Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473942
M. Bassiouni, M. Loper
Abstract/transfer syntaxes are used in the presentation layer of OSI communication networks to achieve data interoperability among heterogeneous nodes. We discuss the problems of using ASN.1 in the distributed interactive simulation (DIS) environment and present an approach for a modified transfer syntax that allows for the flexible decoding of transmitted protocol data units (PDUs) at the receiving host.<>
{"title":"Flexible transfer syntax for interoperable training networks","authors":"M. Bassiouni, M. Loper","doi":"10.1109/MILCOM.1994.473942","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473942","url":null,"abstract":"Abstract/transfer syntaxes are used in the presentation layer of OSI communication networks to achieve data interoperability among heterogeneous nodes. We discuss the problems of using ASN.1 in the distributed interactive simulation (DIS) environment and present an approach for a modified transfer syntax that allows for the flexible decoding of transmitted protocol data units (PDUs) at the receiving host.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473980
Bin Zhu, N. Ansari, Z. Siveski, Y. Bar-Ness
A thorough investigation on the convergence and stability of an adaptive synchronous CDMA receiver is presented. The receiver consists of a decorrelator at the first stage and an adaptive interference canceler at the second stage. By using a steepest descent algorithm to adaptively control the weights, the knowledge of the users' received powers is no longer required. It is shown that the system has good "near-far" resistance, and can approach optimum performance when the interfering users SNRs are high. Sufficient conditions for the receiver to achieve convergence are derived, and their properties are analyzed.<>
{"title":"Convergence and stability analysis of a synchronous adaptive CDMA-based PCS receiver","authors":"Bin Zhu, N. Ansari, Z. Siveski, Y. Bar-Ness","doi":"10.1109/MILCOM.1994.473980","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473980","url":null,"abstract":"A thorough investigation on the convergence and stability of an adaptive synchronous CDMA receiver is presented. The receiver consists of a decorrelator at the first stage and an adaptive interference canceler at the second stage. By using a steepest descent algorithm to adaptively control the weights, the knowledge of the users' received powers is no longer required. It is shown that the system has good \"near-far\" resistance, and can approach optimum performance when the interfering users SNRs are high. Sufficient conditions for the receiver to achieve convergence are derived, and their properties are analyzed.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473861
G. Orr, B. Rice
Estimations of the probabilities of bit errors in a fast-hopped M-ary-frequency-shift-keyed (MFSK) signal can be obtained by specifying a range of "scenarios" and an exhaustive set of "subscenarios" for which the occurrence or non-occurrence of symbol errors can be determined. The probability of symbol error for a given scenario is computed as the sum of the probabilities of occurrence of those subscenarios that produce symbol errors. An error is assumed to occur when the channel output of a most-often-jammed channel exceeds that of the channel containing the signal. An efficient method is presented for computing the probabilities of each possible subscenario. In the important case that there is only one jamming tone in the frequency band of a jammed hop, a partitioning technique enables precise calculations of these probabilities even when the number of hops combined is quite large. Monte Carlo techniques plus precise calculations in special cases are used to calculate the probabilities when the number of jamming tones per jammed hop is greater than one.<>
{"title":"Effect of multitone jammers on error rates of fast-hopped MFSK signals with no side information","authors":"G. Orr, B. Rice","doi":"10.1109/MILCOM.1994.473861","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473861","url":null,"abstract":"Estimations of the probabilities of bit errors in a fast-hopped M-ary-frequency-shift-keyed (MFSK) signal can be obtained by specifying a range of \"scenarios\" and an exhaustive set of \"subscenarios\" for which the occurrence or non-occurrence of symbol errors can be determined. The probability of symbol error for a given scenario is computed as the sum of the probabilities of occurrence of those subscenarios that produce symbol errors. An error is assumed to occur when the channel output of a most-often-jammed channel exceeds that of the channel containing the signal. An efficient method is presented for computing the probabilities of each possible subscenario. In the important case that there is only one jamming tone in the frequency band of a jammed hop, a partitioning technique enables precise calculations of these probabilities even when the number of hops combined is quite large. Monte Carlo techniques plus precise calculations in special cases are used to calculate the probabilities when the number of jamming tones per jammed hop is greater than one.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473836
S. Drakul, E. Biglieri
This paper describes a method for selecting pulse shapes for digital transmission over band- and power-limited channels. These signals are easily generated and lend themselves to a sampling receiver with limited complexity. In particular, we show how to generate an 8-dimensional signal basis that allows one to achieve a bit-error rate of 10/sup -5/ at E/sub b//N/sub 0/=3.6 dB with a spectral efficiency 1.7 bits/s/Hz.<>
{"title":"A method for selecting pulse shapes in digital transmission","authors":"S. Drakul, E. Biglieri","doi":"10.1109/MILCOM.1994.473836","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473836","url":null,"abstract":"This paper describes a method for selecting pulse shapes for digital transmission over band- and power-limited channels. These signals are easily generated and lend themselves to a sampling receiver with limited complexity. In particular, we show how to generate an 8-dimensional signal basis that allows one to achieve a bit-error rate of 10/sup -5/ at E/sub b//N/sub 0/=3.6 dB with a spectral efficiency 1.7 bits/s/Hz.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473889
M. Harrigan, K. H. Brockel, W. P. Sudnikovich, A. Vigants, W. Barnett, S. Conway-Clough, R. Wood, R. Edwards, J. Tóth, J. Sunshine
The 24-hour network performance management system (24NPMS) is a conceptual system proposed by the Network Management Automation/Integration Working Group (NMA/IWG) convened by the Space and Terrestrial Communications Directorate (S&TCD). 24NPMS will incorporate new traffic/propagation-prediction tools with existing tactical network management concepts and planned upgrades to provide the communications systems manager unprecedented real-time insight into anticipated performance of the networks, and replan accordingly. The effects of rain and multipath fading on the planning and management of tactical communications networks are incorporated.<>
{"title":"24-hour network performance management system","authors":"M. Harrigan, K. H. Brockel, W. P. Sudnikovich, A. Vigants, W. Barnett, S. Conway-Clough, R. Wood, R. Edwards, J. Tóth, J. Sunshine","doi":"10.1109/MILCOM.1994.473889","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473889","url":null,"abstract":"The 24-hour network performance management system (24NPMS) is a conceptual system proposed by the Network Management Automation/Integration Working Group (NMA/IWG) convened by the Space and Terrestrial Communications Directorate (S&TCD). 24NPMS will incorporate new traffic/propagation-prediction tools with existing tactical network management concepts and planned upgrades to provide the communications systems manager unprecedented real-time insight into anticipated performance of the networks, and replan accordingly. The effects of rain and multipath fading on the planning and management of tactical communications networks are incorporated.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473858
Peter A. J. Nagy
This paper presents a modulation classifier that is designed to handle multi-channel systems and situations where several digitally modulated signals are mixed. This is accomplished by dividing the analyzed signal into individual components. The signal components are located via a smoothed amplitude spectrum and individually classified by a single tone classifier that can handle CW, ASK, BPSK, and QPSK signals. FSK signals can also be handled since they are divided into two peaks, which are separately classified. Each peak in an FSK signal will be an ASK signal. The FSK signal is thus classified as two ASK signals, and by analyzing their correlation it can be established that they form an FSK signal.<>
{"title":"A modulation classifier for multi-channel systems and multi-transmitter situations","authors":"Peter A. J. Nagy","doi":"10.1109/MILCOM.1994.473858","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473858","url":null,"abstract":"This paper presents a modulation classifier that is designed to handle multi-channel systems and situations where several digitally modulated signals are mixed. This is accomplished by dividing the analyzed signal into individual components. The signal components are located via a smoothed amplitude spectrum and individually classified by a single tone classifier that can handle CW, ASK, BPSK, and QPSK signals. FSK signals can also be handled since they are divided into two peaks, which are separately classified. Each peak in an FSK signal will be an ASK signal. The FSK signal is thus classified as two ASK signals, and by analyzing their correlation it can be established that they form an FSK signal.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473917
C. Ward, S. Mitra, T. Phillips
Baratz and Segall (1988) have proposed a reliable link initialization procedure (RLIP) for use between terrestrial nodes connected by point-to-point links. This paper reexamines this area and introduces a new link management protocol, LAMSLM, appropriate for low Earth orbit (LEO) satellite networks. The principal criterion for the design of this protocol is to minimize the time spent by link initialization during link establishment so that data transmission time can be extended. This is accomplished by specifying a unique link closure mechanism that permits link reinitialization at a later stage. The paper includes the algorithm design and analysis of the impact on throughput efficiency.<>
{"title":"Re-examining the reliable link initialization procedure","authors":"C. Ward, S. Mitra, T. Phillips","doi":"10.1109/MILCOM.1994.473917","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473917","url":null,"abstract":"Baratz and Segall (1988) have proposed a reliable link initialization procedure (RLIP) for use between terrestrial nodes connected by point-to-point links. This paper reexamines this area and introduces a new link management protocol, LAMSLM, appropriate for low Earth orbit (LEO) satellite networks. The principal criterion for the design of this protocol is to minimize the time spent by link initialization during link establishment so that data transmission time can be extended. This is accomplished by specifying a unique link closure mechanism that permits link reinitialization at a later stage. The paper includes the algorithm design and analysis of the impact on throughput efficiency.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473855
M. Yukish, E. Peluso, S. Phoha, S. Sircar, J. Licari, A. Ray, I. Mayk
The paper evaluates the controllability of hierarchically organized C/sup 2/ systems with distributed components under conditions of imperfect communications. Controllability in a C/sup 2/ system depends on the number of levels of reporting in the C/sup 2/ hierarchy and the amount of aggregation of events in the feedback to the command levels. Following the discrete event dynamic systems concepts developed by Ramadge and Wonham (1987), a formal control language was defined with its alphabet consisting of controllable and uncontrollable discrete events at the lowest level in the C/sup 2/ hierarchy. At the next level of command, specific patterns of these events are recognized as words. These words, in turn, form the alphabet for a higher level formal control language generated by this automaton and recognized by the automaton at the next higher level of command. In this context, we establish the theoretical limits of control in a C/sup 2/ system for performing a given mission using a selected course of action (COA). Furthermore, introduction of imperfect communications which result in a loss of observability at the command level may render the controllable formal language associated with a selected COA to become uncontrollable. Control by the command level may also be diminished due to the unobservability of events not reported to this level. Theoretical limits of control are computed for a specific C/sup 2/ system modeled as a two level hierarchy of interacting automata under conditions of perfect observability, i.e., perfect communications and total observation of all events. Introduction of observability issues and communication delays in this model is used to demonstrate how a previously controllable language for a selected COA may become uncontrollable resulting in a loss of the mission. We demonstrate that a more conservative COA is then required to ensure that its associated formal language is controllable.<>
{"title":"Limits of control in designing distributed C/sup 2/ experiments under imperfect communications","authors":"M. Yukish, E. Peluso, S. Phoha, S. Sircar, J. Licari, A. Ray, I. Mayk","doi":"10.1109/MILCOM.1994.473855","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473855","url":null,"abstract":"The paper evaluates the controllability of hierarchically organized C/sup 2/ systems with distributed components under conditions of imperfect communications. Controllability in a C/sup 2/ system depends on the number of levels of reporting in the C/sup 2/ hierarchy and the amount of aggregation of events in the feedback to the command levels. Following the discrete event dynamic systems concepts developed by Ramadge and Wonham (1987), a formal control language was defined with its alphabet consisting of controllable and uncontrollable discrete events at the lowest level in the C/sup 2/ hierarchy. At the next level of command, specific patterns of these events are recognized as words. These words, in turn, form the alphabet for a higher level formal control language generated by this automaton and recognized by the automaton at the next higher level of command. In this context, we establish the theoretical limits of control in a C/sup 2/ system for performing a given mission using a selected course of action (COA). Furthermore, introduction of imperfect communications which result in a loss of observability at the command level may render the controllable formal language associated with a selected COA to become uncontrollable. Control by the command level may also be diminished due to the unobservability of events not reported to this level. Theoretical limits of control are computed for a specific C/sup 2/ system modeled as a two level hierarchy of interacting automata under conditions of perfect observability, i.e., perfect communications and total observation of all events. Introduction of observability issues and communication delays in this model is used to demonstrate how a previously controllable language for a selected COA may become uncontrollable resulting in a loss of the mission. We demonstrate that a more conservative COA is then required to ensure that its associated formal language is controllable.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473853
I. Mayk
This paper provides an inside look at the C2RM and documents some of its more subtle aspects. More specifically, the taxonomy of the C2RM and its use with object-oriented benchmarks for modeling command and control are illustrated. In addition, the paper reviews known criticisms of the C2RM, attempts to dispel some of the apparent myths, and clarifies with specific examples possible areas of confusion. The objective of the C2RM is to provide a standard, object-oriented, open system architecture, and open system interconnection framework to be used in modeling and simulating C2ed objects. In developing technology and applications of managed objects for command and control (i.e., C2 objects) it is intended to promote standardization of key C2 protocols and interfaces for interactions among heterogeneous and distributed resources of C2 systems.<>
{"title":"Inside the command and control reference model","authors":"I. Mayk","doi":"10.1109/MILCOM.1994.473853","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473853","url":null,"abstract":"This paper provides an inside look at the C2RM and documents some of its more subtle aspects. More specifically, the taxonomy of the C2RM and its use with object-oriented benchmarks for modeling command and control are illustrated. In addition, the paper reviews known criticisms of the C2RM, attempts to dispel some of the apparent myths, and clarifies with specific examples possible areas of confusion. The objective of the C2RM is to provide a standard, object-oriented, open system architecture, and open system interconnection framework to be used in modeling and simulating C2ed objects. In developing technology and applications of managed objects for command and control (i.e., C2 objects) it is intended to promote standardization of key C2 protocols and interfaces for interactions among heterogeneous and distributed resources of C2 systems.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-10-02DOI: 10.1109/MILCOM.1994.473822
S. V. Schell, D.L. Smith
Recent progress by several groups around the world shows that moving average linear time-invariant channels that distort digital communication signals can be identified using only second-order statistics, provided that certain conditions on the channel and data are met. In this paper, a subchannel response matching channel identification method is modified to exploit prior knowledge of the pulse-shaping filter. Computer simulations demonstrate the method's performance as a channel estimator and as an equalizer compared to appropriate lower bounds on the normalized channel estimation error and the bit error rate.<>
{"title":"Improved performance of blind equalization using prior knowledge of transmitter filter","authors":"S. V. Schell, D.L. Smith","doi":"10.1109/MILCOM.1994.473822","DOIUrl":"https://doi.org/10.1109/MILCOM.1994.473822","url":null,"abstract":"Recent progress by several groups around the world shows that moving average linear time-invariant channels that distort digital communication signals can be identified using only second-order statistics, provided that certain conditions on the channel and data are met. In this paper, a subchannel response matching channel identification method is modified to exploit prior knowledge of the pulse-shaping filter. Computer simulations demonstrate the method's performance as a channel estimator and as an equalizer compared to appropriate lower bounds on the normalized channel estimation error and the bit error rate.<<ETX>>","PeriodicalId":337873,"journal":{"name":"Proceedings of MILCOM '94","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}