270 research outputs found

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    A Survey of Satellite Communications System Vulnerabilities

    Get PDF
    The U.S. military’s increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries. Attacks on these satellites could cause military communications to become unavailable at critical moments during a conflict. This research dissected a typical satellite communications system in order to provide an understanding of the possible attacker entry points into the system, to determine the vulnerabilities associated with each of these access points, and to analyze the possible impacts of these vulnerabilities to U.S. military operations. By understanding these vulnerabilities of U.S. communications satellite systems, methods can be developed to mitigate these threats and protect future systems. This research concluded that the satellite antenna is the most vulnerable component of the satellite communications system’s space segment. The antenna makes the satellite vulnerable to intentional attacks such as: RF jamming, spoofing, meaconing, and deliberate physical attack. The most vulnerable Earth segment component was found to be the Earth station network, which incorporates both Earth station and NOC vulnerabilities. Earth segment vulnerabilities include RF jamming, deliberate physical attack, and Internet connection vulnerabilities. The most vulnerable user segment components were found to be the SSPs and PoPs. SSPs are subject to the vulnerabilities of the services offered, the vulnerabilities of Internet connectivity, and the vulnerabilities associated with operating the VSAT central hub. PoPs are susceptible to the vulnerabilities of the PoP routers, the vulnerabilities of Internet and Intranet connectivity, and the vulnerabilities associated with cellular network access

    Performance evaluation of mobile relays in CDMA system

    Get PDF
    In this thesis we consider the uplink direction of DS-CDMA (Direct Sequence, Code Division Multiple Access) network with multihop transmission. For the purpose, we discussed simple conditions by which we can understand whether single hop or multihop is better. One promising direction that the current wireless network moves toward is multihopping that allows mobiles to relay packets of other mobiles to their destinations. A major reason for adopting such multihopping is in capacity and range enhancement, which may pay off its increased complexity. Here, we focus on the non-real-time (NRT) services in the uplink of a DS-CDMA cell. Mobiles are moving around the cell, trying to send NRT packets to the base station, possibly by multihopping. Our goal is to derive a per-hop based multihop scheduling algorithm that is easily applicable in a cellular network with high mobility. For the purpose, we utilize the similarity between the basketball game and our multihop uplink packet scheduling problem. By regarding players, the basket and the ball as mobiles, the base station and data packet, respectively, we can mimic passing (multihopping) patterns of the basketball players. A major difference between the two is that in the multihopping problem, there are many packets (balls) while in the basket ball game, there is only one ball to shoot into the basket

    Satellite Communications

    Get PDF
    This study is motivated by the need to give the reader a broad view of the developments, key concepts, and technologies related to information society evolution, with a focus on the wireless communications and geoinformation technologies and their role in the environment. Giving perspective, it aims at assisting people active in the industry, the public sector, and Earth science fields as well, by providing a base for their continued work and thinking

    Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)

    Get PDF
    Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression

    Desenvolupament, proves de camp i anĂ lisi de resultats en una xarxa de sensors

    Get PDF
    The objective of this master thesis is to describe the problems of the underwater acoustic sensor network and make some experiments. The experiments carried out try to characterize the communication in underwater environments in order to be able to develop underwater sensor networks. In the first chapter we describe the motivations, features of aquatic environment, the difficulties of underwater acoustic channels, and the open questions in mobile underwater sensor network design. In the second chapter we try to describe the experiments, show the results and try to explain these results. And finally in the third chapter we explain the conclusions and the further works of this master thesis
    • …
    corecore