The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Physical-layer network coding is a high-throughput technique for communicating over the two-way relay channel, which consists of two terminals that communicate exclusively via an intermediate relay. An exchange of messages begins with both terminals transmitting binary data sequences simultaneously to the relay. The relay determines the modulo-2 sum of the sequences, which it modulates and broadcasts...
We develop accurate and robust one-dimensional EXIT chart methods to design raptor codes with binary and higher-order modulations on AWGN channels over any desired range of SNRs. We formulate the check-node degree distribution optimization as a linear program that optimizes a suitable objective function of the desired operating points. The throughput curves predicted by the analysis are easily compared...
Unequal error protection (UEP) and rateless coding are both methods used to combat channel uncertainty. With a rateless code, the code rate automatically adapts to the channel quality through the use of incremental redundancy. However, a rateless code lacks the ability to differentiate priorities and all bits suffer the same long delay in poor channel conditions. In contrast, UEP ensures reliable...
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
In this paper a communication system operating over a Gilbert-Elliot channel is studied. The goal of the transmitter is to maximize the number of successfully transmitted bits. This is achieved by choosing among three possible actions: (i) betting aggressively by using a weak code that allows the transmission of a high number of bits but provides no protection against a bad channel, (ii) betting conservatively...
Effective adaptation of error-control coding in a packet radio network requires certain statistics to be developed in the demodulator and decoder of the receiving radio during the reception of each packet. The statistics from one packet are employed to select the code for the next packet. The design and evaluation of cross-layer protocols that use such statistics typically require numerous simulations...
Statistics obtained during demodulation are used in a direct-sequence spread-spectrum packet radio network to govern the adjustment of transmitter power within the first few packets of a session. The statistics are also employed by an adaptive transmission protocol to select the modulation parameters and the rate of the error-control code for each packet. The power-adjustment protocol uses the statistics...
The Link-16 is the tactical data link utilized by the Joint Tactical Information Distribution System (JTIDS). The JTIDS system is important due to its wide use by U.S. armed forces, NATO, and other allied militaries. Link-16 is a hybrid frequency-hopped/direct sequence spread spectrum system that utilizes minimum-shift keying (MSK) to modulate the chips, cyclical code-shift keying (CCSK) to modulate...
We present a cross-layer and multilevel unequal error protection (UEP) approach for robust video transmission over noisy wireless channels. We combine the UEP schemes at the application layer (i.e., multi-level unequal importance of compressed H.264/AVC video data) and physical layer (multi-resolution asymmetric 8-PSK modulation). The proposed scheme multiplexes the video data by mapping it to the...
This paper proposes a rateless coding for efficient MPEG video transmission over loss prone networks. An MPEG video stream is comprised of various frame types, which contribute differently to the displayed video quality. We employ rateless codes with unequal error protection (UEP) property to have more protection on frames with higher influence on the quality of the displayed video. We define protection...
Demodulation of M-ary quadrature amplitude modulation (M-QAM) requires the receiver to estimate the phase and amplitude of the received signal. The demodulator performance is sensitive to errors in these estimates, and the sensitivity increases as M increases. We examine the effects of phase and amplitude errors on the performance of QAM communication systems with error-control coding and soft-decision...
The effects of adaptive-rate transmissions and routing on the total throughput of a slow-frequency-hop packet-radio network are considered. Adaptive rates are achieved through the use of error-control coding with perfect side information. Both fixed-length codes and variable-length codes are considered. Performance results are obtained for direct transmission (i.e., no routing), two-hop limited routing,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.