Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer network protocols (2)
- Automatic data collection systems (1)
- Bluetooth technology (1)
- Computer networks--Security measures (1)
- Data processing (1)
-
- Detectors (1)
- Doppler navigation--Data processing (1)
- Information networks (1)
- Local area networks (1)
- Multicasting (Computer networks) (1)
- Pattern recognition systems (1)
- Radar (1)
- Special operations (1)
- United States. Air Force--Computer networks (1)
- Wireless communication systems (1)
- Wireless communication systems--Data processing (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach
A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach
Theses and Dissertations
Today's information age has exploded the amount of data available to decision makers at all levels of the control hierarchy. The miniaturization and proliferation of sensor technology has enabled extensive detection and monitoring and advances in computational capabilities have provided for embedded data analysis and the generation of information from raw data. Additionally, with the miniaturization of mechanical systems it is possible to provide platforms for sensor suites that are capable of mobility and limited autonomy. Swarming or bio-emergent behavior problems, provides a robust scalable mechanism for organizing large numbers of mobile sensor platforms. However, the mobility dynamics of swarm …
Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger
Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger
Theses and Dissertations
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM) in a LEO satellite constellation. PIM-DM is a terrestrial protocol for distributing traffic efficiently between subscriber nodes by combining data streams into a tree-based structure, spreading from the root of the tree to the branches. Using this structure, a minimum number of connections are required to transfer data, decreasing the load on intermediate satellite routers. The PIM-DM protocol was developed for terrestrial systems and this research implemented an adaptation of this protocol in a satellite system. This research examined the PIM-DM performance characteristics which were compared to …
Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel
Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel
Theses and Dissertations
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …
Investigation Of Doppler Effects On The Detection Of Polyphase Coded Radar Waveforms, Geoffrey G. Bowman
Investigation Of Doppler Effects On The Detection Of Polyphase Coded Radar Waveforms, Geoffrey G. Bowman
Theses and Dissertations
Special operations missions often depend on discrete insertion of highly trained soldiers into dangerous territory. To reduce the risk involved in this type of engagement, Low Probability of Detection radar waveforms have been designed specifically to defeat enemy passive radar detectors. These waveforms have been shown to perform well when the Doppler shift is minimal, but their performance degrades dramatically with increased frequency shifts due to Doppler effects. This research compares one known Low Probability of Detection waveform, based on Welti coding, with a radar waveform known to provide Doppler constancy, namely, one based on Frank coding. These waveforms are …
Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon
Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon
Theses and Dissertations
Soon, advancements in data encryption technology will make real-time decryption of the contents of network packets virtually impossible. This research anticipates this development and extracts useful information based on packet level characteristics. Distinguishing characteristics from e-mail, HTTP, print, and FTP applications are identified and analyzed. The analysis of collected data from an ad-hoc wireless network reveals that distinguishing characteristics of network traffic do indeed exist. These characteristics include packet size, packet frequency, inter-packet correlation, and channel utilization. Without knowing the contents of packets or the direction of the traffic flow, the applications accessing the wireless network can be determined.
Internet Protocol (Ip) Over Link-16, Clinton W. Stinson
Internet Protocol (Ip) Over Link-16, Clinton W. Stinson
Theses and Dissertations
The purpose of Link- 16 is to exchange real-time tactical data among units of the United States and allied forces. Primary Link- 16 functions include exchange of friendly unit position and status data, fl%the dissemination of tactical surveillance track data, and the control/management of air, surface, and subsurface engagements. Because Link- 16 will play an integral role in fl% network-centric Joint Battlespace Infosphere (JBI), the performance of Internet Protocol version six (IPv6) and IP Security (IPSec) over Link-16 needs to be determined. Using OPNET modeling software to simulate a Link- 16 network, the investigation of this research revealed that the …