Tactical wireless communications and networks design concepts and challenges
Uniquely presents tactical wireless communications and networks from an open architecture model perspective Providing a complete description of modern tactical military communications and networks technologies, this book systematically compares tactical military communications techniques with their...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Chichester, West Sussex :
John Wiley & Sons, Ltd
2012.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628574806719 |
Tabla de Contenidos:
- -- About the Author xi
- Foreword xiii
- Preface xv
- List of Acronyms xvii
- Part I THEORETICAL BASIS
- 1 Introduction 3
- 1.1 The OSI Model 4
- 1.2 From Network Layer to IP Layer 6
- 1.3 Pitfall of the OSI Model 7
- 1.4 Tactical Networks Layers 9
- 1.5 Historical Perspective 10
- Bibliography 11
- 2 The Physical Layer 13
- 2.1 Modulation 13
- 2.1.1 Signal-in-Space (SiS) 16
- 2.2 Signal Detection 22
- 2.2.1 Signal Detection in Two-Dimensional Space 24
- 2.2.2 Multidimensional Constellations for AWGN 28
- 2.3 Non-Coherent Demodulation 29
- 2.4 Signal Fading 29
- 2.5 Power Spectrum 31
- 2.6 Spread Spectrum Modulation 34
- 2.6.1 Direct Sequence Spread Spectrum 35
- 2.6.2 Frequency Hopping Spread Spectrum 38
- 2.7 Concluding Remarks 40
- 2.7.1 What Happens Before Modulation and After Demodulation? 40
- 2.7.2 Historical Perspective 40
- Bibliography 41
- 3 The DLL and Information Theory in Tactical Networks 43
- 3.1 Information Theory and Channel Capacity 43
- 3.1.1 Uncertainty and Information 45
- 3.1.2 Entropy 46
- 3.1.3 Coding for a Discrete Memoryless Source 48
- 3.1.4 Mutual Information and Discrete Channels 50
- 3.1.5 The Binary Symmetric Channel (BSC) Model 53
- 3.1.6 Capacity of a Discrete Channel 54
- 3.2 Channel Coding, Error Detection, and Error Correction 57
- 3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58
- 3.2.2 Overview of Linear Block Codes 60
- 3.2.3 Convolutional Codes 62
- 3.2.4 Concatenated Coding and Interleaving 64
- 3.2.5 Network Coding versus Transport Layer Packet Erasure Coding 65
- 3.3 Concluding Remarks 67
- 3.3.1 The Role of Information Theory and Coding in Tactical Wireless Communications and Networking 67
- 3.3.2 Historical Perspective 68
- Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69
- 3.A.1 The Utilized RS Code 69
- 3.A.2 Packet Erasure Analysis 70
- 3.A.3 Imposed Tactical Requirements 77
- Bibliography 80
- 4 MAC and Network Layers in Tactical Networks 83.
- 4.1 MAC Layer and Multiple Access Techniques 83
- 4.2 Queuing Theory 87
- 4.2.1 Statistical Multiplexing of Packets 87
- 4.2.2 Queuing Models 92
- 4.3 Concluding Remarks 106
- 4.3.1 How Congestion Happens in Tactical Wireless Networks 106
- 4.3.2 Historical Perspective 107
- 4.3.3 Remarks Regarding the First Part of the Book 108
- Bibliography 110
- Part II THE EVOLUTION OF TACTICAL RADIOS
- 5 Non-IP Tactical Radios and the Move toward IP 113
- 5.1 Multistep Evolution to the Global Information Grid 113
- 5.2 Link-16 Waveform 114
- 5.2.1 Link-16 Messages 119
- 5.2.2 Link Layer Operations of Link-16 120
- 5.2.3 JTIDS/LINK-16 Modulation and Coding 120
- 5.2.4 Enhancements to Link-16 126
- 5.2.5 Concluding Remarks on Link-16 Waveform 129
- 5.3 EPLRS Waveform 130
- 5.4 SINCGARS Waveform 131
- 5.5 Tactical Internet (TI) 131
- 5.6 IP Gateways 136
- 5.6.1 Throughput Efficiency 136
- 5.6.2 End-to-End Packet Loss 137
- 5.7 Concluding Remarks 137
- 5.7.1 What Comes after the GIG? 137
- 5.7.2 Historical Perspective 137
- Bibliography 138
- 6 IP-Based Tactical Waveforms and the GIG 141
- 6.1 Tactical GIG Notional Architecture 141
- 6.2 Tactical GIG Waveforms 144
- 6.2.1 Wide-Area Network Waveform (WNW) 144
- 6.2.2 Soldier Radio Waveform (SRW) 163
- 6.2.3 High-Band Networking Waveform (HNW) 164
- 6.2.4 Network Centric Waveform (NCW) 165
- 6.3 The Role of Commercial Satellite in the Tactical GIG 166
- 6.4 Satellite Delay Analysis 166
- 6.5 Networking at the Tactical GIG 169
- 6.6 Historical Perspective 170
- Bibliography 173
- 7 Cognitive Radios 177
- 7.1 Cognitive Radios and Spectrum Regulations 177
- 7.2 Conceptualizing Cognitive Radios 180
- 7.2.1 Cognitive Radio Setting (CRS) Parameters 180
- 7.2.2 The Cognitive Engine 181
- 7.3 Cognitive Radios in Tactical Environments 183
- 7.4 Software Communications Architecture (SCA) 184
- 7.4.1 The SCA Core Framework 185
- 7.4.2 SCA Definitions 185
- 7.4.3 SCA Components 186
- 7.4.4 SCA and Security Architecture 188.
- 7.5 Spectrum Sensing 190
- 7.5.1 Multidimensional Spectrum Awareness 190
- 7.5.2 Complexity of Spectrum Sensing 193
- 7.5.3 Implementation of Spectrum Sensing 195
- 7.5.4 Cooperative Spectrum Sensing 199
- 7.5.5 Spectrum Sensing in Current Wireless Standards 200
- 7.6 Security in Cognitive Radios 201
- 7.7 Concluding Remarks 201
- 7.7.1 Development of Cognitive Radios 201
- 7.7.2 Modeling and Simulation of Cognitive Radios 202
- 7.7.3 Historical Perspective 202
- Bibliography 202
- Part III THE OPEN ARCHITECTURE MODEL
- 8 Open Architecture in Tactical Networks 207
- 8.1 Commercial Cellular Wireless Open Architecture Model 208
- 8.2 Tactical Wireless Open Architecture Model 210
- 8.3 Open Architecture Tactical Protocol Stack Model 211
- 8.3.1 Tactical Wireless Open Architecture Model Entities 213
- 8.3.2 Open Architecture Tactical Wireless Model ICDs 216
- 8.4 The Tactical Edge 219
- 8.4.1 Tactical Edge Definition 219
- 8.4.2 Tactical Edge Analysis 220
- 8.5 Historical Perspective 222
- Bibliography 224
- 9 Open Architecture Details 225
- 9.1 The Plain Text IP Layer and the Tactical Edge 225
- 9.2 Measurement Based Resource Management 227
- 9.2.1 Advantages and Challenges of MBRM 228
- 9.2.2 Congestion Severity Level 229
- 9.2.3 Markov Chain Representation of MBAC 231
- 9.2.4 Regulating the Flow of Traffic between Two Nodes 233
- 9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233
- 9.2.6 Packet Loss from the Physical Layer 234
- 9.3 ICD I: Plain Text IP Layer to HAIPE 238
- 9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239
- 9.4.1 TCP Proxy over HAIPE 239
- 9.4.2 VoIP Proxy over HAIPE 241
- 9.4.3 Video Proxy over HAIPE 247
- 9.4.4 RSVP Proxy over HAIPE 248
- 9.4.5 Multicast Proxy over HAIPE 252
- 9.5 ICD X Cross Layer Signaling across the HAIPE 255
- 9.6 Concluding Remarks 258
- 9.7 Historical Perspective 258
- Bibliography 259
- 10 Bringing Commercial Cellular Capabilities to Tactical Networks 261
- 10.1 Tactical User Expectations 262.
- 10.2 3G/4G/LTE Technologies within the War Theater 264
- 10.3 The Tactical Cellular Gateway 265
- 10.4 Deployment Use Cases 267
- 10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW) Radio 268
- 10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269
- 10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271
- 10.5 Concluding Remarks 272
- Bibliography 273
- 11 Network Management Challenges in Tactical Networks 275
- 11.1 Use of Policy Based Network Management and Gaming Theory in Tactical Networks 275
- 11.2 Challenges Facing Joint Forces Interoperability 277
- 11.3 Joint Network Management Architectural Approach 277
- 11.3.1 Assumptions and Concepts for Operations (ConOps) 279
- 11.3.2 The Role of Gateway Nodes 281
- 11.3.3 Abstracting Information 282
- 11.3.4 Creating Path Information 283
- 11.3.5 Sequence Diagram 285
- 11.4 Conflict Resolution for Shared Resources 286
- 11.4.1 Tactical Network Hierarchy 287
- 11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287
- 11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288
- 11.4.4 NCW Resource Attributes 289
- 11.5 Concluding Remarks 290
- Bibliography 291
- Index 293.