US20040156388A1 - System for maintaining quality of service - Google Patents
System for maintaining quality of service Download PDFInfo
- Publication number
- US20040156388A1 US20040156388A1 US10/771,027 US77102704A US2004156388A1 US 20040156388 A1 US20040156388 A1 US 20040156388A1 US 77102704 A US77102704 A US 77102704A US 2004156388 A1 US2004156388 A1 US 2004156388A1
- Authority
- US
- United States
- Prior art keywords
- nodes
- service
- set forth
- algorithm
- further including
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000013442 quality metrics Methods 0.000 claims abstract description 23
- 238000004590 computer program Methods 0.000 claims description 13
- 238000000034 method Methods 0.000 claims description 13
- 239000013598 vector Substances 0.000 claims description 5
- 230000006978 adaptation Effects 0.000 description 21
- 230000008859 change Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000006855 networking Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 9
- 230000003287 optical effect Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000005012 migration Effects 0.000 description 3
- 238000013508 migration Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 3
- 230000003044 adaptive effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005055 memory storage Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000002567 autonomic effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000001727 in vivo Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002195 synergetic effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0083—Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
- H04W36/00835—Determination of neighbour cell lists
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to a system for maintaining quality of service within a wireless network, and more specifically, to a system for maintaining a quality of service center of mass within wireless network operation.
- Ad-Hoc Networks are a subset of variable topology networks.
- the goal of variable topology networks is to maintain message delivery as the network topology varies.
- Network nodes ideally should be able to dynamically form transient networks.
- Nodes which may be located on rapidly moving platforms such as aircraft, ideally should be able to join, leave, and re-join networks which may form at any time. Networks spontaneously form and their topologies may change rapidly.
- An additional challenge required by airborne and heterogeneous air and ground environments is the ability to provide predictable and optimized quality of service (QoS) for reliable information transmission over variable topologies.
- QoS quality of service
- a network architecture may support adaptation to a rapidly changing infrastructure.
- the degree to which the network adapts may be dependent on the rate of change of the topology.
- QoS requirements are conventionally stated in the form of an optimization problem with a cost function that is optimized by adaptation within the network.
- the No Free Lunch Theorem defines a limit on the ability of any single algorithm, or protocol, to meet all QoS requirements.
- the No Free Lunch Theorem has proven that all algorithms perform exactly the same as the algorithms search for an extremum, when averaged over all cost functions. If an apparently superior algorithm appears to outperform an apparently poor algorithm on some cost functions, then there exist exactly as many cost functions where the apparent poor algorithm will outperform the apparently superior algorithm. In other words, no single algorithm, or ad-hoc protocol, may optimize all possible QoS constraints.
- IP Internet Protocol
- programmable networks allow control software of a network to be dynamically re-programmed.
- Active networks are an extreme form of programmable networks that allow code and data to travel through the network, often in the same packet structure. Active packet code may execute on any node along the path that the packet travels.
- a “meta”-adaptation view, or how adaptive mechanisms work together, would be extremely useful for ad-hoc network environments. Attempts to develop this meta-adaptation view have resulted in Explicit Link Failure Notification. Congestion and routing each try to adapt based upon limited knowledge of each other, resulting in sub-optimal global behavior. Another example of sub-optimal adaptation behavior is MAC to IP layer address resolution.
- Load balancing algorithms may be used to help determine optimal placement of services and routing within an ad-hoc network.
- a related issue is adaptive cache location. Caching data to improve performance may occur within the network.
- an ad-hoc network adds additional changes in optimizing cache locations within the network.
- Active caches, or caches implemented within active networks with the capability to migrate from node to node, may address this challenge.
- the No Free Lunch Theorem has produced a myriad of ad-hoc routing protocols. Each protocol may be optimal under different conditions. The choice of a protocol itself might be considered an adaptable parameter. Further, multiple routing protocols may be combined within the same network.
- Ad hoc networking typically requires a more flexible communications architecture than fixed networks in order to maximize QoS.
- a cross-layer design has been suggested as a means of achieving improved performance.
- this design lacks flexibility and suggests a fundamental limitation exists in the ability of a single a priori optimization function to meet all QoS requirements in an ad hoc network.
- a system in accordance with the present invention operates a wireless ad hoc network.
- the system includes a plurality of nodes and an active packet.
- the active packet maintains an optimal quality metric of a service for a plurality of nodes that utilize the service.
- the active packet utilizes an adaptable algorithm for achieving the optimal quality metric.
- a computer program product in accordance with the present invention maintains optimal quality of service of a wireless network.
- the computer program product includes a first instruction for maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and a second instruction for utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams the wireless network.
- a method in accordance with the present invention maintains optimal quality of service of a wireless network.
- the method includes the steps of maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and utilizing an adaptable algorithm for achieving the optimal quality metric.
- the algorithm is applied by an active packet that roams the wireless network.
- FIG. 1 is a schematic representation of an example system in accordance with the present invention.
- FIG. 2 is a schematic representation of another example system in accordance with the present invention.
- FIG. 3 is a schematic representation of still another example system in accordance with the present invention.
- An active network allows intelligent, autonomous packets to roam the active network. These packets may be caches of previously sent information for improving network performance.
- a system 10 in accordance with the present invention may utilize this roaming to maintain caches in optimal locations in such a dynamically changing network (FIG. 1).
- the system utilizes autonomous, active caches to intercept and store information likely to be retrieved again by other nodes at an optimal node.
- the system further utilizes a fitness function designed to maintain quality of service (QoS) within a “center of mass” of a client node population. Client nodes may be weighted to move a service closer to those client nodes with higher priorities (i.e., client nodes that should receive a higher QoS, etc.).
- QoS quality of service
- the system 10 does not define yet another ad-hoc routing protocol, but rather achieves QoS in a variable topology network.
- a highest-level performance metric may be qualitatively stated as the degree to which the system is able to meet any reasonable QoS requirement regarding the transmission and reception of information over a variable topology network. It is assumed that QoS requirements are specifically defined as potential trade-offs of traditional networking requirements such as throughput, delay, and degree of information assurance. Information is particularly important for meeting military requirements.
- a QoS metric may be introduced that is concerned with the best possible QoS achievable in a rapidly changing variable topology environment.
- the system 10 provides adaptation, defined as the ability of an algorithm to change, that is a radical improvement in ad-hoc network capabilities.
- the code itself may be capable of change, as well as inter-node code transport, deep within a network infrastructure.
- the ability of the code itself to adapt makes the system 10 extremely flexible and resilient.
- the system 10 defines a metric quantifying a relation of a degree of dynamism to QoS within the ad hoc network. Dynamism quantifies the complexity and rate of change of a variable topology. A critical requirement is how quickly the system 10 may adapt as a function of the complexity and rate of change of the topology. This dynamism may be represented by a specified set of force vectors to be applied to each network node. Thus, a velocity and direction may be applied to each node and the network's characteristics may be monitored as the system 10 responds to applied forces. Based on the above-described No Free Lunch Theorem, a single algorithm or protocol to meet all possible QoS requirements does not exist. Further, only a subset of QoS requirements are likely to be requested by a reasonable user under reasonable operating conditions. However, the envelope of what may be considered reasonable, particularly under military conditions, may constantly expand.
- An ad hoc network desirably eliminates inefficiency caused by competing fitness requirements.
- multiple protocol layers in the same protocol stack may produce inefficiencies due to competing fitness requirements. These inefficiencies become highly exacerbated in an ad hoc environment.
- Adaptation may be defined as autonomic change in network state designed to maintain optimal communication performance. Most network functionality falls under some form of adaptation.
- the problem with adaptation as defined above is that algorithms, defined a priori (i.e., before installation within the network, etc.), are typically developed to meet high performance standards for specific predefined cases within the network. These algorithms may not have the flexibility, or adaptability, required to meet unanticipated conditions.
- the definition of adaptation may include self-directed change by an algorithm designed to maintain optimal performance. Adaptation may be a self-directed change in an algorithm, or program code, designed to maintain optimal ad-hoc network performance.
- Adaptation may be related to traditional metrics.
- Route discovery time or route acquisition time including reactive protocols, may be a specific metric that is critical to a variable topology network.
- Route discovery time may be influenced by a location announcement interval (i.e., beaconing, a hello message, etc.).
- End-end delay and throughput are metrics that may also be considered. These metrics may be influenced by packet loss rate, route reconstruction time, and routing overhead, which may be additional candidate metrics.
- Changing an algorithm requires changing code. Services require capability to adjust their location within an ad hoc network in order to maximize QoS to all client nodes. Code that remains resident to only one node may not reside in an optimal location given ad hoc movement patterns. Installing all potentially useful code on all nodes creates much overhead, particularly for low capability ad hoc nodes and sensors. It is desirable that code have the capability to move from node to node. The location and movement of a service affect network performance.
- the factors influencing service migration include not only basic route acquisition delays, but also the size of a service code. Route acquisition delays have the impact of potentially providing false network topology information and may cause a service to migrate towards an incorrect location. Large service code size may be due to a complex service that is being offered or due to the overhead of a service location algorithm itself.
- the system 10 in accordance with the present invention provides the ability to maintain a service at an optimal location relative to a set of mobile client nodes. Specifically, because nodes are mobile and the direction and velocity of the nodes may be highly variable, nodes may be temporarily or permanently unreachable. The system 10 assigns a penalty for ‘no quality of service’.
- the system 10 may define a metric that captures the precision, including overhead, with which the network is able to maintain an optimal location for the service that maximizes overall QoS normalized by the amount of dynamism in the network topology. By means of simulation, an optimal location may be determined at all times.
- a system 10 in accordance with the present invention provides such a metric as applied to an active ad-hoc network.
- the system 10 maximizes QoS by adaptation of algorithms, rather than simply tuning static algorithms.
- Algorithms may change form either in vivo within a node, or be defined a priori, before network operation. In either case, the code implementing the algorithm may migrate to the best service location in the network as the network topology changes. The topology changes due to node movement patterns.
- Network topology is thus dependent upon the effects of node movement and those effects may be examined via vector fields.
- Vector field representation of node movement may be directly applied to the estimation of QoS and the requirements for service migration performance (i.e., service transmission rate as a function of code size, expected link transmission rate, etc.).
- FIG. 1 shows an example representation of a system 10 in accordance with the present invention.
- the dots represent mobile nodes.
- the caches are also located on mobile nodes.
- the QoSWeights are attributes of client nodes' requests for services. Client nodes may reside on any nodes.
- the caches are mobile and move themselves (and their contents) to an optimal location in the network. The best location may be a simple solution to the objective function Min E(x)+Var(x) where E is Expected Value, Var is Variance, and x is a hop count for each client node to it's cache multiplied by its QoSWeight (i.e., h*QoSWeight where h is hop count).
- the mobile caches may thus be pulled into the center of mass of the client nodes.
- a computer program product 200 maintains optimal quality of service of a wireless network (FIG. 2).
- the computer program product 200 includes a first instruction 201 for maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and a second instruction 202 for utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams 203 the wireless network.
- a method 300 maintains optimal quality of service of a wireless network (FIG. 3).
- the method 300 includes the steps of maintaining 301 an optimal quality metric of a service for a plurality of nodes that utilize the service and utilizing 302 an adaptable algorithm for achieving the optimal quality metric.
- the algorithm is applied by an active packet that roams 303 the wireless network.
- inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like.
- the illustrated aspects of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications argument model. However, some, if not all aspects of the invention can be practiced on stand-alone computers.
- program modules may be located in both local and remote memory storage devices.
- An exemplary system for implementing the various aspects of the invention includes a conventional server computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
- the processing unit may be any of various commercially available processors. Dual microprocessors and other multi-processor architectures also can be used as the processing unit.
- the system bus may be any of several types of bus structure including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of conventional bus architectures.
- the system memory includes read only memory (ROM) and random access memory (RAM).
- BIOS basic input/output system
- BIOS basic routines that help to transfer information between elements within the server computer, such as during start-up, is stored in ROM.
- the server computer further includes a hard disk drive, a magnetic disk drive, e.g., to read from or write to a removable disk, and an optical disk drive, e.g., for reading a CD-ROM disk or to read from or write to other optical media.
- the hard disk drive, magnetic disk drive, and optical disk drive are connected to the system bus by a hard disk drive interface, a magnetic disk drive interface, and an optical drive interface, respectively.
- the drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, etc., for the server computer.
- computer-readable media refers to a hard disk, a removable magnetic disk and a CD
- other types of media which are readable by a computer such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment, and further that any such media may contain computer-executable instructions for performing the methods of the present invention.
- a number of program modules may be stored in the drives and RAM, including an operating system, one or more application programs, other program modules, and program data.
- a user may enter commands and information into the server computer through a keyboard and a pointing device, such as a mouse.
- Other input devices may include a microphone, a joystick, a game pad, a satellite dish, a scanner, or the like.
- These and other input devices are often connected to the processing unit through a serial port interface that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB).
- a monitor or other type of display device is also connected to the system bus via an interface, such as a video adapter.
- computers typically include other peripheral output devices (not shown), such as speaker and printers.
- the server computer may operate in a networked environment using logical connections to one or more remote computers, such as a remote client computer.
- the remote computer may be a workstation, a server computer, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the server computer.
- the logical connections include a local area network (LAN) and a wide area network (WAN).
- LAN local area network
- WAN wide area network
- the server computer When used in a LAN networking environment, the server computer is connected to the local network through a network interface or adapter.
- the server computer When used in a WAN networking environment, the server computer typically includes a modem, or is connected to a communications server on the LAN, or has other means for establishing communications over the wide area network, such as the internet.
- the modem which may be internal or external, is connected to the system bus via the serial port interface.
- program modules depicted relative to the server computer, or portions thereof may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
Abstract
A system in accordance with the present invention operates a wireless ad hoc network. The system includes a plurality of nodes and an active packet. The active packet maintains an optimal quality metric of a service for nodes of the plurality of nodes that utilize the service. The active packet utilizes an adaptable algorithm for achieving the optimal quality metric.
Description
- This application claims the benefit of U.S. Provisional Application No. 60/445,579, filed Feb. 7, 2003.
- The present invention relates to a system for maintaining quality of service within a wireless network, and more specifically, to a system for maintaining a quality of service center of mass within wireless network operation.
- Ad-Hoc Networks are a subset of variable topology networks. The goal of variable topology networks is to maintain message delivery as the network topology varies. Network nodes ideally should be able to dynamically form transient networks. Nodes, which may be located on rapidly moving platforms such as aircraft, ideally should be able to join, leave, and re-join networks which may form at any time. Networks spontaneously form and their topologies may change rapidly. An additional challenge required by airborne and heterogeneous air and ground environments is the ability to provide predictable and optimized quality of service (QoS) for reliable information transmission over variable topologies.
- In order to provide predictable and optimal QoS in ad-hoc networks, a network architecture may support adaptation to a rapidly changing infrastructure. The degree to which the network adapts may be dependent on the rate of change of the topology. QoS requirements are conventionally stated in the form of an optimization problem with a cost function that is optimized by adaptation within the network.
- An applicable option from complexity theory, the No Free Lunch Theorem defines a limit on the ability of any single algorithm, or protocol, to meet all QoS requirements. The No Free Lunch Theorem has proven that all algorithms perform exactly the same as the algorithms search for an extremum, when averaged over all cost functions. If an apparently superior algorithm appears to outperform an apparently poor algorithm on some cost functions, then there exist exactly as many cost functions where the apparent poor algorithm will outperform the apparently superior algorithm. In other words, no single algorithm, or ad-hoc protocol, may optimize all possible QoS constraints.
- Two forms of conventional adaptation are a constant algorithm with tunable parameters and a variable algorithm. Conventional ad hoc network protocol research has focused upon the constant algorithm with tunable parameters. In other words, conventional research is searching for a fixed algorithm that has enough degrees of freedom that optimal operation may be found by tuning a fixed set of parameters. This may be due in part to the difficulty in breaking away from the fixed node architecture of Internet Protocol (IP) that has conventionally been used.
- There is great potential in examining the latter form of adaptation, particularly in light of the implication of the No Free Lunch Theorem suggesting that simply tuning a fixed algorithm may not be as optimal as changing to a better algorithm given a different cost function. Two high-level frameworks that are flexible and customizable enough to allow change in fundamental algorithmic content are programmable networks and active networks. Programmable networks allow control software of a network to be dynamically re-programmed. Active networks are an extreme form of programmable networks that allow code and data to travel through the network, often in the same packet structure. Active packet code may execute on any node along the path that the packet travels.
- Active networks have been applied to both mobile and ad-hoc networking. The applications have focused on solving the problem of mismatch among adaptation mechanisms within individual layers of the IP and improving adaptation to suit the characteristics of ad-hoc network environments.
- The most significant challenge that has been identified with regard to adaptation within ad-hoc networking is the lack of synergistic adaptation among network layers. Early network implementation focused upon network layering as a mechanism for partitioning computer communications into a set of tractable subtasks. Layering resulted in many forms of adaptation occurring simultaneously within the network. However, adaptation in one layer (i.e., congestion control, etc.) may occur in a manner antithetical to adaptation in another layer (i.e., route repair, etc.).
- A “meta”-adaptation view, or how adaptive mechanisms work together, would be extremely useful for ad-hoc network environments. Attempts to develop this meta-adaptation view have resulted in Explicit Link Failure Notification. Congestion and routing each try to adapt based upon limited knowledge of each other, resulting in sub-optimal global behavior. Another example of sub-optimal adaptation behavior is MAC to IP layer address resolution.
- Also, benefit may be gained by examining the lighter, un-layered ad hoc communication of sensor networks. Sensor networks tend to assume large numbers of constrained sensor devices that transmit asymmetrically to a central location. However, ad hoc routing should be implemented on the sensors using as little power and processing as possible. This has conventionally resulted in fewer network layers and better in-network utilization via active networking.
- Another challenge is service migration. Load balancing algorithms may be used to help determine optimal placement of services and routing within an ad-hoc network. A related issue is adaptive cache location. Caching data to improve performance may occur within the network. However, an ad-hoc network adds additional changes in optimizing cache locations within the network. Active caches, or caches implemented within active networks with the capability to migrate from node to node, may address this challenge.
- The No Free Lunch Theorem has produced a myriad of ad-hoc routing protocols. Each protocol may be optimal under different conditions. The choice of a protocol itself might be considered an adaptable parameter. Further, multiple routing protocols may be combined within the same network.
- Ad hoc networking typically requires a more flexible communications architecture than fixed networks in order to maximize QoS. A cross-layer design has been suggested as a means of achieving improved performance. However, this design lacks flexibility and suggests a fundamental limitation exists in the ability of a single a priori optimization function to meet all QoS requirements in an ad hoc network.
- Active networking and programmable networking enable unprecedented flexibility for ad hoc communication networks. However, in order to best leverage the results of active and programmable networking for ad hoc networks, metrics that best indicate the location and nature of the required flexibility are desired.
- A system in accordance with the present invention operates a wireless ad hoc network. The system includes a plurality of nodes and an active packet. The active packet maintains an optimal quality metric of a service for a plurality of nodes that utilize the service. The active packet utilizes an adaptable algorithm for achieving the optimal quality metric.
- A computer program product in accordance with the present invention maintains optimal quality of service of a wireless network. The computer program product includes a first instruction for maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and a second instruction for utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams the wireless network.
- A method in accordance with the present invention maintains optimal quality of service of a wireless network. The method includes the steps of maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and utilizing an adaptable algorithm for achieving the optimal quality metric. The algorithm is applied by an active packet that roams the wireless network.
- The foregoing and other features of the present invention will become apparent to one skilled in the art to which the present invention relates upon consideration of the following description of the invention with reference to the accompanying drawings, wherein:
- FIG. 1 is a schematic representation of an example system in accordance with the present invention;
- FIG. 2 is a schematic representation of another example system in accordance with the present invention; and
- FIG. 3 is a schematic representation of still another example system in accordance with the present invention.
- An active network allows intelligent, autonomous packets to roam the active network. These packets may be caches of previously sent information for improving network performance. A
system 10 in accordance with the present invention may utilize this roaming to maintain caches in optimal locations in such a dynamically changing network (FIG. 1). The system utilizes autonomous, active caches to intercept and store information likely to be retrieved again by other nodes at an optimal node. The system further utilizes a fitness function designed to maintain quality of service (QoS) within a “center of mass” of a client node population. Client nodes may be weighted to move a service closer to those client nodes with higher priorities (i.e., client nodes that should receive a higher QoS, etc.). - The
system 10 does not define yet another ad-hoc routing protocol, but rather achieves QoS in a variable topology network. A highest-level performance metric may be qualitatively stated as the degree to which the system is able to meet any reasonable QoS requirement regarding the transmission and reception of information over a variable topology network. It is assumed that QoS requirements are specifically defined as potential trade-offs of traditional networking requirements such as throughput, delay, and degree of information assurance. Information is particularly important for meeting military requirements. In addition to these metrics, a QoS metric may be introduced that is concerned with the best possible QoS achievable in a rapidly changing variable topology environment. - The
system 10 provides adaptation, defined as the ability of an algorithm to change, that is a radical improvement in ad-hoc network capabilities. The code itself may be capable of change, as well as inter-node code transport, deep within a network infrastructure. The ability of the code itself to adapt makes thesystem 10 extremely flexible and resilient. - The
system 10 defines a metric quantifying a relation of a degree of dynamism to QoS within the ad hoc network. Dynamism quantifies the complexity and rate of change of a variable topology. A critical requirement is how quickly thesystem 10 may adapt as a function of the complexity and rate of change of the topology. This dynamism may be represented by a specified set of force vectors to be applied to each network node. Thus, a velocity and direction may be applied to each node and the network's characteristics may be monitored as thesystem 10 responds to applied forces. Based on the above-described No Free Lunch Theorem, a single algorithm or protocol to meet all possible QoS requirements does not exist. Further, only a subset of QoS requirements are likely to be requested by a reasonable user under reasonable operating conditions. However, the envelope of what may be considered reasonable, particularly under military conditions, may constantly expand. - An ad hoc network desirably eliminates inefficiency caused by competing fitness requirements. In addition to multiple users with potentially competing fitness requirements within a single protocol or application, multiple protocol layers in the same protocol stack may produce inefficiencies due to competing fitness requirements. These inefficiencies become highly exacerbated in an ad hoc environment.
- Adaptation may be defined as autonomic change in network state designed to maintain optimal communication performance. Most network functionality falls under some form of adaptation. The problem with adaptation as defined above is that algorithms, defined a priori (i.e., before installation within the network, etc.), are typically developed to meet high performance standards for specific predefined cases within the network. These algorithms may not have the flexibility, or adaptability, required to meet unanticipated conditions. However, the definition of adaptation may include self-directed change by an algorithm designed to maintain optimal performance. Adaptation may be a self-directed change in an algorithm, or program code, designed to maintain optimal ad-hoc network performance.
- Adaptation may be related to traditional metrics. Route discovery time, or route acquisition time including reactive protocols, may be a specific metric that is critical to a variable topology network. Route discovery time may be influenced by a location announcement interval (i.e., beaconing, a hello message, etc.). End-end delay and throughput are metrics that may also be considered. These metrics may be influenced by packet loss rate, route reconstruction time, and routing overhead, which may be additional candidate metrics.
- Changing an algorithm requires changing code. Services require capability to adjust their location within an ad hoc network in order to maximize QoS to all client nodes. Code that remains resident to only one node may not reside in an optimal location given ad hoc movement patterns. Installing all potentially useful code on all nodes creates much overhead, particularly for low capability ad hoc nodes and sensors. It is desirable that code have the capability to move from node to node. The location and movement of a service affect network performance.
- The factors influencing service migration include not only basic route acquisition delays, but also the size of a service code. Route acquisition delays have the impact of potentially providing false network topology information and may cause a service to migrate towards an incorrect location. Large service code size may be due to a complex service that is being offered or due to the overhead of a service location algorithm itself.
- The
system 10 in accordance with the present invention provides the ability to maintain a service at an optimal location relative to a set of mobile client nodes. Specifically, because nodes are mobile and the direction and velocity of the nodes may be highly variable, nodes may be temporarily or permanently unreachable. Thesystem 10 assigns a penalty for ‘no quality of service’. - Additionally, the
system 10 may define a metric that captures the precision, including overhead, with which the network is able to maintain an optimal location for the service that maximizes overall QoS normalized by the amount of dynamism in the network topology. By means of simulation, an optimal location may be determined at all times. - As discussed above, a fundamental limitation exists in the ability of a single a priori optimization function to meet all QoS requirements. Metrics that best indicate the location and nature of required flexibility are desirable. A
system 10 in accordance with the present invention provides such a metric as applied to an active ad-hoc network. Thesystem 10 maximizes QoS by adaptation of algorithms, rather than simply tuning static algorithms. Algorithms may change form either in vivo within a node, or be defined a priori, before network operation. In either case, the code implementing the algorithm may migrate to the best service location in the network as the network topology changes. The topology changes due to node movement patterns. - Network topology is thus dependent upon the effects of node movement and those effects may be examined via vector fields. Vector field representation of node movement may be directly applied to the estimation of QoS and the requirements for service migration performance (i.e., service transmission rate as a function of code size, expected link transmission rate, etc.).
- FIG. 1 shows an example representation of a
system 10 in accordance with the present invention. The dots represent mobile nodes. The caches are also located on mobile nodes. The QoSWeights are attributes of client nodes' requests for services. Client nodes may reside on any nodes. The caches are mobile and move themselves (and their contents) to an optimal location in the network. The best location may be a simple solution to the objective function Min E(x)+Var(x) where E is Expected Value, Var is Variance, and x is a hop count for each client node to it's cache multiplied by its QoSWeight (i.e., h*QoSWeight where h is hop count). The mobile caches may thus be pulled into the center of mass of the client nodes. - In accordance with the present invention, a
computer program product 200 maintains optimal quality of service of a wireless network (FIG. 2). Thecomputer program product 200 includes afirst instruction 201 for maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service and asecond instruction 202 for utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams 203 the wireless network. - In accordance with the present invention, a
method 300 maintains optimal quality of service of a wireless network (FIG. 3). Themethod 300 includes the steps of maintaining 301 an optimal quality metric of a service for a plurality of nodes that utilize the service and utilizing 302 an adaptable algorithm for achieving the optimal quality metric. The algorithm is applied by an active packet that roams 303 the wireless network. - In order to provide a context for the various aspects of the present invention, the following discussion is intended to provide a brief, general description of a suitable computing environment in which the various aspects of the present invention may be implemented. While the invention has been described above in the general context of computer-executable instructions of a computer program that runs on a computer, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like. The illustrated aspects of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications argument model. However, some, if not all aspects of the invention can be practiced on stand-alone computers. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
- An exemplary system for implementing the various aspects of the invention includes a conventional server computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The processing unit may be any of various commercially available processors. Dual microprocessors and other multi-processor architectures also can be used as the processing unit. The system bus may be any of several types of bus structure including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of conventional bus architectures. The system memory includes read only memory (ROM) and random access memory (RAM). A basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within the server computer, such as during start-up, is stored in ROM.
- The server computer further includes a hard disk drive, a magnetic disk drive, e.g., to read from or write to a removable disk, and an optical disk drive, e.g., for reading a CD-ROM disk or to read from or write to other optical media. The hard disk drive, magnetic disk drive, and optical disk drive are connected to the system bus by a hard disk drive interface, a magnetic disk drive interface, and an optical drive interface, respectively. The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, etc., for the server computer. Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and a CD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment, and further that any such media may contain computer-executable instructions for performing the methods of the present invention.
- A number of program modules may be stored in the drives and RAM, including an operating system, one or more application programs, other program modules, and program data. A user may enter commands and information into the server computer through a keyboard and a pointing device, such as a mouse. Other input devices (not shown) may include a microphone, a joystick, a game pad, a satellite dish, a scanner, or the like. These and other input devices are often connected to the processing unit through a serial port interface that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB). A monitor or other type of display device is also connected to the system bus via an interface, such as a video adapter. In addition to the monitor, computers typically include other peripheral output devices (not shown), such as speaker and printers.
- The server computer may operate in a networked environment using logical connections to one or more remote computers, such as a remote client computer. The remote computer may be a workstation, a server computer, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the server computer. The logical connections include a local area network (LAN) and a wide area network (WAN). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the internet.
- When used in a LAN networking environment, the server computer is connected to the local network through a network interface or adapter. When used in a WAN networking environment, the server computer typically includes a modem, or is connected to a communications server on the LAN, or has other means for establishing communications over the wide area network, such as the internet. The modem, which may be internal or external, is connected to the system bus via the serial port interface. In a networked environment, program modules depicted relative to the server computer, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- In accordance with the practices of persons skilled in the art of computer programming, the present invention has been described with reference to acts and symbolic representations of operations that are performed by a computer, such as the server computer, unless otherwise indicated. Such acts and operations are sometimes referred to as being computer-executed. It will be appreciated that the acts and symbolically represented operations include the manipulation by the processing unit of electrical signals representing data bits which causes a resulting transformation or reduction of the electrical signal representation, and the maintenance of data bits at memory locations in the memory system (including the system memory, hard drive, floppy disks, and CD-ROM) to thereby reconfigure or otherwise alter the computer system's operation, as well as other processing of signals. The memory locations where such data bits are maintained are physical locations that have particular electrical, magnetic, or optical properties corresponding to the data bits.
- It will be understood that the above description of the present invention is susceptible to various modifications, changes and adaptations, and the same are intended to be comprehended within the meaning and range of equivalents of the appended claims. The presently disclosed embodiments are considered in all respects to be illustrative, and not restrictive. The scope of the invention is indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalence thereof are intended to be embraced therein.
Claims (20)
1. A system for operating a wireless ad hoc network, said system comprising:
a plurality of nodes; and
an active packet for maintaining an optimal quality metric of a service for said plurality of nodes that utilize the service, said active packet utilizing an adaptable algorithm for achieving the optimal quality metric.
2. The system as set forth in claim 1 further including a fitness function for quantifying the quality of the service.
3. The system as set forth in claim 2 wherein at least one of said plurality of nodes has a weight value other than 1.0.
4. The system as set forth in claim 3 wherein said fitness function allows functional evolution of said plurality of nodes.
5. The system as set forth in claim 4 wherein said system relocates the service from one of said plurality of nodes to another of said plurality of nodes in order to increase the quality metric.
6. The system as set forth in claim 5 wherein the algorithm autonomously changes in order to adjust to changing conditions of said plurality of nodes.
7. The system as set forth in claim 6 wherein the changing conditions of said plurality of nodes are represented by vector fields that are directly applied to an estimation of the quality metric.
8. A computer program product for maintaining optimal quality of service of a wireless network, said computer program product comprising:
a first instruction for maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service; and
a second instruction for utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams the wireless network.
9. The computer program product as set forth in claim 8 further including a third instruction for quantifying the quality of the service using a fitness function.
10. The computer program product as set forth in claim 8 further including a third instruction for assigning weight values to each of said plurality of nodes.
11. The computer program product as set forth in claim 8 further including a third instruction for allowing functional evolution of the plurality of nodes by a fitness function.
12. The computer program product as set forth in claim 8 further including a third instruction for relocating the service from one of the plurality of nodes to another of the plurality of nodes in order to increase the quality metric.
13. The computer program product as set forth in claim 8 further including a third instruction for autonomously changing the algorithm to adjust to changing conditions of the plurality of nodes.
14. The computer program product as set forth in claim 8 further including a third instruction for representing the plurality of nodes by vector fields in order to estimate the quality metric.
15. A method for maintaining optimal quality of service of a wireless network, said method comprising the steps of:
maintaining an optimal quality metric of a service for a plurality of nodes that utilize the service; and
utilizing an adaptable algorithm for achieving the optimal quality metric, the algorithm being applied by an active packet that roams the wireless network.
16. The method as set forth in claim 15 further including the step of quantifying the quality of the service using a fitness function.
17. The method as set forth in claim 15 further including the step of assigning weight values to each of said plurality of nodes.
18. The method as set forth in claim 15 further including the step of allowing functional evolution of the plurality of nodes by a fitness function.
19. The method as set forth in claim 15 further including the step of relocating the service from one of the plurality of nodes to another of the plurality of nodes in order to increase the quality metric.
20. The method as set forth in claim 15 further including the step of autonomously changing the algorithm to adjust to changing conditions of the plurality of nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/771,027 US20040156388A1 (en) | 2003-02-07 | 2004-02-03 | System for maintaining quality of service |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US44557903P | 2003-02-07 | 2003-02-07 | |
US10/771,027 US20040156388A1 (en) | 2003-02-07 | 2004-02-03 | System for maintaining quality of service |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040156388A1 true US20040156388A1 (en) | 2004-08-12 |
Family
ID=32829912
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/771,027 Abandoned US20040156388A1 (en) | 2003-02-07 | 2004-02-03 | System for maintaining quality of service |
US10/771,026 Abandoned US20040157557A1 (en) | 2003-02-07 | 2004-02-03 | System for a dynamic ad-hoc wireless network |
US10/770,694 Active 2026-01-08 US7366185B2 (en) | 2003-02-07 | 2004-02-03 | System for evolutionary service migration |
US10/770,665 Expired - Fee Related US7409716B2 (en) | 2003-02-07 | 2004-02-03 | System for intrusion detection |
US10/771,021 Abandoned US20040156370A1 (en) | 2003-02-07 | 2004-02-03 | System for evolutionary adaptation |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/771,026 Abandoned US20040157557A1 (en) | 2003-02-07 | 2004-02-03 | System for a dynamic ad-hoc wireless network |
US10/770,694 Active 2026-01-08 US7366185B2 (en) | 2003-02-07 | 2004-02-03 | System for evolutionary service migration |
US10/770,665 Expired - Fee Related US7409716B2 (en) | 2003-02-07 | 2004-02-03 | System for intrusion detection |
US10/771,021 Abandoned US20040156370A1 (en) | 2003-02-07 | 2004-02-03 | System for evolutionary adaptation |
Country Status (1)
Country | Link |
---|---|
US (5) | US20040156388A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050002364A1 (en) * | 2003-06-06 | 2005-01-06 | Meshnetworks, Inc. | System and method to provide fairness and service differentation in ad-hoc networks |
US20080043773A1 (en) * | 2006-08-16 | 2008-02-21 | Akihiro Ihori | Communication Device, Communication Method and Program |
US8059615B1 (en) | 2008-09-08 | 2011-11-15 | Sprint Spectrum L.P. | Selective personality negotiation during session negotiation |
US8614996B1 (en) * | 2007-12-12 | 2013-12-24 | Sprint Spectrum L.P. | Predictive personality negotiation during session negotiation |
US20150281049A1 (en) * | 2014-03-31 | 2015-10-01 | Vmware, Inc. | Fast lookup and update of current hop limit |
Families Citing this family (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4228342B2 (en) * | 2002-04-12 | 2009-02-25 | 日本電気株式会社 | Wireless transmission device for wireless network, route control method, and route control program |
US7711847B2 (en) | 2002-04-26 | 2010-05-04 | Sony Computer Entertainment America Inc. | Managing users in a multi-user network game environment |
US20030217135A1 (en) | 2002-05-17 | 2003-11-20 | Masayuki Chatani | Dynamic player management |
US8131802B2 (en) * | 2007-10-05 | 2012-03-06 | Sony Computer Entertainment America Llc | Systems and methods for seamless host migration |
US20040156388A1 (en) * | 2003-02-07 | 2004-08-12 | Lockheed Martin Corporation | System for maintaining quality of service |
US7500014B1 (en) * | 2003-05-07 | 2009-03-03 | Packeteer, Inc. | Network link state mirroring |
KR100621369B1 (en) * | 2003-07-14 | 2006-09-08 | 삼성전자주식회사 | Apparatus and method for routing path setting in sensor network |
US7394826B2 (en) * | 2003-09-09 | 2008-07-01 | Harris Corporation | Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features |
US7068605B2 (en) * | 2003-09-09 | 2006-06-27 | Harris Corporation | Mobile ad hoc network (MANET) providing interference reduction features and related methods |
DE10344345B3 (en) * | 2003-09-24 | 2005-05-12 | Siemens Ag | Method for communication in an ad hoc radio communication system |
US7519371B2 (en) * | 2004-02-09 | 2009-04-14 | Qualcomm Incorporated | Multi-hop communications in a wireless network |
US20050208949A1 (en) * | 2004-02-12 | 2005-09-22 | Chiueh Tzi-Cker | Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks |
JP3761091B2 (en) * | 2004-05-07 | 2006-03-29 | 株式会社ソニー・コンピュータエンタテインメント | Application execution method, file data download method, file data upload method, communication method, and wireless communication terminal device |
US8090837B2 (en) * | 2004-05-27 | 2012-01-03 | Hewlett-Packard Development Company, L.P. | Communication in multiprocessor using proxy sockets |
US20060015596A1 (en) * | 2004-07-14 | 2006-01-19 | Dell Products L.P. | Method to configure a cluster via automatic address generation |
US7848757B2 (en) * | 2004-10-29 | 2010-12-07 | Samsung Electronics Co., Ltd. | Apparatus and method for extending mobility in a mobile ad hoc network |
EP1808032A4 (en) * | 2004-11-05 | 2008-11-05 | Meshnetworks Inc | System and method for providing a congestion-aware routing metric for selecting a route between nodes in a multihopping communication network |
US7912973B2 (en) * | 2004-12-03 | 2011-03-22 | Microsoft Corporation | Message exchange protocol extension negotiation |
US20060159024A1 (en) * | 2005-01-18 | 2006-07-20 | Hester Lance E | Method and apparatus for responding to node anormalities within an ad-hoc network |
US7826373B2 (en) * | 2005-01-28 | 2010-11-02 | Honeywell International Inc. | Wireless routing systems and methods |
EP1715654A1 (en) * | 2005-04-22 | 2006-10-25 | Create-Net | Communication network performing service functions |
US7724717B2 (en) * | 2005-07-22 | 2010-05-25 | Sri International | Method and apparatus for wireless network security |
US8249028B2 (en) * | 2005-07-22 | 2012-08-21 | Sri International | Method and apparatus for identifying wireless transmitters |
US8014404B2 (en) * | 2005-09-30 | 2011-09-06 | Motorola Solutions, Inc. | Method and system for priority based routing |
US20070226375A1 (en) * | 2006-03-23 | 2007-09-27 | Chu Hsiao-Keng J | Plug-in architecture for a network stack in an operating system |
US8045976B2 (en) | 2006-04-04 | 2011-10-25 | Aegis Mobility, Inc. | Mobility call management |
US20070239871A1 (en) * | 2006-04-11 | 2007-10-11 | Mike Kaskie | System and method for transitioning to new data services |
US8160560B2 (en) | 2007-03-02 | 2012-04-17 | Aegis Mobility, Inc. | Management of mobile device communication sessions to reduce user distraction |
KR20090011481A (en) * | 2007-07-26 | 2009-02-02 | 삼성전자주식회사 | Method for intrusion detecting in a terminal device and apparatus therefor |
US8224353B2 (en) | 2007-09-20 | 2012-07-17 | Aegis Mobility, Inc. | Disseminating targeted location-based content to mobile device users |
US7996510B2 (en) * | 2007-09-28 | 2011-08-09 | Intel Corporation | Virtual clustering for scalable network control and management |
US8954562B2 (en) * | 2007-09-28 | 2015-02-10 | Intel Corporation | Entropy-based (self-organizing) stability management |
US8811265B2 (en) * | 2007-10-19 | 2014-08-19 | Honeywell International Inc. | Ad-hoc secure communication networking based on formation flight technology |
US9264126B2 (en) | 2007-10-19 | 2016-02-16 | Honeywell International Inc. | Method to establish and maintain an aircraft ad-hoc communication network |
US9143523B2 (en) * | 2007-12-31 | 2015-09-22 | Phillip King-Wilson | Assessing threat to at least one computer network |
US9467221B2 (en) * | 2008-02-04 | 2016-10-11 | Honeywell International Inc. | Use of alternate communication networks to complement an ad-hoc mobile node to mobile node communication network |
MX2011002443A (en) * | 2008-09-05 | 2012-03-06 | Aegis Mobility Inc | Bypassing enhanced services. |
US8312542B2 (en) * | 2008-10-29 | 2012-11-13 | Lockheed Martin Corporation | Network intrusion detection using MDL compress for deep packet inspection |
US8327443B2 (en) * | 2008-10-29 | 2012-12-04 | Lockheed Martin Corporation | MDL compress system and method for signature inference and masquerade intrusion detection |
US8483217B2 (en) * | 2009-03-10 | 2013-07-09 | Viasat, Inc. | Internet protocol broadcasting |
US20100284290A1 (en) * | 2009-04-09 | 2010-11-11 | Aegis Mobility, Inc. | Context based data mediation |
GB0909079D0 (en) * | 2009-05-27 | 2009-07-01 | Quantar Llp | Assessing threat to at least one computer network |
WO2011011544A1 (en) | 2009-07-21 | 2011-01-27 | Scott Ferrill Tibbitts | Method and system for controlling a mobile communication device in a moving vehicle |
US9615213B2 (en) | 2009-07-21 | 2017-04-04 | Katasi Llc | Method and system for controlling and modifying driving behaviors |
US9386447B2 (en) | 2009-07-21 | 2016-07-05 | Scott Ferrill Tibbitts | Method and system for controlling a mobile communication device |
US8245302B2 (en) * | 2009-09-15 | 2012-08-14 | Lockheed Martin Corporation | Network attack visualization and response through intelligent icons |
US8245301B2 (en) * | 2009-09-15 | 2012-08-14 | Lockheed Martin Corporation | Network intrusion detection visualization |
US8138918B2 (en) * | 2009-09-17 | 2012-03-20 | Raytheon Company | Intrusion detection and tracking system |
US20110158111A1 (en) * | 2009-12-28 | 2011-06-30 | Alcatel-Lucent Canada Inc. | Bulk service provisioning on live network |
US9762605B2 (en) * | 2011-12-22 | 2017-09-12 | Phillip King-Wilson | Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer network |
US8533319B2 (en) | 2010-06-02 | 2013-09-10 | Lockheed Martin Corporation | Methods and systems for prioritizing network assets |
WO2012015688A2 (en) | 2010-07-27 | 2012-02-02 | Raytheon Company | An intrusion detection and tracking system |
US8621629B2 (en) | 2010-08-31 | 2013-12-31 | General Electric Company | System, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target |
US9288224B2 (en) | 2010-09-01 | 2016-03-15 | Quantar Solutions Limited | Assessing threat to at least one computer network |
US8874763B2 (en) * | 2010-11-05 | 2014-10-28 | At&T Intellectual Property I, L.P. | Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates |
CN103477608A (en) | 2011-04-13 | 2013-12-25 | 瑞萨移动公司 | Sensor network information collection via mobile gateway |
JP5977818B2 (en) * | 2011-04-25 | 2016-08-24 | コリア ユニバーシティ リサーチ アンド ビジネス ファウンデーション | Apparatus and method for controlling backbone network for sensor network |
US9106689B2 (en) | 2011-05-06 | 2015-08-11 | Lockheed Martin Corporation | Intrusion detection using MDL clustering |
US8490175B2 (en) * | 2011-12-06 | 2013-07-16 | Telcordia Technologies, Inc. | Security method for mobile ad hoc networks with efficient flooding mechanism using layer independent passive clustering (LIPC) |
CN102448139B (en) * | 2011-12-28 | 2014-08-06 | 南昌大学 | Hierarchical routing method for wireless sensor network |
US10277484B2 (en) * | 2012-08-10 | 2019-04-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Self organizing network event reporting |
US9245116B2 (en) | 2013-03-21 | 2016-01-26 | General Electric Company | Systems and methods for remote monitoring, security, diagnostics, and prognostics |
US9282008B2 (en) | 2013-06-11 | 2016-03-08 | General Electric Company | Systems and methods for monitoring system performance and availability |
US9351130B2 (en) * | 2013-06-28 | 2016-05-24 | Aruba Networks, Inc. | System and method for efficient state synchronization among neighboring network devices |
US20160044281A1 (en) * | 2014-08-07 | 2016-02-11 | Smart Digital LLC | Portable Surveillance Device |
US9858284B2 (en) | 2015-04-21 | 2018-01-02 | International Business Machines Corporation | Crowd sourced data sampling at the crowd |
US9699301B1 (en) | 2015-05-31 | 2017-07-04 | Emma Michaela Siritzky | Methods, devices and systems supporting driving and studying without distraction |
WO2017111912A1 (en) * | 2015-12-21 | 2017-06-29 | Hewlett Packard Enterprise Development Lp | Identifying a signature for a data set |
WO2017111915A1 (en) | 2015-12-21 | 2017-06-29 | Hewlett Packard Enterprise Development Lp | Identifying signatures for data sets |
EP3831021A1 (en) | 2018-07-27 | 2021-06-09 | Gotenna Inc. | VINEtm ZERO-CONTROL ROUTING USING DATA PACKET INSPECTION FOR WIRELESS MESH NETWORKS |
US10992689B2 (en) | 2018-09-18 | 2021-04-27 | The Boeing Company | Systems and methods for relating network intrusions to passenger-owned devices |
US10765952B2 (en) | 2018-09-21 | 2020-09-08 | Sony Interactive Entertainment LLC | System-level multiplayer matchmaking |
US10695671B2 (en) | 2018-09-28 | 2020-06-30 | Sony Interactive Entertainment LLC | Establishing and managing multiplayer sessions |
CN110062209B (en) * | 2019-04-26 | 2020-09-01 | 哈尔滨工业大学 | Embedded multi-hop real-time video transmission method and system based on OKMX6Q |
US11889392B2 (en) | 2019-06-14 | 2024-01-30 | The Boeing Company | Aircraft network cybersecurity apparatus and methods |
CN110572451B (en) * | 2019-09-04 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
US11811641B1 (en) * | 2020-03-20 | 2023-11-07 | Juniper Networks, Inc. | Secure network topology |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412654A (en) * | 1994-01-10 | 1995-05-02 | International Business Machines Corporation | Highly dynamic destination-sequenced destination vector routing for mobile computers |
US5987024A (en) * | 1997-05-09 | 1999-11-16 | Motorola, Inc. | Self synchronizing network protocol |
US5987011A (en) * | 1996-08-30 | 1999-11-16 | Chai-Keong Toh | Routing method for Ad-Hoc mobile networks |
US6130892A (en) * | 1997-03-12 | 2000-10-10 | Nomadix, Inc. | Nomadic translator or router |
US6304556B1 (en) * | 1998-08-24 | 2001-10-16 | Cornell Research Foundation, Inc. | Routing and mobility management protocols for ad-hoc networks |
US6307843B1 (en) * | 1997-07-18 | 2001-10-23 | Nec Corporation | Ad hoc network of mobile hosts using link table for identifying wireless links and destination addresses |
US6415330B1 (en) * | 1996-12-27 | 2002-07-02 | Nec Corporation | Method of setting up AD HOC local area network, method of communicating using said network, and terminal for use with said network |
US6535498B1 (en) * | 1999-12-06 | 2003-03-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Route updating in ad-hoc networks |
US6754188B1 (en) * | 2001-09-28 | 2004-06-22 | Meshnetworks, Inc. | System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content |
US6870846B2 (en) * | 2002-04-29 | 2005-03-22 | Harris Corporation | Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using dynamic source routing (DSR) |
US6954435B2 (en) * | 2002-04-29 | 2005-10-11 | Harris Corporation | Determining quality of service (QoS) routing for mobile ad hoc networks |
US7068600B2 (en) * | 2002-04-29 | 2006-06-27 | Harris Corporation | Traffic policing in a mobile ad hoc network |
US7177295B1 (en) * | 2002-03-08 | 2007-02-13 | Scientific Research Corporation | Wireless routing protocol for ad-hoc networks |
Family Cites Families (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4780821A (en) * | 1986-07-29 | 1988-10-25 | International Business Machines Corp. | Method for multiple programs management within a network having a server computer and a plurality of remote computers |
US5517618A (en) | 1992-02-10 | 1996-05-14 | Matsushita Electric Industrial Co., Ltd. | Mobile migration communications control device |
KR100387207B1 (en) * | 1994-03-15 | 2003-10-04 | 디지 인터내셔날 인크. | Communication system and communication method by remote network device |
GB2299729B (en) | 1995-04-01 | 1999-11-17 | Northern Telecom Ltd | Traffic routing in a telecommunications network |
US5623495A (en) * | 1995-06-15 | 1997-04-22 | Lucent Technologies Inc. | Portable base station architecture for an AD-HOC ATM lan |
US5717689A (en) * | 1995-10-10 | 1998-02-10 | Lucent Technologies Inc. | Data link layer protocol for transport of ATM cells over a wireless link |
US6122759A (en) * | 1995-10-10 | 2000-09-19 | Lucent Technologies Inc. | Method and apparatus for restoration of an ATM network |
US6046988A (en) | 1995-11-16 | 2000-04-04 | Loran Network Systems Llc | Method of determining the topology of a network of objects |
WO1997020419A2 (en) | 1995-11-16 | 1997-06-05 | Loran Network Systems, L.L.C. | Method of determining the topology of a network of objects |
US6088452A (en) | 1996-03-07 | 2000-07-11 | Northern Telecom Limited | Encoding technique for software and hardware |
US5943322A (en) * | 1996-04-24 | 1999-08-24 | Itt Defense, Inc. | Communications method for a code division multiple access system without a base station |
GB2316504A (en) * | 1996-08-22 | 1998-02-25 | Ibm | Distributed genetic programming / algorithm performance |
JP3254393B2 (en) * | 1996-11-19 | 2002-02-04 | 三菱電機株式会社 | Genetic algorithm machine, method of manufacturing genetic algorithm machine, and method of executing genetic algorithm |
DE69724947T2 (en) | 1997-07-31 | 2004-05-19 | Siemens Ag | Computer system and method for backing up a file |
JP3905959B2 (en) * | 1997-10-24 | 2007-04-18 | 富士通株式会社 | Arrangement optimization problem processing method, arrangement optimization problem processing apparatus, and computer readable recording medium recording arrangement optimization problem processing program |
US6324654B1 (en) | 1998-03-30 | 2001-11-27 | Legato Systems, Inc. | Computer network remote data mirroring system |
US6130881A (en) | 1998-04-20 | 2000-10-10 | Sarnoff Corporation | Traffic routing in small wireless data networks |
US6266577B1 (en) * | 1998-07-13 | 2001-07-24 | Gte Internetworking Incorporated | System for dynamically reconfigure wireless robot network |
US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6104712A (en) | 1999-02-22 | 2000-08-15 | Robert; Bruno G. | Wireless communication network including plural migratory access nodes |
US6446200B1 (en) | 1999-03-25 | 2002-09-03 | Nortel Networks Limited | Service management |
US6195697B1 (en) * | 1999-06-02 | 2001-02-27 | Ac Properties B.V. | System, method and article of manufacture for providing a customer interface in a hybrid network |
US6501995B1 (en) * | 1999-06-30 | 2002-12-31 | The Foxboro Company | Process control system and method with improved distribution, installation and validation of components |
US6529515B1 (en) * | 1999-09-30 | 2003-03-04 | Lucent Technologies, Inc. | Method and apparatus for efficient network management using an active network mechanism |
US6754699B2 (en) | 2000-07-19 | 2004-06-22 | Speedera Networks, Inc. | Content delivery and global traffic management network system |
US20020091855A1 (en) | 2000-02-02 | 2002-07-11 | Yechiam Yemini | Method and apparatus for dynamically addressing and routing in a data network |
AU2001255441A1 (en) | 2000-04-17 | 2001-10-30 | Circadence Corporation | System and method for implementing application -independent functionality within a network infrastructure |
US20020099816A1 (en) | 2000-04-20 | 2002-07-25 | Quarterman John S. | Internet performance system |
US7000015B2 (en) | 2000-04-24 | 2006-02-14 | Microsoft Corporation | System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device |
FI110736B (en) * | 2000-08-01 | 2003-03-14 | Nokia Corp | Data Transfer Method, Subscriber Terminal and GPRS / EDGE Radio Access Network |
US7702806B2 (en) | 2000-09-07 | 2010-04-20 | Riverbed Technology, Inc. | Statistics collection for network traffic |
US7124440B2 (en) | 2000-09-07 | 2006-10-17 | Mazu Networks, Inc. | Monitoring network traffic denial of service attacks |
US7278159B2 (en) | 2000-09-07 | 2007-10-02 | Mazu Networks, Inc. | Coordinated thwarting of denial of service attacks |
US7398317B2 (en) | 2000-09-07 | 2008-07-08 | Mazu Networks, Inc. | Thwarting connection-based denial of service attacks |
US6894991B2 (en) | 2000-11-30 | 2005-05-17 | Verizon Laboratories Inc. | Integrated method for performing scheduling, routing and access control in a computer network |
CA2327211A1 (en) | 2000-12-01 | 2002-06-01 | Nortel Networks Limited | Management of log archival and reporting for data network security systems |
US7937470B2 (en) | 2000-12-21 | 2011-05-03 | Oracle International Corp. | Methods of determining communications protocol latency |
US7155518B2 (en) | 2001-01-08 | 2006-12-26 | Interactive People Unplugged Ab | Extranet workgroup formation across multiple mobile virtual private networks |
AU2002234258A1 (en) | 2001-01-22 | 2002-07-30 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
US7197565B2 (en) | 2001-01-22 | 2007-03-27 | Sun Microsystems, Inc. | System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection |
US7165107B2 (en) | 2001-01-22 | 2007-01-16 | Sun Microsystems, Inc. | System and method for dynamic, transparent migration of services |
US20020122410A1 (en) | 2001-02-13 | 2002-09-05 | Cybiko Inc. | Method of wireless data exchange amongst devices of limited range |
US7266085B2 (en) | 2001-03-21 | 2007-09-04 | Stine John A | Access and routing protocol for ad hoc network using synchronous collision resolution and node state dissemination |
US7035937B2 (en) | 2001-04-25 | 2006-04-25 | Cornell Research Foundation, Inc. | Independent-tree ad hoc multicast routing |
US7124173B2 (en) | 2001-04-30 | 2006-10-17 | Moriarty Kathleen M | Method and apparatus for intercepting performance metric packets for improved security and intrusion detection |
US20020198994A1 (en) | 2001-05-15 | 2002-12-26 | Charles Patton | Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment |
US20020188656A1 (en) | 2001-05-15 | 2002-12-12 | Charles Patton | Combining specialized, spatially distinguished, point to point communications with other wireless networking communications to provide networking configuration in classroom-like settings |
US7116661B2 (en) | 2001-05-15 | 2006-10-03 | Sri International | Combining multi-hop and multicast wireless networking in classroom-like settings |
US7234168B2 (en) | 2001-06-13 | 2007-06-19 | Mcafee, Inc. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
JP2004531971A (en) | 2001-06-14 | 2004-10-14 | メッシュネットワークス インコーポレーティッド | A routing protocol embedded under the internet protocol routing layer of the software architecture protocol stack in mobile ad hoc networks |
US7743126B2 (en) | 2001-06-28 | 2010-06-22 | Hewlett-Packard Development Company, L.P. | Migrating recovery modules in a distributed computing environment |
US7161926B2 (en) | 2001-07-03 | 2007-01-09 | Sensoria Corporation | Low-latency multi-hop ad hoc wireless network |
US20030041042A1 (en) | 2001-08-22 | 2003-02-27 | Insyst Ltd | Method and apparatus for knowledge-driven data mining used for predictions |
KR100886202B1 (en) | 2001-09-25 | 2009-02-27 | 메시네트웍스, 인코포레이티드 | A system and method employing algorithms and protocols for optimizing carrier sense multiple accesscsma protocols in wireless networks |
US7451205B2 (en) | 2001-10-01 | 2008-11-11 | Hewlett-Packard Development Company, L.P. | Multimedia stream pre-fetching and redistribution in servers to accommodate mobile clients |
US6917811B2 (en) * | 2001-12-27 | 2005-07-12 | Kt Corporation | Method for dynamically assigning channel in real time based on genetic algorithm |
US6961310B2 (en) * | 2002-08-08 | 2005-11-01 | Joseph Bibb Cain | Multiple path reactive routing in a mobile ad hoc network |
WO2004018158A2 (en) * | 2002-08-21 | 2004-03-04 | Neal Solomon | Organizing groups of self-configurable mobile robotic agents |
US20040156388A1 (en) * | 2003-02-07 | 2004-08-12 | Lockheed Martin Corporation | System for maintaining quality of service |
-
2004
- 2004-02-03 US US10/771,027 patent/US20040156388A1/en not_active Abandoned
- 2004-02-03 US US10/771,026 patent/US20040157557A1/en not_active Abandoned
- 2004-02-03 US US10/770,694 patent/US7366185B2/en active Active
- 2004-02-03 US US10/770,665 patent/US7409716B2/en not_active Expired - Fee Related
- 2004-02-03 US US10/771,021 patent/US20040156370A1/en not_active Abandoned
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412654A (en) * | 1994-01-10 | 1995-05-02 | International Business Machines Corporation | Highly dynamic destination-sequenced destination vector routing for mobile computers |
US5987011A (en) * | 1996-08-30 | 1999-11-16 | Chai-Keong Toh | Routing method for Ad-Hoc mobile networks |
US6415330B1 (en) * | 1996-12-27 | 2002-07-02 | Nec Corporation | Method of setting up AD HOC local area network, method of communicating using said network, and terminal for use with said network |
US6130892A (en) * | 1997-03-12 | 2000-10-10 | Nomadix, Inc. | Nomadic translator or router |
US5987024A (en) * | 1997-05-09 | 1999-11-16 | Motorola, Inc. | Self synchronizing network protocol |
US6307843B1 (en) * | 1997-07-18 | 2001-10-23 | Nec Corporation | Ad hoc network of mobile hosts using link table for identifying wireless links and destination addresses |
US6304556B1 (en) * | 1998-08-24 | 2001-10-16 | Cornell Research Foundation, Inc. | Routing and mobility management protocols for ad-hoc networks |
US6535498B1 (en) * | 1999-12-06 | 2003-03-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Route updating in ad-hoc networks |
US6754188B1 (en) * | 2001-09-28 | 2004-06-22 | Meshnetworks, Inc. | System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content |
US7177295B1 (en) * | 2002-03-08 | 2007-02-13 | Scientific Research Corporation | Wireless routing protocol for ad-hoc networks |
US6870846B2 (en) * | 2002-04-29 | 2005-03-22 | Harris Corporation | Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using dynamic source routing (DSR) |
US6954435B2 (en) * | 2002-04-29 | 2005-10-11 | Harris Corporation | Determining quality of service (QoS) routing for mobile ad hoc networks |
US7068600B2 (en) * | 2002-04-29 | 2006-06-27 | Harris Corporation | Traffic policing in a mobile ad hoc network |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050002364A1 (en) * | 2003-06-06 | 2005-01-06 | Meshnetworks, Inc. | System and method to provide fairness and service differentation in ad-hoc networks |
US7075890B2 (en) * | 2003-06-06 | 2006-07-11 | Meshnetworks, Inc. | System and method to provide fairness and service differentation in ad-hoc networks |
US20080043773A1 (en) * | 2006-08-16 | 2008-02-21 | Akihiro Ihori | Communication Device, Communication Method and Program |
US7701965B2 (en) * | 2006-08-16 | 2010-04-20 | Sony Corporation | Communication device, communication method and program |
US8614996B1 (en) * | 2007-12-12 | 2013-12-24 | Sprint Spectrum L.P. | Predictive personality negotiation during session negotiation |
US8059615B1 (en) | 2008-09-08 | 2011-11-15 | Sprint Spectrum L.P. | Selective personality negotiation during session negotiation |
US20150281049A1 (en) * | 2014-03-31 | 2015-10-01 | Vmware, Inc. | Fast lookup and update of current hop limit |
US9667528B2 (en) * | 2014-03-31 | 2017-05-30 | Vmware, Inc. | Fast lookup and update of current hop limit |
US10187294B2 (en) * | 2014-03-31 | 2019-01-22 | Vmware, Inc. | Fast lookup and update of current hop limit |
US10841204B2 (en) | 2014-03-31 | 2020-11-17 | Vmware, Inc. | Fast lookup and update of current hop limit |
Also Published As
Publication number | Publication date |
---|---|
US7409716B2 (en) | 2008-08-05 |
US20040156333A1 (en) | 2004-08-12 |
US20040157556A1 (en) | 2004-08-12 |
US7366185B2 (en) | 2008-04-29 |
US20040157557A1 (en) | 2004-08-12 |
US20040156370A1 (en) | 2004-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040156388A1 (en) | System for maintaining quality of service | |
Fujimoto et al. | Network simulation | |
He et al. | AIDA: Adaptive application-independent data aggregation in wireless sensor networks | |
US8315519B2 (en) | Systems and methods for transmitting signals in communication networks | |
Tomar et al. | Load balanced congestion adaptive routing for randomly distributed mobile adhoc networks | |
Wang et al. | Computational offloading with delay and capacity constraints in mobile edge | |
Sultanuddin et al. | Token system‐based efficient route optimization in mobile ad hoc network for vehicular ad hoc network in smart city | |
Hosahalli et al. | Cross‐layer routing protocol for event‐driven M2M communication in IoT‐assisted Smart City Planning and Management: CWSN‐eSCPM | |
Tham et al. | A load balancing scheme for sensing and analytics on a mobile edge computing network | |
Hassani et al. | A new objective function based on additive combination of node and link metrics as a mechanism path selection for RPL protocol | |
Xiao et al. | A novel task allocation for maximizing reliability considering fault-tolerant in VANET real time systems | |
Fareena et al. | RETRACTED ARTICLE: A distributed fuzzy multicast routing protocol (DFMCRP) for maximizing the network lifetime in mobile ad-hoc networks | |
Tsai et al. | Enabling efficient and consistent network update in wireless data centers | |
Montana et al. | Adaptive reconfiguration of data networks using genetic algorithms | |
Dai et al. | Distributed convex relaxation for heterogeneous task replication in mobile edge computing | |
Noghani et al. | A generic framework for task offloading in mmWave MEC backhaul networks | |
Kumar et al. | Link discontinuity and optimal route data delivery for random waypoint model | |
Cardei et al. | Resource management for ad-hoc wireless networks with cluster organization | |
Sharma et al. | Estimation-based queue scheduling model to improve QoS for end users in MANETs. | |
Chaudhry et al. | Network-state-aware quality of service provisioning for the internet of things | |
Lin et al. | Proactive multipath routing with a predictive mechanism in software‐defined networks | |
Murugan et al. | Multi-objective Optimization Model for Clustering Based Secure Routing with Congestion Avoidance in Mobile ADHOC Networks | |
Fan et al. | MASCOT: Mobility-Aware Service Function Chain Routing in Mobile Edge Computing | |
Shah et al. | Network aware and power-based resource allocation in mobile Ad Hoc computational grid | |
Hassani et al. | Multi-constraints based RPL objective function with adaptive stability for high traffic IoT applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LOCKHEED MARTIN CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL ELECTRIC COMPANY;REEL/FRAME:014961/0624 Effective date: 20040128 Owner name: GENERAL ELECTRIC COMPANY, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BUSH, STEPHEN F.;REEL/FRAME:014961/0674 Effective date: 20040122 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |