The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the world becomes increasingly dependent on dynamic and up-to-the-moment information, we recognize that broadband networks must be able to convey this information timely and wirelessly, to and from users in motion. Varieties of 802.11 compliant equipment and other types of broadband wireless equipment have been proposed for, and in some areas, being used to meet this need. There have been questions...
A blueprint for an experimental low-power communications device (wireless mote) suitable for ad-hoc and networking applications is presented. The proposed device implements a random access packet-based communications protocol that exploits a special packet structure which is composed of separate header and payload portions. To enable robust packet detection, the headers consist of a preassigned spreading...
We present FlowCode, a system that exploits network coding at the granularity of traffic flows to facilitate fault-tolerant data exchange in wireless mesh networks. Applications include multi-site data replication in ad-hoc environments such as mesh networks or wireless data centers. By coupling an operand-driven transmission mechanism with a layered network topology, FlowCode allows us to realize...
The Network Centric Operations Industry Consortium (NCOIC) provides guidance for network centric operations (NCO) interoperable systems. The NCO interoperability framework (NIF) [1] provides an organizational construct and repository for enabling this guidance. NIF is a framework that assists industry to design interoperable systems. NIF is based upon standards, including patterns, principles, and...
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
Wireless sensor networks (WSNs) are becoming increasingly important because of their reduced cost and a range of real world military applications. The ability to update the code wirelessly is important for their highly dynamic environments. The need to re-program a wireless sensor network may arise from changing application requirements, bug fixes, or during the application development cycle. However,...
Multicasting can be an useful service in wireless mesh networks (WMNs), which have gained significant acceptance in recent years due to their potentials of providing a low-cost wireless backhaul service to mobile clients. Many applications in WMNs require efficient and reliable multicast communication, i.e., with high delivery ratio but with less overhead, among a group of recipients. However, in...
This paper investigates the issue of resource allocation in multicarrier wireless networks, where users have a choice between multiple service providers. We investigate the feasibility of modeling the allocation problem as a probabilistic voting game. In other words, competing transmitters are modeled as candidates in an election, while the receivers form the electorate. The specific example analyzed...
We investigate the risk associated with multihop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon ??cumulative security...
Most communication styles in tactical networks are one-to-many communications, which is multicast transmission. Recently, tactical networks has been evolving to Ad-Hoc-like distributed networks with OFDM-based Wideband Networking Waveform (WNW). In this paper, novel rate-adaptive multicast transmission method over OFDM-based wireless networks is proposed. Transmission rate for wireless multicast over...
The paper introduces a new concept of groupwise generalized selection combining (GGSC), denoted by GGSC(n, m, L) , in which there are n groups of generalized selection combining GSC(m, L) where the largest m (in SNR) elements are selected from L independent elements. The paper proves that GGSC(n, m, L) has the same diversity order (DO) as that of MRC with nL elements, denoted by MRC(nL) and GSC(nm,...
Future wireless communication systems should be flexible to support different waveforms (WFs) and be cognitive to sense the environment and tune themselves. This has lead to tremendous interest in software defined radios (SDRs). Constraints like throughput, latency and low energy demand high implementation efficiency. The tradeoff of going for a highly efficient WF implementation is the increase of...
Bluetooth is one of the most widely available wireless technologies with over 2 billion Bluetooth-enabled devices shipped. Used by cell phones, laptops, gaming consoles and many other devices, it is the predominant wireless personal area networking technology. Over the last couple of years, US Government Departments including the Department of Defense (DoD) have begun to embrace Bluetooth due to its...
The foray of wireless sensor networks into time-sensitive applications demands support for emergency services with guaranteed quality of service (QoS) bounds. We introduced CP-EDCA, a channel preemptive enhancement to the IEEE 802.11e EDCA standard, for guaranteed emergency medium access in distributed wireless environments. The performance results for emergency traffic depicted 50% uniform decrease...
Wireless sensor networks (WSNs) developed for the monitoring of critical military or civilian infrastructures are expected to have long life cycle with ultra-low power consumption. An ultra-low power wireless sensing scheme is developed by exploiting the unique features of infrastructure monitoring systems, which usually have long latency tolerance, low data rate, and strong correlation among data...
Traditional approaches for testing MANET protocols and applications prior to field experimentation often involve simulation tools or small-sized physical testbeds. However, simulation tools typically do not run in real-time and rely on simplified models rather than a real system, while physical testbeds are prohibitively expensive to build and operate. A more practical method is to use emulation tools...
This paper investigates the energy-bandwidth trade-off of various relaying strategies over the AWGN channel. The total energy consumption per information bit includes the receiver circuit processing energy at the relay and destination as well as the transmitted energy. With the cooperation of the source and relay, the end-to-end bandwidth efficiency can be improved at the cost of receiver processing...
In this paper, the impact of non-Markovian distributed primary radio (PR) on/off activities on the opportunity time for secondary radio (SR) transmission is studied. The licensed spectrum is partitioned into N frequency bins (FBs) and each primary user is assumed to require only one FB for transmission. The PR activity in each FB is modeled as an independent on/off process. The sojourn time for PR...
Wireless sensor networks (WSNs) for tactical environments have been considered as the fundamentals for realizing the future combat system (FCS) supporting network-centric warfare (NCW). Much research related to tactical WSN architecture has been conducted. However, a research about randomly distributed WSNs for military tactical scenarios considering functionalities from bootstrap to data transmission...
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.