33 research outputs found

    Efficient Employment of Large Format Sensor Data Transfer Architectures

    Get PDF
    Due to the increasing quantity of data collected by Air Force intelligence, surveillance and reconnaissance (ISR) assets and the focus on timely access to the data collected by these systems, operational data transfer network architectures have become a critical component of their employment in the intelligence production process. Efficient utilization of the provided long-haul communications component of the ISR system improves the value of the single asset to the warfighter and enables connectivity of additional assets via the data transfer network architecture. This research effort focused on the creation and implementation of a structured test design methodology based on the principles of Design of Experiments to propose recommendations for optimization of one such operational architecture while avoiding the common pitfalls of inadequate and inefficient test design and implementation. Factors that could influence the performance of the data transfer network architecture were researched and evaluated to recommend the factors of interest that most greatly affect the efficiency of the operational architecture. To support this evaluation, an emulated network testbed was utilized to develop a representative model of system efficiency. The results of this model indicate that increased aggressiveness for data transfer leads to decreased efficiency in the attempt to utilize available network resources, especially in realm of operations under study that represent non-traditional bandwidth delay product (BDP) networks where network delay is the dominating factor in the determination of BDP. The analysis documented a baseline model of system performance that will be used to guide ongoing maintenance, sustainment and enhancement efforts for the current data transfer capability and provides insight into the recommended test design process for use in development and deployment of future capabilities. The ability to model system performance through the use of a structured and straight-forward process allows for the inclusion of the test design and analysis process in software design and development, as well as, system deployment and operations improvements

    Adaptive Communication for Mobile Multi-Robot Systems

    Full text link
    Mobile multi-robot systems can be immensely powerful, serving as force multipliers for human operators in search-and-rescue operations, urban reconnaissance missions, and more. Key to fulfilling this potential is robust communication, which allows robots to share sensor data or inform others of their intentions. However, wireless communication is often unreliable for mobile multi-robot systems, exhibiting losses, delays, and outages as robots move through their environment. Furthermore, the wireless communication spectrum is a shared resource, and multi-robot systems must determine how to use its limited bandwidth in accomplishing their missions. This dissertation addresses the challenges of inter-robot communication in two thrusts. In the first thrust, we improve the reliability of such communication through the application of a technique we call Adaptive Erasure Coding (AEC). Erasure codes enable recovery from packet loss through the use of redundancy. Conditions in a mobile robotic network are continually changing, so AEC varies the amount of redundancy applied to achieve a probabilistic delivery guarantee. In the second thrust, we describe a mechanism by which robots can make communication decisions by considering the expected effect of a proposed communication action on team performance. We call this algorithm Optimizing Communication under Bandwidth Constraints (OCBC). Given a finite amount of available bandwidth, OCBC optimizes the contents of a message to respect the bandwidth constraint.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/149815/1/ryanjmar_1.pd

    Improving latency for interactive, thin-stream applications over reliable transport

    Get PDF
    A large number of network services use IP and reliable transport protocols. For applications with constant pressure of data, loss is handled satisfactorily, even if the application is latencysensitive. For applications with data streams consisting of intermittently sent small packets, users experience extreme latencies more frequently. Due to the fact that such thin-stream applications are commonly interactive and time-dependent, increased delay may severely reduce the experienced quality of the application. When TCP is used for thin-stream applications, events of highly increased latency are common, caused by the way retransmissions are handled. Other transport protocols that are deployed in the Internet, like SCTP, model their congestion control and reliability on TCP, as do many frameworks that provide reliability on top of unreliable transport. We have tested several application- and transport layer solutions, and based on our findings, we propose sender-side enhancements that reduce the application-layer latency in a manner that is compatible with unmodified receivers. We have implemented the mechanisms as modifications to the Linux kernel, both for TCP and SCTP. The mechanisms are dynamically triggered so that they are only active when the kernel identifies the stream as thin. To evaluate the performance of our modifications, we have conducted a wide range of experiments using replayed thin-stream traces captured from real applications as well as artificially generated thin-stream data patterns. From the experiments, effects on latency, redundancy and fairness were evaluated. The analysis of the performed experiments shows great improvements in latency for thin streams when applying the modifications. Surveys where users evaluate their experience of several applications’ quality using the modified transport mechanisms confirmed the improvements seen in the statistical analysis. The positive effects of our modifications were shown to be possible without notable effects on fairness for competing streams. We therefore conclude that it is advisable to handle thin streams separately, using our modifications, when transmitting over reliable protocols to reduce retransmission latency

    Computer Science's Digest Volume 1

    Get PDF
    This series is dedicated to the students of the Systems Department, to give them reading material related to computer science in a second language. This book covers the Introduction to Computer Science, Computer Communications, Networking and Web Applications

    Complementary Pediatrics

    Get PDF
    Complementary Pediatrics covers complementary issues of pediatric subspecialties consisting of ophthalmologic, surgical, psychosocial and administrative issues of frequently used medications. This book volume with its 16 chapters will help get us and patients enlightened with the new developments on these subspecialties' area

    Next-Generation Public Safety Systems Based on Autonomous Vehicles and Opportunistic Communications

    Get PDF
    An emergency scenario is characterized by the unpredictability of the environment conditions and by the scarcity of the available communication infrastructures. After a natural or human disaster, the main public and private infrastructures are partially damaged or totally destroyed. These infrastructures include roads, bridges, water supplies, electrical grids, telecommunications and so on. In these conditions, the first rescue operations executed by the public safety organizations can be very difficult, due to the unpredictability of the disaster area environment and the lack in the communications systems. The aim of this work is to introduce next-generation public safety systems where the main focus is the use of unmanned vehicles that are able to exploit the self-organizing characteristics of such autonomous systems. With the proposed public safety systems, a team of autonomous vehicles will be able to overcome the hazardous environments of a post disaster scenario by introducing a temporary dynamic network infrastructure which enables the first responders to cooperate and to communicate with the victims involved. Furthermore, given the pervasive penetration of smart end-user devices, the emergence of spontaneous networks could constitute promising solutions to implement emergency communication systems. With these systems the survivors will be able to self-organize in a communication network that allows them to send alerts and information messages towards the rescue teams, even in absence of communication infrastructures
    corecore