By Topic

Military Communications Conference, 1991. MILCOM '91, Conference Record, Military Communications in a Changing World., IEEE

Date 4-7 Nov. 1991

Filter Results

Displaying Results 1 - 25 of 245
  • Military Communications in a Changing World MILCOM, 91. Conference Record (Cat. No.91CH2981-9)

    Publication Year: 1991
    Cited by:  Patents (3)
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Throughput analysis in multihop packet radio networks

    Publication Year: 1991, Page(s):16 - 19 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The authors have set up a simulation program to evaluate the throughput of a packet radio network (PRN) by comparing different routing strategies in both the static and dynamic PRN topology. They compare link access protocol efficiency of a system with spread spectrum modulation, forward error correction coding with an Aloha like protocol in a multihop network versus Aloha. Code division multiple ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for finding an optimal set of short disjoint paths in a communication network

    Publication Year: 1991, Page(s):11 - 15 vol.1
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The motives for seeking a set of short disjoint paths in a communication network are explained. A sequentially constructed optimal set is defined. Three efficient algorithms, one that constructs an optimal set and two that construct approximations, are presented. One of the latter algorithms not only constructs a larger set of short disjoint paths than an iterated version of the standard Dijkstra ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of automated writer-to-reader messaging on the DoD end user

    Publication Year: 1991, Page(s):986 - 990 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    It is pointed out that to fully utilize the benefits of automated writer-to-reader messaging to be provided by the Defense Message System (DMS) the Department of Defense (DoD) end users must be prepared to accept new responsibilities and adapt to a different, but user-friendly, way of doing business. In the evolution to the DMS, the DoD organizational and individual messaging users will make the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed routing algorithm for loop detection and resolution

    Publication Year: 1991, Page(s):6 - 10 vol.1
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    After a brief discussion of the distributed Bellman-Ford algorithm and the associated looping problems, a routing algorithm for loop detection and resolution is proposed. The proposed algorithm detects and resolves all kinds of loops within a finite time depending on the number of nodes in a loop, while requiring a small computation and memory overhead. No extra control messages are generated and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • National Transportable Telecommunications Capability

    Publication Year: 1991, Page(s):934 - 937 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    The National Communications System (NCS) in its role of planning for emergency telecommunications restoration has contracted for a deployable asset to be available for national security and emergency preparedness (NS/EP) uses. This asset, the National Transportable Telecommunications Capability (NTTC) is a transportable package consisting of a cellular switch and base station in a shelter, a micro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of the media resource controller

    Publication Year: 1991, Page(s):981 - 985 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The media resource controller (MRC) provides for packetized least-cost routing in heterogeneous media networks where the network topologies and conditions may be highly dynamic. Previous work has discussed the MRC and its approach to the routing problem when using multiple parameters obtained from radio links. The authors discuss the results of this strategy when applied to a real network operatin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concatenated coding for frequency-hop packet radio

    Publication Year: 1991, Page(s):1235 - 1239 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The application of concatenated coding to frequency-hop packet radio is examined. Upper bounds on the packet error probability are developed for a concatenated coding system which uses a properly interleaved Reed-Solomon outer code and a convolutional inner code with Viterbi decoding. Through the use of these upper bounds, performance tradeoffs are investigated for frequency-hop communications ove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new, simple and exact result for calculating the probability of error for two-dimensional signal constellations

    Publication Year: 1991, Page(s):571 - 575 vol.2
    Cited by:  Papers (391)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    The author presents a simple integral expression for calculating the exact probability of a symbol error for an arbitrary array of signal points. The integrand contains only elementary functions and the range of integration is finite. The approach is introduced by applying it to M-ary phase shift keying (MPSK). The special case of M=2 gives novel and possibly useful expressions f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meteor burst communications relay system

    Publication Year: 1991, Page(s):688 - 692 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    An ocean buoy system is described along with a proposed system concept which could solve the problem of providing primary power for remotely deployed meteor burst communications system (MBCS) relay nodes. A relatively large buoy relay system, with MBCS master station capability, and the results of a buoy-ship relay test between San Diego, San Francisco, and Hawaii, is outlined. For intermittent op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applied queueing analysis in tactical network planning

    Publication Year: 1991, Page(s):1 - 5 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Diffusion routing techniques have been used as a communication routing technique in tactical switching networks for many years. The aim is to apply queueing analysis to a network driven by this routing technique, with emphasis placed on the issues of tactical network planning. Three important planning parameters are derived. They are the call set-up time, the network throughput, and the call block... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced HF digital networks

    Publication Year: 1991, Page(s):929 - 933 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The authors introduce technology enhancements in HF communications that have been developed by Rome Laboratory (RL). Titled `Improved HF Data Network' (IHFDN), the technology improvements for this effort addressed networking for a large mobile network of up to 100 users contained in up to 10 nets having a totally distributed architecture. Specifically, improvements covered are in HF networking, LQ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource allocation optimization in multimedia communication networks

    Publication Year: 1991, Page(s):976 - 980 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The author describes the method used to solve the following problem. One is given a set of multimedia circuits (links) required for a specific deployment, resources (transmitters, receivers, modems, etc.) that are required for these circuits, and a pool of resources available to implement these links. Many of the equipments in the resource pool have multiple capabilities. When the pool of resource... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on antenna pointing for a cluster of users

    Publication Year: 1991, Page(s):238 - 240 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Pointing a space station antenna for the coverage of a cluster of users is studied. Suppose a single antenna located on a space station is mechanically steerable for the coverage of a few users, and the goal of the antenna pointing is to minimize the maximum pointing loss among the users. Mathematically, this is a nonlinear optimization problem. Assuming that all the users are within the mainbeam ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient algorithm for the calculation of node-pair reliability

    Publication Year: 1991, Page(s):187 - 192 vol.1
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    An algorithm for rapidly calculating the node-pair reliability is described. One application of the algorithm is in communication networks that use flooding for route setup or packet transmission and that have both unreliable links and unreliable nodes. The algorithm is much more efficient than the Dotson algorithm, its main competition, because it uses a much smaller sample space of elementary ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Type-II hybrid-ARQ protocols using punctured Reed-Solomon codes

    Publication Year: 1991, Page(s):1229 - 1234 vol.3
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Reed-Solomon (RS) codes possess several properties that make them an ideal choice for type-II hybrid-ARQ protocols. These properties include strong separability, strong invertibility, and excellent reliability performance when used for simultaneous error detection and correction. These properties are shown to lead to a natural definition of an RS type-II hybrid-ARQ protocol. An (n.k) RS c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of detectors in additive and multiplicative noise

    Publication Year: 1991, Page(s):566 - 570 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Performance characteristics of the locally optimum detector for composite signals in additive and multiplicative noise are investigated. A noise model in which the effects of both additive and multiplicative noise components can simultaneously be considered for a signal detection problem is used. The signal is a composite which contains both deterministic and stochastic signal components. To illus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The FAVR meteor burst communication experiment

    Publication Year: 1991, Page(s):683 - 687 vol.2
    Cited by:  Papers (1)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The authors describe the meteor burst communications experiment performed by SCS Telecom, Martin Marietta Energy Systems, and the 11th Air Force. The experiment consisted of transmitting data and voice over a meteor burst channel between Anchorage and Kotzebue using SCS Telecom's FAVR modem. The FAVR algorithm is described. It is a variable rate modem capable of operating at bit rates up to 92 kbi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • European communications R&D programs

    Publication Year: 1991, Page(s):215 - 219 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    To encourage European countries and their industry and research institutes to cooperate in a wide range of research and development, several European programs and projects have been launched which are briefly described. The projects described are EUREKA, RACE, COST, ESPRIT, and EURESCOM View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Iceland Air Defense System: state-of-the-art C4I communications for a changing world

    Publication Year: 1991, Page(s):492 - 496 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Three separate and distinct types of change are occurring which affect C4I communications. These are: (1) a moderation of US attitudes toward eastern Europe, (2) a shrinking defense budget, and (3) rapidly changing technology. The Iceland Air Defense System (IADS) telecommunications system (ITS) responds to each of these rapidly changing arenas. The ITS transports and manages three gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of DS-MSK system in mobile radio communications

    Publication Year: 1991, Page(s):925 - 928 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Differential detection of direct-sequence minimum shift keying in a land mobile radio environment is analyzed. The aim of this work is to perform a theoretical analysis of the error-rate performance of a direct-sequence spread-spectrum minimum shift keying (DS-MSK) with a 2 T delay differential detector. Both the effect of the Gaussian noise present in this channel or generated in the rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards tactical GOSIP: performance of TCP/IP over RF links in the ITDN

    Publication Year: 1991, Page(s):166 - 171 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The combination of underlying tactical link and end-to-end protocol in terms of performance has rarely been measured, even for the Department of Defense transport control protocol/Internet protocol (TCP/IP). The author presents a multilayer method for collecting data on this combined performance and analyzing it to provide integrated information on the performance seen by the users application and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Address sequences with improved resynchronization capability

    Publication Year: 1991, Page(s):1277 - 1280 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The author examines the resynchronization properties of the frequency-hopping address sequences that have been proposed as an alternative to the Reed-Solomon address sequences. It is shown that the new address sequences have been better resynchronization properties than the corresponding Reed-Solomon address sequences. The author has also derived an expression for the exact number of the new addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular voice processor

    Publication Year: 1991, Page(s):1210 - 1214 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    The modular voice processor (MVP) is a single DSP (digital signal processing) chip implementation of a multifunction vocoder in a small, low-power module. With the capability of processing FED-STD-1015 2400 bit/s LPC (linear prediction coding) and FED-STD-1016 4800 bit/s CELP, the MVP module has potential applications for numerous DOD and Federal Government applications. Attention is given to such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DPAS network control system, a real-time distributed self-healing network capability

    Publication Year: 1991, Page(s):889 - 893 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The Digital Patch and Access System (DPAS), a digital cross-connect transmission system which is being deployed in the Defense Communications System, is discussed. Particular attention is given to the DPAS network control system (DNCS), a fully distributed network management system for the DPAS network. It is primarily designed to restore service to NxDS0 bandwidth circuits in order of restoration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.