Addressing Limitations of Tactical Networks by Estimating and Exploiting Information Quality and Information Value

Size: px
Start display at page:

Download "Addressing Limitations of Tactical Networks by Estimating and Exploiting Information Quality and Information Value"

Transcription

1 Addressing Limitations of Tactical Networks by Estimating and Exploiting Information Quality and Information Value Niranjan Suri Senior Research Scientist Florida Institute for Human & Machine Cognition (IHMC) Visiting Scientist US Army Research Laboratory

2 Motivation Old Adage Getting the Right Information to the Right People at the Right Time Or put another way Getting Actionable Information to Soldiers at the Right Time Objective has not changed What has changed? Increased deployment of sensors (with increasing resolution, coverage, persistence) Increased access to open-source and social media data What has (unfortunately) not changed? Tactical networking environments still limited in terms of bandwidth, latency, reliability, stability, and connectivity

3 New Measures and Metrics Need to move away from the (mostly) current paradigm: Gather everything we can Shove what we gather into the network Live with what we get out of the network Quality of Information (QoI) and Value of Information (VoI) promise to be new metrics that can help QoI and VoI can be used to filter and prioritize transmitted information For example Do not transmit low quality information (exceptions?) Do not transmit information with little or no value Another benefit: filtering unnecessary information can reduce the cognitive workload on the Soldier

4 Panel Objectives Attempt to define QoI and VoI as metrics Some disagreement among researchers (which is healthy!) Discuss approaches to determine QoI and VoI Consider different types of information video, pictures, audio, sensor reports, tracks, documents, maps, etc. Discuss applications of these concepts to the DoD missions Consider different perspectives Analyst, Commander, Operator, others? How would we experiment with these concepts and measure improvements? Are there other metrics / measures worth including? For example Quality of Experience (QoE)?

5 Panelists (1) Lance Kaplan is a Scientist in the Networked Sensing and Fusion Branch, Sensors and Electron Devices Directorate (SEDD), at the US Army Research Laboratory (ARL). At ARL, Dr. Kaplan is serving as the Government Technical Area Lead for the Information Network Academic Research Center, which is a multi-institutional basic research program aimed at advancing fundamental understanding of information networks in conjunction with their interactions with social/cognitive and communication networks. Dr. Kaplan has published over 180 technical articles. His current research interests include signal and image processing, information/data fusion, resource management, and network science.

6 Panelists (2) Michael Kolodny has over 50 years of R&D engineering and management experience at The Army Research Laboratory (ARL) / Harry Diamond Laboratories. He retired in May 2009 and is currently serving as a Senior Technology Consultant for ARL. He has been very proactive in autonomous networked sensors and unattended ground sensor (UGS) activities within DoD. He founded and chaired the RDECOM UGS IPT and has been working actively with DoD in defining technology programs to support the Army and other DoD organization s autonomous sensing needs in various programs. Mr. Kolodny s most recent efforts have been focused on new technology concepts including interoperability of ISR assets. He founded the initial UGS Standards Working Group that has now been chartered by USD(I) and is chaired by DIA. Mr. Kolodny established and chairs the Conference on Ground/Air Multi-sensor Interoperability, Integration & Networking for Persistent ISR which is part of the annual SPIE DSS Symposium.

7 Panelists (3) Mark Linderman is a Principal Researcher in Information Management Technologies in the Air Force Research Laboratory Information Directorate where he leads the Information Management technology area. From , Dr. Linderman was the Technical Lead of the AFRL Information Directorate Joint Battlespace Infosphere (JBI) Program. The JBI program addresses a broad spectrum of information management challenges from access control, the role of metadata, dissemination, persistence and destruction of information. Dr. Linderman joined AFRL in 1994 after completing his M.Eng. and Ph.D. in electrical engineering from Cornell University. He holds a BSEE degree from the University of Delaware.

8 Panelists (4) Derya Cansever is the Chief Engineer of the Communication Networks and Networking Division at US Army CERDEC, where he conducts research in Tactical, Mission Aware and Software Defined Networks. Prior to CERDEC, Dr. Cansever worked at Johns Hopkins University Applied Physics Laboratory, AT&T Bell Labs, and GTE Laboratory. He taught courses on Data Communications and Network Security at Boston University and University of Massachusetts. He has a Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana Champaign.

9 Panelists (5) Sastry Kompella received the Ph.D. degree in electrical and computer engineering from the Virginia Tech, Blacksburg, VA, in Currently, he is the Head of the Wireless Networks Research Section under the Information Technology Division, U.S. Naval Research Laboratory, Washington, DC. His research interests include various aspects of wireless networks, from mobile ad hoc to underwater acoustic networks, with specific focus toward the development of cognitive, cooperative network optimization techniques for efficient spectrum and other wireless resource allocations.

10 Panel Format Begin with each panelist presenting opening remarks (10-15 minutes) Open the floor for discussion Audience please make note of questions to ask the panel! Otherwise, I have to resort to my canned questions Potential Next Step (after Panel) Edited Book Provided there is sufficient interest! Combination of invited and peer-reviewed chapters If you are interested, please get in touch with me

11 Shameless Plug Paper on VoI in October IEEE Communications Magazine

12 Let s Get Started! Lance Kaplan Panel Members US Army Research Laboratory Michael Kolodny US Army Research Laboratory Mark Linderman US Air Force Research Laboratory Derya Cansever US Army CERDEC Sastry Kompella US Naval Research Laboratory Make note of your questions or them to me at nsuri@ihmc.us

13 Backup Slides

14 Value of Information Our approach Discretize information into Information Objects Determine value of information (for each IO) Use value estimation to prioritize and filter information Enable receiver and context-dependent delivery Maximize available network capacity Reduce operator data overload Question how to determine right / actionable information?

15 Defining Value of Information Many definitions in the literature for Value of Information Game Theory Price someone would pay for information before making a decision Information Value Theory Value obtained by a reduction in uncertainty / increase in profit Our definitions: Information Object (IO): A discrete piece of information (e.g., a picture, a sensor report, a document, a video clip, a track) Value of Information (VoI): A numerical value between 0 and 1 assigned to an IO VoI of 0 implies it is of no value VoI of 1 implies it is of maximal value VoI of an IO is relative to a recipient (e.g., a soldier) Different from Quality of Information (QoI), which is intrinsic to the IO 15

16 How is VoI Useful? Assumptions: Number of Information Objects (IOs) exceed network s ability to transport and deliver all of the information Delivering all of the IOs available overloads the soldier Determining the VoI for each IO allows us to sort the IOs in decreasing order by value Once sorted, algorithm can Send the most important IOs first, maximizing available network capacity If capacity is reduced, lower rated IOs are dynamically skipped Filter out IOs whose computed VoI is below a desirable threshold Reduce overload on soldier IO s delivered to applications such as ATAK 16

17 Value of Information (2) Question How to determine value of information? Abstract (working) definition information is of value if it causes the receiver to improve his/her situation awareness and/or course of action What is a (reasonably) computable approach to solving this question? Would need to take into account many factors Current mission, current activity, current location Mission Information Exchange Requirements (IER) Predicted location / activity in time (brings in temporal dimension) Type of information, source, pedigree, recency Quality of Information Vetting / validation of the information (sometimes, receiver dependent) Range of influence Information known a priori Receiver s preferences Receiver s social network and trust relationships I n f o r m a t i o n V a l u a t o r

18 Realization Proactive Dissemination Service (DSPro) Model mission (including routes, objectives, roles) Match available and incoming information against mission model Prioritize information dissemination based on relevance estimation Pre-stage information for edge users to increase availability Learn user preferences over time Realize a flexible push/pull architecture Operations Center Tactical Network Tactical Network Operations Center Tactical Network Information Valuator User 1 IO Information Valuator Analyst 1 User 1 User 3 Node Context 1 User 2 IO Node Context n IO Tactical Network User n Sensor Network IO Information Valuator IO Analyst 2 User n Sensor Network IO (a) From OC to Edge Network (a) From Edge Network to OC (c) At the Edge Network

19 Realization (2) Modeled Metadata Georeference / Spatial Extents Timestamp Expiration Time Source / Pedigree Type Classification Relevant Missions Priority Source Reliability Information Content User Context Initial representation includes: Identity Location Mission Name Task / Role Projected Path(s) Relevant Distance By Type of Object Selection Threshold Weights for Ranking VoI (d w d )+(t w t )+(e d : distance from the route / position t : expected time of use e : expiration time i : importance l : learned preference w : corresponding weight factor w e )+(i w Preference Importance i Proximity ) ( l wl Validity Time to Use ) 19

20 Enhancements Range of Influence History of Previously Delivered Information and Change Delta Account for Value Added by new Information Object Object Size

21 Range of Influence Estimate the Range of Influence of Tracks based on type (MIL2525 standard symbol) Configurable policy specifies range of influence for different symbol patterns Policies can depend on attributes such as Friendly, unknown, enemy Type of entity airborne, ground, sea

22 History and Change Delta Matchmaking History used in conjunction with distance to compute relevance of subsequent updates: A track that moves 100 m, but is 1 km away, is assigned a higher relevance than a track that moves 100 m, but is 10 km away. Object Metadata Node Context Area of Relevance Mil STD 2552 Type Client-Assigned Importance... Node Path Node Location Node Mission Node Role... Matchmaker Matchmaking History

23 Object Size Multiple Smaller Objects Vs Fewer Big Objects? Prioritization by Relevance/Object size ratio Filtering of undeliverable data Multiple Tracks ~ 15 KB Object Metadata Area of Relevance Mil STD 2552 Type Client-Assigned Importance... Node Context Node Path Node Location Node Mission Node Role... Network Topology Link capacity Link delay... Matchmaker Matchmaking History Single Image ~ 150 KB Scheduler

24 Initial Results (1) Scenario: Information Dissemination to the Tactical Edge SATCOM SATCOM SATCOM SATCOM MANET MANET MANET Tactical Operations Center Scenario includes dissemination of tracks and sensor reports to dismounted soldiers Soldiers can choose between three levels of selectivity Low (most inclusive), Medium, high (most selective)

25 Bandwidth Utilization (KB/sec) (Lower is Better) Initial Results (2) DSPro Performance Improvement SATCOM MANET Baseline Low - Naïve Low - DSPro Medium - Naïve Medium - DSPro High - Naïve High - DSPro Performance Improvement 26.85% to 45.39% (SATCOM) 31.16% to 64.86% (MANET) Increasing Information Selectivity ---> 25

26 Way Forward Mission based Collection Control the number and type of ISR assets deployed / tasked to support mission requirements Control Drive/steer ISR collection using existing, deployed assets, control what is gathered to support mission requirements as opposed to gathering everything Integrate C2 requirements of multiple missions Shaping of data: downsample imagery, audio, video, summarize documents Based on mission requirements and network state Prioritize based on type; e.g. type of traffic VoIP

27 Broader Context Agile Computing Middleware Realizes Many Protocols for Discovery, Transport, Dissemination, Information Management Building the OODA Loop for the Network Source code for Mockets, DisService, NetProxy has been released under open source GPLv3 license Application Application Agile Computing Middleware Mockets Group Manager (Discovery) AgServe Dissemination Service DSPro ACM Network Proxy UDP Serial Representing Commander s Intent Wired / Wireless Network

28 Interconnected Puzzle Value of Information Mission and Information Requirements Confidence Computation and Actuation Information Ranking and Filtering Wearable Computing and Quantified Self Data Shaping Mediating Between Multiple Information Systems Social Network Analysis / Mining Data Analyzers / Aggregators Moving Computation to Data Software Agents for Offloading Tasks Anomaly Detection Resource Coordination and Allocation Sensor Tasking Quality of Service and Prioritization Tactical Clouds Opportunistic Resource Exploitation Network Awareness Intelligent Dissemination Resource Discovery Tactical Communications Network

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work

More information

Context Based Shared Understanding for Situation Awareness

Context Based Shared Understanding for Situation Awareness Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Information, Decision, & Complex Networks AFOSR/RTC Overview

Information, Decision, & Complex Networks AFOSR/RTC Overview Information, Decision, & Complex Networks AFOSR/RTC Overview 06 MAR 2013 Integrity Service Excellence Robert J. Bonneau, Ph.D. Division Chief AFOSR/RTC Air Force Research Laboratory Report Documentation

More information

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

The Next-Gen ISR Conference brought to you by:

The Next-Gen ISR Conference brought to you by: The Next-Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation Solving Tomorrow s ISR Problems: Getting the Right Information to the Right People

More information

8th International. Command and Control Research and Technology Symposium

8th International. Command and Control Research and Technology Symposium Insertion of Embedded Infosphere Support Technologies Enabling Time Critical Target Prosecution 8th International Command and Control Research and Technology Symposium June 17-19, 2003 National Defense

More information

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

Providing Information Superiority to Small Tactical Units

Providing Information Superiority to Small Tactical Units Providing Information Superiority to Small Tactical Units Jeff Boleng, PhD Principal Member of the Technical Staff Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing

More information

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer

More information

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

Data and Decision Analytics

Data and Decision Analytics DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Data and Decision Analytics DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Data Analytics

More information

Autonomic Computing. Pablo Chacin

Autonomic Computing. Pablo Chacin Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research

More information

Air Force Research Laboratory

Air Force Research Laboratory Air Force Research Laboratory Emerging Command, Control, and Communications Technologies for the 3 rd Offset and Future Operating Concept AFCEA Luncheon 22 September 2016 Dr. Paul Antonik, ST Chief Scientist,

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

On Optimizing Command and Control Structures

On Optimizing Command and Control Structures On Optimizing Command and Control Structures 16th ICCRTS Gary F. Wheatley Best Paper Presentation Kevin Schultz, David Scheidt, {kevin.schultz, david.scheidt}@jhuapl.edu This work was funded in part by

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

New Horizons. Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate. 13 March 2017

New Horizons. Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate. 13 March 2017 New Horizons Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate 13 March 2017 Air Force Research Laboratory 2 Information Technologies....Touch Every Other AFRL Directorate C 4+1 I Command,

More information

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) (ENCS 691K Chapter 7) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

Quality of Service in US Air Force Information Management Systems

Quality of Service in US Air Force Information Management Systems Quality of Service in US Air Force Information Management Systems Co-hosted by: Dr. Joseph P. Loyall BBN Technologies Sponsored by: 12/11/2009 Material Approved for Public Release. Quality of Service is

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks

Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks Gyu Myoung

More information

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project

More information

Cloud-based Open Architecture Approach for Common Enterprise Ground Services

Cloud-based Open Architecture Approach for Common Enterprise Ground Services Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda

More information

Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise

Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise 1 W3C Workshop on Rule Languages for Interoperability Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise A MITRE Sponsored Research Effort Suzette Stoutenburg 28 April 2005

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

CONVERTING SENSOR DATA TO TACTICAL INFORMATION

CONVERTING SENSOR DATA TO TACTICAL INFORMATION 2011 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM VEHICLE ELECTRONICS AND ARCHITECTURE (VEA) MINI-SYMPOSIUM AUGUST 9-11 DEARBORN, MICHIGAN CONVERTING SENSOR DATA TO TACTICAL INFORMATION

More information

UAVs as Communications Routing Nodes in Network-Centric Warfare

UAVs as Communications Routing Nodes in Network-Centric Warfare UAVs as Communications Routing Nodes in Network-Centric Warfare AUVSI s Unmanned Systems 2003 Symposium & Exhibition July 15-17, 17, 2003 Baltimore Convention Center Peter Rigstad L-3 3 Communications

More information

Coalition Interoperability Ontology:

Coalition Interoperability Ontology: Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader

More information

Architecting for Resiliency Army s Common Operating Environment (COE) SERC

Architecting for Resiliency Army s Common Operating Environment (COE) SERC Architecting for Resiliency Army s Common Operating Environment (COE) SERC 5 October 2011 Mr. Terry Edwards Director, ASA(ALT) Office of the Chief Systems Engineer (OCSE) (703) 614-4540 terry.edwards@us.army.mil

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Limited-Bandwidth Plug-ins for DDS

Limited-Bandwidth Plug-ins for DDS May 2011 Limited-Bandwidth Plug-ins for DDS Integrating Applications over Low Bandwidth, Unreliable and Constrained Networks using RTI Data Distribution Service Edwin de Jong, Director of Product Management

More information

An Introduction to the Intelligent IoT Integrator (I3)

An Introduction to the Intelligent IoT Integrator (I3) An Introduction to the Intelligent IoT Integrator (I3) Bhaskar Krishnamachari Professor of Electrical Engineering & Computer Science Director, Center for Cyber-Physical Systems and the Internet of Things

More information

SRA A Strategic Research Agenda for Future Network Technologies

SRA A Strategic Research Agenda for Future Network Technologies SRA A Strategic Research Agenda for Future Network Technologies Rahim Tafazolli,University of Surrey ETSI Future Network Technologies ARCHITECTURE 26th 27th Sep 2011 Sophia Antipolis, France Background

More information

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

Emerging Wireless Networks: Challenges and Perspectives

Emerging Wireless Networks: Challenges and Perspectives Emerging Wireless Networks: Challenges and Perspectives 10:00 Welcome Giuseppe Araniti, Assistant Professor in Telecommunication, DIIES Dep., University Mediterranea of Reggio Calabria, Italy 10:20 Secure

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

A Brief Introduction to CFINS

A Brief Introduction to CFINS A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students

More information

Beyond Web Services A network-centric approach to system design

Beyond Web Services A network-centric approach to system design 1 Beyond Web Services A network-centric approach to system design David Crute Principal Architect Integrated Systems Division General Dynamics C4 Systems 2 Network Services Evolution Software Integration

More information

Executive Summary. iii

Executive Summary. iii Executive Summary Operational and tactical military environments are composed of mobile nodes and dynamic situations resulting in a high degree of uncertainty. Communication links are often based on adhoc

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Towards a Formal Pedigree Ontology for Level-One Sensor Fusion

Towards a Formal Pedigree Ontology for Level-One Sensor Fusion Towards a Formal Pedigree Ontology for Level-One Sensor Fusion Christopher J. Matheus David Tribble Referentia Systems, Inc. Mieczyslaw M. Kokar Northeaster University Marion Ceruti and Scott McGirr Space

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

Quality of Service (QoS) Enabled Dissemination of Managed Information Objects in a Publish-Subscribe-Query

Quality of Service (QoS) Enabled Dissemination of Managed Information Objects in a Publish-Subscribe-Query Quality of Service (QoS) Enabled Dissemination of Managed Information Objects in a Publish-Subscribe-Query Information Broker Dr. Joe Loyall BBN Technologies The Boeing Company Florida Institute for Human

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Interface Technology (MUSCIT) Program

Interface Technology (MUSCIT) Program Multi-UAV Supervisory Control Interface Technology (MUSCIT) Program April 2007 Kristen K. Liggett, Ph.D. System Control Interfaces Branch Warfighter Interface Division Human Effectiveness Directorate Air

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

<Insert Picture Here> Enterprise Data Management using Grid Technology

<Insert Picture Here> Enterprise Data Management using Grid Technology Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility

More information

Next Generation Communication Architectures and Technologies

Next Generation Communication Architectures and Technologies Next Generation Communication Architectures and Technologies Special Session on: Requirements and Technologies for the Next Generation of Mobile Communications Presenter: Prof. Panagiotis Demestichas University

More information

DAISY Data Analysis and Information SecuritY Lab

DAISY Data Analysis and Information SecuritY Lab DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis

More information

5G Reimagined: New Business Models and Enhanced User Experiences

5G Reimagined: New Business Models and Enhanced User Experiences 5G Reimagined: New Business Models and Enhanced User Experiences Panelists: Brian Daly Director, Core Network & Government/Regulatory Standards, AT&T Fred Kemmerer Senior Consultant, Strategic Options

More information

Exadata Database Machine: 12c Administration Workshop Ed 2

Exadata Database Machine: 12c Administration Workshop Ed 2 Oracle University Contact Us: 800-260-690 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop training

More information

Cisco APIC Enterprise Module Simplifies Network Operations

Cisco APIC Enterprise Module Simplifies Network Operations Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º

More information

Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems

Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Vijay Vittal Director, Power Systems Engineering Research Center Ira A. Fulton Chair Professor,

More information

Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days

Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days This Exadata Database Machine: 12c Administration Workshop introduces you to Oracle Exadata Database Machine. Explore the various

More information

Topology Control from Bottom to Top

Topology Control from Bottom to Top Topology Control from Bottom to Top M. Steenstrup Stow Research L.L.C. Clemson University steenie@rcn.com This work was funded in part by DARPA and by ONR MURI. Report Documentation Page Form Approved

More information

Exadata Database Machine: 12c Administration Workshop Ed 2

Exadata Database Machine: 12c Administration Workshop Ed 2 Oracle University Contact Us: 00 9714 390 9050 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Computer-based Tracking Protocols: Improving Communication between Databases

Computer-based Tracking Protocols: Improving Communication between Databases Computer-based Tracking Protocols: Improving Communication between Databases Amol Deshpande Database Group Department of Computer Science University of Maryland Overview Food tracking and traceability

More information

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED UNCLASSIFIED : February 6 Exhibit R, RDT&E Budget Item Justification: PB : Research,, Test & Evaluation, / BA 5: System & Demonstration (SDD) COST ($ in Millions) FY 5 FY 6 R Program Element (Number/Name) PE 65A /

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia Future X Network Sanjay Kamat Managing Partner, Bell Labs Consulting 1 2017 Nokia Nokia Bell Labs innovations have been changing the way we live for more than 90 years 2 2017 Nokia Nokia Internal Nokia

More information

The Business of Security in the Cloud

The Business of Security in the Cloud The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

How To Reduce the IT Budget and Still Keep the Lights On

How To Reduce the IT Budget and Still Keep the Lights On How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,

More information

SECURITY MANAGEMENT FOR SE LINUX

SECURITY MANAGEMENT FOR SE LINUX AFRL-IF-RS-TR-2003-22 Final Technical Report February 2003 SECURITY MANAGEMENT FOR SE LINUX George Washington University Sponsored by Defense Advanced Research Projects Agency DARPA Order No. N624/00 APPROVED

More information

Choosing the Right Acceleration Solution

Choosing the Right Acceleration Solution Choosing the Right Acceleration Solution In the previous piece in this series, What is Network Acceleration, we outlined the various techniques used to improve network performance. Now, we will discuss

More information

www.grensregio.eu www.smarttooling.eu WIRELESS COMMUNICATION, LOCALIZATION (AND MORE) FOR ROBOTICS PROF. JEROEN HOEBEKE, PROF. BRUNO VOLCKAERT, PROF. PIETER SIMOENS (jeroen.hoebeke@ugent.be) GHENT UNIVERSITY

More information

Data Sources for Cyber Security Research

Data Sources for Cyber Security Research Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

APP-PHY Interactions in Wireless Networks

APP-PHY Interactions in Wireless Networks University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

NEXIUM THEATRE. Tactical networks for defence and security forces

NEXIUM THEATRE. Tactical networks for defence and security forces w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and

More information

A look into the 3GPP future 2012 of 3GPP 5G

A look into the 3GPP future 2012 of 3GPP 5G A look into the 3GPP future 2012 of 3GPP 5G Joerg Swetina (NEC) 3GPP SA1, onem2m 3GPP 2016 1 Use case areas of TR 22.891 SMARTER Massive MTC Vehicle / autonomous driving Industry Robot / Drone Game / Sports

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle NoSQL Database and Oracle Relational Database - A Perfect Fit Dave Rubin Director NoSQL Database Development 2 The following is intended to outline our general product direction. It is intended

More information

IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007

IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007 IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS Presented at MILCOM 27 October 29, 27 ABSTRACT Mobile Ad Hoc Networking (MANET) is a key technology enabler in the tactical

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

An Architecture. What the MEC? for 5G

An Architecture. What the MEC? for 5G An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless

More information

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager joshua.roth1@defence.gov.au 02 626

More information

Network-Aware Resource Allocation in Distributed Clouds

Network-Aware Resource Allocation in Distributed Clouds Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and

More information

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 1 Research Scholar, Computer Science and Engineering, Lovely

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

End-to-end QoS negotiation in network federations

End-to-end QoS negotiation in network federations End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report

More information

Exdata Database Machine: 12c Administration Workshop Ed 2

Exdata Database Machine: 12c Administration Workshop Ed 2 Exdata Database Machine: 12c Administration Workshop Ed 2 Duration 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop training introduces you to Oracle Exadata Database

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year 2011/2012

More information

Project: IEEE P Task Group for Wireless Smart Sensors

Project: IEEE P Task Group for Wireless Smart Sensors Project: IEEE P1451.5 Task Group for Wireless Smart Sensors Title: [Industrial Sensing Applications] Date Submitted: [23 Sep, 2002] Source: [Kenneth D. Cornett] Company: [Motorola, Inc.] Address: [8000

More information