首页 > 最新文献

2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE最新文献

英文 中文
Cluster-based cooperative communication with network coding in wireless networks 无线网络中基于集群的网络编码协同通信
Pub Date : 2010-12-01 DOI: 10.1109/MILCOM.2010.5680471
Z. Haas, Tuan-Che Chen
Cooperative communication is a promising way to reduce probability of packet loss. The massive deployment of nodes in wireless sensor network renders such networks especially attractive for exploiting the advantage of cooperative diversity. Similarly, when used appropriately, network coding could also improve the probability of correct reception. In this paper, we introduce the cluster-based Cooperative Coding (CC) protocol, which is based on the integration of cooperative communication and network coding. In particular, in the CC protocol, network nodes are grouped into multiple clusters and nodes within the same cluster cooperate in transmitting and receiving packets. Such an integration reduces the amount of redundant information being forwarded to ensure high probability of correct end-to-end reception, when link-level retransmission of erroneous packets is not allowed (i.e., no linklevel feedback). In particular, our analysis shows how to optimize the performance of the network by properly sizing the clusters. Compared to schemes without cooperation (whether with or without network coding), our simulation results demonstrate the significant performance improvement of the proposed scheme.
协作通信是一种很有前途的降低丢包概率的方法。无线传感器网络中节点的大量部署使得这种网络对利用合作分集的优势具有特别的吸引力。同样,如果使用得当,网络编码也可以提高正确接收的概率。本文介绍了一种基于协同通信和网络编码相结合的基于集群的协同编码(CC)协议。特别是在CC协议中,网络节点被分成多个集群,同一集群中的节点相互协作发送和接收数据包。当不允许错误数据包的链路级重传(即无链路级反馈)时,这种集成减少了转发的冗余信息的数量,以确保高概率的正确端到端接收。特别是,我们的分析显示了如何通过适当地调整集群大小来优化网络的性能。与没有合作的方案(无论是否有网络编码)相比,我们的仿真结果表明,该方案的性能得到了显着提高。
{"title":"Cluster-based cooperative communication with network coding in wireless networks","authors":"Z. Haas, Tuan-Che Chen","doi":"10.1109/MILCOM.2010.5680471","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680471","url":null,"abstract":"Cooperative communication is a promising way to reduce probability of packet loss. The massive deployment of nodes in wireless sensor network renders such networks especially attractive for exploiting the advantage of cooperative diversity. Similarly, when used appropriately, network coding could also improve the probability of correct reception. In this paper, we introduce the cluster-based Cooperative Coding (CC) protocol, which is based on the integration of cooperative communication and network coding. In particular, in the CC protocol, network nodes are grouped into multiple clusters and nodes within the same cluster cooperate in transmitting and receiving packets. Such an integration reduces the amount of redundant information being forwarded to ensure high probability of correct end-to-end reception, when link-level retransmission of erroneous packets is not allowed (i.e., no linklevel feedback). In particular, our analysis shows how to optimize the performance of the network by properly sizing the clusters. Compared to schemes without cooperation (whether with or without network coding), our simulation results demonstrate the significant performance improvement of the proposed scheme.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A cloud-oriented cross-domain security architecture 面向云的跨域安全架构
Pub Date : 2010-11-07 DOI: 10.1109/MILCOM.2010.5680360
Thuy D. Nguyen, Mark A. Gondree, D. Shifflett, Jean Khosalim, T. Levin, C. Irvine
The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite assurance and functional security protections. MYSEA seeks to meet two compelling requirements, often assumed to be at odds: enforcing critical, mandatory security policies, and allowing access and collaboration in a familiar work environment. Recent additions to the MYSEA design expand the architecture to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA servers. The MYSEA cloud supports single-sign on, service replication, and network-layer quality of security service. This new cross-domain, distributed architecture follows the consumption and delivery model for cloud services, while maintaining the federated control model necessary to support and protect cross-domain collaboration within the enterprise. The resulting architecture shows the feasibility of high-assurance, cross-domain services hosted within a community cloud suitable for inter-agency, or joint, collaboration. This paper summarizes the MYSEA architecture and discusses MYSEA's approach to provide an MLS-constrained cloud computing environment.
Monterey安全体系结构解决了在执行信息流策略的同时跨不同分类级别的多个域共享高价值数据的需求。该体系结构允许具有不同安全授权的用户使用通常缺乏先决保证和功能安全保护的商品计算机和熟悉的商业客户端软件安全地协作和交换信息。MYSEA寻求满足两个令人信服的需求,通常被认为是不一致的:执行关键的、强制性的安全策略,并允许在熟悉的工作环境中访问和协作。最近增加的MYSEA设计扩展了体系结构,以支持跨域服务云,托管在多层安全(MLS) MYSEA服务器的联盟中。MYSEA云支持单点登录、服务复制和网络层安全服务质量。这种新的跨域分布式体系结构遵循云服务的消费和交付模型,同时维护支持和保护企业内跨域协作所必需的联邦控制模型。由此产生的体系结构显示了在适合机构间或联合协作的社区云中托管高保证、跨域服务的可行性。本文总结了MYSEA的体系结构,并讨论了MYSEA提供mls约束的云计算环境的方法。
{"title":"A cloud-oriented cross-domain security architecture","authors":"Thuy D. Nguyen, Mark A. Gondree, D. Shifflett, Jean Khosalim, T. Levin, C. Irvine","doi":"10.1109/MILCOM.2010.5680360","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680360","url":null,"abstract":"The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite assurance and functional security protections. MYSEA seeks to meet two compelling requirements, often assumed to be at odds: enforcing critical, mandatory security policies, and allowing access and collaboration in a familiar work environment. Recent additions to the MYSEA design expand the architecture to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA servers. The MYSEA cloud supports single-sign on, service replication, and network-layer quality of security service. This new cross-domain, distributed architecture follows the consumption and delivery model for cloud services, while maintaining the federated control model necessary to support and protect cross-domain collaboration within the enterprise. The resulting architecture shows the feasibility of high-assurance, cross-domain services hosted within a community cloud suitable for inter-agency, or joint, collaboration. This paper summarizes the MYSEA architecture and discusses MYSEA's approach to provide an MLS-constrained cloud computing environment.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Enforcing secure and robust routing with declarative policies 使用声明性策略实施安全和健壮的路由
Pub Date : 2010-10-31 DOI: 10.1109/MILCOM.2010.5680362
Palanivel A. Kodeswaran, Wenjia Li, A. Joshi, Timothy W. Finin, F. Perich
Internet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their misconfigura-tion, usually due to a combination of human errors and the lack of a high-level formal language for specifying routing policies that can be used to generate router configurations. We describe an approach that obviates many problems by using a declarative language for specifying network-wide routing policies to automatically configure routers and also inform software agents that can diagnose and correct networking problems. Our policy language is grounded in ontologies encoded in the Semantic Web language OWL, supporting machine understanding and interoperability. Polices expressed in it can be automatically compiled into low-level router configurations and intelligent agents can reason with them to diagnose and correct routing problems. We have prototyped the approach and evaluated the results both in a simulator and on a small physical network. Our results show that the framework performs well on a number of use cases, including checking for policy coherence, preventing asymmetric routing patterns, applying organizational preferences, and diagnosing and correcting failures.
互联网路由器必须遵守许多管理路径选择的策略,以满足长度、安全性、对称性和组织偏好等潜在的复杂约束。许多路由问题都是由它们的错误配置引起的,通常是由于人为错误和缺乏用于指定可用于生成路由器配置的路由策略的高级正式语言的组合。我们描述了一种方法,通过使用声明性语言来指定网络范围的路由策略来自动配置路由器,并通知可以诊断和纠正网络问题的软件代理,从而避免了许多问题。我们的策略语言以语义Web语言OWL编码的本体为基础,支持机器理解和互操作性。其中表达的策略可以自动编译成低级路由器配置,智能代理可以与它们进行推理,诊断和纠正路由问题。我们对该方法进行了原型设计,并在模拟器和小型物理网络上评估了结果。我们的结果表明,该框架在许多用例上表现良好,包括检查策略一致性、防止不对称路由模式、应用组织偏好以及诊断和纠正故障。
{"title":"Enforcing secure and robust routing with declarative policies","authors":"Palanivel A. Kodeswaran, Wenjia Li, A. Joshi, Timothy W. Finin, F. Perich","doi":"10.1109/MILCOM.2010.5680362","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680362","url":null,"abstract":"Internet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their misconfigura-tion, usually due to a combination of human errors and the lack of a high-level formal language for specifying routing policies that can be used to generate router configurations. We describe an approach that obviates many problems by using a declarative language for specifying network-wide routing policies to automatically configure routers and also inform software agents that can diagnose and correct networking problems. Our policy language is grounded in ontologies encoded in the Semantic Web language OWL, supporting machine understanding and interoperability. Polices expressed in it can be automatically compiled into low-level router configurations and intelligent agents can reason with them to diagnose and correct routing problems. We have prototyped the approach and evaluated the results both in a simulator and on a small physical network. Our results show that the framework performs well on a number of use cases, including checking for policy coherence, preventing asymmetric routing patterns, applying organizational preferences, and diagnosing and correcting failures.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of multi-packet transmission and reception on the throughput capacity of wireless ad hoc networks 多包传输和接收对无线自组织网络吞吐量的影响
Pub Date : 2010-10-31 DOI: 10.1109/MILCOM.2010.5680382
Bita Azimdoost, R. Hamid, J. Garcia-Luna-Aceves
We study the capacity of random wireless ad hoc networks when nodes are capable of multi-packet transmission and reception (MPTR). This paper extends the unified framework of (n, m, k)-cast by Wang et al. [6] for single-packet reception (SPR) at each node to the case of MPTR. (n, m, k)-cast considers all types of information dissemination including unicast routing, multicast routing, broadcasting and anycasting. In this context, n, m, and k represent the total number of nodes in the network, the number of destinations for each communication group and the actual number of destinations that receive the packets, respectively. We show that the capacity of a wireless ad hoc network of n nodes in which nodes have a communication range of r(n) and engage in an (n, m, k) -casting scales as Θ(n√mr3(n)/k), Θ(nr2(n)/k) and Θ(nr4(n)) bits per second when m = O(1/r2(n)), Ω(k) = 1/r2(n) = O(m) and k = Ω(1/r2(n)), respectively. We show that the use of MPTR leads to a gain of Θ(logn) compared to the capacity attained with multi-packet reception (MPR), and to a gain of Θ((logn)2) compared to the capacity attained with SPR, when Ω(√logn/n) = r(n) = O(√loglogn/3logn).
研究了随机无线自组织网络在节点具有多包收发能力时的容量问题。本文将Wang等[6]针对各节点单包接收(SPR)的统一框架(n, m, k)-cast扩展到MPTR情况。(n, m, k)-cast考虑所有类型的信息传播,包括单播路由、组播路由、广播和任意播。在此例中,n、m和k分别表示网络中节点总数、每个通信组的目的地址数量和实际接收数据包的目的地址数量。我们展示了n个节点的无线自组织网络的容量,其中节点的通信范围为r(n),并且在m = O(1/r2(n)), Ω(k) = 1/r2(n) = O(m)和k = Ω(1/r2(n))时,节点的(n, m, k)投射尺度分别为Θ(n√mr3(n)/k), Θ(nr2(n)/k)和Θ(nr4(n))位每秒。我们表明,与使用多包接收(MPR)获得的容量相比,使用MPTR可以获得Θ(logn)的增益,当Ω(√logn/n) = r(n) = O(√loglog /3logn)时,与使用SPR获得的容量相比,MPTR可以获得Θ((logn)2)的增益。
{"title":"Impact of multi-packet transmission and reception on the throughput capacity of wireless ad hoc networks","authors":"Bita Azimdoost, R. Hamid, J. Garcia-Luna-Aceves","doi":"10.1109/MILCOM.2010.5680382","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680382","url":null,"abstract":"We study the capacity of random wireless ad hoc networks when nodes are capable of multi-packet transmission and reception (MPTR). This paper extends the unified framework of (n, m, k)-cast by Wang et al. [6] for single-packet reception (SPR) at each node to the case of MPTR. (n, m, k)-cast considers all types of information dissemination including unicast routing, multicast routing, broadcasting and anycasting. In this context, n, m, and k represent the total number of nodes in the network, the number of destinations for each communication group and the actual number of destinations that receive the packets, respectively. We show that the capacity of a wireless ad hoc network of n nodes in which nodes have a communication range of r(n) and engage in an (n, m, k) -casting scales as Θ(n√mr<sup>3</sup>(n)/k), Θ(nr<sup>2</sup>(n)/k) and Θ(nr<sup>4</sup>(n)) bits per second when m = O(1/r<sup>2</sup>(n)), Ω(k) = 1/r<sup>2</sup>(n) = O(m) and k = Ω(1/r<sup>2</sup>(n)), respectively. We show that the use of MPTR leads to a gain of Θ(logn) compared to the capacity attained with multi-packet reception (MPR), and to a gain of Θ((logn)<sup>2</sup>) compared to the capacity attained with SPR, when Ω(√logn/n) = r(n) = O(√loglogn/3logn).","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting the capture effect opportunistically in MANETs 在manet中机会主义地利用捕获效应
Pub Date : 2010-10-31 DOI: 10.1109/MILCOM.2010.5680159
Hui Xu, J. Garcia-Luna-Aceves, H. Sadjadpour
Channel fading has been regarded as a negative factor for successful packet transmission. However, with deep fading, although collisions for a given transmission may exist, the capture effect can allow the transmission to succeed as long as the channel for the transmitted signal is strong enough and is weak enough for the interference signals. Accordingly, we propose an asynchronous medium access control (MAC) scheme that selects a packet with the highest success probability to be transmitted. We call this approach opportunistic interference management (OIM). The basic mechanism in OIM consists of probing the channel conditions for multiple neighbors concurrently, and then selecting to transmit those packets corresponding to the winners of the probing phase. OIM improves the probability of successful transmission and increases network throughput without adding extra delays for inter-nodal handshakes. Mathematical analysis and simulations are used to validate the advantages of OIM over the traditional packet-transmission scheme used in MAC protocols today.
信道衰落一直被认为是影响数据包传输成功的一个不利因素。然而,对于深度衰落,尽管可能存在给定传输的碰撞,但只要传输信号的信道足够强,并且对干扰信号足够弱,捕获效应就可以允许传输成功。因此,我们提出了一种异步介质访问控制(MAC)方案,该方案选择具有最高成功概率的数据包进行传输。我们称这种方法为机会干扰管理(OIM)。OIM的基本机制包括并发探测多个邻居的通道条件,然后选择传输与探测阶段的获胜者相对应的数据包。OIM提高了成功传输的概率,增加了网络吞吐量,而不会为节点间握手增加额外的延迟。数学分析和仿真验证了OIM相对于当前MAC协议中使用的传统分组传输方案的优势。
{"title":"Exploiting the capture effect opportunistically in MANETs","authors":"Hui Xu, J. Garcia-Luna-Aceves, H. Sadjadpour","doi":"10.1109/MILCOM.2010.5680159","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680159","url":null,"abstract":"Channel fading has been regarded as a negative factor for successful packet transmission. However, with deep fading, although collisions for a given transmission may exist, the capture effect can allow the transmission to succeed as long as the channel for the transmitted signal is strong enough and is weak enough for the interference signals. Accordingly, we propose an asynchronous medium access control (MAC) scheme that selects a packet with the highest success probability to be transmitted. We call this approach opportunistic interference management (OIM). The basic mechanism in OIM consists of probing the channel conditions for multiple neighbors concurrently, and then selecting to transmit those packets corresponding to the winners of the probing phase. OIM improves the probability of successful transmission and increases network throughput without adding extra delays for inter-nodal handshakes. Mathematical analysis and simulations are used to validate the advantages of OIM over the traditional packet-transmission scheme used in MAC protocols today.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123575905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-user diversity in single-radio OFDMA ad hoc networks based on Gibbs sampling 基于Gibbs采样的单无线电OFDMA自组网多用户分集
Pub Date : 2010-10-31 DOI: 10.1109/MILCOM.2010.5679529
M. Veyseh, J. Garcia-Luna-Aceves, H. Sadjadpour
Multiuser Diversity Medium Access or MDMA is a new cross-layer channel allocation scheme that exploits channel fading diversity and attains concurrency utilizing OFDMA in single-radio ad hoc networks. Channel throughput is enhanced by enabling concurrent transmissions from multiple nodes to the same receiver or from a single transmitter to multiple receivers over orthogonal Subchannels. Also, concurrency is attained when two hop away neighbors can utilize the same subchannel to transmit data to nodes not neighboring the other two hop neighbor. Each subchannel uses a portion of the available bandwidth and contains a grouping of subcarriers or tones which are orthogonal carriers of lower-rate input data streams. A new subchannel assignment algorithm based on Gibbs sampling is presented. This algorithm operates alongside the proposed MAC signaling to distribute subchannels among nodes to exploit channel fading condition on each communication link and to minimize hidden terminal interference. The new MAC addresses the synchronization requirements of OFDMA and the needs of the subchannel assignment algorithm. We present simulation results on the throughput gains obtained with our design compared to traditional channel assignment techniques for multi-channel networks.
多用户分集介质接入(MDMA)是一种新的跨层信道分配方案,利用OFDMA在单无线电自组织网络中实现信道衰落分集和并发性。通过支持从多个节点到同一接收器的并发传输,或通过正交子信道从单个发送器到多个接收器的并发传输,可以增强信道吞吐量。另外,当两个跳远邻居可以利用相同的子通道将数据传输到不与其他两个跳邻居相邻的节点时,可以实现并发性。每个子信道使用可用带宽的一部分,并包含一组子载波或音调,这些子载波或音调是低速率输入数据流的正交载波。提出了一种新的基于Gibbs采样的子信道分配算法。该算法与所提出的MAC信令一起工作,在节点之间分配子信道,以利用每个通信链路上的信道衰落情况,并最大限度地减少隐藏的终端干扰。新的MAC解决了OFDMA的同步要求和子信道分配算法的需要。我们给出了与传统的多通道网络信道分配技术相比,我们的设计获得的吞吐量增益的仿真结果。
{"title":"Multi-user diversity in single-radio OFDMA ad hoc networks based on Gibbs sampling","authors":"M. Veyseh, J. Garcia-Luna-Aceves, H. Sadjadpour","doi":"10.1109/MILCOM.2010.5679529","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5679529","url":null,"abstract":"Multiuser Diversity Medium Access or MDMA is a new cross-layer channel allocation scheme that exploits channel fading diversity and attains concurrency utilizing OFDMA in single-radio ad hoc networks. Channel throughput is enhanced by enabling concurrent transmissions from multiple nodes to the same receiver or from a single transmitter to multiple receivers over orthogonal Subchannels. Also, concurrency is attained when two hop away neighbors can utilize the same subchannel to transmit data to nodes not neighboring the other two hop neighbor. Each subchannel uses a portion of the available bandwidth and contains a grouping of subcarriers or tones which are orthogonal carriers of lower-rate input data streams. A new subchannel assignment algorithm based on Gibbs sampling is presented. This algorithm operates alongside the proposed MAC signaling to distribute subchannels among nodes to exploit channel fading condition on each communication link and to minimize hidden terminal interference. The new MAC addresses the synchronization requirements of OFDMA and the needs of the subchannel assignment algorithm. We present simulation results on the throughput gains obtained with our design compared to traditional channel assignment techniques for multi-channel networks.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessing system software performance in complex system of systems environments 在系统环境的复杂系统中评估系统软件性能
Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680358
J. Wessel, Bryce L. Meyer
The characterization of software performance (SWP) in complex, service-oriented architecture (SOA)-based system of systems (SoS) environments is an emergent study area. This report focuses on both qualitative and quantitative ways of determining the current state of SWP in terms of both test coverage (what has been tested) and confidence (degree of testing) for SOA-based SoS environments. Practical tools and methodologies are offered to aid technical and programmatic managers in the form of a stepwise methodology toward SWP selection. Included are system architecture design considerations, resource limiters of SWP, test event design considerations, organizational and process suggestions toward improved SWP management and a matrix of measurement suggestions. Assuring mission success; Network-centric systems and technologies; System-level modeling and simulation; System of systems (SoS);Service Oriented Architecture (SOA)
在复杂的、基于面向服务的体系结构(SOA)的系统的系统(so)环境中,软件性能的表征(SWP)是一个新兴的研究领域。本报告着重于根据基于soa的SoS环境的测试覆盖率(已测试的内容)和置信度(测试程度)来确定SWP当前状态的定性和定量方法。实用的工具和方法以逐步选择SWP的方法的形式提供给技术和规划管理人员。包括系统架构设计考虑、SWP的资源限制、测试事件设计考虑、针对改进SWP管理的组织和过程建议,以及度量建议矩阵。确保任务成功;网络中心系统和技术;系统级建模与仿真;系统的系统;面向服务的体系结构(SOA)
{"title":"Assessing system software performance in complex system of systems environments","authors":"J. Wessel, Bryce L. Meyer","doi":"10.1109/MILCOM.2010.5680358","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680358","url":null,"abstract":"The characterization of software performance (SWP) in complex, service-oriented architecture (SOA)-based system of systems (SoS) environments is an emergent study area. This report focuses on both qualitative and quantitative ways of determining the current state of SWP in terms of both test coverage (what has been tested) and confidence (degree of testing) for SOA-based SoS environments. Practical tools and methodologies are offered to aid technical and programmatic managers in the form of a stepwise methodology toward SWP selection. Included are system architecture design considerations, resource limiters of SWP, test event design considerations, organizational and process suggestions toward improved SWP management and a matrix of measurement suggestions. Assuring mission success; Network-centric systems and technologies; System-level modeling and simulation; System of systems (SoS);Service Oriented Architecture (SOA)","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of a JTIDS-type waveform with noise-normalization combining in pulsed-noise interference 脉冲噪声干扰下噪声归一化组合jtids型波形的性能
Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680222
C. Kao, C. Robertson
The Joint Tactical Information Distribution System (JTIDS) is the communication terminal of Link-16. When the double-pulse structure is chosen to transmit the Link-16 data, JTIDS is a hybrid direct sequence/fast frequency-hopping spread spectrum system with a sequential diversity of two. To minimize the effect of pulsed-noise interference (PNI), a noise-normalized diversity combining MSK chip demodulator is assumed in the JTIDS receiver. The symbol error rate (SER) performance of a coherently detected JTIDS-type waveform for the double-pulse structure with noise-normalization combining (NNC) in PNI is investigated in this paper. To facilitate the evaluation, perfect frequency de-hopping, sequence synchronization, chip synchronization, and 32-chip sequence descrambling are assumed. Furthermore, maximum-likelihood chip detection is assumed rather than maximum-likelihood chip-sequence detection since the former represents a more practical assumption for a JTIDS signal. The results obtained with NNC are compared to those without NNC, as well as to those with perfect side information. The results show that for a coherently detected JTIDS-type waveform with the double-pulse structure, NNC effectively mitigates the system degradation caused by PNI.
联合战术信息分发系统(JTIDS)是Link-16的通信终端。当选择双脉冲结构传输Link-16数据时,JTIDS是一种顺序分集为2的直接序列/快速跳频混合扩频系统。为了减小脉冲噪声干扰(PNI)的影响,在JTIDS接收机中采用噪声归一化分集组合MSK芯片解调器。研究了PNI中具有噪声归一化组合(NNC)的双脉冲结构的相干检测jtids型波形的符号误码率(SER)性能。为了便于评估,我们假设完美跳频、序列同步、芯片同步和32片序列解扰。此外,假设最大似然芯片检测而不是最大似然芯片序列检测,因为前者代表了对JTIDS信号更实际的假设。用NNC与不使用NNC的结果进行了比较,并与具有完美侧信息的结果进行了比较。结果表明,对于具有双脉冲结构的相干检测jtids型波形,NNC有效地减轻了PNI引起的系统退化。
{"title":"Performance of a JTIDS-type waveform with noise-normalization combining in pulsed-noise interference","authors":"C. Kao, C. Robertson","doi":"10.1109/MILCOM.2010.5680222","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680222","url":null,"abstract":"The Joint Tactical Information Distribution System (JTIDS) is the communication terminal of Link-16. When the double-pulse structure is chosen to transmit the Link-16 data, JTIDS is a hybrid direct sequence/fast frequency-hopping spread spectrum system with a sequential diversity of two. To minimize the effect of pulsed-noise interference (PNI), a noise-normalized diversity combining MSK chip demodulator is assumed in the JTIDS receiver. The symbol error rate (SER) performance of a coherently detected JTIDS-type waveform for the double-pulse structure with noise-normalization combining (NNC) in PNI is investigated in this paper. To facilitate the evaluation, perfect frequency de-hopping, sequence synchronization, chip synchronization, and 32-chip sequence descrambling are assumed. Furthermore, maximum-likelihood chip detection is assumed rather than maximum-likelihood chip-sequence detection since the former represents a more practical assumption for a JTIDS signal. The results obtained with NNC are compared to those without NNC, as well as to those with perfect side information. The results show that for a coherently detected JTIDS-type waveform with the double-pulse structure, NNC effectively mitigates the system degradation caused by PNI.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wideband waveform optimization for multiple input single output cognitive radio with practical considerations 基于实用考虑的多输入单输出认知无线电宽带波形优化
Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680114
Zhen Hu, N. Guo, R. Qiu
This paper investigates the transmitted waveform optimization issues for wideband Multiple Input Single Output (MISO) cognitive radio. For cognitive radio, a spectral mask for the transmitted waveform is determined on spectrum sensing, and arbitrary transmitted spectral shaping is required. Meanwhile, the interferences from primary radios should be canceled at the receiver of cognitive radio. The contribution of this paper is to optimize the MISO cognitive radio communication link by jointly considering the optimization objective, the spectral mask constraint at the transmitter and the interference cancellation at the receiver. Meanwhile, reduction in transmitted peak power and quantization is still very desirable, being concerned about implementation complexity and power consumption. These motive us to consider various practical constraints for waveform optimization in the context of MISO cognitive radio. A number of solutions are provided in this paper in conjunction with numerical results showing the optimal wideband waveforms.
研究了宽带多输入单输出(MISO)认知无线电的传输波形优化问题。对于认知无线电,通过频谱感知确定发射波形的频谱掩模,需要对发射频谱进行任意整形。同时,在认知无线电接收端要消除主无线电的干扰。本文的贡献在于综合考虑优化目标、发射端频谱掩码约束和接收端干扰消除等因素,对MISO认知无线电通信链路进行优化。同时,考虑到实现的复杂性和功耗,降低传输峰值功率和量化仍然是非常可取的。这些促使我们考虑在MISO认知无线电背景下波形优化的各种实际约束。本文给出了若干解决方案,并结合数值结果给出了最佳的宽带波形。
{"title":"Wideband waveform optimization for multiple input single output cognitive radio with practical considerations","authors":"Zhen Hu, N. Guo, R. Qiu","doi":"10.1109/MILCOM.2010.5680114","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680114","url":null,"abstract":"This paper investigates the transmitted waveform optimization issues for wideband Multiple Input Single Output (MISO) cognitive radio. For cognitive radio, a spectral mask for the transmitted waveform is determined on spectrum sensing, and arbitrary transmitted spectral shaping is required. Meanwhile, the interferences from primary radios should be canceled at the receiver of cognitive radio. The contribution of this paper is to optimize the MISO cognitive radio communication link by jointly considering the optimization objective, the spectral mask constraint at the transmitter and the interference cancellation at the receiver. Meanwhile, reduction in transmitted peak power and quantization is still very desirable, being concerned about implementation complexity and power consumption. These motive us to consider various practical constraints for waveform optimization in the context of MISO cognitive radio. A number of solutions are provided in this paper in conjunction with numerical results showing the optimal wideband waveforms.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delay-throughput tradeoff for streaming over blockage channels with delayed feedback 具有延迟反馈的阻塞通道上的流的延迟-吞吐量权衡
Pub Date : 2010-10-01 DOI: 10.1109/MILCOM.2010.5680416
H. Yao, Y. Kochman, G. Wornell
We focus on the problem of real-time streaming over a blockage channel with long feedback delay, as arises in real-time satellite communication from a comm-on-the-move (COTM) terminal. For this problem, we introduce a definition of delay that captures the real-time nature of the problem, which we show grows at least as fast as O(log(k)) for memoryless channels, where k corresponds to the number of packets in the transmission. Moreover, we show that a tradeoff exists between this delay and a natural notion of throughput that captures the bandwidth requirements of the communication. We develop and analyze an efficient “multi-burst” transmission protocol for achieving good delay-throughput tradeoffs within this framework, which we show can be augmented with coding for additional performance gains. Simulations validate the new protocols on channels with and without memory.
我们关注的问题是在阻塞信道上的实时流与长反馈延迟,因为出现了实时卫星通信从一个共同的移动(COTM)终端。对于这个问题,我们引入了一个延迟的定义,它捕获了问题的实时性,我们显示,对于无内存通道,延迟的增长速度至少与O(log(k))一样快,其中k对应于传输中的数据包数量。此外,我们还展示了在这种延迟和捕获通信带宽需求的吞吐量的自然概念之间存在权衡。我们开发并分析了一种高效的“多突发”传输协议,以在该框架内实现良好的延迟-吞吐量权衡,我们表明可以通过编码来增强该协议以获得额外的性能收益。仿真验证了新协议在有内存和无内存信道上的有效性。
{"title":"Delay-throughput tradeoff for streaming over blockage channels with delayed feedback","authors":"H. Yao, Y. Kochman, G. Wornell","doi":"10.1109/MILCOM.2010.5680416","DOIUrl":"https://doi.org/10.1109/MILCOM.2010.5680416","url":null,"abstract":"We focus on the problem of real-time streaming over a blockage channel with long feedback delay, as arises in real-time satellite communication from a comm-on-the-move (COTM) terminal. For this problem, we introduce a definition of delay that captures the real-time nature of the problem, which we show grows at least as fast as O(log(k)) for memoryless channels, where k corresponds to the number of packets in the transmission. Moreover, we show that a tradeoff exists between this delay and a natural notion of throughput that captures the bandwidth requirements of the communication. We develop and analyze an efficient “multi-burst” transmission protocol for achieving good delay-throughput tradeoffs within this framework, which we show can be augmented with coding for additional performance gains. Simulations validate the new protocols on channels with and without memory.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1