{"title":"Collision-free medium access control scheme for ad-hoc networks","authors":"Z. Haas, Jing Deng, S. Tabrizi","doi":"10.1109/MILCOM.1999.822687","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822687","url":null,"abstract":"The dual busy tone multiple access (DBTMA) scheme was designed for decentralized multi-hop networks. In DBTMA, the RTS/CTS dialogue is used to reserve the channel. In addition, two busy tones are employed to eliminate collisions between the RTS/CTS control packets and data packet transmissions. Data packet collisions can seriously decrease channel utilization for a MAC protocol, as data packets are much longer than control packets. Since DBTMA completely avoids data packet collisions, its performances are superior to other proposed protocols. We analyze the possible cases of data packet collision and prove that it is collision-free.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coherent Viterbi and threshold demodulators for pulse-driven GMSK signals","authors":"K. Tsai, G. Lui","doi":"10.1109/MILCOM.1999.822690","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822690","url":null,"abstract":"Pulse-driven Gaussian minimum shift keying (PDGMSK) was introduced to facilitate a trade between bandwidth efficiency and receiver complexity when using the classical GMSK waveform. The waveform was purposely devised to converge, as the data rate decreases, to SDPSK or DPSK without expanding the absolute bandwidth. This paper studies the optimal coherent demodulation of the PDGMSK waveform, and provides simulation results of a near-optimal Viterbi demodulator and a low-complexity threshold demodulator in both single and multiple carrier settings. Trade-off among the signal-to-noise ratio (SNR), adjacent channel interference (ACI) level and carrier frequency spacing is also provided.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128292540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.D. Dankberg, M. Miller, W.F. Sullivan, L. E. Taylor
{"title":"A robust satellite system architecture for the mobile user objective system","authors":"M.D. Dankberg, M. Miller, W.F. Sullivan, L. E. Taylor","doi":"10.1109/MILCOM.1999.821379","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821379","url":null,"abstract":"The Department of Defense (DoD) is pursuing development of a mobile user objective system (MUOS). This next generation satellite system will provide voice and data services to ground, airborne and shipborne users with special emphasis on serving a large population of handheld subscribers. A major element of the MUOS architecture will likely be a DoD owned and operated satellite system in the current UHF MILSATCOM frequency band. This paper outlines an innovative architecture for a DoD UHF satellite system which provides substantial system wide capacity and reliable service to a wide range of subscriber types, including handhelds. In particular, the system is robust in the face of the severe channel impairments historically encountered in this band. The key attribute of the architecture that enables handling the impairments is path diversity with diversity combining. The overall diversity combining architecture is described and performance estimates are presented.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128497282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectral density of random time-hopping spread-spectrum UWB signals with uniform timing jitter","authors":"M. Win","doi":"10.1109/MILCOM.1999.821393","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821393","url":null,"abstract":"We derive the power spectral density of time-hopping (TB) spread-spectrum signals in the presence of random timing jitter, which is characterized typically by a discrete-time stationary process (independent of the TH sequences). Detailed descriptions of different TH schemes, employing a random TH sequence, is given and spectral analysis of such TH signals in the presence of uniform timing jitter is carried out using a systematic and tractable technique.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130653942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bąk, A. Beben, W. Burakowski, Z. Kopertowski, M. Lesniewicz, P. Pyda
{"title":"Evaluation of ATM service quality in future ATM tactical networks","authors":"A. Bąk, A. Beben, W. Burakowski, Z. Kopertowski, M. Lesniewicz, P. Pyda","doi":"10.1109/MILCOM.1999.821359","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821359","url":null,"abstract":"The paper presents an evaluation of network services (CBR, VBR and TCP over UBR) in the future ATM tactical network. The included numerical results refer to the tested network configuration, called the extended bottleneck topology. Compared to cable ATM network, the studied system takes into account the wireless environment of the tactical network. More precisely, the presence of transmission errors as well as radio access control protocol is assumed. Additionally, a comparison of ATM service quality between wireless and cable network is included.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123933147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for investigating security attacks in ATM networks","authors":"S. Ghosh, P. Robinson","doi":"10.1109/MILCOM.1999.822779","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822779","url":null,"abstract":"While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doubly spread DS-CDMA for efficient interference cancellation","authors":"T. Wong, T. Lok","doi":"10.1109/MILCOM.1999.822667","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822667","url":null,"abstract":"In this paper, a new spreading scheme, which consists of two stages of spreading, is considered for DS-CDMA systems. The data of a user is spread first with a long signature sequence and then with a short signature sequence. The scheme combines the advantages of the two types of spreading techniques and allows us to suppress multiple access interference (MAI) by performing both beamforming and multiuser detection efficiently. A joint receiver with blind multiuser detection and blind beamforming is proposed for the new spreading scheme. Simulations show that the joint receiver performs better than either beamforming or multiuser detection alone. To speed up convergence, an iterative version of the joint receiver is also considered.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A CORBA-based interoperable auto-configuration system design for battlefield networks","authors":"L. Kant, D. Hsing, Seong-Ho Jeong, Tsong-Ho Wu","doi":"10.1109/MILCOM.1999.822736","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822736","url":null,"abstract":"The rapidly changing network topology of battlefield networks warrants an efficient configuration management system for the battlefield network to function efficiently. Furthermore, it is very important to provide uninterrupted services to the mission critical applications in the tactical battlefield network. In this work we propose an interoperable auto-configuration management system for the army's tactical networks. The interoperability stems from the fact that we support communications both through the tactical Internet and an ATM-based tactical backbone network. The proposed design also enhances network robustness by allowing for reconfiguration after a facility failure, thereby providing uninterrupted service to the mission critical applications. In addition, we propose the use of a directory service system to facilitate configuration management in the dynamic battlefield environment. In order to accommodate a distributed and heterogeneous computing environment, a CORBA-based architecture is proposed to realize a practical implementation of the proposed auto-configuration management system design.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126321269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying the policy concept to avoid logical race conditions in multilayer network restoration","authors":"J. Kroculick, IL Cynthia Hood","doi":"10.1109/MILCOM.1999.821335","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821335","url":null,"abstract":"Protection switching interactions in wide-area networks need to interoperate with each other in order to restore a wide variety of service types, provide survivability to mission-critical applications and accommodate an evolving network infrastructure. Without some coordination between restoration mechanisms, an outage duration would be lengthened as methods assigned to each layer interfere with each other or the network would be locked up in a deadlocked state that never converges to a new topology. A set of control policies can be specified to coordinate between restoration mechanisms in a network that spans multiple layers and regions. These control policies are expressed as rules, and are collectively denoted as the escalation strategy. The escalation strategy can be provisioned by a network manager and is implemented as a distributed coordination protocol between peer recovery agents in the nodes. As rules for coordinating between restoration mechanisms are formalized, a mathematical proof could be provided to prove that the network does indeed converge to a new topology.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125603803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum management using network management concepts","authors":"P. Major, S. Millender, G. C. Wagner","doi":"10.1109/MILCOM.1999.821383","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821383","url":null,"abstract":"As military communications has evolved over the decades, spectrum management technique development has kept pace. A large portion of spectrum management technology involves spectrum planning, which is the process of cataloging the current use of the spectrum and the assignment of new frequencies within that environment to minimize interference while maximizing spectrum reuse. Spectrum planning has received considerable attention in previous years and today there are many state-of-the-art tools available. Another, less known aspect of spectrum management, the identification and resolution of interference, has not developed at a commensurate rate. As the available frequency resource decreases, and demand for that limited resource increases, interference is bound to occur, and the ability to identify and control occurrences of interference on the battlefield will present the next spectrum management challenge. This paper outlines an approach for the identification and resolution of interference events involving software-based radios in near-real time using principles and standards found in network management.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}