2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)

28-31 Oct. 2001

Go

Filter Results

Displaying Results 1 - 25 of 147
  • MILCOM 2001 Communications For Network-centric Operations: Creating The Information Force [front matter]

    Publication Year: 2001, Page(s):0_1 - xxi
    Request permission for commercial reuse | PDF file iconPDF (502 KB)
    Freely Available from IEEE
  • Demonstration of static network mobile router for mobile platforms

    Publication Year: 2001, Page(s):746 - 750 vol.2
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    The issues related to mobile IP implementation are being investigated for a variety of commercial and DoD applications. Specific issues include the effects of link asymmetry, unidirectional link routing (UDLR), and mobile platform network mobility. We set up a "TCP and Mobile IP Network Testbed for Mobile Platforms," which enables us to simulate various network topologies such as asymmetric links,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constrained shortest paths in wireless networks

    Publication Year: 2001, Page(s):884 - 893 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (745 KB) | HTML iconHTML

    We address several QoS routing problems in wireless ad hoc networks. Due to mobility or limited battery power, a link between two nodes can last for a certain period, which is represented by a life parameter. On the other hand, each link has cost parameters which can represent the delay of this link, the transmission power needed to support this link and so on. The life of a path is the shortest l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):1507 - 1511
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Dynamic IP over mobile ATM

    Publication Year: 2001, Page(s):741 - 745 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Deploying a static IP overlay of a mobile ATM network invariably results in poor routing of IP packets: mobile ATM isolates all aspects of mobility from the IP layer by maintaining IP adjacencies regardless of the mobile network's current location. This paper describes a novel technique based on PNNI augmented routing (PAR) that allows mobile routers to adapt and optimize their routing adjacencies... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel systolic array implementation of multiuser detection for asynchronous DS/CDMA

    Publication Year: 2001, Page(s):1091 - 1094 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    In this paper, a parallel systolic array (PSA) is proposed to implement the multiuser detection for asynchronous DS/CDMA systems. Conventional implementation of asynchronous multiuser detection is to set up a sliding received signal window (RSW), and the multiuser detections are applied in the RSW window by window. As we know, in the two edges of a RSW, the interference produced by those edge bits... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance of serial, matched-filter acquisition in direct-sequence packet radio communications

    Publication Year: 2001, Page(s):1045 - 1049 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    The performance of a noncoherent, serial acquisition technique is evaluated for direct-sequence spread-spectrum packet communications. The output of a filter matched to the packet's preamble is sampled at twice the chip rate during acquisition, and each sample is compared with a fixed acquisition threshold. The effect of sample-timing error on the acquisition performance is examined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new backward recursion for the multi-stage nested Wiener filter employing Krylov subspace methods

    Publication Year: 2001, Page(s):1210 - 1213 vol.2
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    The multi-stage nested Wiener filter (MSNWF) can be identified to be the solution of the Wiener-Hopf equation in the Krylov subspace of the covariance matrix of the observation and the crosscorrelation vector of the observation and the desired signal. Therefore, the Arnoldi algorithm which arises from the MSNWF development can be replaced by the Lanczos algorithm leading to a simpler computation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified CSMA/implicit token passing algorithm for MIL-STD-188-220B

    Publication Year: 2001, Page(s):838 - 844 vol.2
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Media access control (MAC) algorithms have been shown to be critical components in the overall efficiency of military radio communication networks. Many papers at the three most recent MILCOM conferences have focused on combat net radios or ML-STD-188-220B. Several of these compared different MAC algorithms for data only and data and voice networks. The MAC algorithm with the best performance char... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmitter adaptation for CDMA systems via power control and code diversity

    Publication Year: 2001, Page(s):1185 - 1189 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    We consider a new transmitter adaptation scheme for direct sequence CDMA systems. In this new scheme, each user is given a number of codes (signature sequences). Each user transmits a data symbol via possibly more than one codes in each symbol interval. At the receiver, the contributions from different code channels are combined. Power control is applied to each code channel so that the signal-to-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of maximum likelihood blind spreading factor detection using FOSSIL

    Publication Year: 2001, Page(s):1500 - 1506 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    We describe and propose the usage of a new codeword set to achieve the symbol rate (or spreading factor) adaptation in a CDMA communication network. Then we analyze the performance of a symbol-by-symbol, non-coherent, maximum-likelihood, blind spreading factor detector. The probability of false detection, which is also referred as the detection error rate (DER) in other studies, is analyzed for a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subspace-based channel estimation for wideband CDMA communication systems

    Publication Year: 2001, Page(s):1205 - 1209 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Subspace-based channel estimation for CDMA systems exploits the eigenstructure of the received data matrix, allowing reconstruction of signature waveforms without the knowledge of the input signals. In this context, we consider the estimation of multiuser channels for wideband CDMA systems. By relying on knowledge of the structure of the propagation channel, the proposed channel identification is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-user detection in alpha stable noise

    Publication Year: 2001, Page(s):1087 - 1090 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    We study several existing and new techniques for robust multiuser detection in the presence of alpha stable ambient noise. These methods are based on minimizing a certain cost function (e.g., the Huber penalty function) over a discrete set of candidate user bit vectors. The candidate vectors are either obtained by quantizing the continuous minimizers or based on the slowest-descent approach. Simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing message priority policies over an 802.11 based mobile ad hoc network

    Publication Year: 2001, Page(s):860 - 864 vol.2
    Cited by:  Papers (31)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    In a mobile ad hoc network (MANET) for military or emergency applications, it is required to give priority to certain messages or message sources. In this paper, mechanisms are considered for implementing priority treatment of packets in a MANET using the DSR ad hoc network multihop routing protocol based on modifying an IEEE 802.11 MAC layer operating in the distributed mode. The mechanisms inclu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority-based dynamic packet reservation for TDMA wireless networks

    Publication Year: 2001, Page(s):833 - 837 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    We investigate the problem of dynamic bandwidth reservation over the uplink of TDMA-based wireless networks providing prioritized services. The proposed multiple access protocol has the following salient features. First, it supports multiple levels of priorities. Second, it optimizes a unique cost function that consists of a weighted sum of allocation "deviation" functions, on a frame-by-frame bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control coding in mobile ATM system

    Publication Year: 2001, Page(s):1180 - 1184 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    This article shows the model of mobile asynchronous transfer mode (ATM) system, and it proposes neural error control coding in this system. A knowledge-combined neural network (NN) approach is developed and applied to optimum coding selection. The proposed approach utilises a NN trained not only by precedent examples but also by knowledge rules to draw conclusions. It is shown that an artificial N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice and data services in multicode and variable spreading factor DS-CDMA systems

    Publication Year: 2001, Page(s):1039 - 1044 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    This paper analyzes the uplink capacity of multicode and variable spreading factor DS-CDMA cellular systems which accommodate users with different transmission rate requirements. It takes into account imperfect power control on slow signal fluctuations due to shadowing, the presence of Rayleigh fading and random location of the users. The circumstance where the portable transmits to the nearest ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft-decision decoding of nonbinary codes

    Publication Year: 2001, Page(s):1495 - 1499 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    Cyclic and modified cyclic codes can provide greater decoding capability due to the increased length as opposed to Reed-Solomon codes where the lengths are equal to the field size. In this paper, an algorithm is presented which uses the algebraic structure of the codes to provide efficient soft-decision decoding. Use of this decoding algorithm for systems using nonbinary shortened cyclic codes and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Turbo coded continuous phase modulation

    Publication Year: 2001, Page(s):1405 - 1409 vol.2
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (829 KB) | HTML iconHTML

    Continuous phase modulation (CPM) provides an attractive option for spectrally efficient communications systems. Turbo-coding combined with CPM has the potential to result in a spectrally efficient scheme that is also energy efficient in that it yields low error rates at low signal-to-noise ratios. In this paper we consider the concatenation of a turbo encoder and a CPM modulator which can be deco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency-hop spread-spectrum packet radio with Hermitian codes

    Publication Year: 2001, Page(s):1330 - 1334 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Hermitian codes are an attractive alternative to Reed-Solomon codes for use in frequency-hop (FH) spread-spectrum packet radio networks. For a given alphabet size, a Hermitian code has a much longer block length than a Reed-Solomon code. This and other considerations suggest that Hermitian codes may be superior for certain applications. Analytical results are developed for the evaluation of the pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Receiver controlled medium access in multihop ad hoc networks with multipacket reception

    Publication Year: 2001, Page(s):1014 - 1018 vol.2
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (757 KB) | HTML iconHTML

    The advent of diversity modulation and signal processing has changed the underlying assumption of the conventional collision model that at most one packet can be received at each node of a network. The use of antenna arrays, code division multiple access (CDMA), and space-time processing with multiuser detection makes multipacket reception (MPR) a more realistic model for the physical layer of fut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new architecture of providing end-to-end quality-of-service for Differentiated Services network

    Publication Year: 2001, Page(s):1450 - 1455 vol.2
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    This paper focuses on providing end-to-end multiple quality of service (QoS) in the Differentiated Services (DiffServ) network, including guaranteed services, assured services and best-effort services. We propose a new architecture that can not only provide coarse grain QoS, but also guarantee end-to-end QoS for premium service without per-flow state management at core routers under the DiffServ a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constrained adaptive CMA for desired-user synchronization and detection in asynchronous DS-CDMA systems

    Publication Year: 2001, Page(s):1082 - 1086
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    A technique for estimation of desired-user bits in asynchronous DS-CDMA systems is developed without an explicit bit synchronization between the receiver and the transmitter. A bit value is estimated based on the observation window of size 2N-1, where N is the length of bit period. The window shifts for N in order to estimate a new bit. A constrained adaptive constant modulus algorithm (CMA) is us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of ad hoc network protocol debugging environment

    Publication Year: 2001, Page(s):855 - 859 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    The multi-hopping and node mobility of an ad hoc network make it difficult to debug its protocol during implementation. It is unpractical to debug protocols on real radios at the beginning of the implementation. A debugging environment is very necessary and important for ad hoc network protocol implementation. This paper analyzes the special requirement for the debugging environment and provides a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application of interleaver in the multilevel coding system over the Rayleigh fading channel

    Publication Year: 2001, Page(s):829 - 832 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    We research block multilevel coding (MLC) with different interleavers, which are bit interleaver and symbol interleaver, for the Rayleigh fading channel. These schemes are both based on Ungerbock partitioning. We construct schemes that follow the capacity rule to show that there is optimum trade-off between power and bandwidth efficiency. By computer simulation, it is shown that the MLC with bit i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.