Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985834
R. Otnes, V. Jodalen
At high latitudes, HF communications at medium data rates (1200-2400 bps) suffer from low availability because of ionospheric disturbances. The problem is that the channel exhibits large Doppler spread, delay spread and/or auroral absorption, not necessarily at the same time. If one can choose among different waveforms at each data rate, the maximum tolerable Doppler spread and delay spread can be increased (without increasing the maximum tolerable spreading factor). We have used DAMSON measurements to analyse the increase in availability that can be achieved using such a scheme. The largest improvement found is: at 2400(1200) bps the availability is 28(57)% using one waveform, and 35(68)% using 3 waveforms.
{"title":"Increasing the availability of medium data rates at high latitude HF channels","authors":"R. Otnes, V. Jodalen","doi":"10.1109/MILCOM.2001.985834","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985834","url":null,"abstract":"At high latitudes, HF communications at medium data rates (1200-2400 bps) suffer from low availability because of ionospheric disturbances. The problem is that the channel exhibits large Doppler spread, delay spread and/or auroral absorption, not necessarily at the same time. If one can choose among different waveforms at each data rate, the maximum tolerable Doppler spread and delay spread can be increased (without increasing the maximum tolerable spreading factor). We have used DAMSON measurements to analyse the increase in availability that can be achieved using such a scheme. The largest improvement found is: at 2400(1200) bps the availability is 28(57)% using one waveform, and 35(68)% using 3 waveforms.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.986083
Yang Wang, E. Serpedin, P. Ciblat, P. Loubaton
Blind carrier frequency offset and symbol timing delay estimators for linearly modulated waveforms transmitted through flat-fading channels have been previously developed by exploiting the received signal's second-order cyclostationary statistics in Ghogho et al., Gini and Giannakis (1998), and Scott and Olasz (1995). The goal of this paper is to establish and analyze the asymptotic (large sample) performance of the estimators of Ghogho et al. and Gini and Giannakis, as a function of the pulse shape bandwidth and the oversampling, factor. It is shown that the performance of these estimators improves as the pulse shape bandwidth increases and by selecting small values for the oversampling factor.
{"title":"Blind cyclostationary statistics based carrier frequency offset and symbol timing delay estimators in flat-fading channels","authors":"Yang Wang, E. Serpedin, P. Ciblat, P. Loubaton","doi":"10.1109/MILCOM.2001.986083","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986083","url":null,"abstract":"Blind carrier frequency offset and symbol timing delay estimators for linearly modulated waveforms transmitted through flat-fading channels have been previously developed by exploiting the received signal's second-order cyclostationary statistics in Ghogho et al., Gini and Giannakis (1998), and Scott and Olasz (1995). The goal of this paper is to establish and analyze the asymptotic (large sample) performance of the estimators of Ghogho et al. and Gini and Giannakis, as a function of the pulse shape bandwidth and the oversampling, factor. It is shown that the performance of these estimators improves as the pulse shape bandwidth increases and by selecting small values for the oversampling factor.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115826125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985766
B. Jabbari, E. Dinan
This paper considers the problem of packet transfer over the radio interface of a cellular network, in which the diversity area may provide alternate resources for mobiles communicating with base stations. A multilink architecture is proposed for the forward link of packet cellular networks. We develop a model for the access mechanism using a two-state MMPP (Markov modulated Poisson process) for the aggregate arrival and a seven-state MMPP for the overflow traffic approximation. An analytical approach is used to calculate the system performance including the probability distribution of packet transmission delay and packet loss rate. We show how a simplified approximate model based on a much smaller number of states for the resulting MMPP can capture the system performance in a reasonably accurate way. We quantify the performance improvement through a numerical example and also compare the results to those obtained from the simulation model.
{"title":"Modeling and performance of a multilink packet access for wireless cellular systems","authors":"B. Jabbari, E. Dinan","doi":"10.1109/MILCOM.2001.985766","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985766","url":null,"abstract":"This paper considers the problem of packet transfer over the radio interface of a cellular network, in which the diversity area may provide alternate resources for mobiles communicating with base stations. A multilink architecture is proposed for the forward link of packet cellular networks. We develop a model for the access mechanism using a two-state MMPP (Markov modulated Poisson process) for the aggregate arrival and a seven-state MMPP for the overflow traffic approximation. An analytical approach is used to calculate the system performance including the probability distribution of packet transmission delay and packet loss rate. We show how a simplified approximate model based on a much smaller number of states for the resulting MMPP can capture the system performance in a reasonably accurate way. We quantify the performance improvement through a numerical example and also compare the results to those obtained from the simulation model.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.986084
D. Torrieri
When power control is used in a cellular network, the base station attempts to either directly or indirectly track the received power of the desired signal from a mobile. As the fading rate increases, the tracking ability of a direct-sequence code-division multiple-access system deteriorates, and the power-control accuracy declines. It is shown that a large performance degradation occurs when the instantaneous signal level cannot be accurately measured, even when the channel-code interleaving is perfect. An alternative that is assumed by many authors is to measure a long-term-average signal level that averages out the fast fading effects. However it is shown that this approach is less viable than attempting to track the instantaneous signal level even if the latter results in large errors.
{"title":"Power-control problems caused by fast fading in a direct-sequence multiple-access network","authors":"D. Torrieri","doi":"10.1109/MILCOM.2001.986084","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986084","url":null,"abstract":"When power control is used in a cellular network, the base station attempts to either directly or indirectly track the received power of the desired signal from a mobile. As the fading rate increases, the tracking ability of a direct-sequence code-division multiple-access system deteriorates, and the power-control accuracy declines. It is shown that a large performance degradation occurs when the instantaneous signal level cannot be accurately measured, even when the channel-code interleaving is perfect. An alternative that is assumed by many authors is to measure a long-term-average signal level that averages out the fast fading effects. However it is shown that this approach is less viable than attempting to track the instantaneous signal level even if the latter results in large errors.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.986020
D. Yuan, Qian Wang, Peng Zhang
In this paper according to the analysis of the characteristics of multilevel codes (MLC) and space-time block codes (STBC), a concatenation scheme combining MLC and STBC is proposed over Rayleigh fading channels. According to the fact that the MLC system can achieve optimal performance by the BP (block partitioning) rule, the optimal set partitioning of the MLC-STBC system is investigated in this paper. After the analysis and computer simulations, it is proved that the MLC-STBC system has the same optimal set partitioning as the MLC system.
{"title":"The research for optimal mapping strategies for concatenation scheme (MLC-STBC) in Rayleigh fading channels","authors":"D. Yuan, Qian Wang, Peng Zhang","doi":"10.1109/MILCOM.2001.986020","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.986020","url":null,"abstract":"In this paper according to the analysis of the characteristics of multilevel codes (MLC) and space-time block codes (STBC), a concatenation scheme combining MLC and STBC is proposed over Rayleigh fading channels. According to the fact that the MLC system can achieve optimal performance by the BP (block partitioning) rule, the optimal set partitioning of the MLC-STBC system is investigated in this paper. After the analysis and computer simulations, it is proved that the MLC-STBC system has the same optimal set partitioning as the MLC system.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985847
J. Rajkowski, K. Brayer
The protocol set for the Global Grid is addressed. The paper provides a rationale for specifying a core protocol set, the methodology for determining the protocols included and a discussion of the extensibility of the core protocol set to address support for user-specific applications.
{"title":"The core protocol set for the Global Grid","authors":"J. Rajkowski, K. Brayer","doi":"10.1109/MILCOM.2001.985847","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985847","url":null,"abstract":"The protocol set for the Global Grid is addressed. The paper provides a rationale for specifying a core protocol set, the methodology for determining the protocols included and a discussion of the extensibility of the core protocol set to address support for user-specific applications.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134518262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985811
Beongku An, S. Papavassiliou
We propose a mobility-based hybrid multicast routing (MHMR) protocol suitable for mobile ad-hoc networks. The main features that our proposed protocol introduces are the following: (a) a mobility based clustering and group based hierarchical structure, in order to support stability and scalability effectively; (b) a group based (limited) mesh structure and forwarding tree concepts, in order to support mesh topology robustness which simultaneously provides "limited" redundancy and efficiency of tree forwarding; (c) a combination of proactive and reactive concepts which provide the low route acquisition delay of proactive techniques and the low overhead of reactive methods. The performance evaluation of the proposed protocol is achieved via modeling and simulation. The corresponding results demonstrate the proposed multicast protocol's efficiency in terms of packet delivery ratio, scalability, control overhead and end-to-end delay as a function of mobility, packet generation rate and multicast group size.
{"title":"A mobility-based hybrid multicast routing in mobile ad-hoc wireless networks","authors":"Beongku An, S. Papavassiliou","doi":"10.1109/MILCOM.2001.985811","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985811","url":null,"abstract":"We propose a mobility-based hybrid multicast routing (MHMR) protocol suitable for mobile ad-hoc networks. The main features that our proposed protocol introduces are the following: (a) a mobility based clustering and group based hierarchical structure, in order to support stability and scalability effectively; (b) a group based (limited) mesh structure and forwarding tree concepts, in order to support mesh topology robustness which simultaneously provides \"limited\" redundancy and efficiency of tree forwarding; (c) a combination of proactive and reactive concepts which provide the low route acquisition delay of proactive techniques and the low overhead of reactive methods. The performance evaluation of the proposed protocol is achieved via modeling and simulation. The corresponding results demonstrate the proposed multicast protocol's efficiency in terms of packet delivery ratio, scalability, control overhead and end-to-end delay as a function of mobility, packet generation rate and multicast group size.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985755
P. Stenumgaard, S. Linder
Co-location between digital radio systems and civilian electronic equipment can lead to severe interference problems. Unintentional radiated electromagnetic emission can increase the bit error probability (BEP) in the digital radio receiver, and thus reduce the range of secure operation. Furthermore the intersystem interference causes a reduction of the jamming resistance. In this paper, the corresponding decrease of the operating range to compensate for this increase in BEP is determined Furthermore, the increase of the operating range for a hostile jammer is determined for a chosen example. The results are visualized as simulated coverage diagrams for chosen terrain environments. The analyses show that the operating range is decreased with approximately 25% for a co-location distance of 20 meters between the radio receiver and disturbing COTS (commercial of the shelf) equipment, if typical measured emission levels are used. In this scenario a hostile jammer gets nearly 50% larger operating range compared to a scenario without the COTS-computers. If a part of the emission equals the EN 55022 Class B emission limit, required for commercial equipment sold in the European Union, a range reduction of 50% is obtained. Thus, the overall conclusion is that interference from COTS can cause severe reductions of operating range for digital communication links. This interference can also have significant impact on the jamming resistance. These are important drawbacks that must be considered before co-locating COTS equipment close to tactical communication systems.
{"title":"Combat radio system range reduction due to radiated electromagnetic interference from COTS electronics","authors":"P. Stenumgaard, S. Linder","doi":"10.1109/MILCOM.2001.985755","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985755","url":null,"abstract":"Co-location between digital radio systems and civilian electronic equipment can lead to severe interference problems. Unintentional radiated electromagnetic emission can increase the bit error probability (BEP) in the digital radio receiver, and thus reduce the range of secure operation. Furthermore the intersystem interference causes a reduction of the jamming resistance. In this paper, the corresponding decrease of the operating range to compensate for this increase in BEP is determined Furthermore, the increase of the operating range for a hostile jammer is determined for a chosen example. The results are visualized as simulated coverage diagrams for chosen terrain environments. The analyses show that the operating range is decreased with approximately 25% for a co-location distance of 20 meters between the radio receiver and disturbing COTS (commercial of the shelf) equipment, if typical measured emission levels are used. In this scenario a hostile jammer gets nearly 50% larger operating range compared to a scenario without the COTS-computers. If a part of the emission equals the EN 55022 Class B emission limit, required for commercial equipment sold in the European Union, a range reduction of 50% is obtained. Thus, the overall conclusion is that interference from COTS can cause severe reductions of operating range for digital communication links. This interference can also have significant impact on the jamming resistance. These are important drawbacks that must be considered before co-locating COTS equipment close to tactical communication systems.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116234627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985767
D. Gregg, W. Blackert, D. Heinbuch, D. Furnanage
Denial of service (DoS) attacks come in a variety of types and can target groups of users, individual users, or entire computer systems. With the ever-increasing reliance on networked information systems for command and control of military systems - not to mention communications infrastructures - relatively simple attacks that degrade or deny service can have devastating effects. The critical importance of protection from DoS attacks is well recognized by the DoD and in fact, the USA National Computer Security Center defines INFOSEC to include "measures and controls to protect infrastructure against denial of service". There are basically three levels of DoS attacks, growing both in sophistication and seriousness of attack effects. The simplest attack exploits errors and bugs in the design and source code of a network operating system. The second level of attack exploits known artifacts of a particular system implementation or protocol, often due to limited storage or capacity, to introduce delay, to saturate a system, or otherwise limit accessibility. The third and most damaging level of attack uses very specific features of the network protocol to mount the attack. These attacks are specifically designed to look like normal usage. We have modeled and validated five different DoS attacks. We have executed these attack models against a validated model of a target network whose architecture and stochastic behavior is varied for analysis purposes. We are currently conducting a systems analysis using these models and are looking across the protocol stack and target network for attack effects. This paper describes the analysis of one attack's effectiveness by varying the attack rate, server time out, and connection settings. Output from our model includes probability of denied service, delay and outage time, and correlations under attack and no attack conditions. Our objective is to characterize attack effects and to ultimately derive mitigation techniques and indications and warnings.
{"title":"Assessing and quantifying denial of service attacks","authors":"D. Gregg, W. Blackert, D. Heinbuch, D. Furnanage","doi":"10.1109/MILCOM.2001.985767","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985767","url":null,"abstract":"Denial of service (DoS) attacks come in a variety of types and can target groups of users, individual users, or entire computer systems. With the ever-increasing reliance on networked information systems for command and control of military systems - not to mention communications infrastructures - relatively simple attacks that degrade or deny service can have devastating effects. The critical importance of protection from DoS attacks is well recognized by the DoD and in fact, the USA National Computer Security Center defines INFOSEC to include \"measures and controls to protect infrastructure against denial of service\". There are basically three levels of DoS attacks, growing both in sophistication and seriousness of attack effects. The simplest attack exploits errors and bugs in the design and source code of a network operating system. The second level of attack exploits known artifacts of a particular system implementation or protocol, often due to limited storage or capacity, to introduce delay, to saturate a system, or otherwise limit accessibility. The third and most damaging level of attack uses very specific features of the network protocol to mount the attack. These attacks are specifically designed to look like normal usage. We have modeled and validated five different DoS attacks. We have executed these attack models against a validated model of a target network whose architecture and stochastic behavior is varied for analysis purposes. We are currently conducting a systems analysis using these models and are looking across the protocol stack and target network for attack effects. This paper describes the analysis of one attack's effectiveness by varying the attack rate, server time out, and connection settings. Output from our model includes probability of denied service, delay and outage time, and correlations under attack and no attack conditions. Our objective is to characterize attack effects and to ultimately derive mitigation techniques and indications and warnings.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-28DOI: 10.1109/MILCOM.2001.985758
G. Wyman, G.R. Bradbeer, S. Hurley, R. Taplin, D.H. Smith
The electromagnetic spectrum is a limited resource which is rapidly becoming saturated, and with the trend to charge users, efficient use is critical. Military users must react to different allotments and adapt to the prevailing conditions. The objective of using available bandwidth efficiently, while, at the same time, minimising interference, gives rise to a number of variations of a problem usually referred to as the frequency assignment problem (FAP). Many algorithms have been developed in order to produce optimal or near optimal assignments of frequencies to defined sets of transmitters, but it is recognised that rigorous solutions are only possible for a very small population. Early assignment algorithms were limited in their application, constrained by the available processing speed and thus only considered a reduced set of constraints. The authors have developed a system for combat net radio that takes into account these extensions to the standard FAP It was concluded that the most effective algorithms start from a sequential solution and use a meta-heuristic algorithm such as tabu search or simulated annealing to find solutions for large network deployments.
{"title":"Improving efficiency in frequency assignment engines","authors":"G. Wyman, G.R. Bradbeer, S. Hurley, R. Taplin, D.H. Smith","doi":"10.1109/MILCOM.2001.985758","DOIUrl":"https://doi.org/10.1109/MILCOM.2001.985758","url":null,"abstract":"The electromagnetic spectrum is a limited resource which is rapidly becoming saturated, and with the trend to charge users, efficient use is critical. Military users must react to different allotments and adapt to the prevailing conditions. The objective of using available bandwidth efficiently, while, at the same time, minimising interference, gives rise to a number of variations of a problem usually referred to as the frequency assignment problem (FAP). Many algorithms have been developed in order to produce optimal or near optimal assignments of frequencies to defined sets of transmitters, but it is recognised that rigorous solutions are only possible for a very small population. Early assignment algorithms were limited in their application, constrained by the available processing speed and thus only considered a reduced set of constraints. The authors have developed a system for combat net radio that takes into account these extensions to the standard FAP It was concluded that the most effective algorithms start from a sequential solution and use a meta-heuristic algorithm such as tabu search or simulated annealing to find solutions for large network deployments.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}