Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Communications

Issue 6 • June 1981

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover and table of contents]

    Publication Year: 1981, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (299 KB)
    Freely Available from IEEE
  • Guest Editor's Prologue

    Publication Year: 1981, Page(s): 761
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Performance Evaluation of a Variable Frame Multiplexer for Integrated Switched Networks

    Publication Year: 1981, Page(s):800 - 807
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    A scheme which multiplexes long messages and single packets using a time-varying frame is presented. Long messages, generated from a fixed number of terminals, immediately access a main trunk, sharing a dynamically dedicated subchannel in a roundrobin fashion. Fixed size packets arrive with Poisson statistics in a FIFO queue and are served through the same trunk, using the remaining capacity. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous Phase Chirp (CPC) Signals for Binary Data Communication - Part II: Noncoherent Detection

    Publication Year: 1981, Page(s):848 - 858
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (909 KB)

    Previous work has shown that coherent multiple bit observation of binary continuous phase chirp (CPC) signals gives improved error rate performance compared to the conventional bit-by-bit detection scheme. This paper determines bounds on the error rate improvement made possible by multiple bit observation for optimum and suboptimum [average matched filter (AMF)] noncoherent detection of binary CPC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Broad-Band Communication Using Optical Networks - Results of an Experimental Study

    Publication Year: 1981, Page(s):868 - 885
    Cited by:  Papers (6)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2309 KB)

    This paper reports on an experimental system of an integrated communication network built with components representing the state-of-the-art in the area of optical fiber transmission and large-scale integration of logic functions. These components make it possible to apply new concepts for signal processing, transmission, and switching in the experimental system. The large bandwidth of optical chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characteristics of the Hedeman H-1, H-2, and H-3 Codes

    Publication Year: 1981, Page(s):901 - 908
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB)

    This paper examines three new digital modulation binary codes developed by Hedeman and denoted as the H-1, H-2, and H-3 codes. It contains a complete description of the Hedeman codes and analyzes several of their important properties. The bit error probability is displayed as a function of signal-to-noise ratio, and detector implementation is discussed. It is shown that with a maximum likelihood s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum Gaussian Filter for Differential Detection of MSK

    Publication Year: 1981, Page(s):916 - 918
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    An optimum predetection Gaussian bandpass filter for differential detection of MSK is derived theoretically with numerical techniques. The optimum product of bandwidth(B)and bit duration(T), compromising the noise reduction effect with the intersymbol interference effect, is calculated at a given bit error rate (BER). It is shown that the optimumBTproduct is 1.21 w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on "Multiaccess Protocols in Packet Communications Systems"

    Publication Year: 1981, Page(s):919 - 920
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "A Study of Users' Buffer Variations in Random Access Satellite Channels

    Publication Year: 1981, Page(s): 919
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply

    Publication Year: 1981, Page(s): 920
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1981, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (390 KB)
    Freely Available from IEEE
  • Delay Related Issues in Integrated Voice and Data Networks

    Publication Year: 1981, Page(s):786 - 800
    Cited by:  Papers (65)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1744 KB)

    This paper focuses on network delays as they apply to voice traffic. First the nature of the delay problem is discussed and this is followed by a review of enhanced circuit, packet, and hybrid switching techniques: these include fast circuit switching (FCS), virtual circuit switching (VCS), buffered speech interpolation (SI), packetized virtual circuit (PVC), cut-through switching (CTS), composite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carrier Tracking Loop Performance in the Presence of Strong CW Interference

    Publication Year: 1981, Page(s):911 - 916
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    In a coherent data link, narrow-band radio frequency interference (RFI) near the carrier frequency can degrade the link performance by impacting the carrier tracking loop behavior and producing a partial or complete loss of coherence. If the RFI is strong enough, this effect can occur even though the frequency of the interference lies well beyond the carrier tracking loop bandwidth. In 1973, Bruno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Retransmission Control of Slotted ALOHA Systems

    Publication Year: 1981, Page(s):891 - 895
    Cited by:  Papers (30)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Multiple access methods constitute an important subject in the design of distributed computer communication systems. A technique which has attracted considerable attention is the slotted ALOHA random access scheme. In this paper, based on some analytical properties of the slotted ALOHA system [9], we establish the optimality property of the multiple control limit policy among the class of multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Requirements and Protocols for a Broadcast Scenario

    Publication Year: 1981, Page(s):778 - 786
    Cited by:  Papers (14)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1168 KB)

    Previous work (e.g., [1], [2]) has characterized communication security requirements in connection-oriented (virtual circuit) environments supporting applications such as interactive communication and file transfer. This work has developed protocols to achieve these requirements using conventional ciphers (CC's) such as the NBS data encryption standard (DES) [3]. More recently, several authors [4]... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modeling for Packet Networks with Satellite Overflow Channels

    Publication Year: 1981, Page(s):808 - 815
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    In a packet network using medium speed terrestrial connectivity, average end-to-end delay can be reduced by using highspeed satellite overflow channels despite their propagation delay. To investigate networks of this type analytically, we derive a new basic queueing model for overflow systems with buffered traffic. The simple, closed-form expressions facilitate analysis. Approximations are develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compression of Black-White Images with Arithmetic Coding

    Publication Year: 1981, Page(s):858 - 867
    Cited by:  Papers (226)  |  Patents (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1120 KB)

    A new approach for black and white image compression is described, with which the eight CCITT test documents can be compressed in a lossless manner 20-30 percent better than with the best existing compression algorithms. The coding and the modeling aspects are treated separately. The key to these improvements is an efficient binary arithmetic code. The code is relatively simple to implement becaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Adaptive Quantizer with Extended Dynamic Range

    Publication Year: 1981, Page(s):830 - 836
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    A modified algorithm for an adaptive quantizer is proposed. The algorithm is of the backward estimating type and no additional information needs to be transmitted to the receiver. An analysis in terms of central step size behavior and mistracking caused by transmission errors is presented. In addition, the signal-to-distortion ratio is estimated by computer simulations. It is shown by an example t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating the Data Encryption Standard into Computer Networks

    Publication Year: 1981, Page(s):762 - 772
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic Authentication of Time-Invariant Quantities

    Publication Year: 1981, Page(s):773 - 777
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Voiceband Codec with Digital Filtering

    Publication Year: 1981, Page(s):815 - 830
    Cited by:  Papers (43)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB)

    Oversampling and digital filtering have been used to design a per-channel voiceband codec with resolution that exceeds the typical transmission system requirement by more than 15 dB. This extended dynamic range will allow for the use of digital processing in the management of signal levels and system characteristics in many telecommunication applications. Digital filtering contained in the codec p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Random Access Packet-Switched Code Division Multiple Access Systems

    Publication Year: 1981, Page(s):895 - 901
    Cited by:  Papers (247)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Analytical techniques for performance evaluation of synchronous random access packet switching in code division multiple access (CDMA) systems are presented. Steady-state throughput characteristics using several packet generation models are obtained. A number of example random access CDMA systems are compared in terms of their throughput versus offered traffic and utilization-delay characteristics... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter Effects on Bit Error Rate Reexamined

    Publication Year: 1981, Page(s):920 - 922
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Standard references show the effects of carrier phase jitter on the performance of digital communications equipment as curves of bit error rate versus signal-to-noise ratio for constant values of jitter variance. In any real system, the variance consists of a relatively small constant component and a component which is inversely proportional to signal-to-noise ratio. This correspondence presents r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous Phase Chirp (CPC) Signals for Binary Data Communication-Part I: Coherent Detection

    Publication Year: 1981, Page(s):836 - 847
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB)

    Chirp (linear FM) signals provide an attractive wideband digital modulation scheme in applications where interference rejection is important. This paper evaluates the error rate (performance) of coherent binary continuous phase chirp (CPC) receivers operating on the additive white Gaussian noise (AWGN) channel and determines the improvement in performance made possible by multiple bit observation.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Soft-Decision Decoding of the (24, 12) Extended Golay Code

    Publication Year: 1981, Page(s):909 - 911
    Cited by:  Papers (23)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    An efficient algorithm for soft-decision decoding of the (24, 12) extended Golay code is described. Results obtained for white Gaussian noise are presented which show that performance is only a few tenths of a decibel away from that of an ideal correlator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas