首页 > 最新文献

2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)最新文献

英文 中文
Optimal placement of training for channel estimation and tracking 信道估计和跟踪训练的最佳位置
Min Dong, L. Tong
The problem of training symbol placement for the estimation of a block-fading channel is first considered. The channel is frequency selective with correlated random taps. The Cramer-Rao bound (CRB) on the mean square error (MSE) of channel estimators is derived and minimized with respect to the pilot symbols and their placement. It is shown that, among all orthogonal pilot sequence placements, the minimum CRB is achieved by concentrating pilot and data powers in the middle of the packet. The placement of training for tracking time-varying channels is then addressed. Both flat and frequency selective fading environments are considered. We optimized training by minimizing the MSE of channel estimators chosen from optimal and sub-optimal tracking algorithms.
首先考虑了块衰落信道估计中训练符号的放置问题。该信道具有相关随机抽头的频率选择性。推导了信道估计器均方误差(MSE)的Cramer-Rao界(CRB),并对导频符号及其位置进行了最小化。结果表明,在所有正交导频序列放置中,通过将导频和数据功率集中在包的中间,可以实现最小的CRB。然后讨论了跟踪时变信道的训练位置。考虑了平坦衰落和频率选择性衰落两种环境。我们通过最小化从最优和次最优跟踪算法中选择的信道估计器的MSE来优化训练。
{"title":"Optimal placement of training for channel estimation and tracking","authors":"Min Dong, L. Tong","doi":"10.1109/MILCOM.2001.986037","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986037","url":null,"abstract":"The problem of training symbol placement for the estimation of a block-fading channel is first considered. The channel is frequency selective with correlated random taps. The Cramer-Rao bound (CRB) on the mean square error (MSE) of channel estimators is derived and minimized with respect to the pilot symbols and their placement. It is shown that, among all orthogonal pilot sequence placements, the minimum CRB is achieved by concentrating pilot and data powers in the middle of the packet. The placement of training for tracking time-varying channels is then addressed. Both flat and frequency selective fading environments are considered. We optimized training by minimizing the MSE of channel estimators chosen from optimal and sub-optimal tracking algorithms.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Carrier frequency allocation in FDMA military SATCOMs 军用卫星通信FDMA中的载波频率分配
L. Westbrook, T. Calladene, I. Berry, N. Briscombe
Tactical military SATCOMs require a sophisticated balance between efficiency and resilience. Ideally, this balance needs to be flexible and dynamic, so as to adapt as demands (and threats) ebb and flow. Automation is seen as the key to providing the flexibility to migrate SATCOM band plans between rapidly evolving scenarios. Efficiency and revenue maximisation are often the key drivers in commercial satellite systems, nevertheless carrier frequency allocation techniques developed for civilian systems can be usefully employed in military systems, provided optimisation is extended to address resilience and support flexibility. Key factors in optimising frequency plans in multi-satellite, multi-beam, multi-terminal, multi-modulation systems are frequency re-use, compliance with satellite and ground station regulation and co-ordination agreements and, critically, the control (or mitigation) of intermodulation products. Significant differences between military and civilian systems are the likelihood of electronic attack and the widespread use of spread-spectrum (particularly frequency hopped) systems, which typically trade spectral efficiency for increased robustness and reduced probability of detection. We describe carrier frequency assignment approaches for SATCOM systems. Techniques studied include the use of meta-heuristic algorithms, such as genetic algorithms and tabu search, and quasi intermodulation-free schemes based on Golomb rulers, as well as conventional heuristic approaches such as variants of the insertion/deletion method.
战术军事卫星通信需要在效率和弹性之间取得复杂的平衡。理想情况下,这种平衡需要灵活和动态,以便适应需求(和威胁)的起起落落。自动化被视为在快速发展的场景之间提供灵活迁移SATCOM频段计划的关键。效率和收益最大化通常是商业卫星系统的关键驱动因素,然而,为民用系统开发的载波频率分配技术可以有效地应用于军事系统,只要优化扩展到解决弹性和支持灵活性。优化多卫星、多波束、多终端、多调制系统频率计划的关键因素是频率重复使用、遵守卫星和地面站监管和协调协议,以及至关重要的是对互调制产品的控制(或缓解)。军用和民用系统之间的显著差异是电子攻击的可能性和扩频(特别是跳频)系统的广泛使用,扩频系统通常以频谱效率为代价,提高鲁棒性,降低检测概率。我们描述了卫星通信系统的载波频率分配方法。研究的技术包括使用元启发式算法,如遗传算法和禁忌搜索,基于Golomb标尺的准互调无方案,以及传统的启发式方法,如插入/删除方法的变体。
{"title":"Carrier frequency allocation in FDMA military SATCOMs","authors":"L. Westbrook, T. Calladene, I. Berry, N. Briscombe","doi":"10.1109/MILCOM.2001.985759","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985759","url":null,"abstract":"Tactical military SATCOMs require a sophisticated balance between efficiency and resilience. Ideally, this balance needs to be flexible and dynamic, so as to adapt as demands (and threats) ebb and flow. Automation is seen as the key to providing the flexibility to migrate SATCOM band plans between rapidly evolving scenarios. Efficiency and revenue maximisation are often the key drivers in commercial satellite systems, nevertheless carrier frequency allocation techniques developed for civilian systems can be usefully employed in military systems, provided optimisation is extended to address resilience and support flexibility. Key factors in optimising frequency plans in multi-satellite, multi-beam, multi-terminal, multi-modulation systems are frequency re-use, compliance with satellite and ground station regulation and co-ordination agreements and, critically, the control (or mitigation) of intermodulation products. Significant differences between military and civilian systems are the likelihood of electronic attack and the widespread use of spread-spectrum (particularly frequency hopped) systems, which typically trade spectral efficiency for increased robustness and reduced probability of detection. We describe carrier frequency assignment approaches for SATCOM systems. Techniques studied include the use of meta-heuristic algorithms, such as genetic algorithms and tabu search, and quasi intermodulation-free schemes based on Golomb rulers, as well as conventional heuristic approaches such as variants of the insertion/deletion method.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QVSB data transmission QVSB数据传输
J.J. Poklemba, G. Mitchell, R. F. Smith
It is well-known that conventional double-sideband (DSB) transmission is not bandwidth-efficient; and historically, in applications where bandwidth is relatively scarce, analog single-sideband (SSB) and vestigial-sideband (VSB) techniques have been used. Previously, high-definition television (HDTV) has opted to send its images digitally-employing multi-level, amplitude-shift-keyed, VSB transmission. This paper extends and broadens the digital VSB transmission concept by demonstrating the utility of quadrature-VSB (QVSB), where two independent data streams are placed on sine and cosine VSB carriers-effectively doubling the bandwidth-efficiency, at the expense of inducing a controlled form of intersymbol-interference (ISI). Classes of minimal ISI filtering families for QVSB are defined, which are more restrictive than Nyquist data shaping. Also, it is demonstrated that m-ary QVSB typically achieves the same capacity as m/sup 2/-ary QDSB, but requires significantly less E/sub b//N/sub o/.
众所周知,传统的双边带(DSB)传输不是带宽高效的;从历史上看,在带宽相对稀缺的应用中,已经使用了模拟单边带(SSB)和残余边带(VSB)技术。以前,高清电视(HDTV)选择了数字传输图像,采用多级、幅度移位键控、VSB传输。本文通过展示正交VSB (QVSB)的效用,扩展和拓宽了数字VSB传输概念,其中两个独立的数据流放置在正弦和余弦VSB载波上,有效地将带宽效率提高了一倍,但代价是诱导受控形式的符号间干扰(ISI)。定义了QVSB的最小ISI滤波族类,它们比奈奎斯特数据整形更具限制性。此外,还证明了m-ary QVSB通常达到与m/sup / 2/ ary QDSB相同的容量,但需要的E/sub / b//N/sub / o/明显更少。
{"title":"QVSB data transmission","authors":"J.J. Poklemba, G. Mitchell, R. F. Smith","doi":"10.1109/MILCOM.2001.986031","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986031","url":null,"abstract":"It is well-known that conventional double-sideband (DSB) transmission is not bandwidth-efficient; and historically, in applications where bandwidth is relatively scarce, analog single-sideband (SSB) and vestigial-sideband (VSB) techniques have been used. Previously, high-definition television (HDTV) has opted to send its images digitally-employing multi-level, amplitude-shift-keyed, VSB transmission. This paper extends and broadens the digital VSB transmission concept by demonstrating the utility of quadrature-VSB (QVSB), where two independent data streams are placed on sine and cosine VSB carriers-effectively doubling the bandwidth-efficiency, at the expense of inducing a controlled form of intersymbol-interference (ISI). Classes of minimal ISI filtering families for QVSB are defined, which are more restrictive than Nyquist data shaping. Also, it is demonstrated that m-ary QVSB typically achieves the same capacity as m/sup 2/-ary QDSB, but requires significantly less E/sub b//N/sub o/.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reduced-rank detection schemes for DS-CDMA communication systems DS-CDMA通信系统的降阶检测方案
Wanshi Chen, U. Mitra
Several reduced-rank detection schemes for direct-sequence code-division multiple access (DS-CDMA) communication systems are compared. After the simplification of the auxiliary vector filtering (AVF) algorithm (Pados and Batalama 1999), it is shown that the AVF algorithm is equivalent to the multistage Wiener filtering (MWF) algorithm of Honig and Goldstein. Furthermore, these schemes can be shown to be equivalent to the multistage linear receiver scheme based on the Cayley Hamilton theorem. The analysis of the reduced rank techniques is extended to multipath fading channels. In particular, a modified reduced rank etection scheme is proposed which outperforms an isolated path combining strategy. In addition, the output signal-to-interference ratio for the noncoherent equal gain combining linear receiver is analyzed to facilitate the study of the tracking behavior of the reduced rank receivers.
对直接序列码分多址(DS-CDMA)通信系统的几种降阶检测方案进行了比较。在对辅助向量滤波(AVF)算法(Pados and Batalama 1999)进行简化后,表明AVF算法等价于Honig和Goldstein的多阶段维纳滤波(MWF)算法。此外,基于Cayley Hamilton定理,可以证明这些方案等价于多级线性接收机方案。将降阶技术的分析推广到多径衰落信道。特别提出了一种改进的降阶选举方案,该方案优于孤立路径组合策略。此外,分析了非相干等增益组合线性接收机的输出信干扰比,便于研究降阶接收机的跟踪行为。
{"title":"Reduced-rank detection schemes for DS-CDMA communication systems","authors":"Wanshi Chen, U. Mitra","doi":"10.1109/MILCOM.2001.986005","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986005","url":null,"abstract":"Several reduced-rank detection schemes for direct-sequence code-division multiple access (DS-CDMA) communication systems are compared. After the simplification of the auxiliary vector filtering (AVF) algorithm (Pados and Batalama 1999), it is shown that the AVF algorithm is equivalent to the multistage Wiener filtering (MWF) algorithm of Honig and Goldstein. Furthermore, these schemes can be shown to be equivalent to the multistage linear receiver scheme based on the Cayley Hamilton theorem. The analysis of the reduced rank techniques is extended to multipath fading channels. In particular, a modified reduced rank etection scheme is proposed which outperforms an isolated path combining strategy. In addition, the output signal-to-interference ratio for the noncoherent equal gain combining linear receiver is analyzed to facilitate the study of the tracking behavior of the reduced rank receivers.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the coexistence of ultra-wideband and narrowband radio systems 关于超宽带和窄带无线电系统共存的问题
A. Swami, Brian M. Sadler, J. Turner
Ultra-wideband (UWB) signals will encounter many interference sources, primarily from relatively narrowband (NB) systems. In addition., UWB signals will also affect a large number of NB radios; of critical importance is the potential interference with GPS, E-911, and navigation bands, as well as cellular bands. There is a rich and growing literature on UWB radios; however, issues related to interference measurements have only been partially addressed. Here, we assess the interference caused by UWB signals via analysis and simulations. Analytical results include the aggregate effect of spatially distributed UWB radios on a receiver, and theoretical BER expressions.
超宽带(UWB)信号将遇到许多干扰源,主要来自相对窄带(NB)系统。此外。,超宽频信号也会影响大量NB无线电;至关重要的是对GPS、E-911、导航波段以及蜂窝波段的潜在干扰。关于超宽带无线电的文献越来越多;然而,与干扰测量有关的问题只得到部分解决。在这里,我们通过分析和模拟来评估UWB信号引起的干扰。分析结果包括空间分布的超宽带无线电对接收机的综合效应,以及理论的误码率表达式。
{"title":"On the coexistence of ultra-wideband and narrowband radio systems","authors":"A. Swami, Brian M. Sadler, J. Turner","doi":"10.1109/MILCOM.2001.985756","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985756","url":null,"abstract":"Ultra-wideband (UWB) signals will encounter many interference sources, primarily from relatively narrowband (NB) systems. In addition., UWB signals will also affect a large number of NB radios; of critical importance is the potential interference with GPS, E-911, and navigation bands, as well as cellular bands. There is a rich and growing literature on UWB radios; however, issues related to interference measurements have only been partially addressed. Here, we assess the interference caused by UWB signals via analysis and simulations. Analytical results include the aggregate effect of spatially distributed UWB radios on a receiver, and theoretical BER expressions.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Estimation of multiplexing gain in ATM tactical links ATM战术链路中复用增益的估计
W. Burakowski, A. Beben, P. Pyda
This paper evaluates the multiplexing gain we can reach on ATM radio-relay link, used for the purpose of inter-node transmission in the tactical networks. This link has limited capacity, e.g. from 2 up to 8 Mbps, and it can cause that profit of using ATM can be much less than expected. Note that ATM technology was mainly designed for integrated networks offering QoS (quality of service) guarantees. Additionally, a high profit of cell multiplexing was expected by using dynamic slot-to-cell allocation. The multiplexing gain in ATM tactical links is estimated under traffic conditions adequate for tactical networks. It means that the network should serve cell traffic generated by applications appropriate for modern command and control systems, e.g. based on transferring voice, data and video signals. For these applications, a level of the QoS is required. Therefore, only these ATM network services can be considered which guarantee appropriate QoS, at both the cell and call level, like CBR and VBR. Numerical results showing limitations of getting reasonable multiplexing gain in an ATM tactical link are included.
本文对战术网络中用于节点间传输的ATM无线电中继链路所能达到的复用增益进行了评估。该链路的容量有限,例如从2到8mbps,这可能导致使用ATM的利润远低于预期。请注意,ATM技术主要是为提供QoS(服务质量)保证的集成网络设计的。此外,采用动态时隙到小区分配,期望小区复用的高收益。在适合战术网络的通信量条件下,对ATM战术链路的复用增益进行了估计。这意味着网络应该为适合现代指挥和控制系统的应用程序产生的蜂窝通信量提供服务,例如,基于传输语音、数据和视频信号。对于这些应用程序,需要一定级别的QoS。因此,只有这些ATM网络服务才能在小区和呼叫级别保证适当的QoS,如CBR和VBR。数值结果显示了在ATM战术链路中获得合理复用增益的局限性。
{"title":"Estimation of multiplexing gain in ATM tactical links","authors":"W. Burakowski, A. Beben, P. Pyda","doi":"10.1109/MILCOM.2001.985831","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985831","url":null,"abstract":"This paper evaluates the multiplexing gain we can reach on ATM radio-relay link, used for the purpose of inter-node transmission in the tactical networks. This link has limited capacity, e.g. from 2 up to 8 Mbps, and it can cause that profit of using ATM can be much less than expected. Note that ATM technology was mainly designed for integrated networks offering QoS (quality of service) guarantees. Additionally, a high profit of cell multiplexing was expected by using dynamic slot-to-cell allocation. The multiplexing gain in ATM tactical links is estimated under traffic conditions adequate for tactical networks. It means that the network should serve cell traffic generated by applications appropriate for modern command and control systems, e.g. based on transferring voice, data and video signals. For these applications, a level of the QoS is required. Therefore, only these ATM network services can be considered which guarantee appropriate QoS, at both the cell and call level, like CBR and VBR. Numerical results showing limitations of getting reasonable multiplexing gain in an ATM tactical link are included.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic identification of users over network 网络上用户的加密识别
N. Ikram
In a network, identification of any user is a vital requirement before one is accorded access to the network-shared information bank or database. The database or information may itself either be encrypted or in plain language. There are various techniques, which offer this service through cryptographic techniques as well as through non-cryptographic means, each with its own attributes This paper presents a scheme which uses the identification (ID) based cryptosystem (Shamir, 1984), based on the concept of public key cryptosystem. However, the scheme works on a carefully selected elliptic curve (EC), itself defined on a binary finite field. The finite field so chosen is F/sub 2//sup 215/. The elliptic curve over which the scheme works has been self-generated and those available in the public domain have not been employed. The new scheme offers highly secure underlying cryptosystem and strong challenge-response type of protocol, ensuring complete user trust.
在网络中,在允许一个人访问网络共享的信息库或数据库之前,识别任何用户是一项至关重要的要求。数据库或信息本身可以是加密的,也可以是明文的。有各种各样的技术,通过加密技术和非加密手段提供这种服务,每种技术都有自己的属性。本文提出了一种方案,该方案使用基于身份(ID)的密码系统(Shamir, 1984),基于公钥密码系统的概念。然而,该方案在精心选择的椭圆曲线(EC)上工作,其本身定义在二元有限域上。所选择的有限域是F/sub 2//sup 215/。该方案工作的椭圆曲线是自生成的,没有使用公共领域中可用的椭圆曲线。新方案提供了高度安全的底层密码系统和强挑战响应类型的协议,确保了用户的完全信任。
{"title":"Cryptographic identification of users over network","authors":"N. Ikram","doi":"10.1109/MILCOM.2001.985764","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985764","url":null,"abstract":"In a network, identification of any user is a vital requirement before one is accorded access to the network-shared information bank or database. The database or information may itself either be encrypted or in plain language. There are various techniques, which offer this service through cryptographic techniques as well as through non-cryptographic means, each with its own attributes This paper presents a scheme which uses the identification (ID) based cryptosystem (Shamir, 1984), based on the concept of public key cryptosystem. However, the scheme works on a carefully selected elliptic curve (EC), itself defined on a binary finite field. The finite field so chosen is F/sub 2//sup 215/. The elliptic curve over which the scheme works has been self-generated and those available in the public domain have not been employed. The new scheme offers highly secure underlying cryptosystem and strong challenge-response type of protocol, ensuring complete user trust.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130808351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A modified directional frequency reuse plan based on channel alternation and rotation 一种改进的基于信道交替和旋转的定向频率复用方案
V. A. Nguyen, P. Wan, O. Frieder
In a previous work (see Nguyen, V.A. et al., IEEE Vehicular Technology Conference, 2001), we presented a novel channel alternation and rotation (CAR) scheme that coordinates channel assignment with antenna directivity. In CAR, each cell type is allocated an extra channel set that provides the network designer the flexibility to alternate and rotate channels according to a nearest front lobe interference avoidance strategy in order to enhance the cochannel interference ratio (C/I). CAR relaxes the constraints assumed in conventional reuse plans to allow deployment of smaller, unconventional reuse cluster sizes based on C/I requirements, thus increasing frequency reuse efficiency. We present a new reuse plan in which 2 extra channel sets are allocated to each cell type and assigned according to CAR strategy. This reuse plan, referred to as 2/spl times/(3+2), increases channel capacity by 20% in comparison with the conventional 4/spl times/3 reuse plan which still provides signals above the minimum acceptable C/I margin. The 2/spl times/(3+2) reuse plan is simple and can be implemented without costs.
在之前的工作中(参见Nguyen, V.A.等人,IEEE车辆技术会议,2001),我们提出了一种新的信道交替和旋转(CAR)方案,该方案通过天线指向性协调信道分配。在CAR中,每个单元类型都分配了一个额外的信道集,使网络设计者能够根据最近的前瓣干扰避免策略灵活地交替和旋转信道,以提高共信道干扰比(C/I)。CAR放宽了传统重用计划中的约束,允许基于C/I需求部署更小、非常规的重用簇大小,从而提高了频率重用效率。我们提出了一种新的复用方案,该方案为每个cell类型分配2个额外的信道集,并根据CAR策略进行分配。这个复用计划称为2/spl倍/(3+2),与传统的4/spl倍/3复用计划相比,信道容量增加了20%,后者仍然提供高于最低可接受的C/I余量的信号。2/ sp1次/(3+2)的重用计划很简单,可以在没有成本的情况下实现。
{"title":"A modified directional frequency reuse plan based on channel alternation and rotation","authors":"V. A. Nguyen, P. Wan, O. Frieder","doi":"10.1109/MILCOM.2001.986093","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986093","url":null,"abstract":"In a previous work (see Nguyen, V.A. et al., IEEE Vehicular Technology Conference, 2001), we presented a novel channel alternation and rotation (CAR) scheme that coordinates channel assignment with antenna directivity. In CAR, each cell type is allocated an extra channel set that provides the network designer the flexibility to alternate and rotate channels according to a nearest front lobe interference avoidance strategy in order to enhance the cochannel interference ratio (C/I). CAR relaxes the constraints assumed in conventional reuse plans to allow deployment of smaller, unconventional reuse cluster sizes based on C/I requirements, thus increasing frequency reuse efficiency. We present a new reuse plan in which 2 extra channel sets are allocated to each cell type and assigned according to CAR strategy. This reuse plan, referred to as 2/spl times/(3+2), increases channel capacity by 20% in comparison with the conventional 4/spl times/3 reuse plan which still provides signals above the minimum acceptable C/I margin. The 2/spl times/(3+2) reuse plan is simple and can be implemented without costs.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying layering principles to legacy systems: Link 16 as a case study 将分层原则应用于遗留系统:链接16作为案例研究
W. J. Wilson
Layering communications systems (for better horizontal integration and to foster interoperability) is central to the Global Grid architecture. Accordingly, it is important to show how legacy systems can be layered in order to direct future development efforts toward achieving greater compatibility with the Global Grid. This paper assesses whether the Link 16 legacy system can be layered within a Global Grid model that has been developed with military requirements in mind. This model is slightly different from the standard OSI 7-layer one and has the following 7 layers: mission, application, service, transport, network, link and physical. Two approaches to layering are considered. First, in a general way,the feasibility is assessed of layering the entire communications process at every level of the protocol stack. Each layer is examined to see if the different functions can be naturally separated into distinct sublayers. This approach emphasizes the desirability of being able to upgrade system performance by replacing one layer at a time without altering other layers. The second approach is to consider the layering potential of systems in terms of their compatibility with the emerging Global Grid. The main thrust of these concepts is that all systems that are part of the Global Grid should be compatible with its transport and network layers (i.e., TCP/IP and/or some variants). Link 16 is a prime example of a "stovepipe" system, designed to maximize performance in a particular tactical environment with high levels of jamming. Since it was designed before layering principles were in wide use, it presents certain difficulties to the layering process.
分层通信系统(为了更好的水平集成和促进互操作性)是Global Grid体系结构的核心。因此,重要的是展示如何对遗留系统进行分层,以便指导未来的开发工作,以实现与Global Grid的更大兼容性。本文评估了Link 16遗留系统是否可以在考虑军事需求而开发的全球网格模型中分层。该模型与标准的OSI 7层模型略有不同,有以下7层:任务层、应用层、服务层、传输层、网络层、链路层和物理层。考虑了两种分层方法。首先,以一般的方式评估在协议栈的每一层对整个通信过程分层的可行性。检查每一层,看看不同的功能是否可以自然地分成不同的子层。这种方法强调了在不改变其他层的情况下,通过一次替换一层来升级系统性能的可取性。第二种方法是根据系统与新兴的全球网格的兼容性来考虑系统的分层潜力。这些概念的主旨是,作为全球网格一部分的所有系统都应该与其传输层和网络层(即TCP/IP和/或某些变体)兼容。Link 16是“烟囱”系统的典型例子,旨在在具有高水平干扰的特定战术环境中最大化性能。由于它是在分层原理广泛应用之前设计的,给分层过程带来了一定的困难。
{"title":"Applying layering principles to legacy systems: Link 16 as a case study","authors":"W. J. Wilson","doi":"10.1109/MILCOM.2001.985849","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985849","url":null,"abstract":"Layering communications systems (for better horizontal integration and to foster interoperability) is central to the Global Grid architecture. Accordingly, it is important to show how legacy systems can be layered in order to direct future development efforts toward achieving greater compatibility with the Global Grid. This paper assesses whether the Link 16 legacy system can be layered within a Global Grid model that has been developed with military requirements in mind. This model is slightly different from the standard OSI 7-layer one and has the following 7 layers: mission, application, service, transport, network, link and physical. Two approaches to layering are considered. First, in a general way,the feasibility is assessed of layering the entire communications process at every level of the protocol stack. Each layer is examined to see if the different functions can be naturally separated into distinct sublayers. This approach emphasizes the desirability of being able to upgrade system performance by replacing one layer at a time without altering other layers. The second approach is to consider the layering potential of systems in terms of their compatibility with the emerging Global Grid. The main thrust of these concepts is that all systems that are part of the Global Grid should be compatible with its transport and network layers (i.e., TCP/IP and/or some variants). Link 16 is a prime example of a \"stovepipe\" system, designed to maximize performance in a particular tactical environment with high levels of jamming. Since it was designed before layering principles were in wide use, it presents certain difficulties to the layering process.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Performance of different call admission schemes in a QoS Diffserv domain QoS Diffserv域中不同呼叫接纳方案的性能
M. Gerla, S.S. Lee, G. Reali, D. D. Sorte
Two types of call admission strategies have been proposed for real time support in the Internet: per flow, reservation (i.e., RSVP) based, and measurement based. We evaluate these strategies for a video streaming application. We use a simulation environment (based on a Parsec platform) which supports DiffServ tools as well as QoS routing. In our experiments, we compare the performance of RA-CAC with M-CAC. We show that the selection between these alternatives is influenced by tradeoffs between throughput and delay performance; and that different classes of users may opt for one or the other technique. We also consider a hybrid situation in which both RA-CAC and M-CAC coexist in the network and are reciprocally "protected" by a weighted fair queueing (WFQ) trunk scheduler. A key enabling technology for the M-CAC scheme is QoS routing. We use Q-OSPF not only to find paths that satisfy the quality constraints (delay and bandwidths) but also to advertise current traffic, delay and available bandwidth on all network links. We also use leaky buckets for shaping and policing. Leaky bucket parameters are selected as a function of effective bandwidth, buffer space and end-to-end delay bound. If the traffic (after shaping and policing) conforms to the negotiated traffic profile, and the effective resources are allocated to the connection, the packets are guaranteed delivery within a given worst-case delay bound. In our experiments we verify that when bandwidth and buffers are explicitly allocated (with RA-CAC), the delay bounds are satisfied. The same is not true for M-CAC, where only a statistical allocation is carried out.
为了在Internet上提供实时支持,提出了两种类型的呼叫允许策略:基于每个流、基于保留(即RSVP)和基于度量。我们为视频流应用评估这些策略。我们使用了一个模拟环境(基于Parsec平台),它支持DiffServ工具和QoS路由。在我们的实验中,我们比较了RA-CAC和M-CAC的性能。我们表明,这些备选方案之间的选择受到吞吐量和延迟性能之间权衡的影响;不同类别的用户可能会选择一种或另一种技术。我们还考虑了一种混合情况,其中RA-CAC和M-CAC在网络中共存,并由加权公平排队(WFQ)中继调度程序相互“保护”。M-CAC方案的关键使能技术是QoS路由。我们使用Q-OSPF不仅可以找到满足质量约束(延迟和带宽)的路径,还可以在所有网络链路上发布当前流量、延迟和可用带宽。我们也用漏水的桶来塑造和管理。漏桶参数是有效带宽、缓冲空间和端到端延迟界的函数。如果经过整形和监管后的流量符合协商的流量轮廓,并且为连接分配了有效的资源,则保证在给定的最坏情况延迟范围内发送数据包。在我们的实验中,我们验证了当带宽和缓冲区显式分配(使用RA-CAC)时,延迟界限是满足的。M-CAC的情况并非如此,它只进行统计分配。
{"title":"Performance of different call admission schemes in a QoS Diffserv domain","authors":"M. Gerla, S.S. Lee, G. Reali, D. D. Sorte","doi":"10.1109/MILCOM.2001.985804","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985804","url":null,"abstract":"Two types of call admission strategies have been proposed for real time support in the Internet: per flow, reservation (i.e., RSVP) based, and measurement based. We evaluate these strategies for a video streaming application. We use a simulation environment (based on a Parsec platform) which supports DiffServ tools as well as QoS routing. In our experiments, we compare the performance of RA-CAC with M-CAC. We show that the selection between these alternatives is influenced by tradeoffs between throughput and delay performance; and that different classes of users may opt for one or the other technique. We also consider a hybrid situation in which both RA-CAC and M-CAC coexist in the network and are reciprocally \"protected\" by a weighted fair queueing (WFQ) trunk scheduler. A key enabling technology for the M-CAC scheme is QoS routing. We use Q-OSPF not only to find paths that satisfy the quality constraints (delay and bandwidths) but also to advertise current traffic, delay and available bandwidth on all network links. We also use leaky buckets for shaping and policing. Leaky bucket parameters are selected as a function of effective bandwidth, buffer space and end-to-end delay bound. If the traffic (after shaping and policing) conforms to the negotiated traffic profile, and the effective resources are allocated to the connection, the packets are guaranteed delivery within a given worst-case delay bound. In our experiments we verify that when bandwidth and buffers are explicitly allocated (with RA-CAC), the delay bounds are satisfied. The same is not true for M-CAC, where only a statistical allocation is carried out.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1