Tactical Wireless Communications and Networks
eBook - ePub

Tactical Wireless Communications and Networks

Design Concepts and Challenges

George F. Elmasry

Compartir libro
  1. English
  2. ePUB (apto para móviles)
  3. Disponible en iOS y Android
eBook - ePub

Tactical Wireless Communications and Networks

Design Concepts and Challenges

George F. Elmasry

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

Providing a complete description of modern tactical military communications and networks technology, this book systematically compares tactical military communications techniques with their commercial equivalents, pointing out similarities and differences. In particular it examines each layer of the protocol stack and shows how specific tactical and security requirements result in changes from the commercial approach. The author systematically leads readers through this complex topic, firstly providing background on the architectural approach upon which the analysis will be based, and then going into detail on tactical wireless communications and networking technologies and techniques.

  • Structured progressively: for readers needing an overall view; for those looking at the communications aspects (lower layers of the protocol stack); and for users interested in the networking aspects (higher layers of the protocol stack)
  • Presents approaches to alleviate the challenges faced by the engineers in the field today
  • Furnished throughout with illustrations and case studies to clarify the notional and architectural approaches
  • Includes a list of problems for each chapter to emphasize the important aspects of the topics covered
  • Covers the current state of tactical networking as well as the future long term evolution of tactical wireless communications and networking in the next 50 years
  • Written at an advanced level with scope as a reference tool for engineers and scientists as well as a graduate text for advanced courses

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Tactical Wireless Communications and Networks un PDF/ePUB en línea?
Sí, puedes acceder a Tactical Wireless Communications and Networks de George F. Elmasry en formato PDF o ePUB, así como a otros libros populares de Tecnología e ingeniería y Comunicaciones móviles e inalámbricas. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Editorial
Wiley
Año
2012
ISBN
9781118445990
Part One
Theoretical Basis
Chapter 1
Introduction
This book assumes that the reader has basic knowledge of wireless communications, including different types of wireless links, an understanding of the physical layer concepts, familiarity with medium access control (MAC) layer role, and so on. The reader is also expected to have a grasp of computer networks protocol stack layers, the Open System Interface (OSI) model, and some detailed knowledge of the network layer and its evolution to Internet Protocol (IP) with protocols such as Open Shortest Path First (OSPF) in addition to Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) over IP. Also, some knowledge of topics such as queuing theory is assumed. In the first part of this book, we will review some of these topics in the context of the tactical wireless communications and networking field before we cover the specifics of the field.
One can divide engineers and scientist in the field of tactical wireless communications and networking into two main groups. One group emphasizes the physical layer and dives into topics such as modulation techniques, error control coding at the data link layer (DLL), and the air interface resource management, and so on. The second group emphasizes networking protocols diving into the network layer, the transport layer, and applications. The first group, primarily composed of electrical engineers, likes to build radios assuming that everything above the DLL that has to interface with the radio is commercial-off-the-shelf (COTS). The second group, mostly composed of computer scientists, assumes that everything below the network layer is just a medium for communications. This book will explain tactical wireless communications and networking in a balanced manner, covering all protocol stack layers. This will provide the reader with a complete overarching view of both the challenges and the design concepts pertaining to tactical wireless communications and networking.
The evolution of tactical wireless communications and networks followed a significantly different path from that of commercial wireless communications and networks. A major milestone of tactical wireless communications development occurred in the 1970s, with the move from the old push-to-talk radios to the first spread spectrum and frequency hopping radios (with anti-jamming capabilities). Since World War II, commanders and soldiers on the ground have effectively communicated with radios forming voice broadcast subnets. These subnets, with their small area of coverage, functioned independent of a core network. Over time, the core networks were created to link tactical command nodes to the command-and-control (C2) nodes and then to headquarters. Commanders on the ground carried push-to-talk radios to communicate with their soldiers and relied on communications vehicles to link them to their superiors through a circuit switched network with microwave or satellite links. Although enhanced versions of these technologies are still deployed today, this book will consider them as legacy architecture and “a thing of the past.” This text focuses on the Global Information Grid (GIG) vision where the tactical theater is full of IP-based subnets that communicate seamlessly to each other with network management policies that enforce the military hierarchy.

1.1 The OSI Model

Every computer networking book, in one way or another, emphasizes the OSI model. The OSI model has its roots in the IBM definitions of networking computers from the early days. Defining such interfaces, while the science of computer networking was a new field, was an effective approach to accelerate the development of networking protocols. With the OSI model, there are different protocol stack layers, with each stack layer performing some predefined functions. These protocol stack layers are separated and utilize standard upward and downward interfaces. These layers work as separate entities and are peered with their corresponding layers in a remote node. Figure 1.1 demonstrates a conventional OSI with seven layers: the application layer, the session layer, the transport layer, the network layer, the DLL, the MAC layer, and the physical layer. These layers communicate to their peer layers (A and B are peer nodes) as shown by the horizontal arrows. Traffic flows up and down the stack, based on well-defined interfaces as indicated by the vertical arrows. Note that some text books may have different variations of these layers. For example, some textbooks may present a presentation layer under the application layer and before the session layer to perform data compression or encryption. Other models (especially for point-to-point links) omit the MAC layer, but we are especially interested in the MAC layer in this book since it is an important part of multiple-access tactical radios. Some models also refer to the IP layer as a network sub-layer. Here, we consider the IP layer as the network layer using IP. Regardless of these variations of the OSI model, the wide use of IP today has created a standard network layer with standard interfaces below it (IP ports to radios, point-to-point links, multiple access wired subnets such as Ethernet, optical links, etc.) and IP ports above clients, servers, voice over IP (VoIP), video over IP, and so on.
Figure 1.1 Conventional OSI protocol stack layers.
1.1
Let us summarize the OSI model before we jump into the tactical wireless communications and networking open architecture model. You can refer to other computer networking books to read more about the OSI model details.
The application layer is simply a software (SW) process that performs its intended application. Your e-mail is a simple example of an application process that runs on your PC or phone (which is essentially a network node).
The session layer has roots in the plain old telephony (POT) networks where call connection information is given to the transport layer. Today, the session layer could be used for authentication, access rights, and so on.
The transport layer can be understood as two peer processors (in nodes A and B in Figure 1.1) that perform the following necessary functions:
  • Break messages down into packets when transmitting, and reassemble when receiving.
  • If the layer...

Índice