Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Digital Communications and Networking

Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo Sep 2012

Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo

Theses and Dissertations

Modern communication systems provide myriad opportunities for passive radar applications. OFDM is a popular waveform used widely in wireless communication networks today. Understanding the structure of these networks becomes critical in future passive radar systems design and concept development. This research develops collection and signal processing models to produce passive SAR ground images using OFDM communication networks. The OFDM-based WiMAX network is selected as a relevant example and is evaluated as a viable source for radar ground imaging. The monostatic and bistatic phase history models for OFDM are derived and validated with experimental single dimensional data. An airborne passive collection …


Dialable Cryptography For Wireless Networks, Marnita T. Eaddie Mar 2008

Dialable Cryptography For Wireless Networks, Marnita T. Eaddie

Theses and Dissertations

The objective of this research is to develop an adaptive cryptographic protocol, which allows users to select an optimal cryptographic strength and algorithm based upon the hardware and bandwidth available and allows users to reason about the level of security versus the system throughput. In this constantly technically-improving society, the ability to communicate via wireless technology provides an avenue for delivering information at anytime nearly anywhere. Sensitive or classified information can be transferred wirelessly across unsecured channels by using cryptographic algorithms. The research presented will focus on dynamically selecting optimal cryptographic algorithms and cryptographic strengths based upon the hardware and …


Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto Mar 2008

Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto

Theses and Dissertations

Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds. Optimistic routing has several weaknesses. Optimistic routing suffers from increased network overhead during increased frequency of node movement and increased node density per area, and optimistic routing also suffers from non-optimistic access change for individual nodes. The overall communication throughput of a network may be increased if the network topology change is scripted; a scripted plan can allow messages to travel along a more efficient topological path while creating less topology control traffic. …


Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts Jun 2007

Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts

Theses and Dissertations

The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft to route data across large regions. The Zone Routing Protocol (ZRP) has the potential to provide seamless large-scale routing for DOD under the Joint Tactical Radio System program. The goal of this study is to determine if there is a difference between routing protocol performance when operating in a large-area MANET with high-speed mobile nodes. This study analyzes MANET performance when using reactive, proactive, and hybrid routing protocols, specifically AODV, DYMO, Fisheye, and ZRP. This analysis compares the performance of the four routing protocols …


On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham Mar 2007

On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham

Theses and Dissertations

Mobile ad-hoc networks offer dynamic portable communication with little or no infrastructure. While this has many benefits, there are additional shortcomings specific to wireless communication that must be addressed. This research proposes gossip-based on-demand key distribution as a means to provide data encryption for mobile ad-hoc networks. This technique uses message keys to avoid encrypting and decrypting a message at every node. Other optimizations used include secure channel caching and joint rekey messages. The use of gossip makes the scheme robust to node failure. Experimental results show only a 15% increase in end-to-end delay with a node failure rate of …


Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon Mar 2007

Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon

Theses and Dissertations

It is well documented that assumptions made in the popular Transmission Control Protocol's (TCP) development, while essential in the highly reliable wired environment, are incompatible with today's wireless network realities in what we refer to as a challenged environment. Challenged environments severely degrade the capability of TCP to establish and maintain a communication connection with reasonable throughput. This thesis proposes and implements an intermediate buffering scheme, implemented at the transport layer, which serves as a TCP helper protocol for use in network routing equipment to overcome short and bursty, but regular, link failures. Moreover, the implementation requires no modifications to …


Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen Mar 2006

Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen

Theses and Dissertations

Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are limited by the resources available to the sensor nodes that make up the WSN. The most significant resource is energy. A WSN may be deployed to an inhospitable or unreachable area, leaving it with a non-replenishable power source. This research examines a way of reducing energy consumption by augmenting the nodes with radio frequency identification (RFID) tags that contain routing information. It was expected that RFID tags would reduce the network throughput, the ad hoc on-demand distance vector (AODV) routing traffic sent, and …


Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson Sep 2004

Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson

Theses and Dissertations

This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance …


Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel Mar 2003

Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel

Theses and Dissertations

IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …


Integrated Manet Mutual Authentication System, Jason T. Ballah Mar 2002

Integrated Manet Mutual Authentication System, Jason T. Ballah

Theses and Dissertations

The Integrated MANET Mutual Authentication System (IMMAS) provides implied mutual authentication of all routing and data traffic within a Mobile Ad Hoc Network (MANET) by combining Elliptic Curve Cryptography, a public-key cryptosystem, with the Dynamic Source Routing (DSR) Protocol. IMMAS provides security by effectively hiding network topology from adversaries while reducing the potential for, among other things, traffic analysis and data tampering, all while providing a graceful degradation for each of the authentication components. Current research in MANETs tends to focus primarily on routing issues leaving topics such as security and authentication for future research. IMMAS focuses on achieving a …


Routing Of Time-Sensitive Data In Mobile Ad Hoc Networks, Necdet Kilic Mar 2001

Routing Of Time-Sensitive Data In Mobile Ad Hoc Networks, Necdet Kilic

Theses and Dissertations

This research focuses on routing of time-sensitive data in mobile ad hoc networks. Routing protocols that were developed for ad hoc networks have been reviewed. Ad Hoc On-demand Distance Vectoring (AODV) routing protocol, which is a prominent routing protocol among these protocols have been implemented in OPNET, a discrete-event simulation tool. Taking AODV as a point of departure, a routing protocol named Real Time Routing Protocol (RTRP) has been developed and also implemented in simulation environment. The performance of these routing protocols have been observed by simulating them in various experiments where the workload has been chosen to be time-sensitive …


Using Direct-Sequenced Spread Spectrum In A Wired Local Area Network, Robert J. Bonner Mar 2001

Using Direct-Sequenced Spread Spectrum In A Wired Local Area Network, Robert J. Bonner

Theses and Dissertations

Code division multiple access provides an ability to share channel bandwidth amongst users at the same time. Individual user performance is not degraded with the addition of more users, unlike traditional Ethernet. Using direct sequenced spread spectrum in a wired local area network, network performance is improved. For a network in overload conditions, individual station throughput is increased by nearly 212% while mean end-to-end delay was reduced by 800%. The vast improvement demonstrated by this research has the capability to extend legacy-cabling infrastructures for many years to come while easily accommodating new bandwidth intensive multimedia applications.


Turbo Codes For Wireless Mobile Communication Systems Applications, Moataz M. Salah Jun 2000

Turbo Codes For Wireless Mobile Communication Systems Applications, Moataz M. Salah

Theses and Dissertations

Research in coding theory has seen many proposals aimed at the construction of powerful codes using block and convolutional codes. Recently, a new forward error control code, known as turbo code, was introduced. This new code yields very good performance (near the Shannon limit) with relatively simple component codes and large interleavers in combination with an iterative decoding process. Among the most important applications of turbo codes are wireless mobile communication systems. A significant performance metric for this application is the minimization of end-to-end delay. In this dissertation, different ways to enhance the performance of turbo codes with short frames …