32,805 research outputs found

    Tactical communication systems based on civil standards: Modeling in the MiXiM framework

    Full text link
    In this paper, new work is presented belonging to an ongoing study, which evaluates civil communication standards as potential candidates for the future military Wide Band Waveforms (WBWFs). After an evaluation process of possible candidates presented in [2], the selection process in [1] showed that the IEEE 802.11n OFDM could be a possible military WBWF candidate, but it should be further investigated first in order to enhance or even replace critical modules. According to this, some critical modules of the physical layer has been further analyzed in [3] regarding the susceptibility of the OFDM signal under jammer influences. However, the critical modules of the MAC layer (e.g., probabilistic medium access CSMA/CA) have not been analysed. In fact, it was only suggested in [2] to replace this medium access by the better suited Unified Slot Allocation Protocol - Multiple Access (USAP-MA) [4]. In this regard, the present contribution describes the design paradigms of the new MAC layer and explains how the proposed WBWF candidate has been modelled within the MiXiM Framework of the OMNeT++ simulator.Comment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch (Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2, 2014, arXiv:1409.0093, 201

    Carrier Sense Random Packet CDMA Protocol in Dual-Channel Networks

    Get PDF
    Code resource wastage is caused by the reason that many hopping frequency (FH) sequences are unused, which occurs under the condition that the number of the actual subnets needed for the tactical network is far smaller than the networking capacity of code division netÂŹworking. Dual-channel network (DCN), consisting of one single control channel and multiple data channels, can solve the code resource wastage effectively. To improve the anti-jamming capability of the control channel of DCN, code division multiple access (CDMA) technology was introduced, and a carrier sense random packet (CSRP) CDMA protocol based on random packet CDMA (RP-CDMA) was proposed. In CSRP-CDMA, we provide a carrier sensing random packet mechanism and a packet-segment acknowledgement policy. Furthermore, an analytical model was developed to evaluate the performance of CSRP-CDMA networks. In this model, the impacts of multi-access interference from both inter-clusters and intra-clusters were analyzed, and the mathematical expressions of packet transmission success probability, normalized network throughput and signal interference to noise ratio, were also derived. Analytical and simulation results demonstrate that the normalized network throughput of CSRP-CDMA outperforms traditional RP-CDMA by 10%, which can guarantee the resource utilization efficiency of the control channel in DCNs

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Evaluation of network coding techniques for a sniper detection application

    Get PDF
    This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance improvements compared to classic flooding. It then presents an implementation of such protocols on mobile phones

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    Youth Internet Radio Network: Can we Innovate Democracy?

    Get PDF
    The Youth Internet Radio Network (YIRN) explores the connection between media technologies and citizenship, building on work by Hartley and Tacchi on 'radiocracy' (radio, democracy & development)4. YIRN combines: 1. Content creation: Establishing a network of young content providers across urban, regional, remote and Indigenous locations; 2. Ethnographic Action Research: Researching how young people interact as both producers and consumers of new media content and technology; 3. Technology Innovation: Identifying how different ‘communicative ecologies’ within the network influence and learn from each other; and, 4. Enterprise development: Understanding how culture and creativity combined with new technologies can be a seedbed for innovation and enterprise. Groups of young people across Queensland will be trained in how to produce content for a dedicated website - audio (music and speech), text (stories, reports, journals) and visuals (photographs, artworks). In addition, the network will allow groups of young people to interact with each other and with others (including Government) on topics and issues chosen by them - through forums, messaging services, message boards, blogs and emails. This research project investigates important questions about new media and participation. If the new economy is a network economy, if the new raw materials are information and knowledge, and if the new workforce needs content creation skills, how will these young people set about using and developing the YIRN network? How do creativity, access, networks and connectivity work together - what are the results of ensuring access and training at this level to a diverse and dispersed set of groups of young people? How does this network work as a communication space: how will the young people interact with each other? And how will they communicate with Government and other agencies? When they are participating in an interactive network are they simultaneously being citizens? Would enterprises built around creative content be civic institutions? This paper presents some of the challenges that face this research project as it seeks to discover how youth civic participation might be addressed through innovative Internet use by embracing practices that are often considered resistant and the domain of a 'subversive youth' (Hartley 1992, 21-42)

    Architecture for Mobile Heterogeneous Multi Domain Networks

    Get PDF
    Multi domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy

    Unicast Barrage Relay Networks: Outage Analysis and Optimization

    Full text link
    Barrage relays networks (BRNs) are ad hoc networks built on a rapid cooperative flooding primitive as opposed to the traditional point-to-point link abstraction. Controlled barrage regions (CBRs) can be used to contain this flooding primitive for unicast and multicast, thereby enabling spatial reuse. In this paper, the behavior of individual CBRs is described as a Markov process that models the potential cooperative relay transmissions. The outage probability for a CBR is found in closed form for a given topology, and the probability takes into account fading and co-channel interference (CCI) between adjacent CBRs. Having adopted this accurate analytical framework, this paper proceeds to optimize a BRN by finding the optimal size of each CBR, the number of relays contained within each CBR, the optimal relay locations when they are constrained to lie on a straight line, and the code rate that maximizes the transport capacity.Comment: 7 pages, 4 figures, 1 table, in IEEE Military Commun. Conf. (MILCOM), 201
    • 

    corecore