The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future military operations will feature network-enabled human soldiers working seamlessly with intelligent, autonomous systems such as sensor networks and unmanned vehicles. In these systems, data aggregation (e.g., data fusion, plan monitoring) and data dissemination (e.g., information sharing) will be essential communication patterns. While ad hoc networks are commonly proposed for complex battlefield...
The performance of a serially concatenated convolutional code (SCCC) for frequency hopped M-ary phase shift keying communication systems over an additive white Gaussian channel noise (AWGN) in the presence of a partial-band noise jammer is discussed in the paper. The scaling of the log-likelihood ratio (LLR) which improves the SNR dynamic range and the jamming strategy are also discussed in the paper...
A future satellite communications system is envisioned that will provide a number of enhancements over predecessor satellite communication systems. It will employ high capacity packet switched service in space, high rate circuits between terminals, and utilize Dynamic Bandwidth Resource Allocation which dynamically assigns resources to terminals based on current channel conditions and traffic demand...
Tactical networking environments demand reliable, robust, and efficient approaches to disseminating information that are tolerant to unreliable and bandwidth-constrained networks. This paper describes DisService, an Agile Computing approach to information dissemination that opportunistically discovers and exploits excess communications, storage, and processing capacity in a distributed network to...
In this work, we consider a multi-hop cognitive radio network with multiple flows. The challenges induced by the random behaviors of the primary users are investigated in a stochastic network utility maximization framework. To fully utilize the scarce network resource, we propose an optimal traffic splitting scheme for each source node to explore multiple paths effectively. In addition, the algorithm...
Extremely small, very low cost and very low power yet smart tactical sensors are commonly proposed. We have investigated the design patterns and algorithms that are capable of on-sensor dimensionality reduction so forwarding information rather than the raw data across these tactical sensor networks where data flows are hampered by a disconnected, intermittent and low bandwidth (DIL) operational domain...
The Network Centric Operations Industry Consortium (NCOIC) provides guidance for network centric operations (NCO) interoperable systems. The NCO interoperability framework (NIF) [1] provides an organizational construct and repository for enabling this guidance. NIF is a framework that assists industry to design interoperable systems. NIF is based upon standards, including patterns, principles, and...
Multiband tactical communication modems must employ different waveforms to meet various demands in quality and nature of data. Range maximization, high data throughput and power conservation requirements are usually not fulfilled by a single waveform. To effectively deliver tactical multimedia data including coded audio, text, video, map and navigation information using radio, multiple choice of frequency...
In February 2006, the Department of Defense (DoD) Chief Information Officer (CIO) issued a memorandum with the subject heading, ??Department of Defense Policy for Transmission of Internet Protocol Over DoD-Leased and DoD-Owned Transponded Satellite Communications Systems?? explaining the need to provide a single solution that supports direct interoperability between users, maximizes bandwidth-on-demand...
As cellular technologies evolve, evaluation of modulation schemes with frequency selective fading is an important consideration. We present methods to evaluate a high data rate DS-SS BPSK reverse link, over a wideband channel, with filters and a modified delayed signature dual finger RAKE. For several years the standard Gaussian approximation has been used to estimate error rate of DS-SS BPSK. We...
In this paper, we propose a novel approach, which is termed heterogeneous intelligent filtering (HIF), for intelligent control and application data filtering in multi-domain heterogeneous networks. HIF creates intelligent gateways to rapidly and autonomously adapt the flow of information content to the changing mission needs and network characteristics. HIF employs a MANET management protocol (termed...
This paper investigates the issue of resource allocation in multicarrier wireless networks, where users have a choice between multiple service providers. We investigate the feasibility of modeling the allocation problem as a probabilistic voting game. In other words, competing transmitters are modeled as candidates in an election, while the receivers form the electorate. The specific example analyzed...
This paper addresses the use of Resource ReSerVation Protocol-Aggregate (RSVP-AGG) at the tactical edge of the Air Force's Airborne Network (AN). Since the AN tactical edge can have different types of stub-networks accessing the AN (i.e., non-IP based legacy networks like Link 16, DiffServ based networks and IntServ based net-works), RSVP-AGG offers a common access approach regardless of the differences...
This paper considers the case for using a ??digital IF?? (intermediate format) as an alternative to conventional analog IF (intermediate frequency) for distributing satellite uplink and downlink signals within modern high-capacity military satellite communications Earth terminals. ??Digital IF?? is defined as a purely digital format enabled by digital I & Q (in-phase and quadrature) sampling for...
Demand Assigned Multiple Access (DAMA) is a technology used to assign link capacity based on user demand. The allocation of capacity is limited by a set of constraints (e.g., priority of the traffic, link condition, RF interference, required bandwidth). Capacity is allocated in the time and frequency domains. An allocation algorithm determines per-user capacity for each assignment epoch. A packing...
In this paper we propose a novel medium access control (MAC) protocol that provides spectrum agile bandwidth allocation for cognitive radios. Our MAC protocol, called spectrum agile multiple access or simply SAMA, harnesses the frequency agility of cognitive radios in allocating fair and contention free bandwidth under a heterogeneous spectrum environment. SAMA accomplishes its bandwidth allocation...
In this paper, we discuss a general multi protocol label switching (MPLS) based traffic engineering (TE) approach for providing QoS based transportation in a geostationary satellite constellation network. As satellite constellation networks become more and more common, with on-board packet processing capabilities providing backbone services to support thousands of airborne and terrestrial terminals,...
A recent feasibility study suggests that a Service Oriented Architecture (SOA) will be central within the NATO Network Enabled Capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. We suggest to use a robust Peer-to-Peer (P2P) network as a complement. Unfortunately, available P2P search...
Friendly force tracking systems (FFTS) are the lowest echelon of command and control information systems (C2IS) in any army command and control architecture. Their initial goal is to provide near real-time information about own troops position. However, in foreseeable current empty battlefields as well as in asymmetric confrontations at least two extra functionalities are required: 1) sensor integration...
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.