MILCOM 2009 Tutorials
Monday, October 19 - Wednesday, October 21, 2009
Seaport Hotel & World Trade Center, 200 Seaport Blvd, Boston MA 02210
Conference attire is Business Casual or UOD and Casual for Crustacean Sensation.
Monday, October 19
|9:00 a.m. - 12:00 Noon
National and International Spectrum Management Processes
Mr. Nelson V. Pollack
Spectrum Analytics, LLC
Description - The military is highly dependent on access to the radio frequency (RF) spectrum. High power sensors, such as radar, communication methodologies, such as tactical VHF and UHF radio, wideband airborne data links, tactical data links, military satellite earth stations, and geostationary satellites are only a few examples of military dependence on the RF spectrum. Additionally, the military is becoming highly reliant on commercial wireless technologies, such as networks built to the IEEE 802.XX family of standards, as well as commercial C-band and Ku-band satellites.
The RF spectrum is a highly regulated and managed resource. The military spectrum-dependent systems must adhere to international spectrum approval processes, as well as global technical standards and regulations. A UN agency, the International Telecommunications Union (ITU) establishes worldwide spectrum policy and technical standards. Nations control spectrum access within their borders as a sovereign national right, similar to aircraft landing rights.
This tutorial provides members of the military and civil service involved with program management and systems acquisition, as well as key industry and academia personnel, with an overview of national and international spectrum management processes from a US military perspective. The tutorial will provide overviews of the key DoD, US national and international groups and organizations involved in approving US military spectrum access. The tutorial will also describe the formal processes required to obtain worldwide spectrum approvals for military spectrum use.
|2:00 p.m. - 5:00 p.m.
How to Duel With Information Assurance
on Military Systems and Win
Mr. John Davidson
Description - This unusual IA tutorial will reveal why so many military system development programs encounter schedule slips and budget overruns because of difficulties addressing IA. It will reveal how inconspicuous distinctions between an “ordinary” system and a “secure” system drive stunning and too often overwhelming differences in how a system architecture must be approached. The purpose is to equip you with an overview of the warning signs for impending IA peril, and provide a basic understanding of the unique system engineering methodologies that will embolden you to recognize and face IA issues head on and win.
The surprising origin of the “real” security requirements for the system architecture is revealed. The reasons why it is not logical to look to IA certifiers as the origin of security requirements, and how certifiers can avoid those pitfalls are presented. The positive way system developers should control their own destiny by deriving (and owning) their own security requirements will be clarified. A layman's security modeling methodology is presented for deriving a precise and verifiable set of system security requirements from an enterprise level security policy (i.e. a precise logical consensus of what "secure behavior" means). This scientific methodology, based on decades of research in security and privacy, with successful worked examples, is the only known way to be certain that the system architecture requirements set is complete, and if enforced will guarantee secure behavior of the system. As a byproduct, it produces artifacts that dramatically simplify and expedite IA certifications. This enables developers to know with precision what must be done to make a system secure, to plan the work and work the plan, and finally to know in advance what the certifier's finding will be before asking.
You will gain a good understanding of the distinction between computer security and communications security (COMSEC). You learn how each works, what part each plays in IA, and how to weave them together to enforce the right set of security requirements. A layman's introduction to the science that underlies the field of computer security (the systems side of IA) is presented. This includes an overview of the security modeling “lite” and how it works to transform intractable security concepts into verifiable precise system requirements. The logic that guarantees secure behavior is revealed. The science underlying COMSEC (the cryptographic side of IA) will be introduced. You will gain a working knowledge of what COMSEC does; what makes it work. An unclassified introduction to the "dark side" of cryptography will reveal how encryption devices work, what crypto keys do, what a keystream is and how initialization vectors enhance security as well as how these functions must be protected.
Tuesday, October 20
|9:00 a.m. - 12:00 Noon
The Digital Communications Mystique: From the Simple to the Sublime
Dr. Bernard Sklar
Description - The main goal of this whirlwind exploration of digital communications is to reinforce important principles representing the heart of the subject. Learn how to make design choices for meeting difficult system requirements. Learn how parameters can be traded-off: power, bandwidth, capacity, error performance, delay time. Additionally, some of the very creative developments that have transformed this technology from the simple to the sublime are described.
Specifically, the tutorial covers:
This intense one-half-day tutorial is geared toward system designers, circuit designers, managers, software developers, and all technical people who wish to partake in the passion that drives communication engineers.
- How data bits are transformed to channel symbols, to spread-spectrum chips, and ultimately to transmission waveforms.
- How signal degradation falls mostly into two classes, calling for very different mitigation methods.
- How waveform signaling falls mostly into two classes having very different characteristics, and are best used for very different requirements.
- How to cope with either limited bandwidth or power, or both.
- Characterization of fading channels, and how to cope with the deleterious effects of multipath. OFDM is explained and how it is a natural mitigating technique.
- A description of Shannon's 1948 predictions, and how they have been (virtually) fulfilled with the advent of turbo codes and LDPC codes. How these codes work are described.
- A description of MIMO, the technique that was thought to violate Shannon's predictions, and an explanation of how it can achieve increased capacity, increased robustness, or both.
|2:00 p.m. - 5:00 p.m.
Fundamentals of GNSS with Emphasis on GPS
Dr. Chris Bartone
Description - This tutorial emphasizes the fundamentals of GNSS with emphasis on GPS. The core functions needed to obtain a user solution using GPS will be explained. The course concludes with an illustration of a user state calculation, and an introduction to differential GNSS.
The main topics to be covered by this course are:
• GPS Segments: Control, Space, User.
• Coordinate frames and datum’s used in the application of GNSS.
• Introduction to Positioning & Satellite Navigation
• Earth Centered Inertial (ECI)
• Earth Centered Earth Fixed (ECEF)
• Latitude, Longitude, Height (LLH)
• Height: Geodetic, MSL, Geoid Undulation
• World Geodetic System (WGS)-84, and International Terrestrial Reference Frame (ITRF)
• Local Level Tangent (LLT)
• Coordinate Conversions
• GPS signal structure formats for current and future signals.
• Basic/Legacy GPS: C/A, P(Y) code formats
• Modernized GPS, Galileo and Glonass (Overview)
• GPS Link Budget
• GPS Navigation Message Data Format Descriptions
• Calculation of the GPS space vehicle (SV) position using the broadcast Kepler parameters (ephemeris and almanac)
• GPS Time Considerations
- Atmosphere errors:
- Ionosphere errors (characterization and mitigation)
- Troposphere errors (characterization and mitigation)
• Calculation of user state (i.e., position and time)
• Associated performance parameters (i.e., dilution of precision terms)
- GPS error budget (overview)
- Introduction to Differential GNSS and different ways to implement it.
At the completion of this tutorial you should have the ability to understand the fundamentals of GNSS as applied to GPS and knowledge of the core functions needed to perform a user solution.
This tutorial benefits engineers, scientists, and managers interested in the area of GNSS using GPS, Galileo, Glonass, and/or other satellite navigation systems. The tutorial provides a solid basis in the fundamentals of satellite navigation. The tutorial is more advanced than a simple user’s course, but not too detailed for the beginner to GNSS.
Wednesday, October 21
|9:00 a.m. - 12:00 Noon
Digital Video Broadcasting (DVB) Networks: Architectures, Emerging Standards, and Applications
Dr. Sastri Kota
Description - As the war fighter’s demand for “anytime, anywhere, and anyway” communications increases, IP based network- centric architectures enable the fusion of technologies including digital video, broadband Internet and mobile communications. The tutorial consists of two parts enabling DVB technologies and service applications to provide the state-of-the art of DVB standards via satellite and its application to DoD and commercial services.
The first part of the discussion will focus on the different DVB technologies via satellite networks i.e. (DVB-S), DVB return channel by satellite (DVB-RCS) and second generation DVB system for broad band services (DVB- S2). A brief overview of DVB-S and DVB-RCS system architectures, protocol standards, including IP delivery over satellite, adaptive MF-TDMA formats and adaptive coding and modulation (ACM) for DVB-S2 will be discussed.
This is followed by a discussion of the recent standard DVB-RCS+M using a reference model for Mobile Satellite Interactive Network. In addition, the new standard (DVB-SH) for hand held devices via satellite enabling multimedia services to mobile users will be described. The second part of the tutorial will provide an overview of the current commercial applications and DoD application of DVB technologies to Joint IP Modem, for two way communications using the Wideband Gap Filler Satellite (WGS) and DVB-RCS hub integration of DISA and US CENTCOM. Technical challenges e.g. QoS, cross-layer protocol designs, propagation effects mitigation, mobility management and interoperability for system realization will be discussed. Possible solutions to address some of these challenges will be provided. Following that, the presentation will be concluded with a discussion on the growing services and future trends for DVB technologies for military applications.
This tutorial will benefit engineers, scientists and managers who wish to gain knowledge and understanding of the protocols, emerging standards, technologies for design development, and deployment of IP over DVB Satellite networks for Military environment.
Software-Defined Radio Workflow Using Simulink™ and the USRP2
Mr. Michael Calabro - Worcester Polytechnic Institute
Mr. Devin Kelly - Worcester Polytechnic Institute
Mr. John Irza - The MathWorks
Mr. Alexander Wyglinkski - Worcester Polytechnic Institute
Description - This tutorial introduces a user-friendly software-defined radio (SDR) development workflow for prototyping, research and education in wireless communications and networks. This workflow consists of multiple SDR platforms capable of digital modulation with synchronization and full control over the physical to network layer of the radios and an interface to The MathWork’s Simulink software package. Using the Universal Software Radio Peripheral 2 (USRP2) platform as the RF front end, this interface uses Simulink for software radio development and signal processing libraries. This combination of hardware and software enables simple design and verification of radio systems in simulation, while allowing the user to easily test the system with live, over the air transmission. The use of Simulink for radio development provides streaming access to the USRP2 via a user-friendly workflow environment. These commonly available software packages and the USRP2 make communication system prototyping both affordable yet highly versatile, enabling research and development groups around the world to conduct advanced experiments into new wireless communications and networking architectures including cognitive radio. The interface allows students to become familiar with tools used in industry while learning communications and networking concepts through labs designed for undergraduate coursework.
The hands-on tutorial will include the following topics:
- MATLAB and Simulink as Verification Tools: Radio development can include impairments such as fading and transmission delay, requiring equalization and synchronization.
- Simulink-based Wireless Communication Experimentation using the USRP2 Platform: Simulink blocks interfacing to the USRP2 will be added to the model developed in the first section of the tutorial.
- Advanced Communication Systems Education and Training using Simulink and USRP2: Cognitive radio techniques including spectrum sensing and dynamic spectrum access will be introduced to the models developed in the first two sections of the tutorial.
|2:00 p.m. - 5:00 p.m.
On-The-Move Satellite Communications: Performance Aspects, and Standards and Regulatory Issues
Dr. Vijitha Weerackody
Dr. Enrique Cuevas
The Johns Hopkins University
Description - On-The-Move satellite communications is a major capability that is being sought by the military to support new operational concepts. Because of their size and weight, small aperture terminals mounted on vehicle platforms are attractive in these communication systems. These small aperture satellite terminals present a new set of technical challenges. Antenna apertures have wide beamwidths and, consequently, can transmit a significant amount of power causing interference towards adjacent satellites. In the receive mode, because of interference from adjacent satellites, the signal-to-interference ratio at the small aperture terminal will be small. Moreover, since on-the-move military vehicles have to operate in rugged terrain conditions there is a potential for motion-induced antenna pointing errors, which may cause additional interference toward adjacent satellites.
This tutorial addresses the challenges in on-the-move satellite communications and examines the performance of small aperture terminals in such systems. In on-the-move satellite communication systems, to protect from interference to neighboring satellites, regulatory and standards issues play a significant role in determining the system performance. This tutorial addresses the standards and regulatory aspects that are relevant to on-the-move satellite communications.
This tutorial addresses the following topics:
- Spectral efficiency of small aperture terminals when operating in commercial Ku- and Ka-bands, and military X- and Ka-bands;
- Effects of motion-induced antenna pointing errors on the performance of on-the-move small aperture terminals;
- Currently applicable ITU-R Recommendations and Radio Regulations that govern the operation of small aperture terminals and on-going activities at the ITU-R and other standards bodies to accommodate on-the-move terminals.