3.3 Concluding Remarks

We have just scratched the surface of error control coding so as to provide you with an idea of how it relates to tactical networks. This book does not specialize in error control coding. You are encouraged to check references such as [12], which is a classic book which explains the basis of error control coding (although it lacks the last few decades' discoveries in areas such as turbo codes, trellis coded modulation, network coding, etc.). You are also encouraged to check more recent references in the areas of network coding, transport layer coding, and tactical edge proxy techniques to learn as much as you can about information flow in tactical networks. Appendix 3.A offers a case study regarding the use of RS codes in the transport layer of tactical networks with High Assurance Internet Protocol Encryption (HAIPE) encrypted core.

3.3.1 The Role of Information Theory and Coding in Tactical Wireless Communications and Networking

You may be wondering why we are discussing information theory and coding in this book. In fact, we have hardly delved into these fields. It is essential to understand the essence of information theory in order to understand the depth of our tactical wireless networking problems. You have seen how transmission over a single channel can be optimized. However, keep in mind that many models and assumption are used for this optimization. We assumed the presence of AWGN, and the independence of source symbols. We used spectrum models ...

Get Tactical Wireless Communications and Networks: Design Concepts and Challenges now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.