Modifi cation of the CGR-Algorithm on Data Routing in a Communication Network of Satellite Constellation

2020 ◽  
Vol 21 (2) ◽  
pp. 75-85 ◽  
Author(s):  
O. V. Karsaev

Communication networks in space systems involving the use of satellite constellations are DTN networks (Delay and Disruption Tolerant Networks). The establishment of communication channels in space communication networks has certain specifics: communication channels can be planned. In this regard, the CGR approach (Contact Graph Routing) is considered as the most promising solution to the problem of data routing. At the basis of this approach, taking into account this specificity, the calculation of the contact plan is considered. On the basis of this plan in the network nodes contact graphs are calculated, which are used to search the shortest data transmission routes. The paper proposes two interrelated solutions as a modification of this approach: the route search based on the contact plan, i.e. without calculation and use of the contact graph, and an adaptive method of finding the set of shortest routes required for routing. The essence of the first solution is as follows. In the standard CGR approach, the graph vertices correspond to the planned contacts between the network nodes, and the edges correspond to the data storage processes in the network nodes. In contrast, in the proposed approach, the vertices of the graph correspond to the nodes of the network, and the edges of the graph and their weight are determined dynamically, in the process of finding the shortest routes. The second solution is based on the concept of the planning front, which means a list of the closest contacts in time. The required routes are divided into a certain number of pools. Each pool combines the routes that use the specified contact from the planning front. The planning front is updated in two cases. If the network topology changes, the completed or not established contacts are replaced by subsequent ones with the same network nodes that are closest in time. If message traffic grows, a certain extension of the planning front and the use of additional route pools are performed. The article concludes with a description and justification of the expected advantages of the proposed approach.

Author(s):  
Г.В. Чечин

Рассматриваются тенденции и концепции построения спутниковых сетей связи на базе негеостационарных орбитальных группировок. Анализ существующих и перспективных сетей основан на большом количестве показателей эффективности, таких как параметры орбитальных группировок, типы антенн, построение системы информационного обмена (протоколы многостанционного доступа и разделения каналов связи, протоколы маршрутизации и передачи информации по каналам связи), а также стоимость. The trends and concepts of satellite communications networks based on non-geostationary orbital constellations are considered. Analysis of existing and prospective networks is based on a large number of performance indicators, such as parameters of orbital constellations, type of antennas, construction of an information exchange system (protocols for multiple access and separation of communication channels, protocols for routing and transmitting information over communication channels), and cost.


2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


Author(s):  
W. K. Hamoudi ◽  
Nadia M. G. Al-Saidi

Information security can provide confidentiality, integrity, and availability for society to benefit efficiently from data storage and open networks. Free space communication networks suffer from adversaries who interfere with data on networked computers. Inventing new protection techniques has arisen to ensure integrity and authenticity of digital information. This chapter introduces Nano and Bio techniques in cryptography to enhance the information security systems. Tasks unfeasible on a classical computer can now be performed by quantum computers, yielding a big impact on online security. Threats of exponentially fast quantum algorithms on business transactions could be overcome by this new technology. Based on biological observations, the exploration of biometric cryptography and authentication to determine individuals' authenticity can be done through numeric measurements. This provides very reliable automated verification and strong protection against biometric system attacks.


Author(s):  
Faiz-ul Hassan ◽  
Wim Vanderbauwhede ◽  
Fernando Rodríguez-Salazar

On-chip communication is becoming an important bottleneck in the design and operation of high performance systems where it has to face additional challenges due to device variability. Communication structures such as tapered buffer drivers, interconnects, repeaters, and data storage elements are vulnerable to variability, which can limit the performance of the on-chip communication networks. In this regard, it becomes important to have a complete understanding of the impact that variability will have on the performance of these circuit elements in order to design high yield and reliable systems. In this paper, the authors have characterized the performance of the communication structures under the impact of random dopant fluctuation (RDF) for the future technology generations of 25, 18, and 13 nm. For accurate characterization of their performance, a Monte Carlo simulation method has been used along with predictive device models for the given technologies. Analytical models have been developed for the link failure probability of a repeater inserted interconnect which uses characterization data of all communication structures to give an accurate prediction of the link failure probability. The model has also been extended to calculate the link failure probability of a wider communication link.


2020 ◽  
Vol 157 ◽  
pp. 04027 ◽  
Author(s):  
Sergey Ageev ◽  
Vladimir Karetnikov ◽  
Evgeny Ol’khovik ◽  
Andrey Privalov

In the paper, an adaptive hybrid heuristic (behavioral) method for detecting small traffic anomalies in high-speed multiservice communication networks, which operates in real time, is proposed and investigated. The relevance of this study is determined by the fact that network security management processes in high-speed multiservice communication networks need to be implemented in a mode close to real-time mode, as well as identifying possible network security threats in the early stages of the implementation of possible network attacks. The proposed method and algorithm belong to the class of adaptive methods and algorithms with preliminary training. The average relative error in estimating the evaluated traffic parameters does not exceed 10%, which is sufficient for the implementation of operational network management tasks. Anomalies of the expectation of traffic intensity and its dispersion are identified if their valuesexceed the normal values by 15% or more, which makes it possible to detect possible network attacks in the early phases of their implementation, for example, at the stage of scanning ports and interfaces of the attacked system. The procedure for detecting anomalous traffic behavior is implemented based on the Mamdani’s method of hierarchical fuzzy logical inference. A study of the proposed method for detecting anomalous behavior of network traffic showed its high efficiency.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4895
Author(s):  
Maurício R. Silva ◽  
Elitelma S. Souza ◽  
Pablo J. Alsina ◽  
Deyvid L. Leite ◽  
Mateus R. Morais ◽  
...  

This paper presents a communication network for a squadron of unmanned aerial vehicles (UAVs) to be used in the scanning rocket impact area for Barreira do Inferno Launch Center—CLBI (Rio Grande do Norte, Brazil), aiming at detecting intruder boats. The main features of communication networks associated with multi-UAV systems are presented. This system sends information through Wireless Sensor Networks (WSN). After comparing and analyzing area scanning strategies, it presents the specification of a data communication network architecture for a squadron of UAVs within a sensor network using XBee Pro 900HP S3B modules. A brief description is made about the initial information from the construction of the system. The embedded hardware and the design procedure of a dedicated communication antenna to the XBee modules are presented. In order to evaluate the performance of the proposed architecture in terms of robustness and reliability, a set of experimental tests in different communication scenarios is carried out. Network management software is employed to measure the throughput, packet loss and other performance indicators in the communication links between the different network nodes. Experimental results allow verifying the quality and performance of the network nodes, as well as the reliability of the communication links, assessing signal received quality, range and latency.


2017 ◽  
Vol 2017 ◽  
pp. 1-18 ◽  
Author(s):  
J. A. Fraire ◽  
P. Madoery ◽  
S. Burleigh ◽  
M. Feldmann ◽  
J. Finochietto ◽  
...  

Existing Internet protocols assume persistent end-to-end connectivity, which cannot be guaranteed in disruptive and high-latency space environments. To operate over these challenging networks, a store-carry-and-forward communication architecture called Delay/Disruption Tolerant Networking (DTN) has been proposed. This work provides the first examination of the performance and robustness of Contact Graph Routing (CGR) algorithm, the state-of-the-art routing scheme for space-based DTNs. To this end, after a thorough description of CGR, two appealing satellite constellations are proposed and evaluated by means of simulations. Indeed, the DtnSim simulator is introduced as another relevant contribution of this work. Results enabled the authors to identify existing CGR weaknesses and enhancement opportunities.


2018 ◽  
Vol 44 ◽  
pp. 00020 ◽  
Author(s):  
Alexey Busygin ◽  
Maxim Kalinin ◽  
Artem Konoplev

This paper considers the tasks of supporting the connectivity of nodes in communication networks of unmanned transport (VANET/MANET-networks). High dynamics, decentralization and absence of hierarchy in the networks of this type actualize the task of supporting the connectivity of nodes with software-configurable security services, providing the network protection. It is offered to use a Blockchain technology based system for VANET/MANET network topologyand authentication data distribution and storage. The issue of unlimited blockchain growth preventing this method from being implemented in VANET/MANET networks is considered. The existing solutions of this issueare analyzed and drawbacks are identified. A notion of blockchain with floating genesis block is introduced and its advantages over similar ideas are demonstrated thus allowing it to be used to resolve the issue of continuously growing blockchain within the systems with stalingtransactions as a whole and in VANET/MANET networks in particular.


2014 ◽  
Vol 1049-1050 ◽  
pp. 520-525
Author(s):  
Xiao Xi Hao ◽  
Xue Mei Guo ◽  
Guo Li Wang

Radio tomographic imaging as a coarse computational imaging method has attracted much attentions due to its potential applications in human surveillance. It utilizes the shadow fading characteristics of radio signals among wireless sensor network nodes to infer the targets' localization. The recovery process involves a large number of scanning links, which brings heavy burdens on node energy, communication routes and data storage. In general, there is a small number of targets and could be seen as a sparse signal compared with the original high-dimensional space. Hence, the key of scene recovery is the effective links selected. This part of work presents a heuristic link selection for radio tomographic localization system, which introduces a Bayesian compressive sensing (BCS) to heuristic link selection method for scene imaging reconstruction.


Sign in / Sign up

Export Citation Format

Share Document