TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks:...

30

Transcript of TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks:...

Page 1: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 2: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 3: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

TACTICAL WIRELESSCOMMUNICATIONSAND NETWORKS

Page 4: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 5: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

TACTICAL WIRELESSCOMMUNICATIONSAND NETWORKSDESIGN CONCEPTSAND CHALLENGES

George F. ElmasryXPRT Solutions, Inc., A DSCI Company, NJ, USA

A John Wiley & Sons, Ltd., Publication

Page 6: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

This edition first published 2012

© 2012 John Wiley and Sons Ltd

Registered officeJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply forpermission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with theCopyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, inany form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted bythe UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not beavailable in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand namesand product names used in this book are trade names, service marks, trademarks or registered trademarks of theirrespective owners. The publisher is not associated with any product or vendor mentioned in this book. Thispublication is designed to provide accurate and authoritative information in regard to the subject matter covered.It is sold on the understanding that the publisher is not engaged in rendering professional services. If professionaladvice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging-in-Publication Data

Elmasry, George F.Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry.

p. cm.Includes bibliographical references and index.ISBN 978-1-119-95176-6 (cloth)

1. Communications, Military. 2. Wireless communication systems. I. Title.UA940.E56 2012623.7′34–dc23

2012023990

A catalogue record for this book is available from the British Library.

Print ISBN: 9781119951766

Set in 10/12pt Times by Laserwords Private Limited, Chennai, India

Page 7: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Contents

About the Author xi

Foreword xiii

Preface xv

List of Acronyms xvii

Part I THEORETICAL BASIS

1 Introduction 31.1 The OSI Model 41.2 From Network Layer to IP Layer 61.3 Pitfall of the OSI Model 71.4 Tactical Networks Layers 91.5 Historical Perspective 10

Bibliography 11

2 The Physical Layer 132.1 Modulation 13

2.1.1 Signal-in-Space (SiS) 162.2 Signal Detection 22

2.2.1 Signal Detection in Two-Dimensional Space 242.2.2 Multidimensional Constellations for AWGN 28

2.3 Non-Coherent Demodulation 292.4 Signal Fading 292.5 Power Spectrum 312.6 Spread Spectrum Modulation 34

2.6.1 Direct Sequence Spread Spectrum 352.6.2 Frequency Hopping Spread Spectrum 38

2.7 Concluding Remarks 402.7.1 What Happens Before Modulation and After Demodulation? 402.7.2 Historical Perspective 40Bibliography 41

Page 8: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

vi Contents

3 The DLL and Information Theory in Tactical Networks 433.1 Information Theory and Channel Capacity 43

3.1.1 Uncertainty and Information 453.1.2 Entropy 463.1.3 Coding for a Discrete Memoryless Source 483.1.4 Mutual Information and Discrete Channels 503.1.5 The Binary Symmetric Channel (BSC) Model 533.1.6 Capacity of a Discrete Channel 54

3.2 Channel Coding, Error Detection, and Error Correction 573.2.1 Hamming Distance and Probability of Bit Error

in Channel Coding 583.2.2 Overview of Linear Block Codes 603.2.3 Convolutional Codes 623.2.4 Concatenated Coding and Interleaving 643.2.5 Network Coding versus Transport Layer Packet

Erasure Coding 653.3 Concluding Remarks 67

3.3.1 The Role of Information Theory and Codingin Tactical Wireless Communications and Networking 67

3.3.2 Historical Perspective 68Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 693.A.1 The Utilized RS Code 693.A.2 Packet Erasure Analysis 703.A.3 Imposed Tactical Requirements 77Bibliography 80

4 MAC and Network Layers in Tactical Networks 834.1 MAC Layer and Multiple Access Techniques 834.2 Queuing Theory 87

4.2.1 Statistical Multiplexing of Packets 874.2.2 Queuing Models 92

4.3 Concluding Remarks 1064.3.1 How Congestion Happens in Tactical Wireless Networks 1064.3.2 Historical Perspective 1074.3.3 Remarks Regarding the First Part of the Book 108Bibliography 110

Part II THE EVOLUTION OF TACTICAL RADIOS

5 Non-IP Tactical Radios and the Move toward IP 1135.1 Multistep Evolution to the Global Information Grid 1135.2 Link-16 Waveform 114

5.2.1 Link-16 Messages 1195.2.2 Link Layer Operations of Link-16 1205.2.3 JTIDS/LINK-16 Modulation and Coding 120

Page 9: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Contents vii

5.2.4 Enhancements to Link-16 1265.2.5 Concluding Remarks on Link-16 Waveform 129

5.3 EPLRS Waveform 1305.4 SINCGARS Waveform 1315.5 Tactical Internet (TI) 1315.6 IP Gateways 136

5.6.1 Throughput Efficiency 1365.6.2 End-to-End Packet Loss 137

5.7 Concluding Remarks 1375.7.1 What Comes after the GIG? 1375.7.2 Historical Perspective 137Bibliography 138

6 IP-Based Tactical Waveforms and the GIG 1416.1 Tactical GIG Notional Architecture 1416.2 Tactical GIG Waveforms 144

6.2.1 Wide-Area Network Waveform (WNW) 1446.2.2 Soldier Radio Waveform (SRW) 1636.2.3 High-Band Networking Waveform (HNW) 1646.2.4 Network Centric Waveform (NCW) 165

6.3 The Role of Commercial Satellite in the Tactical GIG 1666.4 Satellite Delay Analysis 1666.5 Networking at the Tactical GIG 1696.6 Historical Perspective 170

Bibliography 173

7 Cognitive Radios 1777.1 Cognitive Radios and Spectrum Regulations 1777.2 Conceptualizing Cognitive Radios 180

7.2.1 Cognitive Radio Setting (CRS) Parameters 1807.2.2 The Cognitive Engine 181

7.3 Cognitive Radios in Tactical Environments 1837.4 Software Communications Architecture (SCA) 184

7.4.1 The SCA Core Framework 1857.4.2 SCA Definitions 1857.4.3 SCA Components 1867.4.4 SCA and Security Architecture 188

7.5 Spectrum Sensing 1907.5.1 Multidimensional Spectrum Awareness 1907.5.2 Complexity of Spectrum Sensing 1937.5.3 Implementation of Spectrum Sensing 1957.5.4 Cooperative Spectrum Sensing 1997.5.5 Spectrum Sensing in Current Wireless Standards 200

7.6 Security in Cognitive Radios 2017.7 Concluding Remarks 201

Page 10: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

viii Contents

7.7.1 Development of Cognitive Radios 2017.7.2 Modeling and Simulation of Cognitive Radios 2027.7.3 Historical Perspective 202Bibliography 202

Part III THE OPEN ARCHITECTURE MODEL

8 Open Architecture in Tactical Networks 2078.1 Commercial Cellular Wireless Open Architecture Model 2088.2 Tactical Wireless Open Architecture Model 2108.3 Open Architecture Tactical Protocol Stack Model 211

8.3.1 Tactical Wireless Open Architecture Model Entities 2138.3.2 Open Architecture Tactical Wireless Model ICDs 216

8.4 The Tactical Edge 2198.4.1 Tactical Edge Definition 2198.4.2 Tactical Edge Analysis 220

8.5 Historical Perspective 222Bibliography 224

9 Open Architecture Details 2259.1 The Plain Text IP Layer and the Tactical Edge 2259.2 Measurement Based Resource Management 227

9.2.1 Advantages and Challenges of MBRM 2289.2.2 Congestion Severity Level 2299.2.3 Markov Chain Representation of MBAC 2319.2.4 Regulating the Flow of Traffic between Two Nodes 2339.2.5 Regulating the Flow of Traffic for Multiple Nodes 2339.2.6 Packet Loss from the Physical Layer 234

9.3 ICD I: Plain Text IP Layer to HAIPE 2389.4 ICD V: Plain Text IP Layer Peer-to-Peer 239

9.4.1 TCP Proxy over HAIPE 2399.4.2 VoIP Proxy over HAIPE 2419.4.3 Video Proxy over HAIPE 2479.4.4 RSVP Proxy over HAIPE 2489.4.5 Multicast Proxy over HAIPE 252

9.5 ICD X Cross Layer Signaling across the HAIPE 2559.6 Concluding Remarks 2589.7 Historical Perspective 258

Bibliography 259

10 Bringing Commercial Cellular Capabilities to TacticalNetworks 261

10.1 Tactical User Expectations 26210.2 3G/4G/LTE Technologies within the War Theater 26410.3 The Tactical Cellular Gateway 265

Page 11: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Contents ix

10.4 Deployment Use Cases 26710.4.1 Use Case I: Smartphone Tethered to a Soldier Radio

Waveform (SRW) Radio 26810.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 26910.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271

10.5 Concluding Remarks 272Bibliography 273

11 Network Management Challenges in Tactical Networks 27511.1 Use of Policy Based Network Management and Gaming Theory

in Tactical Networks 27511.2 Challenges Facing Joint Forces Interoperability 27711.3 Joint Network Management Architectural Approach 277

11.3.1 Assumptions and Concepts for Operations (ConOps) 27911.3.2 The Role of Gateway Nodes 28111.3.3 Abstracting Information 28211.3.4 Creating Path Information 28311.3.5 Sequence Diagram 285

11.4 Conflict Resolution for Shared Resources 28611.4.1 Tactical Network Hierarchy 28711.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 28711.4.3 Interfacing between the WIN-NM and the JWNM

for NCW Resources 28811.4.4 NCW Resource Attributes 289

11.5 Concluding Remarks 290Bibliography 291

Index 293

Page 12: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 13: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

About the Author

Dr. George F. Elmasry was born in Egypt and received a Bachelor of Science in ElectricalEngineering from Alexandria University, Egypt in 1985. He then continued on to receivea Master of Science and a Ph.D. in Electrical Engineering from New Jersey Institute ofTechnology (NJIT) in 1993 and 1999 respectively. He has 20 years of industrial experiencein commercial and defense telecommunications and is currently leading XPRT Solutions – aDSCI Company which specializes in research and development of communications systemswith an emphasis on Department of Defense Cyber, Command, Control, Communications,Computers, and Combat-support (C6) space.

Dr. Elmasry has an interdisciplinary background in electrical and computer engineeringand computer science. He has much experience in many areas of these fields, includingresearch, patenting, publication, and grant proposal activities. He has an in-depth knowl-edge of commercial and tactical telecommunication systems, experience with technical taskleads, and team building for middle and upper management. Dr. Elmasry has over 50publications and patents, which pertain to network management, network operations, qual-ity of service and resource management, network and transport layer coding, joint source andchannel coding, source coding, modeling and simulation of large-scale networks, securityand information assurance, cross layer signaling, topology management, multidimensionalinterleaving, and spread spectrum communications.

In addition to his publications and patents, Dr. Elmasry has been a member of the technicalcommittee for the annual Military Communication Conference (Milcom) since 2003, wherehe has led session organization, paper reviews, and session chairing. Dr. Elmasry is also asenior member of the Institute of Electrical and Electronics Engineers (IEEE), a memberof the Armed Forces Communications and Electronics Association (AFCEA) International,a member of Sigma Xi, and a member of Alpha Epsilon Lambda – NJIT graduate-studenthonor society. Dr. Elmasry holds countless awards, including the prestigious HashimotoAward for achievement and academic excellence in electrical and computer engineering.

Page 14: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 15: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Foreword

This textbook authored by Dr. George Elmasry, is the definitive text on the subject of tacticalwireless networks. Dr. Elmasry, General Manager of XPRT Solutions, Inc., a subsidiary ofDSCI, is an author of numerous peer reviewed papers, inventor, and patent holder, andrecognized authority regarding the subject matter. The text provides a comprehensive viewand unique insight in its treatment of tactical wireless networks by bridging theory withpractical examples. In creating this work, Dr. Elmasry has succeeded in creating a thoroughand reliable reference source for network engineers and scientists.

Steven DeChiaroCEO and Chairman of the Board, DSCI

Page 16: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 17: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Preface

Before I can present design concepts or tactical wireless communications and networkchallenges, I feel the need to mention the challenges of writing for a field where someinformation is not available for public domain and cannot be included in this book’s context.Another challenge is the use of military jargon and the extensive number of abbreviations(and abbreviations of abbreviations!) in the field. Engineering books are naturally dry, and Ihave attempted to make it light by presenting the concepts in layman’s terms before divinginto the technical details. I am structuring this book in such a way as to make it useful fora specialized graduate course in tactical communications and networking, or as a referencebook in the field.

My own experience is similar to that of many engineers and scientists who movedfrom the commercial wireless communications and networks field, during the Internet boomin the 1990s, to the tactical wireless communications and networks field during the boom atthe turn of the millennium. My unique experience is a result of the diverse projects I havebeen involved with. They have enabled me to see the larger picture of tactical networks,and have positioned me in such a place that I can take the challenge of writing this book.

The book, in many ways, draws a correlation between tactical wireless networks and com-mercial wireless networks, in order to make the reader aware of their different requirements,expectations, needs, and constraints of information assurance, and so on. I have always beeninfluenced by how, at the turn of the millennium, commercial wireless networks have mademore technological leaps than tactical wireless networks. Historically, in the USA, defense-based technologies were decades ahead of commercial technologies. The Internet beganas a DARPA project, and defense networks were connected decades before academia andcommercial entities had such technology. With the technological leaps in commercial wire-less networks, expectations of tactical wireless networks increased and have yet to be fullymet. If a soldier can use a lightweight powerful smart phone in his day-to-day life, thesame soldier would question the necessity of carrying a few pounds of tactical radio, withdiminished capabilities and features. In today’s tactical wireless networks, security features(such as intrusion detection, anti-jamming, etc.) are certainly ahead of commercial networks.However, applications in tactical wireless radios are no match for the commercial capabil-ities that came with 3G and 4G wireless devices. Also, the scalability and price cuts incommercial wireless services seem to be decades ahead. One cannot expect the price oftactical communication equipment to be comparable to commercial wireless, given the lim-ited market size. However, one hopes that the success of commercial wireless can influencethe model used in tactical networks, in order to achieve cost saving. Reduced cost leads

Page 18: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

xvi Preface

to leaps in technology, since funding can be channeled towards developing more advancedcapabilities.

This book presents tactical wireless communications and networks in a breakdown model.The ultimate goal is to be of help to different types of readers, such as graduate studentsspecializing in communications, or simply newcomers to the field. This book introducestactical wireless communications and networks in terms of protocol stack layers (just likecommercial wireless communications and networks), and points to the differences and simi-larities between tactical and commercial models. This book should also help engineers to geta better understanding of how to face the challenges in this field, through the use of conceptsand design approaches introduced here, such as the open architecture model, and cross layersignaling. Hopefully this text can help engineers and scientists gear tactical network designsto a more manageable model, by breaking the general problem of a tactical wireless networknode into smaller entities of what needs to be done at each stack layer. I have long beenan advocate of open architecture in tactical wireless communications networking. For themost part, I am presenting tactical wireless networks with an open architecture framework.Tactical wireless networks are not the same as commercial wireless networks by any means.However, some engineering concepts that have proven successful in the commercial model,especially the open architecture concept, can be adapted by tactical wireless networks.

This book is presented in three parts as follows:The first part is composed of four chapters, which focuses on theoretical basis. Chapter 1

is an introductory chapter. Chapter 2 discusses the physical layer as it relates to tacticalradios. Chapter 3 discusses the Data Link Layer (DLL) layer and information theory inthe context of tactical networks. Chapter 4 covers the Medium Access Control (MAC) andnetwork layers as they apply to tactical networks, with some focus on Queuing Theory.

The second part is composed of three chapters and focuses on the evolution of tacticalradios. In Chapter 5, legacy radios are presented with Link-16, as an example of its genera-tion of spread-spectrum frequency-hopping radios. The Tactical Internet with IP touch pointsis introduced as well. Chapter 6 covers the IP-based tactical radio, with a focus on the JTRSWNW waveform as the representative of its generation of radios. The Global InformationGrid vision is introduced as the natural evolution of the Tactical Internet. Chapter 7 coverscognitive radios as the futuristic generation of tactical radios.

The third part is composed of four chapters dedicated to the open architecture model oftactical networks and the seamless interoperability between tactical and commercial tech-nologies. Chapter 8 introduces an open architecture model for tactical networks. Chapter 9details some of this open architecture model’s interface control documents (ICDs) and thedeviations from the commercial model that require add-on functions to the different protocolstack layers. Chapter 10 is dedicated to the integration of commercial cellular technologyinto the tactical theater. Chapter 11 discusses the challenges of network management andnetwork operations in tactical networks.

I certainly hope that this book helps the different readers to get a better grasp of the verycomplex problems of tactical wireless communications and networks. I also hope that it willcontribute to the advancement of the field.

George F. Elmasry

Page 19: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

List of Acronyms

2G second generation3G third generation3GPP third generation partnership project4G fourth generationACK acknowledgmentADC analog-to-digital converterADD application deployment descriptorADNS automated digital network systemAFH adaptive frequency hoppingAI artificial intelligenceAIM advanced InfoSec machineAMPS advanced mobile phone systemAN airborne networkAoC area of coverageAPI application programming interfaceARQ automatic repeat requestASCII American standards code for information interchangeASIP advanced system improvement programAWGN additive white Gaussian noiseBACN battlefield airborne communications nodeBER bit error rateBFSK binary frequency shift keyingBGP border gateway protocolBPSK binary phase shift keyingBSC binary symmetric channelC2 command and controlCAC call admission controlCCSK cyclic code shift keyingCDMA code division multiple accessCDS connected dominating setCLS cross layer signalingCNR combat net radio

Page 20: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

xviii List of Acronyms

ComSec communications securityConOps concepts for operationsCONUS continental United StatesCORBA common object request broker architectureCoS class of serviceCOTS commercial-off-the-shelfCPFSK continuous phase frequency-shift keyingCPU central processing unitCR cognitive radioCRC cyclic redundancy checkCRS cognitive radio settingsCS connecting setCSDF cyclic spectral density functionCSMA carrier sense multiple accessDARPA Defense Advanced Research Projects AgencyDAC digital-to-analogdB decibelDCD device configuration descriptorDFA dynamic frequency accessDGSN distributed GPRS support nodeDiffServ differentiated servicesDISN Defense Information Systems NetworkDLL data link layerDNS domain name serviceDoD Department of DefenseDPD device package descriptorDRSN Defense Red Switch NetworkDS direct sequenceDS dominating setDSCP differentiated services code pointDSL digital subscriber lineDSN dominating set neighborDSP digital signal processorsDTV digital televisionDVS DISN video servicesEACK explicit acknowledgmentECE explicit congestion experiencedECN explicit congestion notificationECT ECN capable transportEDCA enhanced distributed channel accessEF expedited forwardingEGP exterior gateway protocolEPLRS enhanced position location reporting systemESP encapsulating security payloadFCC Federal Communications CommissionFCI framework control interfaces

Page 21: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

List of Acronyms xix

FDM frequency division multiplexingFDMA frequency division multiple accessFEC forward error correctionFH frequency hoppingFIFO first-in-first-outFPGA field-programmable gate arraysFSI framework services interfacesFSK frequency shift keyingGDC generic discovery clientGDS generic discovery serverGGSN gateway GPRS support nodeGIG global information gridGN gateway nodeGNU GNU’s not UnixGPP general purpose processorsGPRS general packet radio serviceGPS global positioning systemGRE generic routing encapsulationGSM global system for mobile communicationsGW gatewayHAIPE high assurance internet protocol encryptionHDP HAIPE discovery protocolHF high frequencyHMS handheld manpack and small-form-fitHNW high-band networking waveformHQ headquarterHz hertzI/O input/outputIA information assuranceICD interface control documentIDL interface definition languageIdM identity managementIEEE Institute of Electrical and Electronics EngineeringIGMP internet group management protocolIMTS improved mobile telephone serviceINC internet network controllerInfoSec information securityIntServ integrated servicesIP Internet ProtocolIP v4 Internet Protocol version 4IP v6 Internet Protocol version 6IPSec Internet Protocol SecurityISDN integrated services digital networkJDIICS Joint Defense Information Infrastructure Control SystemJGN joint gateway nodeJNMS joint network management system

Page 22: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

xx List of Acronyms

JTIDS joint tactical information distribution systemJTRS joint tactical radio systemskHz kilohertzLAN local area networkLDAP lightweight directory access protocolLPD low probability of detectionLPI low probability of interceptionLSA link state advertisementLSD link state databaseLSU link state updateLTE long term evolutionMAC medium access controlMANET mobile ad hoc networkingM-ary M-arrayMBAC measurement based admission controlMBRM measurement based resource managementMCDS minimum connected dominating setMDL mobile data linkMDS maximum distance separableMDS minimum dominating setMI mobile InternetML maximum likelihoodMPEG Moving Picture Expert GroupMSEC message securityMSE mobile subscriber equipmentMSK minimum shift keyingMTS mobile telephone serviceMTU maximum transmission unitNACK negative acknowledgmentNASA National Aeronautics and Space AdministrationNCS network control stationNCS-E EPLRS network control centerNCW network centric waveformNetOps network operationsNIPRNET Non-secure Internet Protocol Router NetworkNM network managementNMS network management systemNP non-deterministically polynomialNSA National Security AgentODMA orthogonal domain multiple accessOE operating environmentOFDMA orthogonal frequency division multiple accessOLSR optimized link state routing protocolOQPSK offset QPSK

Page 23: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

List of Acronyms xxi

OS operating systemOSI open system interfaceOSPF open shortest path firstOTM on-the-moveP2DP pack-2 double pulseP2SP pack-2 single pulseP4SP pack-4 single pulsePBNM policy based network managementpdf probability distribution functionPIM protocol-independent multicastPN pseudo-noisePoP points-of-presencePOSIX portable operating system interfacePOT plain old telephonyPPPoE point-to-point protocol over EthernetPSK phase shift keyingPUE primary user emulationQAM quadrature amplitude modulationQoS quality of serviceQPSK quadrature phase shift keyingR&D research and developmentRBCI radio based combat IDRCC radio common carrierRF radio frequencyRFC request for commentsROCs receiver operating characteristicsROSPF radio OSPFRS Reed–SolomonRSVP resource reservation protocolRSVP-AGG RSVP aggregateRTCP real-time transport controlRTP real-time protocolRTT round-trip timingSAD software assembly descriptorSBU sensitive but unclassifiedSCA software communications architectureSCD software component descriptorSCI sensitive compartmented informationSDR software defined radioSDU secure data unitSER symbol error rateSHF super high frequencySINCGARS single channel ground and airborne radio systemSIP system improvement program

Page 24: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

xxii List of Acronyms

SIP session initiation protocolSIPRNET secret Internet Protocol router networkSiS signal-in-spaceSLA service level agreementSMS short message serviceSNMP simple network management protocolSNR signal-to-noise-ratioSOA service oriented architectureSOAP simple object access protocolSoS speed of serviceSPD software package descriptorSPI service provider interfaceSPR software programmable radioSRW soldier radio waveformSTD-DP standard-double-pulseTCG tactical cellular gatewayTCP transmission control protocolTDMA time division multiple accessTH time hoppingTI tactical internetTMG tactical multinet gatewayTOC tactical operational commandToS type of serviceTransSec transmission securityTS top secretTSEC transmission securityUCDS unifying connected dominating setUDP user datagram protocolUHF ultra high frequencyU-MAC universal media access controlUML unified modeling languageUMTS universal mobile telephone systemUSAP unifying slot assignment protocolUSB universal serial busUSRP universal software radio peripheralUWB ultra widebandVHF very high frequencyVoIP voice over IPWAN wide area networkWIN-T warfighter information network – tacticalWNW wideband networking waveformWRAN wireless regional area networkWSGA wireless system genetic algorithmXML extensible markup language

Page 25: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Part OneTheoretical Basis

Page 26: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references
Page 27: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

1Introduction

This book assumes that the reader has basic knowledge of wireless communications,including different types of wireless links, an understanding of the physical layer concepts,familiarity with medium access control (MAC) layer role, and so on. The reader is alsoexpected to have a grasp of computer networks protocol stack layers, the Open SystemInterface (OSI) model, and some detailed knowledge of the network layer and its evolutionto Internet Protocol (IP) with protocols such as Open Shortest Path First (OSPF) in additionto Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) over IP. Also,some knowledge of topics such as queuing theory is assumed. In the first part of this book,we will review some of these topics in the context of the tactical wireless communicationsand networking field before we cover the specifics of the field.

One can divide engineers and scientist in the field of tactical wireless communications andnetworking into two main groups. One group emphasizes the physical layer and dives intotopics such as modulation techniques, error control coding at the data link layer (DLL), andthe air interface resource management, and so on. The second group emphasizes networkingprotocols diving into the network layer, the transport layer, and applications. The first group,primarily composed of electrical engineers, likes to build radios assuming that everythingabove the DLL that has to interface with the radio is commercial-off-the-shelf (COTS). Thesecond group, mostly composed of computer scientists, assumes that everything below thenetwork layer is just a medium for communications. This book will explain tactical wirelesscommunications and networking in a balanced manner, covering all protocol stack layers.This will provide the reader with a complete overarching view of both the challenges andthe design concepts pertaining to tactical wireless communications and networking.

The evolution of tactical wireless communications and networks followed a significantlydifferent path from that of commercial wireless communications and networks. A majormilestone of tactical wireless communications development occurred in the 1970s, with themove from the old push-to-talk radios to the first spread spectrum and frequency hoppingradios (with anti-jamming capabilities). Since World War II, commanders and soldiers on theground have effectively communicated with radios forming voice broadcast subnets. Thesesubnets, with their small area of coverage, functioned independent of a core network. Overtime, the core networks were created to link tactical command nodes to the command-and-control (C2) nodes and then to headquarters. Commanders on the ground carried push-to-talk

Tactical Wireless Communications and Networks: Design Concepts and Challenges, First Edition. George F. Elmasry.© 2012 John Wiley & Sons, Ltd. Published 2012 by John Wiley & Sons, Ltd.

Page 28: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

4 Tactical Wireless Communications and Networks

radios to communicate with their soldiers and relied on communications vehicles to linkthem to their superiors through a circuit switched network with microwave or satellite links.Although enhanced versions of these technologies are still deployed today, this book willconsider them as legacy architecture and “a thing of the past.” This text focuses on theGlobal Information Grid (GIG) vision where the tactical theater is full of IP-based subnetsthat communicate seamlessly to each other with network management policies that enforcethe military hierarchy.

1.1 The OSI Model

Every computer networking book, in one way or another, emphasizes the OSI model. TheOSI model has its roots in the IBM definitions of networking computers from the earlydays. Defining such interfaces, while the science of computer networking was a new field,was an effective approach to accelerate the development of networking protocols. Withthe OSI model, there are different protocol stack layers, with each stack layer performingsome predefined functions. These protocol stack layers are separated and utilize standardupward and downward interfaces. These layers work as separate entities and are peered withtheir corresponding layers in a remote node. Figure 1.1 demonstrates a conventional OSIwith seven layers: the application layer, the session layer, the transport layer, the networklayer, the DLL, the MAC layer, and the physical layer. These layers communicate to theirpeer layers (A and B are peer nodes) as shown by the horizontal arrows. Traffic flows upand down the stack, based on well-defined interfaces as indicated by the vertical arrows.Note that some text books may have different variations of these layers. For example, sometextbooks may present a presentation layer under the application layer and before the sessionlayer to perform data compression or encryption. Other models (especially for point-to-pointlinks) omit the MAC layer, but we are especially interested in the MAC layer in this book

Application

A B

Application

Session Session

Transport Transport

Network Network

DLL

MAC

DLL

MAC

PhyPhy

Figure 1.1 Conventional OSI protocol stack layers.

Page 29: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

Introduction 5

since it is an important part of multiple-access tactical radios. Some models also refer to theIP layer as a network sub-layer. Here, we consider the IP layer as the network layer usingIP. Regardless of these variations of the OSI model, the wide use of IP today has created astandard network layer with standard interfaces below it (IP ports to radios, point-to-pointlinks, multiple access wired subnets such as Ethernet, optical links, etc.) and IP ports aboveclients, servers, voice over IP (VoIP), video over IP, and so on.

Let us summarize the OSI model before we jump into the tactical wireless communicationsand networking open architecture model. You can refer to other computer networking booksto read more about the OSI model details.

The application layer is simply a software (SW) process that performs its intendedapplication. Your e-mail is a simple example of an application process that runs on your PCor phone (which is essentially a network node).

The session layer has roots in the plain old telephony (POT) networks where call con-nection information is given to the transport layer. Today, the session layer could be usedfor authentication, access rights, and so on.

The transport layer can be understood as two peer processors (in nodes A and B inFigure 1.1) that perform the following necessary functions:

• Break messages down into packets when transmitting, and reassemble when receiving.• If the layers below are not reliable (packet loss is encountered), a reliable end-to-end

protocol may be utilized by this layer.• Perform end-to-end flow control. Please refer to TCP flow control as an example of

this function.• Session multiplexing (if there are many low rate sessions between the same node pair),

and session splitting if there are high rate sessions going between the same node pair.

The network layer in the OSI model is ideally a single process per node. As you willsee later, this convention changes with the tactical model. This layer performs many tasksincluding packet-based flow control and routing. A network packet has a payload and aheader. The header contains the information needed for this process to perform its intendedfunctions (packet flow control, routing, etc.). Notice that with the layer independence ofthe OSI model, the header information of the network layer is independent of the headerinformation of the DLL layer. With the OSI model, each layer generates its own headerinformation. The network layer packet (including the header) is treated by the DLL as aset of information that needs to be delivered reliably to the peer processor. Each layergenerates its own header based on the information it has, or parameters passed from theadjacent layers. The network layer also generates its own control packets (e.g., Link StateUpdates–LSUs, route discovery packets, etc.). For the remainder of this book, we willadhere to the convention of referring to the IP layer as the network layer.

The data link layer , also known in some textbooks as the data link control layer , isa peer processor that ensures the reliability of the underlying bit pipe. The network layerabove can send packets reliably, based on the DLL protocols. The DLL treats the networklayer packets as a stream of information bits that need to be transmitted reliably. The DLLadds a header and trailer to the packet received from the network layer, forming a DLLframe. Note that this frame length is not constant since the network layer packets are ofvariable length. The DLL overhead size (headers and trailers) depends on the error control

Page 30: TACTICAL WIRELESS AND NETWORKS - Startseite · Tactical wireless communications and networks: design concepts and challenges / George F. Elmasry. p. cm. Includes bibliographical references

6 Tactical Wireless Communications and Networks

coding protocol used. Certain DLL protocols can stop transmission in the presence of errorsabove a specific threshold. Other DLL protocols may not have error correction capabilitiesand depend on the reliability of the transport layer. Other DLL protocols may have errordetection and/or error correction capabilities. How much reliability should be at the DLL;how much reliability should be at the higher layers of the protocol stack (on a hop-by-hopbasis); and how much reliability should be left for the transport layer (for an end-to-end pathover the network) is a matter of debate. Network coding is an interesting area of researchthat you should look at to understand this much-debated topic. Cross layer signaling canalso be used to optimize the performance of the protocol stack where the tradeoff betweenDLL overhead and transport layer overhead needed for reliability can be optimized.

The medium access control layer , or MAC layer, plays a major role in multiple accesswaveforms. Contrary to point-to-point links, with multiple access waveforms, this layeris responsible for managing the multiple access media. Protocols for collision avoidance(making sure two nodes do not transmit on multiple access media at the same time) are atthe heart of the MAC layer. In this book, you will see examples of tactical IP radios wheredifferent types of medium control are implemented.

The physical layer transmits a sequence of bits over the physical channel. There are manyphysical media used today ranging from your cable/digital subscriber line (DSL) modemat home to your cellular phone, Ethernet cable, and optical media. Each medium has itsmodulation/demodulation technique that maps a bit or a sequence of bits to a signal. Noticethat the bit stream from a MAC frame has to be transmitted in a synchronous manner sinceeach bit needs a specific time duration t to be transmitted. The medium’s speed or rate inbits per second is 1/t . The MAC layer emits bits to the physical layer at this rate. Intermitperiods between MAC frames (when the MAC layer has no information to send) meansthat the channel is idle for these periods. Before IP became the standard for the networklayer, each physical media needed a MAC or DLL layer that could interface to it, andstandardization was a nightmare. Now, we have IP-based modems that can interface to anIP port. IP is the gold standard and should stay with us for a long time. As you will see inthe rest of this book, we approach the open architecture for tactical wireless communicationsand networking as IP-based and thus can bring a wide variety of technologies to the wartheater, making them communicate seamlessly.

The OSI concept allowed the science of computer networking to evolve quickly, sincethe separated entities meant that engineers could focus on developing the layers of theirspecialties without having to worry about defining interfaces to upward or downward layers.Computer networking relies on this model with some changes.

1.2 From Network Layer to IP Layer

With the IP model, the community has established a five-layer model as shown in Figure 1.2,with the application layer, transport layer, IP layer, DLL/MAC layer, and the physical layer.In addition to the reduction of the OSI layers from seven to five layers, this model refersto the IP as “layer 3” and the DLL/MAC “layer 2” while the physical layer is layer 1.

Notice that the relationship between the network layer and the DLL/MAC is one-to-many. The network layer can send and receive packets from multiple DLL layers (links).This concept evolved with Internet Protocol to become an IP port. An IP router can alsohave ports dedicated to multiple workstations, servers, and so on, each with its own transport