George F. Elmasry
Tactical Wireless Communications and Networks
George F. Elmasry
Tactical Wireless Communications and Networks
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Providing a complete description of modern tactical military communications and networks technology, this book systematically compares tactical military communications techniques with their commercial equivalents, pointing out similarities and differences. In particular it examines each layer of the protocol stack and shows how specific tactical and security requirements result in changes from the commercial approach. The author systematically leads readers through this complex topic, firstly providing background on the architectural approach upon which the analysis will be based, and then…mehr
Andere Kunden interessierten sich auch für
- Dan ForsbergLte Security130,99 €
- Lajos HanzoOfdm and MC-Cdma for Broadband Multi-User Communications, Wlans and Broadcasting314,99 €
- Dorgham SisalemSip Security128,99 €
- WiMAX Security and Quality of Service138,99 €
- Man Young RheeWireless Mobile Internet Security133,99 €
- Andrei GurtovHost Identity Protocol (Hip)122,99 €
- Silke HoltmannsCellular Authentication for Mobile and Internet Services113,99 €
-
-
-
Providing a complete description of modern tactical military communications and networks technology, this book systematically compares tactical military communications techniques with their commercial equivalents, pointing out similarities and differences. In particular it examines each layer of the protocol stack and shows how specific tactical and security requirements result in changes from the commercial approach. The author systematically leads readers through this complex topic, firstly providing background on the architectural approach upon which the analysis will be based, and then going into detail on tactical wireless communications and networking technologies and techniques.
Structured progressively: for readers needing an overall view; for those looking at the communications aspects (lower layers of the protocol stack); and for users interested in the networking aspects (higher layers of the protocol stack)
Presents approaches to alleviate the challenges faced by the engineers in the field today
Furnished throughout with illustrations and case studies to clarify the notional and architectural approaches
Includes a list of problems for each chapter to emphasize the important aspects of the topics covered
Covers the current state of tactical networking as well as the future long term evolution of tactical wireless communications and networking in the next 50 years
Written at an advanced level with scope as a reference tool for engineers and scientists as well as a graduate text for advanced courses
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Structured progressively: for readers needing an overall view; for those looking at the communications aspects (lower layers of the protocol stack); and for users interested in the networking aspects (higher layers of the protocol stack)
Presents approaches to alleviate the challenges faced by the engineers in the field today
Furnished throughout with illustrations and case studies to clarify the notional and architectural approaches
Includes a list of problems for each chapter to emphasize the important aspects of the topics covered
Covers the current state of tactical networking as well as the future long term evolution of tactical wireless communications and networking in the next 50 years
Written at an advanced level with scope as a reference tool for engineers and scientists as well as a graduate text for advanced courses
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Wiley & Sons
- 2. Aufl.
- Seitenzahl: 336
- Erscheinungstermin: 28. November 2012
- Englisch
- Abmessung: 250mm x 175mm x 22mm
- Gewicht: 693g
- ISBN-13: 9781119951766
- ISBN-10: 1119951763
- Artikelnr.: 35940402
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Wiley & Sons
- 2. Aufl.
- Seitenzahl: 336
- Erscheinungstermin: 28. November 2012
- Englisch
- Abmessung: 250mm x 175mm x 22mm
- Gewicht: 693g
- ISBN-13: 9781119951766
- ISBN-10: 1119951763
- Artikelnr.: 35940402
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
George F. Elmasry, Senior Vice President, DSCI, USA With seventeen years of industry experience, two years of college teaching experience and having published over 50 peer reviewed publications and patents, George F. Elmasry has a strong interdisciplinary background in electrical and computer engineering, computer science, research, presentation, patent, publication and grant-proposal activities. He has in-depth knowledge of commercial and tactical telecommunication systems, with an industrial background including: heading Networking and Communications Division at a US defense firm; serving as the technical lead of a wireless networking simulation and modeling group; and developing simulation software using OPNET, MS Visual C++, C under SunOS. George Elmasry obtained his PhD in Electrical Engineering from New Jersey Institute of Technology and has research publications that span from physical layer to QoS, to Network Management, to protocols and algorithms.
About the Author xi
Foreword xiii
Preface xv
List of Acronyms xvii
Part I Theoretical Basis
1 Introduction 3
1.1 The OSI Model 4
1.2 From Network Layer to IP Layer 6
1.3 Pitfall of the OSI Model 7
1.4 Tactical Networks Layers 9
1.5 Historical Perspective 10
Bibliography 11
2 The Physical Layer 13
2.1 Modulation 13
2.1.1 Signal-in-Space (SiS) 16
2.2 Signal Detection 22
2.2.1 Signal Detection in Two-Dimensional Space 24
2.2.2 Multidimensional Constellations for AWGN 28
2.3 Non-Coherent Demodulation 29
2.4 Signal Fading 29
2.5 Power Spectrum 31
2.6 Spread Spectrum Modulation 34
2.6.1 Direct Sequence Spread Spectrum 35
2.6.2 Frequency Hopping Spread Spectrum 38
2.7 Concluding Remarks 40
2.7.1 What Happens Before Modulation and After Demodulation? 40
2.7.2 Historical Perspective 40
Bibliography 41
3 The DLL and Information Theory in Tactical Networks 43
3.1 Information Theory and Channel Capacity 43
3.1.1 Uncertainty and Information 45
3.1.2 Entropy 46
3.1.3 Coding for a Discrete Memoryless Source 48
3.1.4 Mutual Information and Discrete Channels 50
3.1.5 The Binary Symmetric Channel (BSC) Model 53
3.1.6 Capacity of a Discrete Channel 54
3.2 Channel Coding, Error Detection, and Error Correction 57
3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58
3.2.2 Overview of Linear Block Codes 60
3.2.3 Convolutional Codes 62
3.2.4 Concatenated Coding and Interleaving 64
3.2.5 Network Coding versus Transport Layer Packet
Erasure Coding 65
3.3 Concluding Remarks 67
3.3.1 The Role of Information Theory and Coding in Tactical Wireless
Communications and Networking 67 3.3.2 Historical Perspective 68
Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69
3.A.1 The Utilized RS Code 69
3.A.2 Packet Erasure Analysis 70
3.A.3 Imposed Tactical Requirements 77
Bibliography 80
4 MAC and Network Layers in Tactical Networks 83
4.1 MAC Layer and Multiple Access Techniques 83
4.2 Queuing Theory 87
4.2.1 Statistical Multiplexing of Packets 87
4.2.2 Queuing Models 92
4.3 Concluding Remarks 106
4.3.1 How Congestion Happens in Tactical Wireless Networks 106
4.3.2 Historical Perspective 107
4.3.3 Remarks Regarding the First Part of the Book 108
Bibliography 110
Part II The Evolution Of Tactical Radios
5 Non-IP Tactical Radios and the Move toward IP 113
5.1 Multistep Evolution to the Global Information Grid 113
5.2 Link-16 Waveform 114
5.2.1 Link-16 Messages 119
5.2.2 Link Layer Operations of Link-16 120
5.2.3 JTIDS/LINK-16 Modulation and Coding 120
5.2.4 Enhancements to Link-16 126
5.2.5 Concluding Remarks on Link-16 Waveform 129
5.3 EPLRS Waveform 130
5.4 SINCGARS Waveform 131
5.5 Tactical Internet (TI) 131
5.6 IP Gateways 136
5.6.1 Throughput Efficiency 136
5.6.2 End-to-End Packet Loss 137
5.7 Concluding Remarks 137
5.7.1 What Comes after the GIG? 137
5.7.2 Historical Perspective 137
Bibliography 138
6 IP-Based Tactical Waveforms and the GIG 141
6.1 Tactical GIG Notional Architecture 141
6.2 Tactical GIG Waveforms 144
6.2.1 Wide-Area Network Waveform (WNW) 144
6.2.2 Soldier Radio Waveform (SRW) 163
6.2.3 High-Band Networking Waveform (HNW) 164
6.2.4 Network Centric Waveform (NCW) 165
6.3 The Role of Commercial Satellite in the Tactical GIG 166
6.4 Satellite Delay Analysis 166
6.5 Networking at the Tactical GIG 169
6.6 Historical Perspective 170
Bibliography 173
7 Cognitive Radios 177
7.1 Cognitive Radios and Spectrum Regulations 177
7.2 Conceptualizing Cognitive Radios 180
7.2.1 Cognitive Radio Setting (CRS) Parameters 180
7.2.2 The Cognitive Engine 181
7.3 Cognitive Radios in Tactical Environments 183
7.4 Software Communications Architecture (SCA) 184
7.4.1 The SCA Core Framework 185
7.4.2 SCA Definitions 185
7.4.3 SCA Components 186
7.4.4 SCA and Security Architecture 188
7.5 Spectrum Sensing 190
7.5.1 Multidimensional Spectrum Awareness 190
7.5.2 Complexity of Spectrum Sensing 193
7.5.3 Implementation of Spectrum Sensing 195
7.5.4 Cooperative Spectrum Sensing 199
7.5.5 Spectrum Sensing in Current Wireless Standards 200
7.6 Security in Cognitive Radios 201
7.7 Concluding Remarks 201
7.7.1 Development of Cognitive Radios 201
7.7.2 Modeling and Simulation of Cognitive Radios 202
7.7.3 Historical Perspective 202
Bibliography 202
Part III The Open Architecture Model
8 Open Architecture in Tactical Networks 207
8.1 Commercial Cellular Wireless Open Architecture Model 208
8.2 Tactical Wireless Open Architecture Model 210
8.3 Open Architecture Tactical Protocol Stack Model 211
8.3.1 Tactical Wireless Open Architecture Model Entities 213
8.3.2 Open Architecture Tactical Wireless Model ICDs 216
8.4 The Tactical Edge 219
8.4.1 Tactical Edge Definition 219
8.4.2 Tactical Edge Analysis 220
8.5 Historical Perspective 222
Bibliography 224
9 Open Architecture Details 225
9.1 The Plain Text IP Layer and the Tactical Edge 225
9.2 Measurement Based Resource Management 227
9.2.1 Advantages and Challenges of MBRM 228
9.2.2 Congestion Severity Level 229
9.2.3 Markov Chain Representation of MBAC 231
9.2.4 Regulating the Flow of Traffic between Two Nodes 233
9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233
9.2.6 Packet Loss from the Physical Layer 234
9.3 ICD I: Plain Text IP Layer to HAIPE 238
9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239
9.4.1 TCP Proxy over HAIPE 239
9.4.2 VoIP Proxy over HAIPE 241
9.4.3 Video Proxy over HAIPE 247
9.4.4 RSVP Proxy over HAIPE 248
9.4.5 Multicast Proxy over HAIPE 252
9.5 ICD X Cross Layer Signaling across the HAIPE 255
9.6 Concluding Remarks 258
9.7 Historical Perspective 258
Bibliography 259
10 Bringing Commercial Cellular Capabilities to Tactical Networks 261
10.1 Tactical User Expectations 262
10.2 3G/4G/LTE Technologies within the War Theater 264
10.3 The Tactical Cellular Gateway 265
10.4 Deployment Use Cases 267
10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW)
Radio 268
10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269
10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271
10.5 Concluding Remarks 272
Bibliography 273
11 Network Management Challenges in Tactical Networks 275
11.1 Use of Policy Based Network Management and Gaming Theory in Tactical
Networks 275
11.2 Challenges Facing Joint Forces Interoperability 277
11.3 Joint Network Management Architectural Approach 277
11.3.1 Assumptions and Concepts for Operations (ConOps) 279
11.3.2 The Role of Gateway Nodes 281
11.3.3 Abstracting Information 282
11.3.4 Creating Path Information 283
11.3.5 Sequence Diagram 285
11.4 Conflict Resolution for Shared Resources 286
11.4.1 Tactical Network Hierarchy 287
11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287
11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288
11.4.4 NCW Resource Attributes 289
11.5 Concluding Remarks 290
Bibliography 291
Index 293
Foreword xiii
Preface xv
List of Acronyms xvii
Part I Theoretical Basis
1 Introduction 3
1.1 The OSI Model 4
1.2 From Network Layer to IP Layer 6
1.3 Pitfall of the OSI Model 7
1.4 Tactical Networks Layers 9
1.5 Historical Perspective 10
Bibliography 11
2 The Physical Layer 13
2.1 Modulation 13
2.1.1 Signal-in-Space (SiS) 16
2.2 Signal Detection 22
2.2.1 Signal Detection in Two-Dimensional Space 24
2.2.2 Multidimensional Constellations for AWGN 28
2.3 Non-Coherent Demodulation 29
2.4 Signal Fading 29
2.5 Power Spectrum 31
2.6 Spread Spectrum Modulation 34
2.6.1 Direct Sequence Spread Spectrum 35
2.6.2 Frequency Hopping Spread Spectrum 38
2.7 Concluding Remarks 40
2.7.1 What Happens Before Modulation and After Demodulation? 40
2.7.2 Historical Perspective 40
Bibliography 41
3 The DLL and Information Theory in Tactical Networks 43
3.1 Information Theory and Channel Capacity 43
3.1.1 Uncertainty and Information 45
3.1.2 Entropy 46
3.1.3 Coding for a Discrete Memoryless Source 48
3.1.4 Mutual Information and Discrete Channels 50
3.1.5 The Binary Symmetric Channel (BSC) Model 53
3.1.6 Capacity of a Discrete Channel 54
3.2 Channel Coding, Error Detection, and Error Correction 57
3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58
3.2.2 Overview of Linear Block Codes 60
3.2.3 Convolutional Codes 62
3.2.4 Concatenated Coding and Interleaving 64
3.2.5 Network Coding versus Transport Layer Packet
Erasure Coding 65
3.3 Concluding Remarks 67
3.3.1 The Role of Information Theory and Coding in Tactical Wireless
Communications and Networking 67 3.3.2 Historical Perspective 68
Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69
3.A.1 The Utilized RS Code 69
3.A.2 Packet Erasure Analysis 70
3.A.3 Imposed Tactical Requirements 77
Bibliography 80
4 MAC and Network Layers in Tactical Networks 83
4.1 MAC Layer and Multiple Access Techniques 83
4.2 Queuing Theory 87
4.2.1 Statistical Multiplexing of Packets 87
4.2.2 Queuing Models 92
4.3 Concluding Remarks 106
4.3.1 How Congestion Happens in Tactical Wireless Networks 106
4.3.2 Historical Perspective 107
4.3.3 Remarks Regarding the First Part of the Book 108
Bibliography 110
Part II The Evolution Of Tactical Radios
5 Non-IP Tactical Radios and the Move toward IP 113
5.1 Multistep Evolution to the Global Information Grid 113
5.2 Link-16 Waveform 114
5.2.1 Link-16 Messages 119
5.2.2 Link Layer Operations of Link-16 120
5.2.3 JTIDS/LINK-16 Modulation and Coding 120
5.2.4 Enhancements to Link-16 126
5.2.5 Concluding Remarks on Link-16 Waveform 129
5.3 EPLRS Waveform 130
5.4 SINCGARS Waveform 131
5.5 Tactical Internet (TI) 131
5.6 IP Gateways 136
5.6.1 Throughput Efficiency 136
5.6.2 End-to-End Packet Loss 137
5.7 Concluding Remarks 137
5.7.1 What Comes after the GIG? 137
5.7.2 Historical Perspective 137
Bibliography 138
6 IP-Based Tactical Waveforms and the GIG 141
6.1 Tactical GIG Notional Architecture 141
6.2 Tactical GIG Waveforms 144
6.2.1 Wide-Area Network Waveform (WNW) 144
6.2.2 Soldier Radio Waveform (SRW) 163
6.2.3 High-Band Networking Waveform (HNW) 164
6.2.4 Network Centric Waveform (NCW) 165
6.3 The Role of Commercial Satellite in the Tactical GIG 166
6.4 Satellite Delay Analysis 166
6.5 Networking at the Tactical GIG 169
6.6 Historical Perspective 170
Bibliography 173
7 Cognitive Radios 177
7.1 Cognitive Radios and Spectrum Regulations 177
7.2 Conceptualizing Cognitive Radios 180
7.2.1 Cognitive Radio Setting (CRS) Parameters 180
7.2.2 The Cognitive Engine 181
7.3 Cognitive Radios in Tactical Environments 183
7.4 Software Communications Architecture (SCA) 184
7.4.1 The SCA Core Framework 185
7.4.2 SCA Definitions 185
7.4.3 SCA Components 186
7.4.4 SCA and Security Architecture 188
7.5 Spectrum Sensing 190
7.5.1 Multidimensional Spectrum Awareness 190
7.5.2 Complexity of Spectrum Sensing 193
7.5.3 Implementation of Spectrum Sensing 195
7.5.4 Cooperative Spectrum Sensing 199
7.5.5 Spectrum Sensing in Current Wireless Standards 200
7.6 Security in Cognitive Radios 201
7.7 Concluding Remarks 201
7.7.1 Development of Cognitive Radios 201
7.7.2 Modeling and Simulation of Cognitive Radios 202
7.7.3 Historical Perspective 202
Bibliography 202
Part III The Open Architecture Model
8 Open Architecture in Tactical Networks 207
8.1 Commercial Cellular Wireless Open Architecture Model 208
8.2 Tactical Wireless Open Architecture Model 210
8.3 Open Architecture Tactical Protocol Stack Model 211
8.3.1 Tactical Wireless Open Architecture Model Entities 213
8.3.2 Open Architecture Tactical Wireless Model ICDs 216
8.4 The Tactical Edge 219
8.4.1 Tactical Edge Definition 219
8.4.2 Tactical Edge Analysis 220
8.5 Historical Perspective 222
Bibliography 224
9 Open Architecture Details 225
9.1 The Plain Text IP Layer and the Tactical Edge 225
9.2 Measurement Based Resource Management 227
9.2.1 Advantages and Challenges of MBRM 228
9.2.2 Congestion Severity Level 229
9.2.3 Markov Chain Representation of MBAC 231
9.2.4 Regulating the Flow of Traffic between Two Nodes 233
9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233
9.2.6 Packet Loss from the Physical Layer 234
9.3 ICD I: Plain Text IP Layer to HAIPE 238
9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239
9.4.1 TCP Proxy over HAIPE 239
9.4.2 VoIP Proxy over HAIPE 241
9.4.3 Video Proxy over HAIPE 247
9.4.4 RSVP Proxy over HAIPE 248
9.4.5 Multicast Proxy over HAIPE 252
9.5 ICD X Cross Layer Signaling across the HAIPE 255
9.6 Concluding Remarks 258
9.7 Historical Perspective 258
Bibliography 259
10 Bringing Commercial Cellular Capabilities to Tactical Networks 261
10.1 Tactical User Expectations 262
10.2 3G/4G/LTE Technologies within the War Theater 264
10.3 The Tactical Cellular Gateway 265
10.4 Deployment Use Cases 267
10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW)
Radio 268
10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269
10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271
10.5 Concluding Remarks 272
Bibliography 273
11 Network Management Challenges in Tactical Networks 275
11.1 Use of Policy Based Network Management and Gaming Theory in Tactical
Networks 275
11.2 Challenges Facing Joint Forces Interoperability 277
11.3 Joint Network Management Architectural Approach 277
11.3.1 Assumptions and Concepts for Operations (ConOps) 279
11.3.2 The Role of Gateway Nodes 281
11.3.3 Abstracting Information 282
11.3.4 Creating Path Information 283
11.3.5 Sequence Diagram 285
11.4 Conflict Resolution for Shared Resources 286
11.4.1 Tactical Network Hierarchy 287
11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287
11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288
11.4.4 NCW Resource Attributes 289
11.5 Concluding Remarks 290
Bibliography 291
Index 293
About the Author xi
Foreword xiii
Preface xv
List of Acronyms xvii
Part I Theoretical Basis
1 Introduction 3
1.1 The OSI Model 4
1.2 From Network Layer to IP Layer 6
1.3 Pitfall of the OSI Model 7
1.4 Tactical Networks Layers 9
1.5 Historical Perspective 10
Bibliography 11
2 The Physical Layer 13
2.1 Modulation 13
2.1.1 Signal-in-Space (SiS) 16
2.2 Signal Detection 22
2.2.1 Signal Detection in Two-Dimensional Space 24
2.2.2 Multidimensional Constellations for AWGN 28
2.3 Non-Coherent Demodulation 29
2.4 Signal Fading 29
2.5 Power Spectrum 31
2.6 Spread Spectrum Modulation 34
2.6.1 Direct Sequence Spread Spectrum 35
2.6.2 Frequency Hopping Spread Spectrum 38
2.7 Concluding Remarks 40
2.7.1 What Happens Before Modulation and After Demodulation? 40
2.7.2 Historical Perspective 40
Bibliography 41
3 The DLL and Information Theory in Tactical Networks 43
3.1 Information Theory and Channel Capacity 43
3.1.1 Uncertainty and Information 45
3.1.2 Entropy 46
3.1.3 Coding for a Discrete Memoryless Source 48
3.1.4 Mutual Information and Discrete Channels 50
3.1.5 The Binary Symmetric Channel (BSC) Model 53
3.1.6 Capacity of a Discrete Channel 54
3.2 Channel Coding, Error Detection, and Error Correction 57
3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58
3.2.2 Overview of Linear Block Codes 60
3.2.3 Convolutional Codes 62
3.2.4 Concatenated Coding and Interleaving 64
3.2.5 Network Coding versus Transport Layer Packet
Erasure Coding 65
3.3 Concluding Remarks 67
3.3.1 The Role of Information Theory and Coding in Tactical Wireless
Communications and Networking 67 3.3.2 Historical Perspective 68
Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69
3.A.1 The Utilized RS Code 69
3.A.2 Packet Erasure Analysis 70
3.A.3 Imposed Tactical Requirements 77
Bibliography 80
4 MAC and Network Layers in Tactical Networks 83
4.1 MAC Layer and Multiple Access Techniques 83
4.2 Queuing Theory 87
4.2.1 Statistical Multiplexing of Packets 87
4.2.2 Queuing Models 92
4.3 Concluding Remarks 106
4.3.1 How Congestion Happens in Tactical Wireless Networks 106
4.3.2 Historical Perspective 107
4.3.3 Remarks Regarding the First Part of the Book 108
Bibliography 110
Part II The Evolution Of Tactical Radios
5 Non-IP Tactical Radios and the Move toward IP 113
5.1 Multistep Evolution to the Global Information Grid 113
5.2 Link-16 Waveform 114
5.2.1 Link-16 Messages 119
5.2.2 Link Layer Operations of Link-16 120
5.2.3 JTIDS/LINK-16 Modulation and Coding 120
5.2.4 Enhancements to Link-16 126
5.2.5 Concluding Remarks on Link-16 Waveform 129
5.3 EPLRS Waveform 130
5.4 SINCGARS Waveform 131
5.5 Tactical Internet (TI) 131
5.6 IP Gateways 136
5.6.1 Throughput Efficiency 136
5.6.2 End-to-End Packet Loss 137
5.7 Concluding Remarks 137
5.7.1 What Comes after the GIG? 137
5.7.2 Historical Perspective 137
Bibliography 138
6 IP-Based Tactical Waveforms and the GIG 141
6.1 Tactical GIG Notional Architecture 141
6.2 Tactical GIG Waveforms 144
6.2.1 Wide-Area Network Waveform (WNW) 144
6.2.2 Soldier Radio Waveform (SRW) 163
6.2.3 High-Band Networking Waveform (HNW) 164
6.2.4 Network Centric Waveform (NCW) 165
6.3 The Role of Commercial Satellite in the Tactical GIG 166
6.4 Satellite Delay Analysis 166
6.5 Networking at the Tactical GIG 169
6.6 Historical Perspective 170
Bibliography 173
7 Cognitive Radios 177
7.1 Cognitive Radios and Spectrum Regulations 177
7.2 Conceptualizing Cognitive Radios 180
7.2.1 Cognitive Radio Setting (CRS) Parameters 180
7.2.2 The Cognitive Engine 181
7.3 Cognitive Radios in Tactical Environments 183
7.4 Software Communications Architecture (SCA) 184
7.4.1 The SCA Core Framework 185
7.4.2 SCA Definitions 185
7.4.3 SCA Components 186
7.4.4 SCA and Security Architecture 188
7.5 Spectrum Sensing 190
7.5.1 Multidimensional Spectrum Awareness 190
7.5.2 Complexity of Spectrum Sensing 193
7.5.3 Implementation of Spectrum Sensing 195
7.5.4 Cooperative Spectrum Sensing 199
7.5.5 Spectrum Sensing in Current Wireless Standards 200
7.6 Security in Cognitive Radios 201
7.7 Concluding Remarks 201
7.7.1 Development of Cognitive Radios 201
7.7.2 Modeling and Simulation of Cognitive Radios 202
7.7.3 Historical Perspective 202
Bibliography 202
Part III The Open Architecture Model
8 Open Architecture in Tactical Networks 207
8.1 Commercial Cellular Wireless Open Architecture Model 208
8.2 Tactical Wireless Open Architecture Model 210
8.3 Open Architecture Tactical Protocol Stack Model 211
8.3.1 Tactical Wireless Open Architecture Model Entities 213
8.3.2 Open Architecture Tactical Wireless Model ICDs 216
8.4 The Tactical Edge 219
8.4.1 Tactical Edge Definition 219
8.4.2 Tactical Edge Analysis 220
8.5 Historical Perspective 222
Bibliography 224
9 Open Architecture Details 225
9.1 The Plain Text IP Layer and the Tactical Edge 225
9.2 Measurement Based Resource Management 227
9.2.1 Advantages and Challenges of MBRM 228
9.2.2 Congestion Severity Level 229
9.2.3 Markov Chain Representation of MBAC 231
9.2.4 Regulating the Flow of Traffic between Two Nodes 233
9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233
9.2.6 Packet Loss from the Physical Layer 234
9.3 ICD I: Plain Text IP Layer to HAIPE 238
9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239
9.4.1 TCP Proxy over HAIPE 239
9.4.2 VoIP Proxy over HAIPE 241
9.4.3 Video Proxy over HAIPE 247
9.4.4 RSVP Proxy over HAIPE 248
9.4.5 Multicast Proxy over HAIPE 252
9.5 ICD X Cross Layer Signaling across the HAIPE 255
9.6 Concluding Remarks 258
9.7 Historical Perspective 258
Bibliography 259
10 Bringing Commercial Cellular Capabilities to Tactical Networks 261
10.1 Tactical User Expectations 262
10.2 3G/4G/LTE Technologies within the War Theater 264
10.3 The Tactical Cellular Gateway 265
10.4 Deployment Use Cases 267
10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW)
Radio 268
10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269
10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271
10.5 Concluding Remarks 272
Bibliography 273
11 Network Management Challenges in Tactical Networks 275
11.1 Use of Policy Based Network Management and Gaming Theory in Tactical
Networks 275
11.2 Challenges Facing Joint Forces Interoperability 277
11.3 Joint Network Management Architectural Approach 277
11.3.1 Assumptions and Concepts for Operations (ConOps) 279
11.3.2 The Role of Gateway Nodes 281
11.3.3 Abstracting Information 282
11.3.4 Creating Path Information 283
11.3.5 Sequence Diagram 285
11.4 Conflict Resolution for Shared Resources 286
11.4.1 Tactical Network Hierarchy 287
11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287
11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288
11.4.4 NCW Resource Attributes 289
11.5 Concluding Remarks 290
Bibliography 291
Index 293
Foreword xiii
Preface xv
List of Acronyms xvii
Part I Theoretical Basis
1 Introduction 3
1.1 The OSI Model 4
1.2 From Network Layer to IP Layer 6
1.3 Pitfall of the OSI Model 7
1.4 Tactical Networks Layers 9
1.5 Historical Perspective 10
Bibliography 11
2 The Physical Layer 13
2.1 Modulation 13
2.1.1 Signal-in-Space (SiS) 16
2.2 Signal Detection 22
2.2.1 Signal Detection in Two-Dimensional Space 24
2.2.2 Multidimensional Constellations for AWGN 28
2.3 Non-Coherent Demodulation 29
2.4 Signal Fading 29
2.5 Power Spectrum 31
2.6 Spread Spectrum Modulation 34
2.6.1 Direct Sequence Spread Spectrum 35
2.6.2 Frequency Hopping Spread Spectrum 38
2.7 Concluding Remarks 40
2.7.1 What Happens Before Modulation and After Demodulation? 40
2.7.2 Historical Perspective 40
Bibliography 41
3 The DLL and Information Theory in Tactical Networks 43
3.1 Information Theory and Channel Capacity 43
3.1.1 Uncertainty and Information 45
3.1.2 Entropy 46
3.1.3 Coding for a Discrete Memoryless Source 48
3.1.4 Mutual Information and Discrete Channels 50
3.1.5 The Binary Symmetric Channel (BSC) Model 53
3.1.6 Capacity of a Discrete Channel 54
3.2 Channel Coding, Error Detection, and Error Correction 57
3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58
3.2.2 Overview of Linear Block Codes 60
3.2.3 Convolutional Codes 62
3.2.4 Concatenated Coding and Interleaving 64
3.2.5 Network Coding versus Transport Layer Packet
Erasure Coding 65
3.3 Concluding Remarks 67
3.3.1 The Role of Information Theory and Coding in Tactical Wireless
Communications and Networking 67 3.3.2 Historical Perspective 68
Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69
3.A.1 The Utilized RS Code 69
3.A.2 Packet Erasure Analysis 70
3.A.3 Imposed Tactical Requirements 77
Bibliography 80
4 MAC and Network Layers in Tactical Networks 83
4.1 MAC Layer and Multiple Access Techniques 83
4.2 Queuing Theory 87
4.2.1 Statistical Multiplexing of Packets 87
4.2.2 Queuing Models 92
4.3 Concluding Remarks 106
4.3.1 How Congestion Happens in Tactical Wireless Networks 106
4.3.2 Historical Perspective 107
4.3.3 Remarks Regarding the First Part of the Book 108
Bibliography 110
Part II The Evolution Of Tactical Radios
5 Non-IP Tactical Radios and the Move toward IP 113
5.1 Multistep Evolution to the Global Information Grid 113
5.2 Link-16 Waveform 114
5.2.1 Link-16 Messages 119
5.2.2 Link Layer Operations of Link-16 120
5.2.3 JTIDS/LINK-16 Modulation and Coding 120
5.2.4 Enhancements to Link-16 126
5.2.5 Concluding Remarks on Link-16 Waveform 129
5.3 EPLRS Waveform 130
5.4 SINCGARS Waveform 131
5.5 Tactical Internet (TI) 131
5.6 IP Gateways 136
5.6.1 Throughput Efficiency 136
5.6.2 End-to-End Packet Loss 137
5.7 Concluding Remarks 137
5.7.1 What Comes after the GIG? 137
5.7.2 Historical Perspective 137
Bibliography 138
6 IP-Based Tactical Waveforms and the GIG 141
6.1 Tactical GIG Notional Architecture 141
6.2 Tactical GIG Waveforms 144
6.2.1 Wide-Area Network Waveform (WNW) 144
6.2.2 Soldier Radio Waveform (SRW) 163
6.2.3 High-Band Networking Waveform (HNW) 164
6.2.4 Network Centric Waveform (NCW) 165
6.3 The Role of Commercial Satellite in the Tactical GIG 166
6.4 Satellite Delay Analysis 166
6.5 Networking at the Tactical GIG 169
6.6 Historical Perspective 170
Bibliography 173
7 Cognitive Radios 177
7.1 Cognitive Radios and Spectrum Regulations 177
7.2 Conceptualizing Cognitive Radios 180
7.2.1 Cognitive Radio Setting (CRS) Parameters 180
7.2.2 The Cognitive Engine 181
7.3 Cognitive Radios in Tactical Environments 183
7.4 Software Communications Architecture (SCA) 184
7.4.1 The SCA Core Framework 185
7.4.2 SCA Definitions 185
7.4.3 SCA Components 186
7.4.4 SCA and Security Architecture 188
7.5 Spectrum Sensing 190
7.5.1 Multidimensional Spectrum Awareness 190
7.5.2 Complexity of Spectrum Sensing 193
7.5.3 Implementation of Spectrum Sensing 195
7.5.4 Cooperative Spectrum Sensing 199
7.5.5 Spectrum Sensing in Current Wireless Standards 200
7.6 Security in Cognitive Radios 201
7.7 Concluding Remarks 201
7.7.1 Development of Cognitive Radios 201
7.7.2 Modeling and Simulation of Cognitive Radios 202
7.7.3 Historical Perspective 202
Bibliography 202
Part III The Open Architecture Model
8 Open Architecture in Tactical Networks 207
8.1 Commercial Cellular Wireless Open Architecture Model 208
8.2 Tactical Wireless Open Architecture Model 210
8.3 Open Architecture Tactical Protocol Stack Model 211
8.3.1 Tactical Wireless Open Architecture Model Entities 213
8.3.2 Open Architecture Tactical Wireless Model ICDs 216
8.4 The Tactical Edge 219
8.4.1 Tactical Edge Definition 219
8.4.2 Tactical Edge Analysis 220
8.5 Historical Perspective 222
Bibliography 224
9 Open Architecture Details 225
9.1 The Plain Text IP Layer and the Tactical Edge 225
9.2 Measurement Based Resource Management 227
9.2.1 Advantages and Challenges of MBRM 228
9.2.2 Congestion Severity Level 229
9.2.3 Markov Chain Representation of MBAC 231
9.2.4 Regulating the Flow of Traffic between Two Nodes 233
9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233
9.2.6 Packet Loss from the Physical Layer 234
9.3 ICD I: Plain Text IP Layer to HAIPE 238
9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239
9.4.1 TCP Proxy over HAIPE 239
9.4.2 VoIP Proxy over HAIPE 241
9.4.3 Video Proxy over HAIPE 247
9.4.4 RSVP Proxy over HAIPE 248
9.4.5 Multicast Proxy over HAIPE 252
9.5 ICD X Cross Layer Signaling across the HAIPE 255
9.6 Concluding Remarks 258
9.7 Historical Perspective 258
Bibliography 259
10 Bringing Commercial Cellular Capabilities to Tactical Networks 261
10.1 Tactical User Expectations 262
10.2 3G/4G/LTE Technologies within the War Theater 264
10.3 The Tactical Cellular Gateway 265
10.4 Deployment Use Cases 267
10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW)
Radio 268
10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269
10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271
10.5 Concluding Remarks 272
Bibliography 273
11 Network Management Challenges in Tactical Networks 275
11.1 Use of Policy Based Network Management and Gaming Theory in Tactical
Networks 275
11.2 Challenges Facing Joint Forces Interoperability 277
11.3 Joint Network Management Architectural Approach 277
11.3.1 Assumptions and Concepts for Operations (ConOps) 279
11.3.2 The Role of Gateway Nodes 281
11.3.3 Abstracting Information 282
11.3.4 Creating Path Information 283
11.3.5 Sequence Diagram 285
11.4 Conflict Resolution for Shared Resources 286
11.4.1 Tactical Network Hierarchy 287
11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287
11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288
11.4.4 NCW Resource Attributes 289
11.5 Concluding Remarks 290
Bibliography 291
Index 293