SlideShare a Scribd company logo
1 of 24
Creating Ever-changing QoS-constrained Dataflows
in Tactical Networks: An Exploratory Study
Tactical Communications (I)
Roberto Rigolin F. Lopes, Pooja Hanavadi Balaraju, Peter Sevenich
roberto.lopes@fkie.fraunhofer.de , pooja.balaraju@rwth-aachen.de, peter.sevenich@fkie.fraunhofer.de
Budva, 14th May, 2019
#ICMCIS 2019
Research supported by
BAAINBw and WTD-81
The not so Big Bang…
We have been trying to deploy Web Services
in Tactical Networks. It started in the TACTICS
(2014-2017) project and was extended to
CWIX 2018
2014-2017
Where are the performance bounds of the system?
2018
<UHF><VHF> <SatCom>
OAS FFT MEDVAC
A
B
C
Changing
ChangingNetwork conditions:
User behavior:
TSI RuDi
DEU-RuDiDEU-TACTICS
TacRouter
DEU-FIST
Tactical Network
Router + Middleware
User Applications
Background: Problem A
CIS Capabilities
Technical Services
Communication Services
Transmission Services
Transport Services
Communication Access Services
Core Enterprise Services
SOA Platform Services
Enterprise Support Services
COI Services
COI-Enabling Services
COI-Specific Services
User-Facing Capabilities
User Applications
Infrastructure Services
Cross-layerdataexchange
COI-Specific Services
COMMS
FCS
TacRouter
VHF Sat + LTEESSOR
DEU-FIST
DEU-MOTORFIN DEU-SOACC
TSI RuDi Proxy
NORDEU-RuDiDEU-TACTICS
FFT* OpenCOP COP + FFT
FFT
DEU-RuDi NOR
Handheld
<Dismounted>
Problem A
Problem B
Changing…
Changing…
Problem A|B
C3 Taxonomy
B1
B2
B3
Three patterns of network
change:
Three patterns of dataflow
change:
A1 A2 A3
?
Background: Problem A
CIS Capabilities
Technical Services
Communication Services
Transmission Services
Transport Services
Communication Access Services
Core Enterprise Services
SOA Platform Services
Enterprise Support Services
COI Services
COI-Enabling Services
COI-Specific Services
User-Facing Capabilities
User Applications
Infrastructure Services
Cross-layerdataexchange
COI-Specific Services
Problem A
Problem B
Changing…
Changing…
Problem A|B
C3 Taxonomy
Sleep x: queue 0: dequeue
No: queue Yes: dequeue
How long to admission?
Buffer below b%?
Sender
User service(s)
3
ε4
ε3
ε1
Invoke:
λx
QoS Handler
Receiver(s)
out
αin
i
ii How much to b%?
Cross-layerContextualMonitoring
4Proxy
Message Queue
1
UDP Transport
Packet Handler
2
Routing ε2
B1
B2
B3
EVER-changing
The system: <messages>
<message>
<IP packets>
Priority
0 FLASH
1 Immediate
2 Priority
3 Routine
Sleep x: queue 0: dequeue
No: queue Yes: dequeue
How long to admission?
Buffer below b%?
Sender
User service(s)
3
ε4
ε3
ε1
Invoke:
λx
QoS Handler
Receiver(s)
out
αin
i
ii How much to b%?
Cross-layerContextualMonitoring
4Proxy
Message Queue
1
UDP Transport
Packet Handler
2
Routing ε2
<radio buffer>
B1
B2
B3
In short: we are trying to tame RANDOMNESS to study the performance
bounds of tactical systems
Yes, we are trying to tame RANDOMNESS
The solution A
• Creating ever-changing QoS-constrained: let us assume that the
services are states of a Markov chain
OAS
FFT MEDVAC
MEDVAC
OASMEDVAC
.1
.3
.6
Markov Chain
Given a service sj what is the probability of si
also be called?
Service Priority Reliability ToE(sec)
s1 MEDEVAC 0 FLASH Yes 300
s2 Obstacle Alert 1 Immediate Yes 150
s3 Picture 2 Priority Yes 3600
s4 FFT 3 Routine No 120
s1 s2 s3 s4
A1
A2
A3
Creating sequences of messages using Markov chains:
MEDVAC FFT
Creating QoS-Constrained dataflows
s1 s2 s3 s4
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
User behavior: QoS-constrained dataflows
Markov chains: A1 A2 A3
H(A1) = 1.46
H(A2) = 1.85
H(A3) = 1.80
Creating QoS-Constrained dataflows: 10x
s1 s2 s3 s4
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
User behavior: QoS-constrained dataflows
Markov chains: A1 A2 A3
H(A1) = 1.46
H(A2) = 1.85
H(A3) = 1.80
Why EVER-changing? 20 queues with 20 messages 10x
s1 s2 s3 s4
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
User behavior: QoS-constrained dataflows
Markov chains: A1 A2 A3
20
4
= 4,845
20
5
= 15,504
20
10
= 184,756
# of expired messages
• Let us vary the message size and the radio
datarate as following:
• Datarate: .6, 1.2, 2.4, 4.8 and 9.6 kbps
• Message size: .5, 2, 4, 8 and 16 KB
• Zero expired messages means no challenge
for the store-and-forward mechanism
00
00
00
Service Priority Reliability ToE(sec)
s1 MEDEVAC 0 FLASH Yes 300
s2 Obstacle Alert 1 Immediate Yes 150
s3 Picture 2 Priority Yes 3600
s4 FFT 3 Routine No 120
Simulating disruptions
• What is going to happen with the sequence
of messages if the network is jumping from
disconnect to connected?
• Let us combine the patterns of messages
against the patterns of network states:
• {disconnected, connected, disconnected}
• 1 (2 groups), 4 (5 groups), 9 (10 groups)
A1|B1
A1|B2
A1|B3
A2|B1
A2|B2
A2|B3
A3|B1
A3|B2
A3|B3
A1|B1 A1|B2 A1|B3
B1 B2
B3
2 groups 5 groups 10 groups
A1
A2
A3
A2|B1
A3|B1
A2|B2
A3|B2
A2|B3
A3|B3
As a result:
Simulating disruptions: # expired messages
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
Tactical Network states
A1|B1 A1|B2 A1|B3
B1 B2
B3
# of expired messages
0 0 0 0 0 0 0 0 0 0 0
2 groups 5 groups 10 groups
Simulating disruptions: # expired messages
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
Tactical Network states
A2|B1 A2|B2 A2|B3
B1 B2
B3
# of expired messages
0 0 0 0 0 0 0 0 0
2 groups 5 groups 10 groups
Simulating disruptions: # expired messages
Changing…
Message Queue
Sorting messages by priority:
the darker the higher
>
Tactical Network states
A1|B1 A1|B2 A1|B3
B1 B2
B3
# of expired messages
0 000 0 0 0 0 0 0 0 0 0 0
2 groups 5 groups 10 groups
Message Queue
A1,2,3|B1 A1,2,3|B2 A1,2,3|B3
B1 B2
B3
# of expired messages
0 000 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0
The pattern… can be counter by
increasing the number of
messages
The more you change the
network the less expired
messages
Service ToE(sec)
s1 MEDEVAC 300
s2 Obstacle Alert 150
s3 Picture 3600
s4 FFT 120
Exploration and experimentation
• Examples of fundamental computations that
are challenged by ever-changing dataflows:
• Sorting queues by priority
• Dropping expired messages
• Message replacement
• Retransmit reliable messages
• Time for admission
• Aggregation
• Zero expired messages may indicate no
challenge for these computations
0 000 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0
Sort, replace
and drop
Continuous
hygiene
Message Queue
Conclusion
• The goal was to surely challenge the
underlying store-and-forward mechanism
• We introduced a model to create
reproducible patterns of QoS-constrained
dataflows
• Explored the characterization of the
dataflow patterns defining metrics
• And the future work…
Changing…
B1
B2
B3
2019
Tactical Network
User Applications
Future work: Doing experiments like Galileo
• Given a time-window, create a
reproducible set of network states
.6 1.2 2.4 4.8 9.6
1 2 3 4 5
d1|d1 d2|d2
d3|d3 d4|d4 d5|d5
d2|d1 d3|d2 d4|d3 d5|d4
d1|d2 d2|d3 d3|d4
d4|d5
d5|d1
d1|d5
d2|d5
d3|d5
d4|d1d3|d1
d3|d2
d2|d4
D1 1.8 kbps (±1.57) D2 4.1 kbps (±3.12) D3 6.5 kbps (±3.16)
Datarates as states in a Markov chain, then we
can create the following sequences of states:
PR4G supports five datarates:
ThreeMarkovchains COMMS
Exploration, Experimentation, Examination, Exercise
B1
B2
B3
D1 1.8 kbps (±1.57)
D2 4.1 kbps (±3.12)
D3 6.5 kbps (±3.16) ~19.13 min
~53.73 min
~28.90 min
zUkWcE7uWxvXgkH5Z
hGpJ/Ehr8CDohpY/AVy
1QkCDuA0eszi/LzhYf1B
K+23OasWSTHjaMhGN
AOfwdDoYy0ewxOngwI
gcAbYWigkZw/qvP7n6i1
EiAKYpqDKg+VDKTCVyn
ToO80qdYeskgd7ZHv2lv
500 kB
<message>
Five datarates: .6, 1.2, 2.4, 4.8, 9.6
Creating Ever-changing QoS-constrained Dataflows
in Tactical Networks: An Exploratory Study
Tactical Communications (I)
Roberto Rigolin F. Lopes, Pooja Hanavadi Balaraju, Peter Sevenich
roberto.lopes@fkie.fraunhofer.de , pooja.balaraju@rwth-aachen.de, peter.sevenich@fkie.fraunhofer.de
Budva, 14th May, 2019
#ICMCIS 2019 – The End
Research supported by
BAAINBw and WTD-81Book used as inspiration:
Fractal Geometry of Nature by B. B. Mandelbrot

More Related Content

What's hot

sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
Videoguy
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
hanums1
 

What's hot (19)

Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Qo s
Qo sQo s
Qo s
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingDDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...
 
Mpls Qos Jayk
Mpls Qos JaykMpls Qos Jayk
Mpls Qos Jayk
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
Chapter4[one.]
Chapter4[one.]Chapter4[one.]
Chapter4[one.]
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
 
A018210109
A018210109A018210109
A018210109
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Hn analysis
Hn analysisHn analysis
Hn analysis
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
 

Similar to Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study

Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
Dân Chơi
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
magdy Abdel RahmanCV
magdy Abdel RahmanCVmagdy Abdel RahmanCV
magdy Abdel RahmanCV
Magdi Mohamed
 
. RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the . RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the
MartineMccracken314
 
. RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the . RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the
SilvaGraf83
 

Similar to Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study (20)

Bnt203 internetworking with tcpip
Bnt203 internetworking with tcpipBnt203 internetworking with tcpip
Bnt203 internetworking with tcpip
 
Session 2: 'On cloud nine about your IT solution'
Session 2:  'On cloud nine about your IT solution'Session 2:  'On cloud nine about your IT solution'
Session 2: 'On cloud nine about your IT solution'
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
waqas CV
waqas CVwaqas CV
waqas CV
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
magdy Abdel RahmanCV
magdy Abdel RahmanCVmagdy Abdel RahmanCV
magdy Abdel RahmanCV
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Cisco CCNP Data Center
Cisco CCNP Data CenterCisco CCNP Data Center
Cisco CCNP Data Center
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
Saidul
SaidulSaidul
Saidul
 
. RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the . RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the
 
. RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the . RubricPrompt. Students will focus on setting the
. RubricPrompt. Students will focus on setting the
 
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 

Recently uploaded

Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
AlMamun560346
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
ssuser79fe74
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 

Recently uploaded (20)

9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 o
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 

Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study

  • 1. Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study Tactical Communications (I) Roberto Rigolin F. Lopes, Pooja Hanavadi Balaraju, Peter Sevenich roberto.lopes@fkie.fraunhofer.de , pooja.balaraju@rwth-aachen.de, peter.sevenich@fkie.fraunhofer.de Budva, 14th May, 2019 #ICMCIS 2019 Research supported by BAAINBw and WTD-81
  • 2. The not so Big Bang… We have been trying to deploy Web Services in Tactical Networks. It started in the TACTICS (2014-2017) project and was extended to CWIX 2018 2014-2017 Where are the performance bounds of the system? 2018 <UHF><VHF> <SatCom> OAS FFT MEDVAC A B C Changing ChangingNetwork conditions: User behavior: TSI RuDi DEU-RuDiDEU-TACTICS TacRouter DEU-FIST Tactical Network Router + Middleware User Applications
  • 3. Background: Problem A CIS Capabilities Technical Services Communication Services Transmission Services Transport Services Communication Access Services Core Enterprise Services SOA Platform Services Enterprise Support Services COI Services COI-Enabling Services COI-Specific Services User-Facing Capabilities User Applications Infrastructure Services Cross-layerdataexchange COI-Specific Services COMMS FCS TacRouter VHF Sat + LTEESSOR DEU-FIST DEU-MOTORFIN DEU-SOACC TSI RuDi Proxy NORDEU-RuDiDEU-TACTICS FFT* OpenCOP COP + FFT FFT DEU-RuDi NOR Handheld <Dismounted> Problem A Problem B Changing… Changing… Problem A|B C3 Taxonomy B1 B2 B3 Three patterns of network change: Three patterns of dataflow change: A1 A2 A3 ?
  • 4. Background: Problem A CIS Capabilities Technical Services Communication Services Transmission Services Transport Services Communication Access Services Core Enterprise Services SOA Platform Services Enterprise Support Services COI Services COI-Enabling Services COI-Specific Services User-Facing Capabilities User Applications Infrastructure Services Cross-layerdataexchange COI-Specific Services Problem A Problem B Changing… Changing… Problem A|B C3 Taxonomy Sleep x: queue 0: dequeue No: queue Yes: dequeue How long to admission? Buffer below b%? Sender User service(s) 3 ε4 ε3 ε1 Invoke: λx QoS Handler Receiver(s) out αin i ii How much to b%? Cross-layerContextualMonitoring 4Proxy Message Queue 1 UDP Transport Packet Handler 2 Routing ε2 B1 B2 B3 EVER-changing
  • 5. The system: <messages> <message> <IP packets> Priority 0 FLASH 1 Immediate 2 Priority 3 Routine Sleep x: queue 0: dequeue No: queue Yes: dequeue How long to admission? Buffer below b%? Sender User service(s) 3 ε4 ε3 ε1 Invoke: λx QoS Handler Receiver(s) out αin i ii How much to b%? Cross-layerContextualMonitoring 4Proxy Message Queue 1 UDP Transport Packet Handler 2 Routing ε2 <radio buffer> B1 B2 B3
  • 6. In short: we are trying to tame RANDOMNESS to study the performance bounds of tactical systems
  • 7. Yes, we are trying to tame RANDOMNESS
  • 8. The solution A • Creating ever-changing QoS-constrained: let us assume that the services are states of a Markov chain OAS FFT MEDVAC MEDVAC OASMEDVAC .1 .3 .6 Markov Chain Given a service sj what is the probability of si also be called? Service Priority Reliability ToE(sec) s1 MEDEVAC 0 FLASH Yes 300 s2 Obstacle Alert 1 Immediate Yes 150 s3 Picture 2 Priority Yes 3600 s4 FFT 3 Routine No 120 s1 s2 s3 s4
  • 9. A1 A2 A3 Creating sequences of messages using Markov chains: MEDVAC FFT
  • 10. Creating QoS-Constrained dataflows s1 s2 s3 s4 Changing… Message Queue Sorting messages by priority: the darker the higher > User behavior: QoS-constrained dataflows Markov chains: A1 A2 A3 H(A1) = 1.46 H(A2) = 1.85 H(A3) = 1.80
  • 11. Creating QoS-Constrained dataflows: 10x s1 s2 s3 s4 Changing… Message Queue Sorting messages by priority: the darker the higher > User behavior: QoS-constrained dataflows Markov chains: A1 A2 A3 H(A1) = 1.46 H(A2) = 1.85 H(A3) = 1.80
  • 12. Why EVER-changing? 20 queues with 20 messages 10x s1 s2 s3 s4 Changing… Message Queue Sorting messages by priority: the darker the higher > User behavior: QoS-constrained dataflows Markov chains: A1 A2 A3 20 4 = 4,845 20 5 = 15,504 20 10 = 184,756
  • 13. # of expired messages • Let us vary the message size and the radio datarate as following: • Datarate: .6, 1.2, 2.4, 4.8 and 9.6 kbps • Message size: .5, 2, 4, 8 and 16 KB • Zero expired messages means no challenge for the store-and-forward mechanism 00 00 00 Service Priority Reliability ToE(sec) s1 MEDEVAC 0 FLASH Yes 300 s2 Obstacle Alert 1 Immediate Yes 150 s3 Picture 2 Priority Yes 3600 s4 FFT 3 Routine No 120
  • 14. Simulating disruptions • What is going to happen with the sequence of messages if the network is jumping from disconnect to connected? • Let us combine the patterns of messages against the patterns of network states: • {disconnected, connected, disconnected} • 1 (2 groups), 4 (5 groups), 9 (10 groups) A1|B1 A1|B2 A1|B3 A2|B1 A2|B2 A2|B3 A3|B1 A3|B2 A3|B3
  • 15. A1|B1 A1|B2 A1|B3 B1 B2 B3 2 groups 5 groups 10 groups A1 A2 A3 A2|B1 A3|B1 A2|B2 A3|B2 A2|B3 A3|B3 As a result:
  • 16. Simulating disruptions: # expired messages Changing… Message Queue Sorting messages by priority: the darker the higher > Tactical Network states A1|B1 A1|B2 A1|B3 B1 B2 B3 # of expired messages 0 0 0 0 0 0 0 0 0 0 0 2 groups 5 groups 10 groups
  • 17. Simulating disruptions: # expired messages Changing… Message Queue Sorting messages by priority: the darker the higher > Tactical Network states A2|B1 A2|B2 A2|B3 B1 B2 B3 # of expired messages 0 0 0 0 0 0 0 0 0 2 groups 5 groups 10 groups
  • 18. Simulating disruptions: # expired messages Changing… Message Queue Sorting messages by priority: the darker the higher > Tactical Network states A1|B1 A1|B2 A1|B3 B1 B2 B3 # of expired messages 0 000 0 0 0 0 0 0 0 0 0 0 2 groups 5 groups 10 groups
  • 19. Message Queue A1,2,3|B1 A1,2,3|B2 A1,2,3|B3 B1 B2 B3 # of expired messages 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 The pattern… can be counter by increasing the number of messages The more you change the network the less expired messages Service ToE(sec) s1 MEDEVAC 300 s2 Obstacle Alert 150 s3 Picture 3600 s4 FFT 120
  • 20. Exploration and experimentation • Examples of fundamental computations that are challenged by ever-changing dataflows: • Sorting queues by priority • Dropping expired messages • Message replacement • Retransmit reliable messages • Time for admission • Aggregation • Zero expired messages may indicate no challenge for these computations 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Sort, replace and drop Continuous hygiene Message Queue
  • 21. Conclusion • The goal was to surely challenge the underlying store-and-forward mechanism • We introduced a model to create reproducible patterns of QoS-constrained dataflows • Explored the characterization of the dataflow patterns defining metrics • And the future work… Changing… B1 B2 B3 2019 Tactical Network User Applications
  • 22. Future work: Doing experiments like Galileo • Given a time-window, create a reproducible set of network states .6 1.2 2.4 4.8 9.6 1 2 3 4 5 d1|d1 d2|d2 d3|d3 d4|d4 d5|d5 d2|d1 d3|d2 d4|d3 d5|d4 d1|d2 d2|d3 d3|d4 d4|d5 d5|d1 d1|d5 d2|d5 d3|d5 d4|d1d3|d1 d3|d2 d2|d4 D1 1.8 kbps (±1.57) D2 4.1 kbps (±3.12) D3 6.5 kbps (±3.16) Datarates as states in a Markov chain, then we can create the following sequences of states: PR4G supports five datarates: ThreeMarkovchains COMMS Exploration, Experimentation, Examination, Exercise B1 B2 B3
  • 23. D1 1.8 kbps (±1.57) D2 4.1 kbps (±3.12) D3 6.5 kbps (±3.16) ~19.13 min ~53.73 min ~28.90 min zUkWcE7uWxvXgkH5Z hGpJ/Ehr8CDohpY/AVy 1QkCDuA0eszi/LzhYf1B K+23OasWSTHjaMhGN AOfwdDoYy0ewxOngwI gcAbYWigkZw/qvP7n6i1 EiAKYpqDKg+VDKTCVyn ToO80qdYeskgd7ZHv2lv 500 kB <message> Five datarates: .6, 1.2, 2.4, 4.8, 9.6
  • 24. Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study Tactical Communications (I) Roberto Rigolin F. Lopes, Pooja Hanavadi Balaraju, Peter Sevenich roberto.lopes@fkie.fraunhofer.de , pooja.balaraju@rwth-aachen.de, peter.sevenich@fkie.fraunhofer.de Budva, 14th May, 2019 #ICMCIS 2019 – The End Research supported by BAAINBw and WTD-81Book used as inspiration: Fractal Geometry of Nature by B. B. Mandelbrot

Editor's Notes

  1. “When you change the way you look at things, the things you look at change.” ― Max Planck
  2. “Enlightenment is man's release from his self-incurred tutelage. Tutelage is man's inability to make use of his understanding without direction from another. Self-incurred is this tutelage when its cause lies not in lack of reason but in lack of resolution and courage to use it without direction from another. Sapere aude! 'Have courage to use your own reason!'- that is the motto of enlightenment.” ― Immanuel Kant
  3. Judge a man by his questions rather than by his answers. - Voltarie
  4. “Either write something worth reading or do something worth writing.” ― Benjamin Franklin
  5. The true delight is in the finding out rather than in the knowing. ― Isaac Asimov
  6. “We are trying to prove ourselves wrong as quickly as possible, because only in that way can we find progress.” ― Richard P. Feynman
  7. “Measure what can be measured, and make measurable what cannot be measured.” ― Galileo
  8. “Nothing exists except atoms and empty space; everything else is opinion.” ― Democritus
  9. “We have to continually be jumping off cliffs and developing our wings on the way down.” ― Kurt Vonnegut, If This Isn't Nice, What Is?: Advice for the Young
  10. Don't be encumbered by history. Go off and do something wonderful. ― Robert Noyce
  11. “All men who have turned out worth anything have had the chief hand in their own education.” ― Sir Walter Scott
  12. “All men who have turned out worth anything have had the chief hand in their own education.” ― Sir Walter Scott
  13. Avoidance of boredom is the only worthy mode of action. Life otherwise is not worth living. ― Nassim Nicholas Taleb, Antifragile: Things that Gain from Disorder
  14. “Any man could, if he were so inclined, be the sculptor of his own brain.” ― Santiago Ramon y Cajal, Advice for a Young Investigator
  15. “It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat.” ― Theodore Roosevelt
  16. “A man is known by his heroes.” ― Benoît B. Mandelbrot, The Fractalist: Memoir of a Scientific Maverick