No. 4 (2004)
ARTICLES FROM THIS ISSUE
-
Developing standards for interoperability of tactical communications systems
Abstract
The lack of interoperability in tactical communications systems has been a known fact in the North Atlantic Treaty Organization (NATO) since the end of the Cold War. This condition still exists today. The only alternative to obtain tactical communications systems with the interoperability necessitated by future operational requirements are through the establishment of NATO standards. This paper examines the tactical communications systems Post 2000 (TACOMS) project whose aim is to develop technical standards that will allow for achievement of interoperability between multinational tactical communications networks.
-
Enterprise integration lessons learned
Abstract
This document describes the lessons learned from a United States Navy enterprise integration initiative called Web Enabled Navy (WEN). WEN was initiated in April 2001 with the foci of integrating navy resources and providing a single-point-of-access, Web environment to all business and operational applications. The navy`s applications operate within a complex network environment that spans commands afloat, ashore, and overseas. The challenges addressed are similar to those faced by large, multi-national corporations and include some unusual characteristics including islands of intermittently, bandwidth-limited, connected information consumers. Both technical and management lessons learned will be described and denoted as either prerequisite or success factors.
-
Modelling and simulation of combat operations in SimCombCalculator application
Abstract
The basis of the article is mathematical discrete problem connected with local military battle. The problem consists of two dependent problems. One of them shows how to find our troops allocation to enemy`s troops. The battle damage assessment function for the problem is proposed. The second problem is connected with finding global strategy of attack. Local battle is described by modified Lanchester model. Two level logistic model is built for describing materials and munitions resupply management processes. This idea was used in computer simulator SimCombCalculator. The paper shows how to use this simulator for finding attack strategy from the platoon to brigade level.
-
Seamless roaming between UMTS and IEEE 802.11 networks
Abstract
Mobile Internet access is currently available mainly using 2G/3G cellular telecommunication networks and wireless local area networks. WLANs are perceived as a local complement to slower, but widely available cellular networks, such as existing GSM/GPRS or future UMTS networks. To benefit from the advantages offered by both radio access networks, a mobile user should be able to seamlessly roam between them without the need to terminate already established Internet connections. The goal of this paper is to present an overview of the profitability of performing vertical handovers between UMTS and IEEE 802.11b using Mobile IP. Several simulations have been carried out using NS-2, which prove that handovers from IEEE 802.11b to UMTS can, under certain circumstances, be profitable not only when there is no more IEEE 802.11b coverage. Simulation results show that a mobile user should be able to roam between these networks depending on the current available channel bandwidth and quality, generated traffic type and number of users in both of them.
-
Boolean feedback functions for full-length nonlinear shift registers
Abstract
In the paper a heuristic algorithm for a random generation of feedback functions for Boolean full-length shift register sequences is presented. With the help of the algorithm one can generate n-stage Boolean full-length shift register sequences for (potentially) arbitrary n
-
Technology solutions for coalition operations
Abstract
As computer technology has advanced, information processing in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) systems has become highly complex. The information processed by these systems is usually of a very highly sensitive nature and is entered into specific systems that are physically isolated from each other. The physical isolation of these systems makes it cumbersome to exchange information between systems. The result is inefficient sharing of sensitive information in situations where timeliness of exchange could be a life or death reality. Since the mid 1990`s, increasing efforts have been placed on improving coalition operations. Many systems have been created with the goal to improve the sharing of information and collaborative planning across coalition boundaries. The usability of these systems have had mixed levels of success and improvements will always be necessary. This paper will briefly describe three advances in telecommunications technology that could be leveraged to significantly improve coalition operations. These technologies are; the session border controller (SBC), advances in pattern matching technology, and multi-protocol label switching (MPLS).
-
User services of tactical communications in the digital age
Abstract
Increasing demands on an extensive amount of digital data and information flows for C4I is forcing the modern armies to freeze and omit EUROCOM based tactical area communications system and to develop new concepts based on the adoption of modern communication systems such as ISDN, ATM described in the TACOMS Post 2000 Final Report II in NATO. ASELSAN, as a leading company in the military electronics arena, is following and participating all the activities of TACOMS Post 2000 together with Turkish Ministry of Defense. Turkey`s tactical area communications system TASMUS is a mature and fielded system, which will satisfy future communication needs of the 21st century C4I systems. In this paper, we describe the basic features and user services of TASMUS. With the support of simultaneous voice and data capabilities, TASMUS aims to form mobile, survivable, flexible and secure network to support all the present and future communication requirements of the tactical commanders. Using the near real time data communications feature, TASMUS is also significant for the network-centric warfare applications such as tactical sensor and weapon systems, besides the communication needs of the Turkish Army.
-
Sharing tactical data in a network-enabled coalition
Abstract
The NATO Command, Control and Consultation Agency (NC3A) is a participant in a coalition project called the Shared Tactical Pictures (STP). The aim of STP is to develop methods and techniques to enable the sharing of a wide variety of information - e.g., ground surveillance sensors, airborne sensor platforms, recognized pictures, and much more - across a widely distributed network. As NATO changes its war-fighting paradigm from a well-known and stable alliance configuration to more flexible, coalition-based operations, solving the problem of information-sharing has never been more important. This paper discusses the technical and operational developments being explored in STP.
-
Introduction of the Network Centric Warfare concept to Czech Armed Forces
Abstract
One of the features determining the strength of troops is command and control. The quality of command and control is determined by the quality of the command and control systems (C2S). The Czech Armed Forces are developing tactical command and control systems (TC2S) for the Ground and Air Forces. The TC2S were a little bit separately developed. Now, we want to use the benefit of shared situation awareness. The concept of Network Centric Warfare is a solution of this problem. The integration of both TC2S`s is its main objective. To apply this concept, separate C2S`s of different units are integrated into one logical system, into one joint C2S. Thus it is possible to create the common operation picture for all units of the task force.
-
Cryptology Laboratory - its quality system and technical competence according to the ISO/IEC 17025 standard
Abstract
A laboratory is an organization which operates a quality system, has technical competence, generates valid results and its quality system and technical competence are conformed and recognized. A cryptology laboratory operates in information technology security area, where cryptographic methods of information protection play main role. Appropriate confidence, correctness and effectiveness of security services is needed and may be achieved trough development, evaluation, accreditation and certification processes performed by competent and commonly recognized organizations like: laboratories, certification and accreditation bodies. We describe in the paper the accreditation and certification structure and the IT security framework and also the role of the cryptology laboratory in this structure and framework.
-
IP-KRYPTO cipher machine for military use
Abstract
Polish military IP networks can be effectively and cheaply secured by IP-KRYPTO cipher machines which are developed in the Military Communication Institute. The cooperation with Polish manufacturers - Optimus and ABA Kraków and the usage of COTS elements and ideas speed up the research and development works. The IP-KRYPTO cipher machine will be used for securing the "SECRET" data so it must be certified to fulfill E3 ITSEC evaluation criteria. This requirement generates additional challenges in the development process when the COTS elements are to be implemented.
-
Primality proving with Gauss and Jacobi sums
Abstract
This article presents a primality test known as APR (Adleman, Pomerance and Rumely) which was invented in 1980. It was later simplified and improved by Cohen and Lenstra. It can be used to prove primality of numbers with thousands of bits in a reasonable amount of time. The running time of this algorithm for number N is O((ln N)C ln ln ln N}) for some constant C. This is almost polynomial time since for all practical purposes the function ln ln ln N acts like a constant.
-
Packet switch architecture with multiple output queueing
Abstract
In this paper the new packet switch architecture with multiple output queuing (MOQ) is proposed. In this architecture the nonblocking switch fabric, which has the capacity of N x N2, and output buffers arranged into N separate queues for each output, are applied. Each of N queues in one output port stores packets directed to this output only from one input. Both switch fabric and buffers can operate at the same speed as input and output ports. This solution does not need any speedup in the switch fabric as well as arbitration logic for taking decisions which packets from inputs will be transferred to outputs. Two possible switch fabric structures are considered: the centralized structure with the switch fabric located on one or several separate boards, and distributed structure with the switch fabric distributed over line cards. Buffer arrangements as separate queues with independent write pointers or as a memory bank with one pointer are also discussed. The mean cell delay and cell loss probability as performance measures for the proposed switch architecture are evaluated and compared with performance of OQ architecture and VOQ architecture. The hardware complexity of OQ, VOQ and presented MOQ are also compared. We conclude that hardware complexity of proposed switch is very similar to VOQ switch but its performance is comparable to OQ switch.
-
Integrated analysis of communication protocols by means of PLA formalism
Abstract
Aggregate approach and its possibilities for specification and analysis of computer network protocols are presented. The theoretical basis of the aggregate approach is a piece-linear aggregate (PLA) for formal specification of systems. The advantage of that approach is that it permits to create models both for analysis correctness of specifications and simulation. Some methods that can be used for validation and verification of aggregate specifications are presented also.
-
Adaptive procedure for automatic modulation recognition
Abstract
An adaptive procedure for automatic modulation recognition is described. With it the automatic modulation classification and recognition of radio communication signals with a priori unknown parameters is possible effectively. The results of modulation recognition are important in the context of radio monitoring or electronic support measurements. The special features of the procedure are the possibility to adapt it dynamically to nearly all modulation types, and the capability to recognize continuous phase modulation (CPM) signals like Gaussian minimum-shift keying (GMSK) too. A time synchronization to the symbol rate is not necessary.