Tactical wireless communications and networks : design concepts and challenges / / George F. Elmasry |
Autore | Elmasry George F. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Chichester, West Sussex : , : John Wiley & Sons, Ltd., , 2012 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 623.7/34 |
Soggetto topico |
Communications, Military
Wireless communication systems |
ISBN |
1-118-44598-8
1-118-44599-6 1-283-91734-3 1-118-44601-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- About the Author xi -- Foreword xiii -- Preface xv -- List of Acronyms xvii -- Part I THEORETICAL BASIS -- 1 Introduction 3 -- 1.1 The OSI Model 4 -- 1.2 From Network Layer to IP Layer 6 -- 1.3 Pitfall of the OSI Model 7 -- 1.4 Tactical Networks Layers 9 -- 1.5 Historical Perspective 10 -- Bibliography 11 -- 2 The Physical Layer 13 -- 2.1 Modulation 13 -- 2.1.1 Signal-in-Space (SiS) 16 -- 2.2 Signal Detection 22 -- 2.2.1 Signal Detection in Two-Dimensional Space 24 -- 2.2.2 Multidimensional Constellations for AWGN 28 -- 2.3 Non-Coherent Demodulation 29 -- 2.4 Signal Fading 29 -- 2.5 Power Spectrum 31 -- 2.6 Spread Spectrum Modulation 34 -- 2.6.1 Direct Sequence Spread Spectrum 35 -- 2.6.2 Frequency Hopping Spread Spectrum 38 -- 2.7 Concluding Remarks 40 -- 2.7.1 What Happens Before Modulation and After Demodulation? 40 -- 2.7.2 Historical Perspective 40 -- Bibliography 41 -- 3 The DLL and Information Theory in Tactical Networks 43 -- 3.1 Information Theory and Channel Capacity 43 -- 3.1.1 Uncertainty and Information 45 -- 3.1.2 Entropy 46 -- 3.1.3 Coding for a Discrete Memoryless Source 48 -- 3.1.4 Mutual Information and Discrete Channels 50 -- 3.1.5 The Binary Symmetric Channel (BSC) Model 53 -- 3.1.6 Capacity of a Discrete Channel 54 -- 3.2 Channel Coding, Error Detection, and Error Correction 57 -- 3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58 -- 3.2.2 Overview of Linear Block Codes 60 -- 3.2.3 Convolutional Codes 62 -- 3.2.4 Concatenated Coding and Interleaving 64 -- 3.2.5 Network Coding versus Transport Layer Packet Erasure Coding 65 -- 3.3 Concluding Remarks 67 -- 3.3.1 The Role of Information Theory and Coding in Tactical Wireless Communications and Networking 67 -- 3.3.2 Historical Perspective 68 -- Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69 -- 3.A.1 The Utilized RS Code 69 -- 3.A.2 Packet Erasure Analysis 70 -- 3.A.3 Imposed Tactical Requirements 77 -- Bibliography 80 -- 4 MAC and Network Layers in Tactical Networks 83.
4.1 MAC Layer and Multiple Access Techniques 83 -- 4.2 Queuing Theory 87 -- 4.2.1 Statistical Multiplexing of Packets 87 -- 4.2.2 Queuing Models 92 -- 4.3 Concluding Remarks 106 -- 4.3.1 How Congestion Happens in Tactical Wireless Networks 106 -- 4.3.2 Historical Perspective 107 -- 4.3.3 Remarks Regarding the First Part of the Book 108 -- Bibliography 110 -- Part II THE EVOLUTION OF TACTICAL RADIOS -- 5 Non-IP Tactical Radios and the Move toward IP 113 -- 5.1 Multistep Evolution to the Global Information Grid 113 -- 5.2 Link-16 Waveform 114 -- 5.2.1 Link-16 Messages 119 -- 5.2.2 Link Layer Operations of Link-16 120 -- 5.2.3 JTIDS/LINK-16 Modulation and Coding 120 -- 5.2.4 Enhancements to Link-16 126 -- 5.2.5 Concluding Remarks on Link-16 Waveform 129 -- 5.3 EPLRS Waveform 130 -- 5.4 SINCGARS Waveform 131 -- 5.5 Tactical Internet (TI) 131 -- 5.6 IP Gateways 136 -- 5.6.1 Throughput Efficiency 136 -- 5.6.2 End-to-End Packet Loss 137 -- 5.7 Concluding Remarks 137 -- 5.7.1 What Comes after the GIG? 137 -- 5.7.2 Historical Perspective 137 -- Bibliography 138 -- 6 IP-Based Tactical Waveforms and the GIG 141 -- 6.1 Tactical GIG Notional Architecture 141 -- 6.2 Tactical GIG Waveforms 144 -- 6.2.1 Wide-Area Network Waveform (WNW) 144 -- 6.2.2 Soldier Radio Waveform (SRW) 163 -- 6.2.3 High-Band Networking Waveform (HNW) 164 -- 6.2.4 Network Centric Waveform (NCW) 165 -- 6.3 The Role of Commercial Satellite in the Tactical GIG 166 -- 6.4 Satellite Delay Analysis 166 -- 6.5 Networking at the Tactical GIG 169 -- 6.6 Historical Perspective 170 -- Bibliography 173 -- 7 Cognitive Radios 177 -- 7.1 Cognitive Radios and Spectrum Regulations 177 -- 7.2 Conceptualizing Cognitive Radios 180 -- 7.2.1 Cognitive Radio Setting (CRS) Parameters 180 -- 7.2.2 The Cognitive Engine 181 -- 7.3 Cognitive Radios in Tactical Environments 183 -- 7.4 Software Communications Architecture (SCA) 184 -- 7.4.1 The SCA Core Framework 185 -- 7.4.2 SCA Definitions 185 -- 7.4.3 SCA Components 186 -- 7.4.4 SCA and Security Architecture 188. 7.5 Spectrum Sensing 190 -- 7.5.1 Multidimensional Spectrum Awareness 190 -- 7.5.2 Complexity of Spectrum Sensing 193 -- 7.5.3 Implementation of Spectrum Sensing 195 -- 7.5.4 Cooperative Spectrum Sensing 199 -- 7.5.5 Spectrum Sensing in Current Wireless Standards 200 -- 7.6 Security in Cognitive Radios 201 -- 7.7 Concluding Remarks 201 -- 7.7.1 Development of Cognitive Radios 201 -- 7.7.2 Modeling and Simulation of Cognitive Radios 202 -- 7.7.3 Historical Perspective 202 -- Bibliography 202 -- Part III THE OPEN ARCHITECTURE MODEL -- 8 Open Architecture in Tactical Networks 207 -- 8.1 Commercial Cellular Wireless Open Architecture Model 208 -- 8.2 Tactical Wireless Open Architecture Model 210 -- 8.3 Open Architecture Tactical Protocol Stack Model 211 -- 8.3.1 Tactical Wireless Open Architecture Model Entities 213 -- 8.3.2 Open Architecture Tactical Wireless Model ICDs 216 -- 8.4 The Tactical Edge 219 -- 8.4.1 Tactical Edge Definition 219 -- 8.4.2 Tactical Edge Analysis 220 -- 8.5 Historical Perspective 222 -- Bibliography 224 -- 9 Open Architecture Details 225 -- 9.1 The Plain Text IP Layer and the Tactical Edge 225 -- 9.2 Measurement Based Resource Management 227 -- 9.2.1 Advantages and Challenges of MBRM 228 -- 9.2.2 Congestion Severity Level 229 -- 9.2.3 Markov Chain Representation of MBAC 231 -- 9.2.4 Regulating the Flow of Traffic between Two Nodes 233 -- 9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233 -- 9.2.6 Packet Loss from the Physical Layer 234 -- 9.3 ICD I: Plain Text IP Layer to HAIPE 238 -- 9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239 -- 9.4.1 TCP Proxy over HAIPE 239 -- 9.4.2 VoIP Proxy over HAIPE 241 -- 9.4.3 Video Proxy over HAIPE 247 -- 9.4.4 RSVP Proxy over HAIPE 248 -- 9.4.5 Multicast Proxy over HAIPE 252 -- 9.5 ICD X Cross Layer Signaling across the HAIPE 255 -- 9.6 Concluding Remarks 258 -- 9.7 Historical Perspective 258 -- Bibliography 259 -- 10 Bringing Commercial Cellular Capabilities to Tactical Networks 261 -- 10.1 Tactical User Expectations 262. 10.2 3G/4G/LTE Technologies within the War Theater 264 -- 10.3 The Tactical Cellular Gateway 265 -- 10.4 Deployment Use Cases 267 -- 10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW) Radio 268 -- 10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269 -- 10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271 -- 10.5 Concluding Remarks 272 -- Bibliography 273 -- 11 Network Management Challenges in Tactical Networks 275 -- 11.1 Use of Policy Based Network Management and Gaming Theory in Tactical Networks 275 -- 11.2 Challenges Facing Joint Forces Interoperability 277 -- 11.3 Joint Network Management Architectural Approach 277 -- 11.3.1 Assumptions and Concepts for Operations (ConOps) 279 -- 11.3.2 The Role of Gateway Nodes 281 -- 11.3.3 Abstracting Information 282 -- 11.3.4 Creating Path Information 283 -- 11.3.5 Sequence Diagram 285 -- 11.4 Conflict Resolution for Shared Resources 286 -- 11.4.1 Tactical Network Hierarchy 287 -- 11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287 -- 11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288 -- 11.4.4 NCW Resource Attributes 289 -- 11.5 Concluding Remarks 290 -- Bibliography 291 -- Index 293. |
Record Nr. | UNINA-9910141534603321 |
Elmasry George F. | ||
Chichester, West Sussex : , : John Wiley & Sons, Ltd., , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Tactical wireless communications and networks : design concepts and challenges / / George F. Elmasry |
Autore | Elmasry George F. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Chichester, West Sussex : , : John Wiley & Sons, Ltd., , 2012 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 623.7/34 |
Soggetto topico |
Communications, Military
Wireless communication systems |
ISBN |
1-118-44598-8
1-118-44599-6 1-283-91734-3 1-118-44601-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- About the Author xi -- Foreword xiii -- Preface xv -- List of Acronyms xvii -- Part I THEORETICAL BASIS -- 1 Introduction 3 -- 1.1 The OSI Model 4 -- 1.2 From Network Layer to IP Layer 6 -- 1.3 Pitfall of the OSI Model 7 -- 1.4 Tactical Networks Layers 9 -- 1.5 Historical Perspective 10 -- Bibliography 11 -- 2 The Physical Layer 13 -- 2.1 Modulation 13 -- 2.1.1 Signal-in-Space (SiS) 16 -- 2.2 Signal Detection 22 -- 2.2.1 Signal Detection in Two-Dimensional Space 24 -- 2.2.2 Multidimensional Constellations for AWGN 28 -- 2.3 Non-Coherent Demodulation 29 -- 2.4 Signal Fading 29 -- 2.5 Power Spectrum 31 -- 2.6 Spread Spectrum Modulation 34 -- 2.6.1 Direct Sequence Spread Spectrum 35 -- 2.6.2 Frequency Hopping Spread Spectrum 38 -- 2.7 Concluding Remarks 40 -- 2.7.1 What Happens Before Modulation and After Demodulation? 40 -- 2.7.2 Historical Perspective 40 -- Bibliography 41 -- 3 The DLL and Information Theory in Tactical Networks 43 -- 3.1 Information Theory and Channel Capacity 43 -- 3.1.1 Uncertainty and Information 45 -- 3.1.2 Entropy 46 -- 3.1.3 Coding for a Discrete Memoryless Source 48 -- 3.1.4 Mutual Information and Discrete Channels 50 -- 3.1.5 The Binary Symmetric Channel (BSC) Model 53 -- 3.1.6 Capacity of a Discrete Channel 54 -- 3.2 Channel Coding, Error Detection, and Error Correction 57 -- 3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58 -- 3.2.2 Overview of Linear Block Codes 60 -- 3.2.3 Convolutional Codes 62 -- 3.2.4 Concatenated Coding and Interleaving 64 -- 3.2.5 Network Coding versus Transport Layer Packet Erasure Coding 65 -- 3.3 Concluding Remarks 67 -- 3.3.1 The Role of Information Theory and Coding in Tactical Wireless Communications and Networking 67 -- 3.3.2 Historical Perspective 68 -- Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69 -- 3.A.1 The Utilized RS Code 69 -- 3.A.2 Packet Erasure Analysis 70 -- 3.A.3 Imposed Tactical Requirements 77 -- Bibliography 80 -- 4 MAC and Network Layers in Tactical Networks 83.
4.1 MAC Layer and Multiple Access Techniques 83 -- 4.2 Queuing Theory 87 -- 4.2.1 Statistical Multiplexing of Packets 87 -- 4.2.2 Queuing Models 92 -- 4.3 Concluding Remarks 106 -- 4.3.1 How Congestion Happens in Tactical Wireless Networks 106 -- 4.3.2 Historical Perspective 107 -- 4.3.3 Remarks Regarding the First Part of the Book 108 -- Bibliography 110 -- Part II THE EVOLUTION OF TACTICAL RADIOS -- 5 Non-IP Tactical Radios and the Move toward IP 113 -- 5.1 Multistep Evolution to the Global Information Grid 113 -- 5.2 Link-16 Waveform 114 -- 5.2.1 Link-16 Messages 119 -- 5.2.2 Link Layer Operations of Link-16 120 -- 5.2.3 JTIDS/LINK-16 Modulation and Coding 120 -- 5.2.4 Enhancements to Link-16 126 -- 5.2.5 Concluding Remarks on Link-16 Waveform 129 -- 5.3 EPLRS Waveform 130 -- 5.4 SINCGARS Waveform 131 -- 5.5 Tactical Internet (TI) 131 -- 5.6 IP Gateways 136 -- 5.6.1 Throughput Efficiency 136 -- 5.6.2 End-to-End Packet Loss 137 -- 5.7 Concluding Remarks 137 -- 5.7.1 What Comes after the GIG? 137 -- 5.7.2 Historical Perspective 137 -- Bibliography 138 -- 6 IP-Based Tactical Waveforms and the GIG 141 -- 6.1 Tactical GIG Notional Architecture 141 -- 6.2 Tactical GIG Waveforms 144 -- 6.2.1 Wide-Area Network Waveform (WNW) 144 -- 6.2.2 Soldier Radio Waveform (SRW) 163 -- 6.2.3 High-Band Networking Waveform (HNW) 164 -- 6.2.4 Network Centric Waveform (NCW) 165 -- 6.3 The Role of Commercial Satellite in the Tactical GIG 166 -- 6.4 Satellite Delay Analysis 166 -- 6.5 Networking at the Tactical GIG 169 -- 6.6 Historical Perspective 170 -- Bibliography 173 -- 7 Cognitive Radios 177 -- 7.1 Cognitive Radios and Spectrum Regulations 177 -- 7.2 Conceptualizing Cognitive Radios 180 -- 7.2.1 Cognitive Radio Setting (CRS) Parameters 180 -- 7.2.2 The Cognitive Engine 181 -- 7.3 Cognitive Radios in Tactical Environments 183 -- 7.4 Software Communications Architecture (SCA) 184 -- 7.4.1 The SCA Core Framework 185 -- 7.4.2 SCA Definitions 185 -- 7.4.3 SCA Components 186 -- 7.4.4 SCA and Security Architecture 188. 7.5 Spectrum Sensing 190 -- 7.5.1 Multidimensional Spectrum Awareness 190 -- 7.5.2 Complexity of Spectrum Sensing 193 -- 7.5.3 Implementation of Spectrum Sensing 195 -- 7.5.4 Cooperative Spectrum Sensing 199 -- 7.5.5 Spectrum Sensing in Current Wireless Standards 200 -- 7.6 Security in Cognitive Radios 201 -- 7.7 Concluding Remarks 201 -- 7.7.1 Development of Cognitive Radios 201 -- 7.7.2 Modeling and Simulation of Cognitive Radios 202 -- 7.7.3 Historical Perspective 202 -- Bibliography 202 -- Part III THE OPEN ARCHITECTURE MODEL -- 8 Open Architecture in Tactical Networks 207 -- 8.1 Commercial Cellular Wireless Open Architecture Model 208 -- 8.2 Tactical Wireless Open Architecture Model 210 -- 8.3 Open Architecture Tactical Protocol Stack Model 211 -- 8.3.1 Tactical Wireless Open Architecture Model Entities 213 -- 8.3.2 Open Architecture Tactical Wireless Model ICDs 216 -- 8.4 The Tactical Edge 219 -- 8.4.1 Tactical Edge Definition 219 -- 8.4.2 Tactical Edge Analysis 220 -- 8.5 Historical Perspective 222 -- Bibliography 224 -- 9 Open Architecture Details 225 -- 9.1 The Plain Text IP Layer and the Tactical Edge 225 -- 9.2 Measurement Based Resource Management 227 -- 9.2.1 Advantages and Challenges of MBRM 228 -- 9.2.2 Congestion Severity Level 229 -- 9.2.3 Markov Chain Representation of MBAC 231 -- 9.2.4 Regulating the Flow of Traffic between Two Nodes 233 -- 9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233 -- 9.2.6 Packet Loss from the Physical Layer 234 -- 9.3 ICD I: Plain Text IP Layer to HAIPE 238 -- 9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239 -- 9.4.1 TCP Proxy over HAIPE 239 -- 9.4.2 VoIP Proxy over HAIPE 241 -- 9.4.3 Video Proxy over HAIPE 247 -- 9.4.4 RSVP Proxy over HAIPE 248 -- 9.4.5 Multicast Proxy over HAIPE 252 -- 9.5 ICD X Cross Layer Signaling across the HAIPE 255 -- 9.6 Concluding Remarks 258 -- 9.7 Historical Perspective 258 -- Bibliography 259 -- 10 Bringing Commercial Cellular Capabilities to Tactical Networks 261 -- 10.1 Tactical User Expectations 262. 10.2 3G/4G/LTE Technologies within the War Theater 264 -- 10.3 The Tactical Cellular Gateway 265 -- 10.4 Deployment Use Cases 267 -- 10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW) Radio 268 -- 10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269 -- 10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271 -- 10.5 Concluding Remarks 272 -- Bibliography 273 -- 11 Network Management Challenges in Tactical Networks 275 -- 11.1 Use of Policy Based Network Management and Gaming Theory in Tactical Networks 275 -- 11.2 Challenges Facing Joint Forces Interoperability 277 -- 11.3 Joint Network Management Architectural Approach 277 -- 11.3.1 Assumptions and Concepts for Operations (ConOps) 279 -- 11.3.2 The Role of Gateway Nodes 281 -- 11.3.3 Abstracting Information 282 -- 11.3.4 Creating Path Information 283 -- 11.3.5 Sequence Diagram 285 -- 11.4 Conflict Resolution for Shared Resources 286 -- 11.4.1 Tactical Network Hierarchy 287 -- 11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287 -- 11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288 -- 11.4.4 NCW Resource Attributes 289 -- 11.5 Concluding Remarks 290 -- Bibliography 291 -- Index 293. |
Record Nr. | UNINA-9910809728603321 |
Elmasry George F. | ||
Chichester, West Sussex : , : John Wiley & Sons, Ltd., , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|