MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) 2017
DOI: 10.1109/milcom.2017.8170733
|View full text |Cite
|
Sign up to set email alerts
|

Proxy pair optimizations for increased service reliability in DIL networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…The investigation in [7] reports a quantitative evaluation of a proxy implementing three different application protocols tested over a tactical network with disconnected, limited and intermittent states [15]. The tactical network was composed by both simulated and emulated network technologies, such as SatCom, WiFi and Combat Network Radio (CNR).…”
Section: Tactical Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…The investigation in [7] reports a quantitative evaluation of a proxy implementing three different application protocols tested over a tactical network with disconnected, limited and intermittent states [15]. The tactical network was composed by both simulated and emulated network technologies, such as SatCom, WiFi and Combat Network Radio (CNR).…”
Section: Tactical Systemsmentioning
confidence: 99%
“…6 shows a complete graph with the three network states, where state 0 is disconnected (red), state 1 limited (yellow) and state 2 connected (green). In the literature [7], [15], other authors define the network states as disconnected, intermittent and low-bandwidth, here we include the connected state and assume that intermittent is any variation of states in a given time window. The precise definition of these three network states depends on the network technology.…”
Section: Motivation Amentioning
confidence: 99%
See 2 more Smart Citations
“…The goal is to construct mathematical arguments explaining why systems, also called middlewares, brokers or proxies (e.g. [6], [7], [11], [12], [13], [14], [15], [16], [17], [18]), can handle changes in both A and B relying on crosslayer information exchange with the radios and routers (e.g. buffer occupancy, link data rate, latency, packet loss and so on).…”
Section: Introductionmentioning
confidence: 99%