{"title":"A Survey of Network Reliability Modeling and Calculations","authors":"Y. Lam, V. Li","doi":"10.1109/MILCOM.1986.4805649","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805649","url":null,"abstract":"A brief survey of the subject of network reliability is presented. Network reliability is the study of network performance when components of the network are subject to failures. The problem can be divided into two main parts: the modeling of component failures and the corresponding reliability calculations. In the modeling of component failures, the assumption that component failures are statistically independent is often made to simplify the problem. But this assumption is unrealistic in most real-world situations. In this survey, special attention is given to recent developments in modeling statistically dependent failures of network components. For reliability calculations, only analytical techniques are considered, and simulations are excluded. A brief classification of existing techniques is given. Since most network reliability problems are NP-hard, exact techniques to calculate network reliability can only handle problems of limited sizes, and therefore approximate techniques are of practical importance. Both exact and approximate techniques are covered in this survey.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Experiences in the Development of SHINCOM, a Military Communication System","authors":"Graham C. Ginsberg, Bernard Vince","doi":"10.1109/MILCOM.1986.4805752","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805752","url":null,"abstract":"In February 1982, Leigh Instruments was awarded a contract by the Canadian Department of National Defence for the development of the SHINCOM* system, a SHipboard INtegrated COMmunication system. By the summer of that year, the software program had evolved from a relatively straightforward subcontract management function, to a major software development program. At short notice we were required to pull together a relatively large software team and put tools in place to enable us to meet tight schedule and budget constraints. Could we do it? Did we have the tools, or could we acquire them? Did we have the people or did we have to recruit them? The technical challenge of developing a complex communications system was a major challenge in its own right. Only good people, good luck, and strict adherence to standards saw us through. What did we do that worked, what did not, and what would we do differently if we had to do it again? This paper attempts to answer some of those questions.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NTDS Network Controller (N2C) - Linking NTDS with MILSTAR","authors":"Bruce Nagy","doi":"10.1109/MILCOM.1986.4805768","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805768","url":null,"abstract":"Due to the rapid advances in enemy strike capability, the command, control, and communications theater becomes a greater challenge to the decision maker's ability to make the correct timely decision to defeat the threat. Communication advancements must meet this challenge by providing confidence in the quality, reliability, and timeliness of the data transmitted. Advanced developments in the Tactical Digital Information Link (TADIL) standards, TSEC/KG-84A, and an Extremely High Frequency (EHF) satellite are anticipated to support the desired quality and reliability requirements for military communications. Yet integration of these developments in providing the decision maker with correct timely data has not been identified. A design approach in interfacing with the Naval Tactical Digital System (NTDS), TSEC/KG-84A, and EHF satellite, while providing timely receipt of TADIL messages, is being introduced by the NTDS Network Controller (N2C).","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Predictive Transform Coder for Images","authors":"E. Feria, J. Barba, N. Scheinberg","doi":"10.1109/MILCOM.1986.4805877","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805877","url":null,"abstract":"In this paper a simple predictive transform coder is proposed for the processing of images. The coder is intrafield and predicts the coefficients of a two-dimensional Hadamard transform based on the past pels immediately surrounding the transformed block. The cost and performance of the new coder compares well with that of other techniques. For example, a predictive transform coder acting on 2×2 picture blocks and operating at an average bit rate of 2 bits/pel is found to yield significantly better picture quality than that derived from a 2×2 or even a 4×4 Hadamard coder. Also, just as important, the physical implementation of this coder requires from two to three times the number of on-line operations required by a 2×2 Hadamard coder and 1/4 to 1/3 that of a 4×4 Hadamard coder.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation for the Joint Interoperability of Tactical Command and Control Systems (JINTACCS)","authors":"R. Stein","doi":"10.1109/MILCOM.1986.4805754","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805754","url":null,"abstract":"The Joint Interoperability of Tactical Command and Control Systems (JINTACCS) is a program to increase compatibility and interoperability among the command and control (C2) systems of the services and national agencies. The result of this program has been the development of 132 highly structured C2 message text formats (MTF's). The Joint Chiefs of Staff has directed that, beginning in September 1986, these MTF's be implemented by the Service/Agencies for the command and control of joint operations. Because of the complexity and rigidity of the JINTACCS MTF's, automatic data processing (ADP) is being used to assist with the processing of these messages. Up to the present time, ADP has been used primarily for the drafting or writing of the MTF's; however, applications also exist for processing incoming messages. This paper discusses the present and potential application of ADP to handle JINTACCS MTF's and outlines portions of an algorithm to process incoming messages.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convolutional Code Performance in Impulsive or Burst Noise Channels","authors":"J. Modestino, K. Matis, L. Bechtel","doi":"10.1109/MILCOM.1986.4805694","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805694","url":null,"abstract":"We consider the performance of short constraint-length convolutional codes in conjunction with coherent BPSK modulation in impulsive or burst noise channels when an imperfect erasure mechanism is used to exorcise symbols contaminated by noise hits. The erasure mechanism is a simple holepuncher operating on the sampled matched filter outputs and is characterized by a fixed false alarm probability, PF, and a miss probability, PM. This scheme is representative of a large number of erasure declaration strategies. Some general conclusions are drawn on the basis of cutoff rate arguments under an idealized channel modeling assumption. For short constraint-length convolutional codes we provide tight upper bounds on bit error probability performance under the same idealized channel modeling assumptions. These bounds compare favorably with simulation results for both randomly occurring and periodic noise hits. Departures from idealized channel modeling assumptions are investigated through simulation. Results indicate an important distinction between the case of random and periodic noise hits and has implications for the use of interleaving an impulsive or burst noise channels.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Effects of Interference through Coding and Interleaving","authors":"Wai-hung Ng, Ning-Ning Hsieh","doi":"10.1109/MILCOM.1986.4805742","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805742","url":null,"abstract":"Based on the fact that performance of random error correction decoding is insensitive to code symbols erased before its decoding process, a new approach to mitigate the effects of interference is derived. This approach consists of three basic functions: it modifies conventional interleaving, it detects and deletes burst errors, and it corrects random errors. Therefore, this approach minimizes effects of jamming, antenna switching, and nuclear fading. We shall first describe a tactic of integrating coding and interleaving. Then, derivation and application of a special rate-1/4 convolutional code are illustrated. Finally, some preliminary computer simulation results on a rate-1/2 code are utilized to verify the effectiveness of the proposed technique.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Design Method for VLSI Signal Processors","authors":"R. Haggarty, Bruce L. Johnson, E. Palo","doi":"10.1109/MILCOM.1986.4805858","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805858","url":null,"abstract":"This paper presents a new method of designing digital signal processors for very large scale integrated (VLSI) circuit implementation with residue number systems (RNS), as opposed to the binary number systems traditionally used. In an RNS, a number is represented by its residues, modulo a set of relatively prime integers. The basic operations of modulo addition and multiplication are simpler in RNS because they can be executed independently in each residue class. Consequently, a desired linear function can be executed in a set of parallel channels on a chip, where each channel performs the same calculation modulo the integer used in that channel. Complexity is thus reduced by two mechanisms. Interconnections between parallel channels are eliminated and all operations are performed modulo the small integer used in each parallel channel of the RNS structure. The square law of circuit complexity applied to this set of small integers results in small, simple circuits. Speed of computation is increased because carry propagation delays are avoided. Further, the RNS design is combined with systolic arrays in such a way that the desired function becomes a parallel set of nearest neighbor-connected identical cells, each of which is minimally complex. The regularity minimizes interconnections and design time -- only one master VLSI macrocell that can be optimized and replicated under computer-aided design (CAD) control is needed.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LPI Techniques in the Underwater Acoustic Channel","authors":"J. H. Park","doi":"10.1109/MILCOM.1986.4805687","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805687","url":null,"abstract":"The characteristics of the underwater acoustic channel present special problems in the design of covert communication systems. In this paper we consider communications at relatively short distances, less than 20,000 yds., and well below the water surface. Covertness is measured in terms of the parameter d associated with the interceptor receiver operating characteristic and curves are given that relate d to the distance ratio between intercepter and receiver. The results clearly show the dominance of the channel characteristic over spreading techniques. Systems can be easily made very covert if the interceptor is further from the source than the receiver but are almost impossible if the interceptor is inside the receiver.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Burst Switching - A New Tactical Switching Concept","authors":"E. Haselton","doi":"10.1109/MILCOM.1986.4805869","DOIUrl":"https://doi.org/10.1109/MILCOM.1986.4805869","url":null,"abstract":"GTE Laboratories has researched and developed the Burst Switching concept for the past six years. During the last two years, it has become increasingly evident that the switching principles in the Burst structure apply directly to the military environment. The military forces need increased mobility, widely dispersed and diminished targets of opportunity presented to the enemy, decreased switch sizes and consumed power, and a modular structure to provide any switch capacity by simply stacking and interconnecting the digital network. This paper describes the Burst Switching promise to meet the need of the tactical forces for the 21st century.","PeriodicalId":126184,"journal":{"name":"MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}