A Performance Evaluation of Transport Mechanisms in Hybrid Networks
ABSTRACT This paper evaluates the performance of several alternative reliable unicast transport mechanisms in a hybrid network. Options investigated include end-to-end TCP (different flavors), end-to-end space communications protocol standards-transport protocol (SCPS-TP), and performance enhancing proxies (PEPs) (also called transport layer proxies). Our approach is to analyze these options in a specific scenario using modeling and simulation (M&S). We describe this scenario and the corresponding OPNET network model, our experiment plan, and the results obtained. Finally, we identify several areas for further analyses
Full-textDOI: · Available from: R. Wade, Mar 05, 2015
SourceAvailable from: dtic.mil[Show abstract] [Hide abstract]
ABSTRACT: An adaptive technique for reliable and fast transmission of streaming data at the tactical edge is presented. This technique combines data compression and data robustness to optimize for BW, reliability and speed of transmission in an adaptive matter. Speed of transmission and reducing BW needed for transmission is achieved by exploring lossless data compression of the payloads of the packet stream. Once all redundancy in the packet stream is removed, a packet-erasure-based FEC is applied that further optimize for BW and speed of transmission in addition to adding robustness to the packet stream that assures successful transmission within a speed of service given by tactical requirements. Lossless compression uses an adaptive Arithmetic Coding technique that provides a level of data compression close to theoretical limits (approaching the Shannon Bound) and does not require any prior knowledge of the statistical nature of the packet payload stream (performs compression on-the-fly). The FEC uses an RS code that can work over a general purpose process (does not require specific HW) and optimizes for the amount of redundancy needed. Robustness is achieved in the presence of high percentage of packet erasures caused by blockage, fading or malicious attack. The presented approach guarantees the delivery of a given message within a speed of service defined by tactical requirements and minimizes the BW needed for transmission. The paper presents the technique, shows supporting analysis and presents simulation results.