31R3A1L2 OFFENSIVE AND DEFEENSIVE ELECTRONIC WARFARE Student Handout

Size: px
Start display at page:

Download "31R3A1L2 OFFENSIVE AND DEFEENSIVE ELECTRONIC WARFARE Student Handout"

Transcription

1 31R3A1L2 OFFENSIVE AND DEFEENSIVE ELECTRONIC WARFARE Student Handout a. Early Electronic Warfare (EW) was primarily a tool used to identify ships and military units. Codes and ciphers were developed, and the periodic changing of call signs and frequencies was made a part of everyday communications. The disrupting of communications (jamming) and the creation of deceptive communication practices became a very sophisticated and artful practice. b. World War I. During this period, EW was mostly limited to casual monitoring of radios and some attempts at wire-tapping. c. World War II. The period between the two world wars saw dramatic breakthroughs in the development of radios. The use of radios in the military became commonplace. Radios were found as far down as battalion level. (1) By the end of World War II, radios could be found at company level. (2) The use of deception became an integral part of planning. (3) Code breaking was another major effort in this period. (4) The development of radio detection and ranging (radar) affected the outcome of World War II. c. Korean War. During the Korean Conflict, EW was used by both United Nations (UN) and North Korean forces. (1) Both sides intercepted and analyzed radio signals. (2) The Chinese used radio silence during their move into Korea in d. Vietnam. Both sides used EW in Vietnam. Electronic Security (ELSEC) and deception became an integral part of U.S. battle planning. (1) In North Vietnam, Chinese and Vietnamese air defense units caused the U.S. to use EW to protect its aircraft from radar-controlled, surface-to-air missiles. (2) In South Vietnam, both the U.S. Army and the Army of the Republic of Vietnam (ARVN) used EW Support Measures (ESM) to aid their ground forces. (3) Vietnam also saw the first large scale use of airborne platforms to collect enemy communications and locate enemy units. e. Operation Desert Shield/Desert Storm. The Persian Gulf War provided an example of battlefield deception. The undetected positioning of the coalition forces showed how an effective use of radio silence and 1

2 deception can influence a battle's outcome. (1) Electronic Intelligence (ELINT) was heavily used to locate and destroy the Iraqi air defense capability. (2) The coalition forces used ESM to support the planning of deception operations. The U.S. Marine Corps portrayed an amphibious assault on Kuwait from the sea. EW was used to support rehearsed landings and to monitor the Iraqi forces reaction (determining unit locations and monitoring radio traffic) to the deception. f. The future. (1) There is little to indicate that the use of EW will diminish in the post-cold War era. (2) Directed energy weapons will be used in future battles. Radio frequency and microwave energy weapons are the most likely to be developed to disrupt or destroy communications. What affected the outcome of World War II? What was the purpose of ELINT during Operation Desert Shield/Desert Storm? Viewgraph 4: Electronic Warfare (EW) a. EW is a command responsibility. It is a significant force multiplier when integrated and used with fire and maneuver. b. ESM provides the capability to intercept, locate, and identify enemy emitters. (1) Interception operations provide EW planners with intelligence about the enemy's location, activity, possible future operations, and electronic disruption capabilities. (2) Location operations help planners to identify likely or possible enemy intentions. The data gathered can indicate if an enemy is in an offensive, defensive, or retrograde posture. The size of the area an enemy is occupying is a factor in determining the enemy unit's type and size. c. Electronic Counter Measures (ECM) are offensive actions taken to prevent or reduce an enemy's effective use of the electromagnetic spectrum. Effective ECM operations can degrade an enemy's combat effectiveness by degrading his electromagnetic operations. 2

3 (1) Electronic jamming reduces or denies an enemy the effective use of his electronic equipment. (2) Electronic deception is used to cause an enemy to misinterpret what his electronic collection systems receive. d. Electronic Counter-Countermeasures (ECCM) are defensive measures used to protect friendly command, control, and communications (C 3 ) systems from enemy EW activities. It is closely related to signal security (SIGSEC). The main difference between the two is the type of information being protected from the enemy. ECCM protects friendly emitters from enemy EW assets. SIGSEC protects the information friendly forces transmit. Viewgraph 5: TLO Para 2 Check on Learning What capability does ESM provide? What is the definition of ECCM? Viewgraph 6: Offensive Electronic Warfare a. ESM allows the commander to know the type of enemy force he is facing. (1) The five major ESM components are: (a) (b) (c) (d) (e) Search. Intercept. Locate. Identify. Report. (2) In the search component, the ESM team uses special EW equipment to search for enemy electronic transmissions. b. ECM are actions taken to prevent or reduce effective use of the electromagnetic spectrum by enemy forces. 3

4 (1) Electronic jamming reduces or denies an enemy the effective use of his electronic equipment. (2) Electronic deception causes an enemy to misinterpret what his electronic systems receive. Viewgraph 7: The Electromagnetic Environment a. What battles are won depends in large part to the degree of C 2 the commander exercises. Radio is the primary means for carrying out C 2. b. A battlefield is extremely violent with an exceedingly dense signal environment. A single U.S. division engaged in combat may have over 3,000 communications emitters working. Viewgraph 8: Preventive Electronic Counter-Countermeasures (ECCM) a. Systems design. (1) A radio's low power setting. (2) Secure voice equipment. (3) Frequency hopping. b. Operational techniques. (1) Site selection, radiated power, and antenna selection are the most important considerations in radio system installation. (a) (b) (c) (d) An antenna should be placed to allow the terrain to mask it from the enemy. Frequent antenna relocation make the timely locating and targeting of stations more difficult. Use directional antennas when possible. Use low power settings when possible. (2) Radio operator procedures. (a) (b) (c) (d) Reduce operator-distinguishing characteristics and procedures. Operate on a random schedule. Use authentication. Encrypting Essential Elements of Friendly Information (EEFI). 4

5 Viewgraph 9: TLO Para 5 Check on Learning What are the two major areas of preventive ECCM? What are the most important considerations in radio system installation? Viewgraph 10: Defense Against Enemy Electronic Countermeasures (ECM) a. Radiotelephones provide rapid, short-range, person-to-person communications among mobile and air units. However, it has little defense against enemy Electronic Countermeasures (ECM). It also has little defense against message exploitation unless a security device is used. There are several basic rules for radiotelephone that provide some security and signal protection. b. Use the following to help provide transmission security: (1) No violation of radio silence. (2) No needless chatter among operators. (3) Transmit on directed nets only with permission. (4) No excessive tuning or testing. (5) No sending of an operator's personal name. (6) Only authorized use of plain language. (7) No association of classified and unclassified call signs. (8) No association of address groups and call signs. (9) Only authorized procedure words (prowords) used. c. Prowords are the voice equivalent of prosigns. Using prowords reduces the duration of transmissions. d. There are two correct methods for using call signs. (1) The complete call sign is used when entering a net. It is also used when requested by the Net Control Station (NCS) or another station in the net. (2) The abbreviated call sign is used once the net is entered. The NCS directs the use of abbreviated call signs on the net. Abbreviated call signs allow operators to more quickly identify 5

6 themselves and stations they are calling. This is a defensive EW technique. e. Correctly using the phonetic alphabet is needed to reduce transmission time. This also ensures that there is no confusion by the receiving operator. Viewgraph 11: TLO Para 6 Check on Learning When is the complete call sign used? What is the purpose of using prowords? a. Commanders use Line-of-Sight (LOS) multichannel communications radio, troposcatter, and satellite relay. b. Common myths about the security of multichannel communications can cause operators to violate basic Communications Security (COMSEC) practices. (1) Many think a multichannel radio is always secure. (2) Multichannel radio signals can be intercepted by very accurate enemy sensors. c. Too many operators use the nonsecure orderwire to discuss classified matter. d. Operating with misconceptions causes preventive ECCM techniques to have limited value. Viewgraph 12: Obvious Jamming a. Remedial Electronic Counter-Countermeasures are actions taken in response to enemy jamming. b. Jamming may be either obvious to the operator or extremely subtle and difficult to detect. (1) Obvious jamming is normally easy to detect. Modulated signals are commonly encountered. They are identified quite readily by the signal's actual modulation. Examples of obvious jamming include: (a) Random noise. This is synthetic radio noise that is 6

7 random in amplitude and frequency. It is similar to normal background noise. It is used to degrade all types of signals. (b) (c) (d) (e) (f) (g) (h) Stepped tones (bagpipes). These are sent at increasing and decreasing pitch. They resemble the sound of bagpipes and are normally used against single-channel AM or FM voice. Spark. This is an easily produced signal. Its sound resembles short duration, high intensity signals repeated at a rapid rate. It is very effective in disrupting all types of signals. Gulls. These are generated by a quick rise and then a slow fall of a variable radio signal. Similar to a sea gull's call, they produce a nuisance effect. They are usually effective against voice transmissions. Random pulse. This involves pulses of varying amplitude, duration, and rate. It is used to disrupt radar, and all types of data transmissions. Wobbler. This is a single frequency modulated by a slowly varying tone. Resembling a howling sound, it causes a nuisance to voice radio communications. Preamble jamming. This is the broadcasting of synchronization tones over the operating frequency of a radio net that uses voice security devices. It often causes radios to be locked in the receive mode. Recorded sounds. These can be any audible sound of a varying nature. For example, music, screams, applause, whistles, machinery noise, and laughter. These sounds are used to distract voice radio operators and disrupt communications. (2) Subtle jamming is not obvious to the radio operator because no sound is heard. (3) Unintentional jamming may be a big problem to communicators. Atmospheric conditions, malfunctions of the radio, and other radios (enemy or friend) cause it. Other sources include electric, electronic, and electromagnetic devices. Viewgraph 13: When You Are Jammed b. Once you realize an enemy is conducting jamming operations, you should report the jamming. The following are possible solutions: (1) Continue to operate. (2) Improve the signal-to-jamming ratio. (3) Adjust the receiver. This includes adjusting the beat frequency 7

8 oscillator, adjusting the bandwidth, adjusting the gain or volume control, and fine tuning the frequency. (4) Increase your transmitter power output. (5) Adjust, change, or move the antenna. (6) Set up a retransmission station. (7) Change the frequency. (8) Use a different satellite. (9) Use alternate communication means. Viewgraph 14: TLO Para 8 Check on Learning What are remedial Electronic Counter-Countermeasures? What should you do once you realize the enemy is conducting jamming operations? 8

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace Electronic Warfare System 2015 Integrated Electronic Warfare System Own the Enemy s Battlespace NOBODY WANTS A FAIR FIGHT DRS offers an Integrated Electronic Warfare (EW) System, with comprehensive training

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

What Does Communication (or Telecommunication) Mean?

What Does Communication (or Telecommunication) Mean? What Does Communication (or Telecommunication) Mean? The term communication (or telecommunication) means the transfer of some form of information from one place (known as the source of information) to

More information

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue

More information

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Electromagnetic (EM) waves. Electric and Magnetic Fields. L 30 Electricity and Magnetism [7] James Clerk Maxwell (1831-1879)

Electromagnetic (EM) waves. Electric and Magnetic Fields. L 30 Electricity and Magnetism [7] James Clerk Maxwell (1831-1879) L 30 Electricity and Magnetism [7] ELECTROMAGNETIC WAVES Faraday laid the groundwork with his discovery of electromagnetic induction Maxwell added the last piece of the puzzle Heinrich Hertz made the experimental

More information

Mitigating the Threat of GPS Jamming Anti-Jam Technology

Mitigating the Threat of GPS Jamming Anti-Jam Technology Mitigating the Threat of GPS Jamming Anti-Jam Technology NovAtel White Paper June 2012 Executive Summary Developed in the 1970s by the U.S. Department of Defense, the global positioning system (GPS) was

More information

Advanced Electronics Company. Photonics Based ELINT for Interception and Analysis of Radar Signals

Advanced Electronics Company. Photonics Based ELINT for Interception and Analysis of Radar Signals Advanced Electronics Company (An Economic Offset Program Company) Radar Symposium 2014 Photonics Based ELINT for Interception and Analysis of Radar Signals Presented By: Engr. Ziad H. Al-Musallam Senior

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

FM 6-02 SIGNAL SUPPORT TO OPERATIONS FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at

More information

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman Antennas & Propagation CS 6710 Spring 2010 Rajmohan Rajaraman Introduction An antenna is an electrical conductor or system of conductors o Transmission - radiates electromagnetic energy into space o Reception

More information

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED

More information

AM TRANSMITTERS & RECEIVERS

AM TRANSMITTERS & RECEIVERS Reading 30 Ron Bertrand VK2DQ http://www.radioelectronicschool.com AM TRANSMITTERS & RECEIVERS Revision: our definition of amplitude modulation. Amplitude modulation is when the modulating audio is combined

More information

Single Transistor FM Transmitter Design

Single Transistor FM Transmitter Design Single Transistor FM Transmitter Design In telecommunications, frequency modulation (FM) conveys information over a carrier wave by varying its frequency. FM is commonly used at VHF radio frequencies for

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Chapter 1. Introduction and Historical Background of Computer Networks. 1.1 Scope of Computer Networks

Chapter 1. Introduction and Historical Background of Computer Networks. 1.1 Scope of Computer Networks Chapter 1 Introduction and Historical Background of Computer Networks 1.1 Scope of Computer Networks Perhaps the most significant change in computer science over the past twenty years has been the enormous

More information

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the

More information

COLLATED QUESTIONS: ELECTROMAGNETIC RADIATION

COLLATED QUESTIONS: ELECTROMAGNETIC RADIATION COLLATED QUESTIONS: ELECTROMAGNETIC RADIATION 2011(2): WAVES Doppler radar can determine the speed and direction of a moving car. Pulses of extremely high frequency radio waves are sent out in a narrow

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods

More information

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and

More information

Communication Systems

Communication Systems AM/FM Receiver Communication Systems We have studied the basic blocks o any communication system Modulator Demodulator Modulation Schemes: Linear Modulation (DSB, AM, SSB, VSB) Angle Modulation (FM, PM)

More information

Jabra CRUISER2. User manual. www.jabra.com MUTE VOL - VOL + jabra

Jabra CRUISER2. User manual. www.jabra.com MUTE VOL - VOL + jabra Jabra CRUISER2 VOL - VOL + MUTE jabra User manual www.jabra.com Contents THANK YOU...2 ABOUT YOUR JABRA CRUISER2...2 WHAT YOUR SPEAKERPHONE CAN DO...3 GETTING STARTED...4 CHARGE YOUR SPEAKERPHONE...4 TURNING

More information

MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS

MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS *FM 4-02.4 (FM 8-10-4) FIELD MANUAL HEADQUARTERS NUMBER 4-02.4 DEPARTMENT OF THE ARMY Washington, DC, 24 August 2001 MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS

More information

United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director

United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director DD-01-01 United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director In the Matter of U.S. DEPARTMENT OF DEFENSE Docket No. 030-28641

More information

Personal Broadband Networks, PBN (CE74024-3)

Personal Broadband Networks, PBN (CE74024-3) Faculty of Computing, Engineering & Technology Introduction to Radio Systems Personal Broadband Networks, PBN (CE74024-3) Alison L Griffiths C203 A.L.Griffiths@staffs.ac.uk www.soc.staffs.ac.uk/alg1 2004

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons

Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons Appendix F Scout and TOW Platoons Section 1. Scout Platoon Section 2. TOW Platoon F - 1 Section 1. Scout Platoon. Mission. The battalion scout platoon performs reconnaissance, provides limited security,

More information

ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local exchange networks.

ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local exchange networks. Glossary of Telecommunications Terms (Source: Federal Communications Commission) ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local

More information

U.S. Armed Forces and Veterans

U.S. Armed Forces and Veterans CB03-FF.04SE April 10, 2003 Quotes and Radio Sound Bites i Special Edition i U.S. Armed Forces and Veterans Active Duty and Reserves 1.4 million The number of active duty men and women in the U.S. armed

More information

Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)

Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS) CDT/SV in action Stryker Vehicle Live Training Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS) Live Training Products and Systems Observer-Controllers in the Training

More information

Modern Wireless Communication

Modern Wireless Communication Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

2. OVERVIEW OF COMMUNICATION SYSTEMS

2. OVERVIEW OF COMMUNICATION SYSTEMS 2. OVERVIEW OF COMMUNICATION SYSTEMS A communication system is made up of devices that employ one of two communication methods (wireless or wired), different types of equipment (portable radios, mobile

More information

Services we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com

Services we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Wireless Public Address Systems (WPAS) Licensing. Information Briefing Westbury Hotel, Dublin 26 th July 2006

Wireless Public Address Systems (WPAS) Licensing. Information Briefing Westbury Hotel, Dublin 26 th July 2006 Wireless Public Address Systems (WPAS) Licensing Information Briefing Westbury Hotel, Dublin 26 th July 2006 27/07/2006 2 Agenda WPAS: Wireless Public Address System 1. Background to WPAS Licensing Scheme

More information

Appendix B Glossary of Communications Equipment

Appendix B Glossary of Communications Equipment Appendix B Glossary of Communications Equipment The equipment descriptions below are extracted from those found in U.S. Marine Corps Technical Manual TN-2000-15/2B, Principal Technical Characteristics

More information

AUSA Background Brief

AUSA Background Brief AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of

More information

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation

More information

Computers Are Your Future. 2006 Prentice-Hall, Inc.

Computers Are Your Future. 2006 Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth

More information

The Phase Modulator In NBFM Voice Communication Systems

The Phase Modulator In NBFM Voice Communication Systems The Phase Modulator In NBFM Voice Communication Systems Virgil Leenerts 8 March 5 The phase modulator has been a point of discussion as to why it is used and not a frequency modulator in what are called

More information

Application Note AN-00125

Application Note AN-00125 Considerations for Operation within the 260 470MHz Band Introduction This application note is designed to give the reader a basic understanding of the legal and technical considerations for operation of

More information

Interpreting the Information Element C/I

Interpreting the Information Element C/I Prepared Date Rev Document no pproved File/reference 1(17) 2000-04-11 Interpreting the Information Element C/I This document primarily addresses users of TEMS Investigation. 2(17) 1 Introduction Why is

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of

More information

White Paper Assured PNT Inside Military Ground Vehicles Using D3

White Paper Assured PNT Inside Military Ground Vehicles Using D3 White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems

More information

The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation

The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation Executive Summary The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation Cell phone radiation is harmful to the body. Higher doses produce stronger damaging effects. To protect the brain

More information

Appendix D Logistics Support Element MISSION ORGANIZATION

Appendix D Logistics Support Element MISSION ORGANIZATION Logistics Support Element Effective force projection logistics require a seamless logistics system operating across the strategic, operational, and tactical levels. Elements from CONUS and the theater

More information

CHAPTER 4. Electromagnetic Spectrum

CHAPTER 4. Electromagnetic Spectrum ELEC4504 Avionics Systems 9 CHAPTER 4. Electromagnetic Spectrum 4.1. Electromagnetic (EM) Waves In free space (or the atmosphere) the electric field is perpendicular to the magnetic field and both are

More information

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper

More information

ARIES SAAS HELICOPTER CONTROL AND APPROACH RADAR

ARIES SAAS HELICOPTER CONTROL AND APPROACH RADAR SECURITY AND DEFENSE ARIES SAAS HELICOPTER CONTROL AND APPROACH RADAR Defense and security in five continents indracompany.com ARIES-SAAS ARIES SAAS HELICOPTER CONTROL AND APPROACH RADAR ARIES-SAAS radar

More information

Department of Electrical and Computer Engineering Checklist for MSEE Degree

Department of Electrical and Computer Engineering Checklist for MSEE Degree Department of Electrical and Computer Engineering Checklist for MSEE Degree Student name: ; email: Month/year enrolled: ; Graduation date: I certify that the information contained on this form is correct.

More information

Active and Passive Microwave Remote Sensing

Active and Passive Microwave Remote Sensing Active and Passive Microwave Remote Sensing Passive remote sensing system record EMR that was reflected (e.g., blue, green, red, and near IR) or emitted (e.g., thermal IR) from the surface of the Earth.

More information

BMS Digital Microwave Solutions for National Security & Defense

BMS Digital Microwave Solutions for National Security & Defense BMS Digital Microwave Solutions for National Security & Defense Broadcast Microwave Services, Inc. P.O. Box 84630 San Diego, CA 92138 Phone: +1.800.669.9667 Email: sales@bms-inc.com Web: www.bms-inc.com

More information

NATIONAL TABLE OF FREQUENCY ALLOCATIONS

NATIONAL TABLE OF FREQUENCY ALLOCATIONS State Commission on Radio Frequencies of the Republic of Moldova NATIONAL TABLE OF FREQUENCY ALLOCATIONS Adopted by Decision of the State Commission on Radio Frequencies of the Republic of Moldova no.

More information

ACOUSTICAL CONSIDERATIONS FOR EFFECTIVE EMERGENCY ALARM SYSTEMS IN AN INDUSTRIAL SETTING

ACOUSTICAL CONSIDERATIONS FOR EFFECTIVE EMERGENCY ALARM SYSTEMS IN AN INDUSTRIAL SETTING ACOUSTICAL CONSIDERATIONS FOR EFFECTIVE EMERGENCY ALARM SYSTEMS IN AN INDUSTRIAL SETTING Dennis P. Driscoll, P.E. and David C. Byrne, CCC-A Associates in Acoustics, Inc. Evergreen, Colorado Telephone (303)

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

Citizens Band (CB) radio spectrum use information and operation. Of 364

Citizens Band (CB) radio spectrum use information and operation. Of 364 Citizens Band (CB) radio spectrum use information and operation Of 364 Information statement Publication date: 6 December 2006 Contents Section Page 1 Regulatory and equipment information 1 2 CB operating

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

Spectrum Analyzers vs. Monitoring Receivers. Paul Denisowski, Application Engineer Rohde & Schwarz

Spectrum Analyzers vs. Monitoring Receivers. Paul Denisowski, Application Engineer Rohde & Schwarz Spectrum Analyzers vs. Monitoring Receivers Paul Denisowski, Application Engineer Rohde & Schwarz Spectrum Management Requirements What signals are present at which frequencies? Additional responsibilities

More information

Information Paper. FDMA and TDMA Narrowband Digital Systems

Information Paper. FDMA and TDMA Narrowband Digital Systems Information Paper FDMA and TDMA Narrowband Digital Systems Disclaimer Icom Inc. intends the information presented here to be for clarification and/or information purposes only, and care has been taken

More information

Appendix C GSM System and Modulation Description

Appendix C GSM System and Modulation Description C1 Appendix C GSM System and Modulation Description C1. Parameters included in the modelling In the modelling the number of mobiles and their positioning with respect to the wired device needs to be taken

More information

THE PATH TO BECOMING A MARINE CORPS AVIATOR

THE PATH TO BECOMING A MARINE CORPS AVIATOR THE PATH TO BECOMING A MARINE CORPS AVIATOR Every journey starts with a first step. Your first step in making a decision to join the ranks of the elite starts here. By reviewing the information in this

More information

AM Receiver. Prelab. baseband

AM Receiver. Prelab. baseband AM Receiver Prelab In this experiment you will use what you learned in your previous lab sessions to make an AM receiver circuit. You will construct an envelope detector AM receiver. P1) Introduction One

More information

Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks SEAN YUN. June 2009. Software Solutions in Radiocommunications

Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks SEAN YUN. June 2009. Software Solutions in Radiocommunications Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks June 2009 SEAN YUN 2 2 Abstract In an effort to help preserve the ozone and the availability of diminishing natural

More information

Wireless Medical Telemetry Laboratory

Wireless Medical Telemetry Laboratory Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to

More information

Analysis of Immunity by RF Wireless Communication Signals

Analysis of Immunity by RF Wireless Communication Signals 64 PIERS Proceedings, Guangzhou, China, August 25 28, 2014 Analysis of Immunity by RF Wireless Communication Signals Hongsik Keum 1, Jungyu Yang 2, and Heung-Gyoon Ryu 3 1 EletroMagneticwave Technology

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

CIVIL AVIATION REQUIREMENTS SECTION 9 AIR SPACE AND AIR TRAFFIC MANAGEMENT SERIES 'D' PART VI

CIVIL AVIATION REQUIREMENTS SECTION 9 AIR SPACE AND AIR TRAFFIC MANAGEMENT SERIES 'D' PART VI GOVERNMENT OF INDIA OFFICE OF DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPP SAFDARJANG AIRPORT, NEW DELHI CIVIL AVIATION REQUIREMENTS SECTION 9 AIR SPACE AND AIR TRAFFIC MANAGEMENT SERIES 'D'

More information

MAINTENANCE & ADJUSTMENT

MAINTENANCE & ADJUSTMENT MAINTENANCE & ADJUSTMENT Circuit Theory The concept of PLL system frequency synthesization is not of recent development, however, it has not been a long age since the digital theory has been couplet with

More information

CDMA Performance under Fading Channel

CDMA Performance under Fading Channel CDMA Performance under Fading Channel Ashwini Dyahadray 05307901 Under the guidance of: Prof Girish P Saraph Department of Electrical Engineering Overview Wireless channel fading characteristics Large

More information

RF Communication System. EE 172 Systems Group Presentation

RF Communication System. EE 172 Systems Group Presentation RF Communication System EE 172 Systems Group Presentation RF System Outline Transmitter Components Receiver Components Noise Figure Link Budget Test Equipment System Success Design Remedy Transmitter Components

More information

AIS (Automatic Identification System)

AIS (Automatic Identification System) AIS (Automatic Identification System) AIS are the one of the most important aids to navigation that you can have add to your navigations system. It is an excellent tool for collision avoidance. In the

More information

Příloha č. 1: Přehled Článků, ze kterých může být ověřována schopnost správně přečíst, a přeložit odborný text z angličtiny do češtiny a naopak.

Příloha č. 1: Přehled Článků, ze kterých může být ověřována schopnost správně přečíst, a přeložit odborný text z angličtiny do češtiny a naopak. Příloha č. 1: Přehled Článků, ze kterých může být ověřována schopnost správně přečíst, a přeložit odborný text z angličtiny do češtiny a naopak. Terms and definitions: - Maritime mobile service: A mobile

More information

11 Distress and Urgency

11 Distress and Urgency 11 Distress and Urgency COMMUNICATIONS 11.1 Definitions Distress Distress is defined as a condition of being threatened by serious and/or imminent danger and of requiring immediate assistance. Urgency

More information

Solution. (Chapters 5-6-7-8) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department

Solution. (Chapters 5-6-7-8) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department The Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data Communications ECOM 4314 Solution (Chapters 5-6-7-8) Dr. Hasan Qunoo Eng. Wafaa Audah Eng. Waleed Mousa 1. A cable

More information

Preview of Period 3: Electromagnetic Waves Radiant Energy II

Preview of Period 3: Electromagnetic Waves Radiant Energy II Preview of Period 3: Electromagnetic Waves Radiant Energy II 3.1 Radiant Energy from the Sun How is light reflected and transmitted? What is polarized light? 3.2 Energy Transfer with Radiant Energy How

More information

a GAO-02-781 GAO CRITICAL INFRASTRUCTURE PROTECTION Commercial Satellite Security Should Be More Fully Addressed

a GAO-02-781 GAO CRITICAL INFRASTRUCTURE PROTECTION Commercial Satellite Security Should Be More Fully Addressed GAO United States General Accounting Office Report to the Ranking Minority Member, Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate August 2002 CRITICAL INFRASTRUCTURE

More information

ISSN No: 2348-4845 International Journal & Magazine of Engineering, Technology, Management and Research

ISSN No: 2348-4845 International Journal & Magazine of Engineering, Technology, Management and Research A Real-time Packet Classification System Based On Combining Cryptographic Primitives with Physical-Layer Attributes To Address Jamming Attacks in Wireless Networks G.Deepthi H.Akshay G. Rajesh T. Swetha

More information

VOICE COMMUNICATIONS

VOICE COMMUNICATIONS CHAPTER 2 VOICE COMMUNICATIONS Upon completing this chapter you should be able to do the following: Identify circuit procedures, discipline, and techniques in voice communications. Describe radiotelephone

More information

CHAPTER VII. Distress and safety communications 1

CHAPTER VII. Distress and safety communications 1 CHAPTER VII Distress and safety communications 1 1 C.VII For the purposes of this Chapter, distress and safety communications include distress, urgency and safety calls and messages. RR30-1 ARTICLE 30

More information

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO ELBIT SYSTEMS Jefferies Global Industrials Conference - August 2014 Joseph Gaspar EVP & CFO AT A GLANCE HEADQUARTED ISRAEL with International Operations 11,700 EMPLOYEES 50% engineers TEL AVIV & NASDAQ

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD

More information

Various Technics of Liquids and Solids Level Measurements. (Part 3)

Various Technics of Liquids and Solids Level Measurements. (Part 3) (Part 3) In part one of this series of articles, level measurement using a floating system was discusses and the instruments were recommended for each application. In the second part of these articles,

More information

After a wave passes through a medium, how does the position of that medium compare to its original position?

After a wave passes through a medium, how does the position of that medium compare to its original position? Light Waves Test Question Bank Standard/Advanced Name: Question 1 (1 point) The electromagnetic waves with the highest frequencies are called A. radio waves. B. gamma rays. C. X-rays. D. visible light.

More information

Tx/Rx A high-performance FM receiver for audio and digital applicatons

Tx/Rx A high-performance FM receiver for audio and digital applicatons Tx/Rx A high-performance FM receiver for audio and digital applicatons This receiver design offers high sensitivity and low distortion for today s demanding high-signal environments. By Wayne C. Ryder

More information

Chapter 5. Lesson 5.1 9/10/2012. EMS Communications. Phases and Roles of Communications

Chapter 5. Lesson 5.1 9/10/2012. EMS Communications. Phases and Roles of Communications 1 Chapter 5 EMS Communications 2 Lesson 5.1 Phases and Roles of Communications 3 1 Learning Objectives Outline the phases of communications that occur during typical emergency medical services (EMS) event.

More information

Systems Engineering in Counter Radio- Controlled Improvised Explosive Device Electronic Warfare

Systems Engineering in Counter Radio- Controlled Improvised Explosive Device Electronic Warfare Systems Engineering in Counter Radio- Controlled Improvised Explosive Device Electronic Warfare Michael E. Pesci he systems engineering process consists of several phases designed to develop a system or

More information

RECOMMENDATION ITU-R M.1082-1*, **

RECOMMENDATION ITU-R M.1082-1*, ** Rec. ITU-R M.1082-1 1 RECOMMENDATION ITU-R M.1082-1*, ** INTERNATIONAL MARITIME MF/HF RADIOTELEPHONE SYSTEM WITH AUTOMATIC FACILITIES BASED ON DIGITAL SELECTIVE CALLING SIGNALLING FORMAT Rec. ITU-R M.1082-1

More information

The data can be transmitted through a variety of different communications platforms such as:

The data can be transmitted through a variety of different communications platforms such as: COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects

More information

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

Aircraft Radio Operator Certificate of Proficiency

Aircraft Radio Operator Certificate of Proficiency Aircraft Radio Operator Certificate of Proficiency 327 Flight AAFC Designed by PLTOFF(AAFC) Stewart Hignett Amended for 327FLT by SQNLDR(AAFC) Bill Gleeson-Barker, OCT10 Objectives Understand legislation

More information

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives: TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission

More information

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for

More information

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p Data Transmission Concepts and terminology Transmission terminology Transmission from transmitter to receiver goes over some transmission medium using electromagnetic waves Guided media. Waves are guided

More information

The Army Universal Task List

The Army Universal Task List Change No. 7 FM 7-15, C7 Headquarters Department of the Army Washington, D.C., 20 May 2011 The Army Universal Task List 1. Change 7 to FM 7-15, 27 February 2009, updates the tasks with civil affairs and

More information

GOOD SECURITY IS A GROUP EFFORT

GOOD SECURITY IS A GROUP EFFORT THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,

More information