Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13513
W. J. Garrison
In this tutorial, the author describes a powerful modeling tool which can dramatically reduce the amount of time it takes to simulate a computer system. The Network II.5 world view and the class of problems it addresses are discussed. A summary of Network II.5 capabilities is presented. To tie the tutorial concepts together, an example of using Network II.5 is included.<>
{"title":"Simulation of computer communications networks using Network II.5-without programming","authors":"W. J. Garrison","doi":"10.1109/MILCOM.1988.13513","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13513","url":null,"abstract":"In this tutorial, the author describes a powerful modeling tool which can dramatically reduce the amount of time it takes to simulate a computer system. The Network II.5 world view and the class of problems it addresses are discussed. A summary of Network II.5 capabilities is presented. To tie the tutorial concepts together, an example of using Network II.5 is included.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"29 1","pages":"1015-1019 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90056216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13437
M.P. Ristenbatt
A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<>
{"title":"Methodology for network communication vulnerability analysis","authors":"M.P. Ristenbatt","doi":"10.1109/MILCOM.1988.13437","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13437","url":null,"abstract":"A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"35 1","pages":"493-499 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79615046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13469
M. Yin, Vu Li
The authors present a recursive method to compute the joint distribution of bit errors for single-hop unslotted code-division multiple-access (CDMA) networks with deterministic packet lengths. The computational complexity of this method grows polynomially with M, the number of bits per packet, if the bit error probability equals 1 when the number of interferers exceeds a threshold. The complexity is O(M/sup 3/) for the L-channel model, which assumes that the probability of bit error is zero below the threshold L and 1 above the threshold. The throughput of the system can be improved by using a channel sensing protocol.<>
{"title":"Throughput of single-hop unslotted CDMA networks with fixed packet lengths","authors":"M. Yin, Vu Li","doi":"10.1109/MILCOM.1988.13469","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13469","url":null,"abstract":"The authors present a recursive method to compute the joint distribution of bit errors for single-hop unslotted code-division multiple-access (CDMA) networks with deterministic packet lengths. The computational complexity of this method grows polynomially with M, the number of bits per packet, if the bit error probability equals 1 when the number of interferers exceeds a threshold. The complexity is O(M/sup 3/) for the L-channel model, which assumes that the probability of bit error is zero below the threshold L and 1 above the threshold. The throughput of the system can be improved by using a channel sensing protocol.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"40 1","pages":"715-720 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84710998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13381
S. V. Pizzi, P. J. Leary, J. deLellis
The authors discuss the design of a frequency-hopped Ungerboeck-encoded 4-ary DPSK HF modem. First, they present a general channel model. Next, they present channel simulation results for rate-2/3 encoding of 8-ary and 4-ary differentially coherent DPSK. Both additive Gaussian white noise and Rayleigh fading channels are examined. The basic structure of the frequency-hopped waveform is elucidated, and it is shown how the Ungerboeck encoding is combined with the waveform to produce the frequency-hopped encoded modulation.<>
{"title":"A frequency-hopped Ungerboeck-encoded 4-ary DPSK modem","authors":"S. V. Pizzi, P. J. Leary, J. deLellis","doi":"10.1109/MILCOM.1988.13381","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13381","url":null,"abstract":"The authors discuss the design of a frequency-hopped Ungerboeck-encoded 4-ary DPSK HF modem. First, they present a general channel model. Next, they present channel simulation results for rate-2/3 encoding of 8-ary and 4-ary differentially coherent DPSK. Both additive Gaussian white noise and Rayleigh fading channels are examined. The basic structure of the frequency-hopped waveform is elucidated, and it is shown how the Ungerboeck encoding is combined with the waveform to produce the frequency-hopped encoded modulation.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"27 1","pages":"133-141 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13380
E. Biglieri, Y. Liu
The authors examine some of the features of an analytical representation for trellis-coded modulation (TCM), based on a single function f. They first consider the structure of the function, f, and observe that (i) it must be nonlinear, (ii) it can reflect certain phase-invariance properties of the code, and (iii) it can reflect the intrinsic parallel structure of the encoder. Then they provide a general parametric representation of f based on orthogonal Volterra series, and show some examples of code design for channels with intersymbol interference.<>
{"title":"On the analytical representation of trellis codes","authors":"E. Biglieri, Y. Liu","doi":"10.1109/MILCOM.1988.13380","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13380","url":null,"abstract":"The authors examine some of the features of an analytical representation for trellis-coded modulation (TCM), based on a single function f. They first consider the structure of the function, f, and observe that (i) it must be nonlinear, (ii) it can reflect certain phase-invariance properties of the code, and (iii) it can reflect the intrinsic parallel structure of the encoder. Then they provide a general parametric representation of f based on orthogonal Volterra series, and show some examples of code design for channels with intersymbol interference.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"66 1","pages":"127-131 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81723435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13506
N. Benvenuto, G. Guidotti, S. Pupolin
A novel structure of an acquisition circuit which implements a digital noncoherent correlation scheme is presented. In addition, a novel control strategy based on the maximum time to perform the search is proposed. It is concluded that this technique is helpful in hybrid frequency-hopping-direct-sequence systems because it performs a multiple dwell serial search in different hops. As a consequence, the acquisition system is more robust against partial band jammers and/or channel impairments (e.g., multipath).<>
{"title":"Performance of a digital acquisition circuit for hybrid FH-DS spread spectrum systems","authors":"N. Benvenuto, G. Guidotti, S. Pupolin","doi":"10.1109/MILCOM.1988.13506","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13506","url":null,"abstract":"A novel structure of an acquisition circuit which implements a digital noncoherent correlation scheme is presented. In addition, a novel control strategy based on the maximum time to perform the search is proposed. It is concluded that this technique is helpful in hybrid frequency-hopping-direct-sequence systems because it performs a multiple dwell serial search in different hops. As a consequence, the acquisition system is more robust against partial band jammers and/or channel impairments (e.g., multipath).<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"12 1","pages":"971-975 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80747235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13450
Richard J. Fulthorp
The author tracks the evolution of meteor burst technology advances in system architectures of operational systems, from the first data acquisition system (1977), through the addition of communications capabilities in 1980, to the fully interoperable communications/data acquisition networks now becoming available. He shows how advances in computer technology have allowed more sophisticated capabilities, while avoiding specialized system designs, leading to generalized networks able to support a myriad of applications. He concludes that interoperability requirements will become more important and will eventually become mandatory for ensuring product compatibility between vendor supplied systems. A figure illustrating the evolution of interoperability is presented.<>
{"title":"Recent technological advances in meteor burst communications","authors":"Richard J. Fulthorp","doi":"10.1109/MILCOM.1988.13450","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13450","url":null,"abstract":"The author tracks the evolution of meteor burst technology advances in system architectures of operational systems, from the first data acquisition system (1977), through the addition of communications capabilities in 1980, to the fully interoperable communications/data acquisition networks now becoming available. He shows how advances in computer technology have allowed more sophisticated capabilities, while avoiding specialized system designs, leading to generalized networks able to support a myriad of applications. He concludes that interoperability requirements will become more important and will eventually become mandatory for ensuring product compatibility between vendor supplied systems. A figure illustrating the evolution of interoperability is presented.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"30 3 1","pages":"593-597 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83320765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13393
S. Gubelmann, L. Edgar, J. Lane, B. Pawlowski, R. Otto
Within the military command, control, and communications (C/sup 3/) community interoperability has become a critical quality issue. A panel discussion is presented, providing a forum for: C/sup 3/ system users, C/sup 3/ system integrators, and C/sup 3/ hardware and software vendors to present their case so that a better understanding of the importance of interoperability in the development of quality C/sup 3/ products is reached.<>
{"title":"C/sup 3/ product quality and interoperability","authors":"S. Gubelmann, L. Edgar, J. Lane, B. Pawlowski, R. Otto","doi":"10.1109/MILCOM.1988.13393","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13393","url":null,"abstract":"Within the military command, control, and communications (C/sup 3/) community interoperability has become a critical quality issue. A panel discussion is presented, providing a forum for: C/sup 3/ system users, C/sup 3/ system integrators, and C/sup 3/ hardware and software vendors to present their case so that a better understanding of the importance of interoperability in the development of quality C/sup 3/ products is reached.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"429 1","pages":"201-203 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78769983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13408
Q. Wang, T. Gulliver, V. Bhargava, E. Felstead
The authors examine the performance of various types of error correcting codes under worst-case partial band noise jamming and worst-case multitone jamming using fast frequency-hopped, noncoherent M-ary frequency-shift-keying (NCMFSK) with optimum diversity. The bit-error-rate performance of some error correcting codes, which augments the results previously published on the subject, is given. New candidate codes with superior antijam performance are identified. It is concluded that, overall, the concatenated (255,241) Reed-Solomon outer code with the semiorthogonal convolutional inner code with 8-ary FSK has the best performance. If only nonconcatenated codes are considered, the rate 1/2 Trumpis code is best, and is only 0.89 dB worse than the best concatenated code.<>
{"title":"Coding for fast frequency hopped noncoherent MFSK spread spectrum communications under worst case jamming","authors":"Q. Wang, T. Gulliver, V. Bhargava, E. Felstead","doi":"10.1109/MILCOM.1988.13408","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13408","url":null,"abstract":"The authors examine the performance of various types of error correcting codes under worst-case partial band noise jamming and worst-case multitone jamming using fast frequency-hopped, noncoherent M-ary frequency-shift-keying (NCMFSK) with optimum diversity. The bit-error-rate performance of some error correcting codes, which augments the results previously published on the subject, is given. New candidate codes with superior antijam performance are identified. It is concluded that, overall, the concatenated (255,241) Reed-Solomon outer code with the semiorthogonal convolutional inner code with 8-ary FSK has the best performance. If only nonconcatenated codes are considered, the rate 1/2 Trumpis code is best, and is only 0.89 dB worse than the best concatenated code.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"40 1","pages":"299-305 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89791528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13470
J. Dill, J. Silvester
The authors present an acknowledgement scheme for receiver-directed code-division multiple-access (CDMA) networks that takes advantage of the inherent CDMA capabilities of the radios to ensure the success of acknowledgement transmissions with very high probability. This is accomplished by placing acknowledgements on a dedicated code channel that is guaranteed to be contention free. This results in a large improvement over the performance of acknowledgements on the normal data transmission channel. Throughput expressions are developed for the cases of perfect acknowledgement, normal acknowledgement, and dedicated channel acknowledgement.<>
{"title":"A dedicated channel acknowledgement protocol for multihop CDMA packet radio networks","authors":"J. Dill, J. Silvester","doi":"10.1109/MILCOM.1988.13470","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13470","url":null,"abstract":"The authors present an acknowledgement scheme for receiver-directed code-division multiple-access (CDMA) networks that takes advantage of the inherent CDMA capabilities of the radios to ensure the success of acknowledgement transmissions with very high probability. This is accomplished by placing acknowledgements on a dedicated code channel that is guaranteed to be contention free. This results in a large improvement over the performance of acknowledgements on the normal data transmission channel. Throughput expressions are developed for the cases of perfect acknowledgement, normal acknowledgement, and dedicated channel acknowledgement.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"33 1","pages":"721-725 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87975982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}