improve the anti-MAI (multiple access interference) ability of the desired receiver, but also to reduce the interference on the undesired receivers around the sender. Simulation results show that SBT-CDMA can significantly reduce the packet collision and increase the channel utilization with lower energy consumption","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1605802
Nan Zhang, B. Vojcic
In a RFID system, readers need to acquire ID information stored in tags via the wireless channel. The binary search algorithm is used to coordinate the transmissions from multiple tags to one reader. In this paper, we propose a new approach to use interference cancellation in the binary search algorithm, which achieves time saving of around 50% to read all tags' IDs. In addition, for algorithms with and without interference cancellation, we analyze the reliability of ID detection and obtain analytical results of the average probability of success for ID detection
{"title":"Binary search algorithms with interference cancellation RFID systems","authors":"Nan Zhang, B. Vojcic","doi":"10.1109/MILCOM.2005.1605802","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605802","url":null,"abstract":"In a RFID system, readers need to acquire ID information stored in tags via the wireless channel. The binary search algorithm is used to coordinate the transmissions from multiple tags to one reader. In this paper, we propose a new approach to use interference cancellation in the binary search algorithm, which achieves time saving of around 50% to read all tags' IDs. In addition, for algorithms with and without interference cancellation, we analyze the reliability of ID detection and obtain analytical results of the average probability of success for ID detection","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1605672
Theodoros N. Arvanitis, C. Constantinou, A. Stepanenko, Y. Sun, B. Liu, K. Baughan
A novel procedure of summarizing and abstracting the topology and distributed statistical measures of routing performance for communication networks is presented. This procedure, called logical network abridgment (LNA), forms the basis of a novel resilient recursive routing (R3) protocol. In this paper, we investigate the usefulness of LNA in visualizing and defining the state of health of a communication network. Traditionally, connectivity and metrics (such as link utilization, end-to-end delay, etc.) are used to provide indications of the state of health of a network. However, connectivity alone tells us little about the intrinsic diversity of the network and therefore its resiliency to attacks or attrition. Similarly, individual localized or path specific metrics tell us little about the overall intrinsic capability of the network. The LNA procedure summarizes the metric of choice over the total network and is thus capable of describing the intrinsic state of its health. In the context of military command and control, as well as commercial network management, scenarios, operators wish to easily create well-designed networks, in terms of resiliency and performance. Furthermore, operators need to identify, in an intuitive manner, the vulnerabilities that exist in a network. In addition, the consequences of actions taken to remedy failures or strengthen resiliency are often time consuming to understand in a large distributed system. The LNA procedure offers a quick and reliable algorithmic visual tool to achieve these. The paper presents work funded by the US Air-Force Research Laboratory (AFRL-EOARD) that demonstrates the potential of network visualization and analysis through the proposed LNA procedure
{"title":"Network visualisation and analysis tool based on logical network abridgment","authors":"Theodoros N. Arvanitis, C. Constantinou, A. Stepanenko, Y. Sun, B. Liu, K. Baughan","doi":"10.1109/MILCOM.2005.1605672","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605672","url":null,"abstract":"A novel procedure of summarizing and abstracting the topology and distributed statistical measures of routing performance for communication networks is presented. This procedure, called logical network abridgment (LNA), forms the basis of a novel resilient recursive routing (R3) protocol. In this paper, we investigate the usefulness of LNA in visualizing and defining the state of health of a communication network. Traditionally, connectivity and metrics (such as link utilization, end-to-end delay, etc.) are used to provide indications of the state of health of a network. However, connectivity alone tells us little about the intrinsic diversity of the network and therefore its resiliency to attacks or attrition. Similarly, individual localized or path specific metrics tell us little about the overall intrinsic capability of the network. The LNA procedure summarizes the metric of choice over the total network and is thus capable of describing the intrinsic state of its health. In the context of military command and control, as well as commercial network management, scenarios, operators wish to easily create well-designed networks, in terms of resiliency and performance. Furthermore, operators need to identify, in an intuitive manner, the vulnerabilities that exist in a network. In addition, the consequences of actions taken to remedy failures or strengthen resiliency are often time consuming to understand in a large distributed system. The LNA procedure offers a quick and reliable algorithmic visual tool to achieve these. The paper presents work funded by the US Air-Force Research Laboratory (AFRL-EOARD) that demonstrates the potential of network visualization and analysis through the proposed LNA procedure","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1606022
D. Kiwior, E. Idhaw, S. V. Pizzi
In this paper we examine the use of the open shortest path first (OSPF) protocol for use within the future airborne network. OSPF is one of the standards-based routing protocols that could be used within the airborne network. However, given the fading characteristics of airborne line-of-sight (LOS) channels, OSPF may not be as effective as it is in the commercial terrestrial Internet. Therefore, some modification of OSPF timer settings, most notably the "Hello" protocol timers, may be necessary to enable OSPF to be useful for airborne networking. Our experiments, which examined the effects of OSPF settings in an airborne network environment, demonstrate that configuring the settings to provide faster convergence can reduce the traffic loss by up to 80%. Average packet latency and average packet jitter were not significantly affected by the changes to the OSPF timers. It will be important for the airborne network to consider connectivity interruptions when configuring a routing protocol to limit data losses
{"title":"Quality of service (QoS) sensitivity for the OSPF protocol in the airborne networking environment","authors":"D. Kiwior, E. Idhaw, S. V. Pizzi","doi":"10.1109/MILCOM.2005.1606022","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606022","url":null,"abstract":"In this paper we examine the use of the open shortest path first (OSPF) protocol for use within the future airborne network. OSPF is one of the standards-based routing protocols that could be used within the airborne network. However, given the fading characteristics of airborne line-of-sight (LOS) channels, OSPF may not be as effective as it is in the commercial terrestrial Internet. Therefore, some modification of OSPF timer settings, most notably the \"Hello\" protocol timers, may be necessary to enable OSPF to be useful for airborne networking. Our experiments, which examined the effects of OSPF settings in an airborne network environment, demonstrate that configuring the settings to provide faster convergence can reduce the traffic loss by up to 80%. Average packet latency and average packet jitter were not significantly affected by the changes to the OSPF timers. It will be important for the airborne network to consider connectivity interruptions when configuring a routing protocol to limit data losses","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114681477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1606156
T. Griem, A. Ayyagari, J. H. Kim
Today, there is no effective solution for end-to-end (E2E) resource reservation protocol (RSVP) over Internet protocol security (IPsec) tunnel mode or virtual private network (VPN) environment. Currently, the interior routers supporting tunnels cannot respond to the encapsulated E2E RSVP messages and data. In this paper, we address the problem by providing a capability to support E2E RSVP over IPsec using the IETF RFC 3175 specifications. The RFC 3175-"aggregation of RSVP for IPv4 and IPv6 reservations", is an IETF proposal for improving the scalability of RSVP. however, it does not address its implementation over IPsec (or VPN) environments. We propose aggregate RSVP (A-RSVP) sessions between the routers to reserve the interior resources on behalf of the E2E RSVP sessions. The A-RSVP sessions are transmitted plain-text (PT) between enclaves and use the global DiffServ code point (DSCP) and tunnel exit point address as the RSVP session identifier. The encapsulated data is classified and scheduled by the interior network based on DiffServ's global DSCP marking and the corresponding per hop behaviors. The primary contribution of this design over RFC 3175 is to waive the requirement for protocol identifier modification (RSVP-E2E-IGNORE) and to identify a framework for implementing the capability over a tunnel-specific environment with multiple security enclaves. An alternative for multicast support is also proposed. The original proposal in RFC 3175 has the interior network depending on exterior multicast addresses to identify destination de-aggregators. We propose that portions of the multicast E2E path be aggregated together with unicast E2E RSVP sessions into the (unicast) A-RSVP sessions. The A-RSVP session will aggregate unicast and multicast RSVP sessions with similar service requirements.
{"title":"RSVP over IPsec tunnel mode using RFC 3175","authors":"T. Griem, A. Ayyagari, J. H. Kim","doi":"10.1109/MILCOM.2005.1606156","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606156","url":null,"abstract":"Today, there is no effective solution for end-to-end (E2E) resource reservation protocol (RSVP) over Internet protocol security (IPsec) tunnel mode or virtual private network (VPN) environment. Currently, the interior routers supporting tunnels cannot respond to the encapsulated E2E RSVP messages and data. In this paper, we address the problem by providing a capability to support E2E RSVP over IPsec using the IETF RFC 3175 specifications. The RFC 3175-\"aggregation of RSVP for IPv4 and IPv6 reservations\", is an IETF proposal for improving the scalability of RSVP. however, it does not address its implementation over IPsec (or VPN) environments. We propose aggregate RSVP (A-RSVP) sessions between the routers to reserve the interior resources on behalf of the E2E RSVP sessions. The A-RSVP sessions are transmitted plain-text (PT) between enclaves and use the global DiffServ code point (DSCP) and tunnel exit point address as the RSVP session identifier. The encapsulated data is classified and scheduled by the interior network based on DiffServ's global DSCP marking and the corresponding per hop behaviors. The primary contribution of this design over RFC 3175 is to waive the requirement for protocol identifier modification (RSVP-E2E-IGNORE) and to identify a framework for implementing the capability over a tunnel-specific environment with multiple security enclaves. An alternative for multicast support is also proposed. The original proposal in RFC 3175 has the interior network depending on exterior multicast addresses to identify destination de-aggregators. We propose that portions of the multicast E2E path be aggregated together with unicast E2E RSVP sessions into the (unicast) A-RSVP sessions. The A-RSVP session will aggregate unicast and multicast RSVP sessions with similar service requirements.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-17DOI: 10.1109/MILCOM.2005.1605983
F. J. Block
Many future airborne networks will be built around the software-defined joint tactical radio system (JTRS). Because of the programmability of JTRS, planners of these networks will have a great deal of flexibility in their selection of waveforms. There can be a wide variation in the properties of the candidate waveforms, such as data rate, spectral efficiency, latency, and protection against jamming. In order to choose those waveforms which best meet mission needs, these capabilities must be understood. Because of the nodes' high altitudes and use of omnidirectional antennas, airborne networks can be particularly susceptible to jamming. In this paper, we investigate the performance of three representative waveforms in the presence of hostile jamming. One waveform is based on orthogonal frequency division multiplexing (OFDM), a multicarrier modulation technique. The second uses single-carrier direct-sequence spread-spectrum modulation. Finally, a waveform based on the legacy Link 16 system, which uses a combination of frequency-hop and direct-sequence spread spectrum, is considered. Quantitative results comparing the performance of these waveforms against several jamming threats, including tone, partial-band, and frequency-follower jamming, are presented, and techniques to improve their robustness to the interference are considered.
{"title":"Comparison of jamming robustness of airborne networking waveforms","authors":"F. J. Block","doi":"10.1109/MILCOM.2005.1605983","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605983","url":null,"abstract":"Many future airborne networks will be built around the software-defined joint tactical radio system (JTRS). Because of the programmability of JTRS, planners of these networks will have a great deal of flexibility in their selection of waveforms. There can be a wide variation in the properties of the candidate waveforms, such as data rate, spectral efficiency, latency, and protection against jamming. In order to choose those waveforms which best meet mission needs, these capabilities must be understood. Because of the nodes' high altitudes and use of omnidirectional antennas, airborne networks can be particularly susceptible to jamming. In this paper, we investigate the performance of three representative waveforms in the presence of hostile jamming. One waveform is based on orthogonal frequency division multiplexing (OFDM), a multicarrier modulation technique. The second uses single-carrier direct-sequence spread-spectrum modulation. Finally, a waveform based on the legacy Link 16 system, which uses a combination of frequency-hop and direct-sequence spread spectrum, is considered. Quantitative results comparing the performance of these waveforms against several jamming threats, including tone, partial-band, and frequency-follower jamming, are presented, and techniques to improve their robustness to the interference are considered.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}