{"title":"Policy-based frequency management","authors":"G. C. Wagner","doi":"10.1109/MILCOM.2005.1605930","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605930","url":null,"abstract":"The Department of Defense, over the next 3 years, is poised to roll out the first generation of future force communications networks. Examples of these networks include the US Army's warfighter information network-tactical (WIN-T), the US Navy's automated digital network system (ADNS), and the joint tactical radio system (JTRS) with its wideband networking waveform (WNW). These networks are characterized by highly mobile nodes that can join and leave ad hoc networks in accordance with the scheme of maneuver for the units involved. This type of network places new demands on the network operations (NetOps) architecture and functionality. Policy based network management (PBNM) offers a wide range of possibilities for solving some of the management challenges associated with these future force networks, and will likely feature in the network operations architectures of many of them. Yet, however sophisticated the network and its corresponding network operations architecture is, it is likely that spectrum availability will play a pivotal role in the total amount of information that can be transported across these networks. Today's spectrum & frequency management tools and techniques may fall short when applied to mobile ad hoc networks, particularly those where policy-based decisions are being applied locally to the mobile node. This paper describes how a policy-based approach to spectrum & frequency management could be used to assist in the management of the spectrum associated with a mobile ad hoc network","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced C2 functionality in urban and other complex terrain","authors":"S. Sokolowski, R.L. Fillter, N. Vo, P. Olson","doi":"10.1109/MILCOM.2005.1605695","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605695","url":null,"abstract":"The army's network centric warfare concept is focused on enhancing the army's capabilities in information dominance. Network centric warfare is realized through command and control (C2) systems such as the army battle command systems (ABCS) supported by developing tenet technologies, such as networking, communications and positioning. Fundamental to successful C2 systems is the ability to maintain current situation awareness (SA) information through the tenet technologies. Maintaining current SA information, for enhanced C2 functionality, requires continuous and timely position information from all relevant platforms on the battlefield. The accuracy and availability of position information directly affects operational effectiveness. The traditional role of positioning was for \"own ship \" pilotage. That is, \"can I get from point A to point B? \" It is important to note that utilization of position information, as a shared resource is an evolving role from the traditional role of positioning systems, which increases the utility and importance on position information quality and availability derived. The predominate source of that position data is the NA VSTAR global positioning system (GPS). GPS provides a common consistent coordinate reference. GPS accuracy does not degrade with time or distance traveled as self-contained navigation units e.g. inertial navigation units (INU) or Doppler radar navigation sets. In addition, GPS receivers are significantly less expensive to integrate, operate and maintain than INU's or Doppler's. However, GPS has vulnerabilities to electromagnetic interference (EMI) and satellite signal blockage in urban and complex terrain. Technology initiatives are being concentrated to investigate sophisticated integration techniques of combining externally aided and self-contained navigation systems. This paper addresses urban navigation requirements, urban navigation challenges and recent/new technology initiatives to improve the robustness of position information for the dismounted warfighter","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of jamming on DS-UWB system","authors":"M. Hamalainen, J. Iinatti","doi":"10.1109/MILCOM.2005.1605727","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605727","url":null,"abstract":"This paper presents ultra wideband (UWB) jamming studies in additive white Gaussian noise (AWGN) channel analytical approach for UWB system performance in the presence of partial band jamming (or interference), whose special case is tone jamming, is presented. In UWB case, most of the jamming (interference) could be seen as partial band jamming due to the extremely large inherent bandwidth of the desired signal. The given modifications for the existing formulas, which originally have applied for wideband system with narrowband interference, are verified with the corresponding simulated results in UWB context. The study has focused on direct sequence (DS) based single-band UWB system that uses binary pulse amplitude modulation (BPAM) as a data modulation scheme. Jamming (interference) is assumed to be bandlimited and Gaussian distributed, and the presented analytical expressions allow freely spacing and arbitrary bandwidth for the interfering signal. It has been noticed that the general bit error rate (BER) formulas for wideband systems can also be applied to UWB to calculate the upper bounds for the performances using real UWB system parameters in very simply way through spectral characteristics","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive grouped-subcarrier allocation algorithm using comparative superiority","authors":"Youngok Kim, Haewoon Nam, B. Womack","doi":"10.1109/MILCOM.2005.1605804","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605804","url":null,"abstract":"In this paper, an adaptive grouped-subcarrier allocation algorithm using comparative superiority is proposed for the enhancement of system capacity and its simple implementation in a multiuser OFDM system. Since the computational complexity of the optimal subcarrier allocation algorithm based on the each subcarrier is extremely high, various sub-optimal algorithms have been developed for the realization of adaptive subcarrier allocation algorithm with the reduced complexity. Some of the promising sub-optimal algorithms are the blockwise and the decentralized allocation algorithms, which allocate subcarriers in groups instead of each subcarrier. The proposed algorithm is similar to the blockwise or the decentralized subcarrier allocation algorithm but all subcarriers are grouped according to the coherence bandwidth for the enhancement of system capacity. In addition, the proposed algorithm provides a simple solution for the conflict problem among users by reallocating only the conflicted groups and unassigned groups instead of reallocating entire groups. Furthermore, the comparative superiority concept, which swaps the groups between users if the system capacity is increased, is adopted in the re-allocation process for the enhancement of system performance. Simulation results demonstrate that the proposed algorithm increases the system capacity effectively over a static, an adaptive blockwise, and a decentralized subcarrier allocation algorithms","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of terminal movement to the physical layer performance of the IEEE 802.11b wireless LAN systems in simulated UMTS vehicular channel","authors":"A. Silvennoinen, M. Hall, S. Häggman","doi":"10.1109/MILCOM.2005.1605937","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605937","url":null,"abstract":"Wireless local area network (WLAN) systems are typically designed to provide fixed or nomadic access. Using WLAN systems for military purposes raises the question of how WLAN terminals can be utilized in a fully mobile outdoor environment. In these environments, there typically exists multipath propagation with a large delay spread in the radio channel. This paper investigates the effect of terminal movement on the physical layer performance and capacity of IEEE 802.11b WLAN systems in a realistic outdoor mobile environment. Several wireless network interface cards are measured in laboratory conditions using a simulated radio channel. The measurement results indicate that WLAN systems can operate in mobile outdoor environment up to a certain mobile speed, and there are significant differences between equipment from product vendors","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy minimization in wireless sensor networks through an adaptive connectionless scheduling protocol (adaptive CSP)","authors":"S. Evans, N. V. Stralen, J. Hershey, H. Tomlinson","doi":"10.1109/MILCOM.2005.1606118","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606118","url":null,"abstract":"We present an approach to minimizing energy costs in wireless sensor networks through a protocol that implements near perfect scheduling based on a near perfect clock, accurate synchronization, and some discriminating node feature such as a unique identifier. Our approach is highly flexible in that options for communicating in a one-to-one or many-to-one manner are made possible without messaging overhead to set up or tear down channels. Our pseudorandom scheduling paradigm provides flexibility to serve data rate requirements over a wide range of traffic scenarios and automatically adapts to load and latency requirements, providing a high performance scheduling protocol for sensor networks and homeland security applications.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic access methodology for satellite-based networks","authors":"I. Corretjer, D. Minerath, R. Porada, M. Rupar","doi":"10.1109/MILCOM.2005.1606089","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606089","url":null,"abstract":"Current naval satellite-based networks allocate physical layer resources to users based on predetermined requirements analyses. Once the requirements are determined and resources allocated, they cannot be easily changed to adapt as actual situations warrant. A dynamic allocation process allows satellite resources to be reallocated based on the current requirements of the network users. Proposals and designs for next generation satellite systems are beginning to incorporate dynamic resource allocation features into their architectures. In this paper we present a methodology that automatically directs the use of physical layer resources for a satellite-based network according to network demands. The proposed methodology utilizes an \"executive\" to optimize and control the overall system utilization by incorporating information from transponder load, user prioritization, and real-time network requirements. To demonstrate our methodology we have implemented a non-propriety test-bed based on COTS hardware and equipment currently being utilized by the fleet. We also present results from tests that show the benefits of a dynamic architecture over a traditional static architecture.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capture in wireless random-access networks with multiple destinations and a physical channel model","authors":"G. Nguyen, J. Wieselthier, A. Ephremides","doi":"10.1109/MILCOM.2005.1605841","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605841","url":null,"abstract":"The capture effect in wireless random-access networks has been widely studied in the literature. Under capture, a transmission is successfully received at the destination, even in the presence of other transmissions, if the received signal to interference ratio exceeds a threshold. However, most studies of capture are limited to single-destination networks (such as an isolated base station in a cellular network). In this paper, we study capture in wireless networks that have multiple destinations. We use simulation to evaluate throughput performance for different networks, and demonstrate the impact of the capture threshold as well as the impact of the user distribution. The novelty of our approach includes capture under a realistic physical layer model and under the multiple-destination architecture that creates interference among users who transmit to different destinations","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directional networks for above 2 GHz software defined radios","authors":"J. Boyd, J. Schlenzig","doi":"10.1109/MILCOM.2005.1606145","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606145","url":null,"abstract":"The demand for increased bandwidth, standardization on Internet protocol, and focus on network-centric operations in DoD communications have created a need for highspeed mesh networks. Effort is underway to address this need with JTRS CDL. In addition to JTRS compliance, JTRS CDL will provide new waveforms and networking capability to create RF networks with arbitrary topology that run at very high speed. This paper addresses the concept and the challenges that must be solved to define and implement it.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting information security availability via self-adapting intelligent agents","authors":"Robby Fussell","doi":"10.1109/MILCOM.2005.1606116","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606116","url":null,"abstract":"The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}