8,304 research outputs found
Airborne Directional Networking: Topology Control Protocol Design
This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements
Civil society activism, strategic alignment and international public policy making for spectrum
Recent work in political science asserts a growth in prominence of civil society in international public policy processes, something that has been to this point under-addressed in the field of public policy research in communication. This article undertakes an analysis of the role of civil society in the recent EU policy debate on re-allocation of spectrum, one of the most strategically significant communication resources. The article explains the presence of the voice of civil society through construction of a model of international civil society strategic alignment and application of it to the spectrum case. The case provides evidence of how, in an environment generally dominated by state and commercial interests, civil society actors have been able to articulate influentially – though ultimately in a limited way - their public policy preferences
Fighting the network: MANET management in support of littoral operations
Advances in computer processing and communications capabilities have contributed to the recent explosion of mesh network technologies. These technologies’ operational benefits are of particular interest for those operating in the littorals. The dynamic complexities of the littorals force tactical decision-makers to adapt to a constantly changing battlespace in a constrained temporal and spatial environment. Ongoing research into the integration of unmanned systems and sensors as mobile ad-hoc network (MANET) nodes highlights the significant potential to improve situational awareness and force efficiency in the littoral environment. However, difficulties associated with tactical network operations and management make the littorals particularly challenging. There remains a need for a unified approach to managing these networks in a coherent and effective manner. The complexity of the littorals emphasizes the inherent interconnectedness of MANET management and command and control (C2). As a result, new and innovative approaches to C2 are also required. This thesis explores the value of modern network management systems as they contribute to the richness of the human-network interface, as well as the integration of network management and maneuver at the tactical level. The result is a proposal for a novel framework for littoral MANET management and C2 as a corollary of cyber-physical maneuver.http://archive.org/details/fightingnetworkm1094548561Outstanding ThesisLieutenant, United States NavyApproved for public release; distribution is unlimited
Enabling Technologies for Ultra-Reliable and Low Latency Communications: From PHY and MAC Layer Perspectives
© 1998-2012 IEEE. Future 5th generation networks are expected to enable three key services-enhanced mobile broadband, massive machine type communications and ultra-reliable and low latency communications (URLLC). As per the 3rd generation partnership project URLLC requirements, it is expected that the reliability of one transmission of a 32 byte packet will be at least 99.999% and the latency will be at most 1 ms. This unprecedented level of reliability and latency will yield various new applications, such as smart grids, industrial automation and intelligent transport systems. In this survey we present potential future URLLC applications, and summarize the corresponding reliability and latency requirements. We provide a comprehensive discussion on physical (PHY) and medium access control (MAC) layer techniques that enable URLLC, addressing both licensed and unlicensed bands. This paper evaluates the relevant PHY and MAC techniques for their ability to improve the reliability and reduce the latency. We identify that enabling long-term evolution to coexist in the unlicensed spectrum is also a potential enabler of URLLC in the unlicensed band, and provide numerical evaluations. Lastly, this paper discusses the potential future research directions and challenges in achieving the URLLC requirements
Wi-Fi Denial of Service Attack on Wired Analog RF Channel Emulator
This report presents the design and implementation of an analog wireless channel emulator to examine various denial of service attacks in multiple mobile scenarios. The scenarios emulated in this project involve three node topologies of wireless interferers (Wi-Fi radios), including a software defined radio that transmits one of three denial of service (DoS) waveforms. The testbed was functional and met the original specifications. Results from mobile experiments show a clear distinction in performance among the three DoS waveforms depending on the node topology; a digital waveform using binary phase shift keying (BPSK) is most effective at reducing total network throughput at close range while sweep waveforms exhibit minor throughput reduction from a greater distance
The University Defence Research Collaboration In Signal Processing
This chapter describes the development of algorithms for automatic detection of anomalies from multi-dimensional, undersampled and incomplete datasets. The challenge in this work is to identify and classify behaviours as normal or abnormal, safe or threatening, from an irregular and often heterogeneous sensor network. Many defence and civilian applications can be modelled as complex networks of interconnected nodes with unknown or uncertain spatio-temporal relations. The behavior of such heterogeneous networks can exhibit dynamic properties, reflecting evolution in both network structure (new nodes appearing and existing nodes disappearing), as well as inter-node relations.
The UDRC work has addressed not only the detection of anomalies, but also the identification of their nature and their statistical characteristics. Normal patterns and changes in behavior have been incorporated to provide an acceptable balance between true positive rate, false positive rate, performance and computational cost. Data quality measures have been used to ensure the models of normality are not corrupted by unreliable and ambiguous data. The context for the activity of each node in complex networks offers an even more efficient anomaly detection mechanism. This has allowed the development of efficient approaches which not only detect anomalies but which also go on to classify their behaviour
Cyberspace As/And Space
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all of the ways in which cyberspace operates as both extension and evolution of everyday spatial practice. Next, it argues that critics of the cyberspace metaphor have confused two senses of space and two senses of metaphor. The cyberspace metaphor does not refer to abstract, Cartesian space, but instead expresses an experienced spatiality mediated by embodied human cognition. Cyberspace in this sense is relative, mutable, and constituted via the interactions among practice, conceptualization, and representation. The insights drawn from this exercise suggest a very different way of understanding both the spatiality of cyberspace and its architectural and regulatory challenges. In particular, they suggest closer attention to three ongoing shifts: the emergence of a new sense of social space, which the author calls networked space; the interpenetration of embodied, formerly bounded space by networked space; and the ways in which these developments alter, instantiate, and disrupt geographies of power
Evolution of High Throughput Satellite Systems: Vision, Requirements, and Key Technologies
High throughput satellites (HTS), with their digital payload technology, are
expected to play a key role as enablers of the upcoming 6G networks. HTS are
mainly designed to provide higher data rates and capacities. Fueled by
technological advancements including beamforming, advanced modulation
techniques, reconfigurable phased array technologies, and electronically
steerable antennas, HTS have emerged as a fundamental component for future
network generation. This paper offers a comprehensive state-of-the-art of HTS
systems, with a focus on standardization, patents, channel multiple access
techniques, routing, load balancing, and the role of software-defined
networking (SDN). In addition, we provide a vision for next-satellite systems
that we named as extremely-HTS (EHTS) toward autonomous satellites supported by
the main requirements and key technologies expected for these systems. The EHTS
system will be designed such that it maximizes spectrum reuse and data rates,
and flexibly steers the capacity to satisfy user demand. We introduce a novel
architecture for future regenerative payloads while summarizing the challenges
imposed by this architecture
Global Title X Series \u2714
At the direction of the Air Sea Battle (ASB) Office, and with the concurrence of the Chief of Naval Operations, Global ’14 continued to focus on the Air-Sea Battle (ASB) Concept. While Global ’12 looked at the war fighting implications associated with concept implementation, Global ’13 and Global ’14 examined the command and control (C2) of cross-domain operations (XDO) in future Anti-Access/Area-Denial (A2/AD) environments. After evaluating the three possible C2 structures developed in Global ’13 – a functional component commander based model, a “Domain Commander” based model, and a “Cross-Domain Commander” based model – a fourth “hybridized” system was proposed using the current functional component C2 structure incorporating specific features identified during Global ’13
- …