4,621 research outputs found

    Chapter Tactical Communications for Cooperative SAR Robot Missions

    Get PDF
    This chapter describes how the ICARUS communications (COM) team defined, developed and implemented an integrated wireless communication system to ensure an interoperable and dependable networking capability for both human and robotic search and rescue field teams and crisis managers. It starts explaining the analysis of the requirements and the context of the project, the existing solutions and the design of the ICARUS communication system to fulfil all the project needs. Next, it addresses the implementation process of the required networking capabilities, and finally, it explains how the ICARUS communication system and associated tools have been integrated in the overall mission systems and have been validated to provide reliable communications for real‐time information sharing during search and rescue operations in hostile conditions

    Tactical Communications for Cooperative SAR Robot Missions

    Get PDF
    This chapter describes how the ICARUS communications (COM) team defined, developed and implemented an integrated wireless communication system to ensure an interoperable and dependable networking capability for both human and robotic search and rescue field teams and crisis managers. It starts explaining the analysis of the requirements and the context of the project, the existing solutions and the design of the ICARUS communication system to fulfil all the project needs. Next, it addresses the implementation process of the required networking capabilities, and finally, it explains how the ICARUS communication system and associated tools have been integrated in the overall mission systems and have been validated to provide reliable communications for real‐time information sharing during search and rescue operations in hostile conditions

    Allocating Transmission to Mitigate Market Power in Electricity Networks

    Get PDF
    We ask what conditions transmission contracts increase or mitigate market power. We show that the allocation process of transmission rights is crucial. In an efficient arbitraged uniform price auction, generators will only obtain contracts that mitigate their market power. However, if generators inherit transmission contracts or buy them in a ‘pay-as-bid’ auction, then these contracts can enhance market power. In the two-node network case, banning generators from holding transmission contracts that do not correspond to delivery of their own energy mitigates market power. Meshed networks differ in important ways as constrained links no longer isolate prices in competitive markets from market manipulation. The paper suggests ways of minimising market power considerations when designing transmission contracts.electricity, contracts, auction, network, transmission

    Energy-efficient satellite joint computation and communication

    Get PDF
    The emerging interest in satellite networks will be a key driver in the path to 6G. The satellite segment must be conceived beyond a mere relay system, where nodes can process data and offload the terrestrial segment. Besides, evidence suggests that energy consumption is among the most important factors for the design of future communication networks. For this motivation, we introduce Sat2C, an energy-efficient algorithm for satellite joint routing, radio resource allocation and task offloading for latency-constrained services. We develop a novel energy model that incorporates the power amplifier subsystem and changes the geometry of the problem. Regarding the routing task, we propose the SHIELD algorithm, based on the submodularity framework and which achieves Pareto-efficient routes. Besides, the RRM problem is formulated as a log-log convex program. The experimental results reveal that Sat2C has low computational complexity, provides routes with low variance in the mean distance and the transmission powers are optimal to ensure energy minimization

    Design and integrity of deterministic system architectures.

    Get PDF
    Architectures represented by system construction 'building block' components and interrelationships provide the structural form. This thesis addresses processes, procedures and methods that support system design synthesis and specifically the determination of the integrity of candidate architectural structures. Particular emphasis is given to the structural representation of system architectures, their consistency and functional quantification. It is a design imperative that a hierarchically decomposed structure maintains compatibility and consistency between the functional and realisation solutions. Complex systems are normally simplified by the use of hierarchical decomposition so that lower level components are precisely defined and simpler than higher-level components. To enable such systems to be reconstructed from their components, the hierarchical construction must provide vertical intra-relationship consistency, horizontal interrelationship consistency, and inter-component functional consistency. Firstly, a modified process design model is proposed that incorporates the generic structural representation of system architectures. Secondly, a system architecture design knowledge domain is proposed that enables viewpoint evaluations to be aggregated into a coherent set of domains that are both necessary and sufficient to determine the integrity of system architectures. Thirdly, four methods of structural analysis are proposed to assure the integrity of the architecture. The first enables the structural compatibility between the 'building blocks' that provide the emergent functional properties and implementation solution properties to be determined. The second enables the compatibility of the functional causality structure and the implementation causality structure to be determined. The third method provides a graphical representation of architectural structures. The fourth method uses the graphical form of structural representation to provide a technique that enables quantitative estimation of performance estimates of emergent properties for large scale or complex architectural structures. These methods have been combined into a procedure of formal design. This is a design process that, if rigorously executed, meets the requirements for reconstructability

    Investigating Hastily-Formed Collaborative Networks

    Get PDF
    This research explores both the human and technical aspects of the network centric environment in the context of a major disaster or incident of national significance. The National Incident Management System (NIMS) is viewed by the authors as a social network, and an organizational topology is developed to improve its effectiveness. A rapid Network Deployment Kit (RNDK) using commercial off the shelf (COTS) wireless networking technology is also proposed that facilitates immediate NIMS implementation. The integration of logical and technical analyses forms a comprehensive systems engineering proposal to facilitate collaboration in a net-centric environment. It is envisioned that the methodology used herein to derive and evaluate comprehensive networks proves extendable to other contexts thereby contributing to the netcentric body of knowledge

    PAMPA in the wild:a real-life evaluation of a lightweight ad-hoc broadcasting family

    Get PDF
    Broadcast is one of the core building blocks of many services deployed on ad-hoc wireless networks, such as Mobile Ad-Hoc Networks (MANETs) or Wireless Sensor Networks (WSNs). Most broadcast protocols are however only ever evaluated using simulations, which have repeatedly been shown to be unreliable, and potentially misleading. In this paper, we seek to go beyond simulations, and consider the particular case of PAMPA, a promising family of wireless broadcast algorithms for ad-hoc and wireless networks. We report on our efforts to further our experimental understanding of PAMPA, and present the first ever characterisation of the PAMPA family on a real deployment. Here it has to deal with real network problems such as node, message and sending failure. Our experiments show that the standard PAMPA algorithm out-performs all other protocols in the family, with a delivery ratio consistently around 75%, and a retransmission ratio as low as 44%, for a failure-free run. We use this opportunity to reflect on our findings and lessons learnt when moving from simulations to actual experimentsab

    Constructing fail-controlled nodes for distributed systems: a software approach

    Get PDF
    PhD ThesisDesigning and implementing distributed systems which continue to provide specified services in the presence of processing site and communication failures is a difficult task. To facilitate their development, distributed systems have been built assuming that their underlying hardware components are Jail-controlled, i.e. present a well defined failure mode. However, if conventional hardware cannot provide the assumed failure mode, there is a need to build processing sites or nodes, and communication infra-structure that present the fail-controlled behaviour assumed. Coupling a number of redundant processors within a replicated node is a well known way of constructing fail-controlled nodes. Computation is replicated and executed simultaneously at each processor, and by employing suitable validation techniques to the outputs generated by processors (e.g. majority voting, comparison), outputs from faulty processors can be prevented from appearing at the application level. One way of constructing replicated nodes is by introducing hardwired mechanisms to couple replicated processors with specialised validation hardware circuits. Processors are tightly synchronised at the clock cycle level, and have their outputs validated by a reliable validation hardware. Another approach is to use software mechanisms to perform synchronisation of processors and validation of the outputs. The main advantage of hardware based nodes is the minimum performance overhead incurred. However, the introduction of special circuits may increase the complexity of the design tremendously. Further, every new microprocessor architecture requires considerable redesign overhead. Software based nodes do not present these problems, on the other hand, they introduce much bigger performance overheads to the system. In this thesis we investigate alternative ways of constructing efficient fail-controlled, software based replicated nodes. In particular, we present much more efficient order protocols, which are necessary for the implementation of these nodes. Our protocols, unlike others published to date, do not require processors' physical clocks to be explicitly synchronised. The main contribution of this thesis is the precise definition of the semantics of a software based Jail-silent node, along with its efficient design, implementation and performance evaluation.The Brazilian National Research Council (CNPq/Brasil)

    Architecture design for disaster resilient management network using D2D technology

    Get PDF
    Huge damages from natural disasters, such as earthquakes, floods, landslide, tsunamis, have been reported in recent years, claiming many lives, rendering millions homeless and causing huge financial losses worldwide. The lack of effective communication between the public rescue/safety agencies, rescue teams, first responders and trapped survivors/victims makes the situation even worse. Factors like dysfunctional communication networks, limited communications capacity, limited resources/services, data transformation and effective evaluation, energy, and power deficiency cause unnecessary hindrance in rescue and recovery services during a disaster. The new wireless communication technologies are needed to enhance life-saving capabilities and rescue services. In general, in order to improve societal resilience towards natural catastrophes and develop effective communication infrastructure, innovative approaches need to be initiated to provide improved quality, better connectivity in the events of natural and human disasters. In this thesis, a disaster resilient network architecture is proposed and analysed using multi-hop communications, clustering, energy harvesting, throughput optimization, reliability enhancement, adaptive selection, and low latency communications. It also examines the importance of mode selection, power management, frequency and time resource allocation to realize the promises of Long-term Evolution (LTE) Device to Device (D2D) communication. In particular, to support resilient and energy efficient communication in disaster-affected areas. This research is examined by thorough and vigorous simulations and validated through mathematical modelling. Overall, the impact of this research is twofold: i) it provides new technologies for effective inter- and intra-agency coordination system during a disaster event by establishing a stronger and resilient communication; and ii) It offers a potential solution for stakeholders such as governments, rescue teams, and general public with new informed information on how to establish effective policies to cope with challenges before, during and after the disaster events
    corecore