Systems Engineering in Counter Radio- Controlled Improvised Explosive Device Electronic Warfare
|
|
|
- Briana Burke
- 10 years ago
- Views:
Transcription
1 Systems Engineering in Counter Radio- Controlled Improvised Explosive Device Electronic Warfare Michael E. Pesci he systems engineering process consists of several phases designed to develop a system or deliverable product through its entire life cycle, from needs definition through system disposal. Throughout this process, each phase plays a key role in the development and ultimately the operational success of the system. Failure to use systems engineering principles and procedures can result in numerous risks, including a delayed schedule, increased costs, a technically inferior product, and, potentially in this case, increased loss of human life. To improve our technical understanding of the fundamental issues, principles, and phenomena, as well as to provide greater support to the frontline warfighter, APL has adopted a systems engineering process in its Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (CREW) program. This article describes the systems engineering process used by CREW and how the process has improved both overall efficiency of development and product quality through its implementation in a quick-reaction or rapid-prototyping environment. INTRODUCTION Improvised explosive devices (IEDs) have become an increasingly popular weapon of choice for insurgents and small armed forces over the past few decades. A favorite type of IED used in U.S. coalition theaters of operation today is the RF or radio-controlled (RC) command link. These IEDs are inexpensive, easy to build or acquire, and difficult to trace and can be triggered from long distances, keeping the operator safe from any detonation or exposure to U.S. military forces. An RCIED is simply explosive material that is integrated with a handheld wireless radio or device that will trigger upon receipt of a signal from a second wireless handheld device. These RCIEDs have caused many fatalities and injuries to U.S. forces and coalition partners. APL has significant history and depth of knowledge in the areas of RF propagation, electronic warfare (EW), electronic attack, and communication protocols. Because of this knowledge, APL was selected to provide technical guidance and lead development of jamming techniques for all RCIED countermeasures developed by 58
2 Figure 1. CREW context diagram. GPS, global positioning system. the U.S. Marine Corps Counter-RCIED EW (CREW) program. Significant time and effort has been placed into countering this threat using both tactics and technology. Unfortunately, RCIEDs continue to evolve as quickly as they are countered. The rapid evolution of technology and insurgent tactics creates user needs that must be met in a matter of days or weeks, not months. To successfully continue to counter these advances, the APL CREW team developed a rapid cycle, starting with needs, through design, development, and test, and all the way to deployment of the CREW system. APL performs engineering, modeling and simulation, hardware/software prototyping, and testing to provide science and technology guidance concerning current CREW systems. In turn, this also supports the development of future CREW systems. This article focuses on the high-level systems engineering (SE) and development of threat loads and techniques to be used in CREW hardware systems even though these tasks are only a small part of the APL CREW tasking. A subsystem of the overall CREW hardware, threat loads, and techniques make up the heart of the CREW system; they are the instructions and coding that allow the production of a communication jamming protocol for wireless handheld devices used to trigger IEDs, and they are key to successfully countering an RCIED. The role of CREW in the context of today s modern warfighter is shown in Fig. 1. JOHNS HOPKINS APL TECHNICAL DIGEST, VOLUME 31, NUMBER 1 ( 2012) The vast majority of CREW systems are used in dismounted (man-pack) and mounted (vehicle-integrated) configurations. Although the capabilities vary between the two configurations, the operational concept is identical. The CREW system continually scans the environment for signals believed to be those of a threat device trigger. When a suspect signal is located, the system projects energy at the target receiver in an attempt to disrupt communications. Each part of the CREW system shown in Fig. 2 is integral in successfully defeating the target device. Figure 2 depicts the CREW system broken down into its individual components. APL leads and is responsible for all tasking in the five subsystems/areas shown with the exception of tactics, techniques, and procedures (TTPs). In the case of TTPs, these are developed by the U.S. Marine Corps with little to no input from the APL CREW team. As shown, there are five subsystems that make up the overall CREW system. TTPs: TTPs are used by troops on foot, as well as vehicle convoys, to increase the chances of detecting IEDs and of surviving IED detonations. These procedures, while not tangible hardware or software components, are an integral part of the system and its usage. Antennas: Antennas are arguably as important as the anti-rcied hardware itself. Antennas with 59
3 M. E. PESCI CREW System TTPs Antenna Threat Load Hardware Firmware/ Software Troop/vehicle alignments System usage procedures Antenna patterns Propagation measurements and phenomena Threat device interference RF jamming techniques RF jamming hardware and components Hardware controllers Figure 2. High-level CREW system breakdown. omnidirectional patterns, low voltage standing wave ratios, and high gain provide a better capability for the system power to reach the IED receiver and interfere with its operation and communication than do antennas with lesser characteristics. Directional antennas provide even greater capability for the system power to reach the IED receiver, though at the expense of omnidirectional coverage. Threat load: The threat load is the technique employed by the hardware to interfere with the IED communication link. Understanding the strengths and weaknesses of each device is critical, which is why each possible threat device undergoes an interference to determine the most efficient way to interrupt its communications protocols. Techniques must balance power and capability because not all communication devices operate identically or with the same protocols. Developing multiple technique packages that can negate the communications link between dozens of devices is necessary to ensure that the troops are covered in any location or terrain and under varying circumstances. These techniques, and the commands that control the system hardware, are known as threat loads. Hardware: The hardware is the jammer itself and all of its associated material components. Each vendor system is thoroughly analyzed and characterized by APL for strengths and weaknesses to most efficiently make use of its capabilities. Individual internal components are analyzed separately as well to understand how they contribute to overall system performance. Software/firmware: Software and firmware are the hardware controllers. Modifications, upgrades, and changes to firmware may improve performance by unlocking or allowing additional capabilities not originally possible with earlier software/firmware iterations. Understanding how the software/firmware controls the hardware is essential to understanding system performance and thus system effectiveness. The vast majority of the early CREW systems were broadband noise jammers using active-only techniques. Active techniques are those that project power around the system in all directions at all times, regardless of the environment. Performance was achieved in a power-centric fashion by projecting more power on the emplaced threat receiver than the threat transmitter in order to disrupt communication between the two devices. Because there are multiple types of radio devices using multiple frequencies and communications protocols, this approach required CREW systems to inefficiently project energy in every possible threat channel (frequency) simultaneously. Although a large portion of the RF spectrum was jammed, the jamming technique development for these early systems was relatively simple. It consisted of ensuring threat frequency band coverage, minimizing timing concerns due to duty cycling, and channelizing the energy to ensure jamming energy existed in every possible threat channel. All of these are constants so, in other words, the system is always projecting energy at its target, and in most cases, just into the atmosphere in general. As a result of these systems characteristics, the evaluation of performance was also a simple process, a matter of determining how much energy was available for each individual threat channel. For example, for any given threat channel, determining the available amount of energy to project from the CREW system was predictable. Although there were variations in effective isotropic radiated power (the amount of power that would have to be emitted by an isotropic antenna to produce the peak power density observed in the direction of maximum antenna gain) about the vehicle with a system installed in it, this could be taken into account by identifying the performance of a system empirically in the field. Field testing and verification/validation consisted of placing a threat transmitter a fixed distance from the threat receiver within the line of sight. This testing proved to be a valid and conservative method to evaluate CREW system performance accepted by the counter-rcied community. The measure captured system range to 60
4 effect and provided a best guess as to the distance at which the system was effective against a given device or devices. Test scenarios were worst case for the CREW system and proved to be a successful method of evaluating performance. As time went on, the number of threats, threat complexity, communication protocols, and threat frequency bands used all increased. The technological demand on the early active jammers became too great, and their performance deteriorated. Fortunately, new CREW systems using reactive technology were developed by engineering firms and commercial vendors that could protect troops from the growing number of RCIED-based threats. These reactive systems are able to focus their power only on a single threat channel when triggered rather than spreading it over the entire threat band, because the systems are able to monitor and listen to the electromagnetic environment to detect threat signals. With the increased complexity of the CREW systems, the methodology used to develop jamming techniques and evaluate system performance had evolved as well. Prudent SE processes and principles are used to ensure success throughout the development life cycle. However, time is a significant constraint, so the systems engineering process has been adapted to quick-reaction systems development. There is a simplicity to the and speed at which new threat devices are being utilized and customized by insurgents and other forces. When coupled with the quick response and turnaround required by sponsors and users, this dictated that a streamlined SE process be developed and used during recent CREW hardware and software development. For the most part, currently accepted SE process and life cycle models such as EIA and IEEE-ISO detail the SE process for long development cycles but leave quick-reaction tasks up to the systems engineer, who tailors them to the individual project. For the CREW development cycle to remain at 6 8 weeks at the most, these processes were streamlined while still retaining the core principles and practices. SYSTEMS ENGINEERING IN COUNTER-RCIED The function of systems engineering is to guide the engineering of complex systems. 3 Implementation and usage of SE principles and practices have proven to reduce overall project risk while increasing efficiency SYSTEMS ENGINEERING IN CREW Concept Development Engineering Development Postdevelopment Needs Concept exploration Concept definition Advanced development Engineering design Integration and evaluation Production Figure 3. Kossiakoff et al. s systems engineering process. Operation and support and allowing for improved requirement traceability in the final product. It takes valuable time to incorporate traditional practices into CREW tasks and deliverables. As military operations in Iraq and Afghanistan began, the timeline for APL to develop a CREW product could be as short as 4 weeks. Traditional SE processes would require full and extensive use of product documentation, reviews, meetings, plans, analyses, etc. Although all steps in the process are important when producing an acceptable product, streamlining the scope of each phase and adding in key checkpoints to ensure product quality without extended use of time become paramount. Kossiakoff describes the SE process in eight phases as shown in Fig. 3: needs, concept exploration, concept definition, advanced development, engineering design, integration and evaluation, production, and operation and support. Even though the exact same terms were not used, this approach was the basis for the development of the APL SE loop that is highlighted in this issue of Johns Hopkins APL Technical Digest. In the APL SE loop, critical needs and capability assessment is conducted in the concept development block shown in Fig. 3. Concept exploration overlaps both the concept development and engineering development blocks, and solution validation/implementation is conducted during engineering development. As will be discussed later, deployment, which is not an APL CREW task, falls into the postdevelopment block. To contrast the modification in the SE process used in CREW, we summarize the traditional process and phases shown in Fig. 3. Needs : Defines the need for a new system system studies, technology assessments, and operational analyses Concept exploration: Examines potential system concepts concept synthesis, feasibility experiments, and requirements definition 61
5 M. E. PESCI Concept definition: The preferred concept is selected and defined trade-off, functional architecture, and subsystem definition Advanced development: Identifies and reduces development risk risk abatement, subsystem demonstration, and component design requirements Engineering design: Detailed engineering design component engineering, component testing, and reliability engineering Integration and evaluation: Integrates the components into a functioning system and evaluates that system in a realistic environment system integration, prototype testing, and operational evaluation Production: The system is manufactured and produced tools and test equipment, production and acceptance, and system delivery Operation and support: The products of the system development and production phases perform the operational functions for which they were designed system operation, logistics support, and system upgrades. Postdevelopment (production and operations/support) tasks are carried out by the U.S. Marine Corps or their designated support. CREW QUICK-REACTION SYSTEMS ENGINEERING CREW systems development is almost always of the quick-reaction type that is, the time from when a need is realized to when a completed product, or technique, is available is measured in weeks, not months or years. In some cases, SE phases may converge or overlap because multiple tasks are simultaneously in progress. The development of a technique or threat load in a CREW system is multifaceted and follows the traditional SE process phases. Threat loads subsystems include the commands, instructions, and techniques used by CREW hardware to defeat RCIEDs. The streamlined process used by APL when developing a threat load is shown in Fig. 4. Each colored block represents approximately 1.5 weeks, for a total of no more than 6 weeks from needs and requirements development to delivery of the final threat load. This Needs Analysis Concept Exploration/Concept Definition New threat load requirements process Checkpoint 1: new threat load requirements reviews New/ revised threat device introduced? Yes Threat device process Checkpoint 2: threat device reviews No INPUTS New requirements introduced: Threat Load Change Request Revised threat list New or revised EW system New or revised threat device No New/ revised EW system (SUT) introduced? Yes EW system process Checkpoint 3: EW system reviews Advanced Development/Engineering Design Checkpoint 4: interference reviews Interference process, generic interferers EW system requirements definition Integration and Evaluation Map EW system parameters to threat devices, create table Generate candidate threat load(s) Checkpoint 5: candidate threat load(s) reviews Performance process, complete system Checkpoint 6: performance reviews OUTPUTS Final optimized threat load parameters Fielding recommendation letter with risks highlighted Engineering report Threat load fielding recommendation Checkpoint 7: threat load fielding recommendation reviews Figure 4. APL CREW threat load development process. SUT, system under test. 62
6 SYSTEMS ENGINEERING IN CREW is to be compared with a full SE process, which, when applied to threat load development, takes approximately weeks, depending on problem complexity. While efficiency and speed have increased, product quality has not decreased. More focus on the technical aspects of the hardware, software, physics, and RF phenomena allow for increased product value and quality while also decreasing the time engineers are required to spend in meetings or on other endeavors that may otherwise cause a loss of focus. The CREW SE process has many phases that will occur simultaneously, overlapping as necessary. This overlap has resulted in a minimum 50% reduction in response and delivery time, placing the RCIED-defeating technique into the hands of the warfighter in approximately half the time. SE reviews occur at checkpoints via teleconferences or, if possible, through informal internal meetings that, in many cases, are attended by government representatives. This process is described through individual SE phases and described in greater detail in Figs. 5 and 6. Needs Analysis In this phase, a need for an updated counter-rcied threat load and technique is determined on the basis of various intelligence sources. This request, in the form of a Threat Load Change Request, may come from APL, the government, or the user in the operational forces. The need may be created by an advance in wireless technologies, adaptation of new communications protocols, deficiencies or changes to current anti-rcied hardware, or a find by U.S. or coalition forces, such as an unexploded emplaced IED or an uncovered weapons cache. A formal Plan of Action is developed detailing procedures APL will follow in researching and developing the new technique. The Requirements Analysis Review referenced at checkpoint 1 is conducted informally during an internal meeting of APL engineers. Concept Exploration In the concept exploration phase, an of alternative techniques consisting of research into use of currently existing techniques and threat loads, modified existing techniques, and newer experimental techniques is conducted. Analysis of the threat RC device and any changes to the RCIED jamming system hardware begins. Analysis results are traced back to the needs and requirements to verify that the capability exists to defeat the device and disrupt its communication link using current technology. Through communication with the Concept Development Engineering Development Needs Analyze need/customer change request for new counter-rf technique. Conduct studies into the cause of the need advances in technology (new wireless devices/protocols), deficiencies in current system/technique, etc. Develop plan of action based on needs. Conduct operations and functional, feasibility definition, and validation of needs. Advanced development Analyze validity of initial threat load requirements. Begin development of risk-mitigation plans. Identify any hardware, software, or firmware changes that might be necessary. Begin functional and design of technique. Develop several engineering, or prototype, techniques. Develop test plans, procedures, and equipment (as necessary). Evaluate concepts in an over-the-air environment. Concept exploration Conduct of alternative techniques and study of various concepts and experimental techniques. Evaluate customer demand based on previous successes and possible risks. Analyze system performance requirements and implementation concepts. Engineering design Develop most effective technique based on lab and field. Validate through rigorous testing. Integrate internal configuration management into technique versions. Develop customer/user documentation package. Concept definition Select technique concept based on technology and risk factors. Perform functional and concept validation. Conduct development planning. Integration and evaluation Test and Evaluation Master Plan. Continue review of system requirements and design based on test results. Evaluate component, subsystem, and system integration. Conduct developmental and operational test and evaluation. Figure 5. CREW concept development. Figure 6. CREW engineering development. 63
7 M. E. PESCI customer and the user, as well as of previous successes, APL can mitigate the risk of developing a less effective technique by incorporating known successful techniques as appropriate. Constant communication with the customer and user is essential to risk reduction throughout each stage. Threat Device Analysis Reviews and EW System Analysis Reviews referenced at checkpoints 2 and 3, respectively, are again conducted informally and internally by APL engineers. Concept Definition Once the concept design has been chosen, it is formally defined and documented. User documentation detailing individual RF devices mapped to system anti-rcied hardware capabilities helps the user understand how the system will attack the threat device and assists the user in developing their TTPs for actual usage in the theater of operation. Planning begins for operational assessment testing at a government test site at this early stage. Advanced Development Analysis is again performed on the initial requirements to verify they can be met on the basis of evaluation of the anti-rcied hardware capabilities and the subject threat device technical characteristics and communication protocols after an interference. Risk is also performed to reduce potential impact on cost and schedule later in the cycle. Mapping of EW system parameters to threat devices is finalized, and any required custom /test software is developed. Prototype, or engineering, threat load system development begins, and various test loads are created. In addition to exploration of concepts in the laboratory and anechoic chambers, over-the-air evaluations are conducted at an outdoor site using the actual anti-rcied hardware and both real and simulated threat devices. Performance measurements, propagation patterns, system minimum detectable signal, and various other measurements are taken. This is not, however, an operational assessment it is simply an evaluation of the engineering test loads and way of reducing risk before the engineering design and integration and evaluation phases. This advance testing reduces the overall design time and shortens the overall process. Engineering Design Threat load requirements are reviewed again. Propagation issues that may reduce or enhance technique effectiveness, such as vehicle shadowing and antenna patterns, are evaluated. The technique believed to be most effective based on all evaluations to this point is developed into a threat load and component documentation packages. A review of the final technique and threat load referenced by checkpoint 5 is conducted informally at APL, usually with representation from government personnel. Integration and Evaluation The Test and Evaluation Master Plan is completed by APL and delivered to the sponsor. Test readiness reviews are held via teleconference, and operational assessment testing is conducted by the sponsor with APL as the technical advisor. Upon successful completion of the operational assessment, the test data are analyzed by APL to verify performance seen in the field and presented to the customer. The threat loads are then formally delivered to the customer with a recommendation for fielding and a formal Engineering Analysis Report detailing the results of the entire process. Postdevelopment (Production/Operation and Support) APL has no specific tasking in this phase. Once the threat load is delivered to the customer, it is incrementally installed into vehicles in theater based on need, location, and vehicle availability. All service and updates are then conducted by Field Service Representatives of the U.S. Marine Corps. Should issues arise, APL may be contacted for investigation and support, but any nontechnical or logistical matters are handled by the government. The final quick-reaction process is a result of several changes and modifications to the traditional SE process. Each phase overlaps with the preceding phase as well as the next phase. This allows parallel efforts to increase process efficiency, though it relies on the availability of necessary resources. Reviews are informal, and checkpoints may be considered reached while work is still ongoing. The speed and flexibility of these changes allows for a more efficient process. However, its success hinges on the experience of the team members involved and their familiarity not only with the process, but with all technical aspects of the system, subsystems, and components as well. Any deviations from the abbreviated process will delay the schedule and inevitably increase overall cost. CONCLUSIONS The classical SE process allows for an efficient system development process; however, many of today s tasks and projects require an accelerated version of the process capable of rapidly producing a cost-effective and technically capable solution. The modern warfighter cannot wait months for an in-depth research and design process because many of the requested capabilities are needed in the field as soon as possible. Although classical SE processes apply the necessary rigor to develop a quality product, without some modification, this type of 64
8 SYSTEMS ENGINEERING IN CREW procedure can become cumbersome and lengthy when all phases and facets are conducted to their full extent. CREW demonstrates how APL has modified the SE process to enable quick-reaction development capabilities that satisfy the challenging requirements of today s quickly changing battlefields. The result has been a series of analyses, techniques, studies, and products that have helped to greatly reduce RCIED casualties and injuries on the battlefield. The efficiency with which these products are delivered, combined with our continually increasing breadth of technical and operational understanding of the RCIED problem space, led to APL becoming the premier organization for confronting the most difficult RCIED problems. ACKNOWLEDGMENTS: I thank F. Lombardi (APL) for providing the original diagram on which Fig. 4 is based. REFERENCES 1 Electronic Industries Alliance, EIA Standard: Process for Engineering a System, EIA-632, Electronic Industries Alliance, Arlington, VA (1999). 2 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC)-Institute of Electrical and Electronics Engineers (IEEE), Systems and Software Engineering System Life Cycle Processes, ISO/IEC 15288:2008(E)/IEEE Standard , ISO/IEC-IEEE (2008). 3 Kossiakoff, A., Sweet, W. N., Seymour, S. J., and Biemer, S. M., Systems Engineering Principles and Practice, John Wiley & Sons, Hoboken, NJ (2011). The Author Michael E. Pesci Michael E. Pesci is a member of the APL Senior Staff in the Sensor and Weapon Integration and Test Group in the Air and Missile Defense Department. He has contributed to various radar and network projects at APL, such as the Cooperative Engagement Capability (CEC), as well as ground and airborne electronic attack programs, including both the U.S. Navy and U.S. Marine Corps CREW programs. He is currently the Project Manager for the U.S. Marine Corps CREW program and continues to provide SE expertise to this and other CREW programs at APL. His address is [email protected]. The Johns Hopkins APL Technical Digest can be accessed electronically at 65
CUSTOMER KEYNOTE Hal Buddenbohm
CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,
Services we provide. Tel: +1 561-623-8810 email: [email protected] http://www.eetengineering.com
EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
Propsim enabled Aerospace, Satellite and Airborne Radio System Testing
www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
Overview of the System Engineering Process. Prepared by
Overview of the System Engineering Process Prepared by Ed Ryen, PE Maintenance ITS March 2008 Introduction This document provides a high level look at the Systems Engineering Process for ITS projects.
Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence
Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace
Electronic Warfare System 2015 Integrated Electronic Warfare System Own the Enemy s Battlespace NOBODY WANTS A FAIR FIGHT DRS offers an Integrated Electronic Warfare (EW) System, with comprehensive training
Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)
CDT/SV in action Stryker Vehicle Live Training Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS) Live Training Products and Systems Observer-Controllers in the Training
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical
Global Spectrum Management
Global Spectrum Management Engineering Solutions Software Solutions Data Solutions Interactive Solutions Government Solutions CONTENTS Engineering Solutions 3 Proven Software Solutions 5 Custom Telecom
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
Department of Defense Workbook Information File In Support of AWS-3 Transition Planning for the 1755-1780 MHz Band Rev. 9/10/14
Department of Defense Workbook Information File In Support of AWS-3 Transition Planning for the 1755-1780 MHz Band Rev. 9/10/14 AWS-3 auction bidders should read and comprehend this document in its entirety
Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses
Wireless Networks Keeping your network running smooth and secure with the latest security and site analyses A wireless network can be one of the most important features of your business, creating efficiencies,
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Certificate of Advanced Study in Microwave Engineering
Certificate of Advanced Study in Microwave Engineering The Department of Electrical Engineering and Computer Science (EECS) at Syracuse University offers the Certificate of Advanced Study in Microwave
USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices
USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices White Paper April 2012 Document: 327216-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
White Paper Assured PNT Inside Military Ground Vehicles Using D3
White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
RF & GPS Tracking. American Sales: 150 S. Adkins Way, Suite 100 Meridian, ID 83642 United States. European Sales: Ahventie 4a7 02170 ESPOO Finland
RF & GPS Tracking European Sales: Ahventie 4a7 02170 ESPOO Finland American Sales: 150 S. Adkins Way, Suite 100 Meridian, ID 83642 United States www.trackersecurity.com [email protected] +1 (888)
Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
Understanding Range for RF Devices
Understanding Range for RF Devices October 2012 White Paper Understanding how environmental factors can affect range is one of the key aspects to deploying a radio frequency (RF) solution. This paper will
Time to Raise the Bar on Base Station Antennas
Time to Raise the Bar on Base Station Antennas White Paper Evolving Technology Drives Adoption of Recommended Standards Kevin Linehan VP, Chief Technology Officer of Antenna Systems September, 2014 Contents
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number
Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies
Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business
Knowledge Base Data Warehouse Methodology
Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This
Physical Layer Research Trends for 5G
Physical Layer Research Trends for 5G Brett T. Walkenhorst, Ph.D. Principal Research Engineer, Georgia Tech Research Institute Adjunct Professor, Georgia Tech, School of Electrical and Computer Engineering
Intelligence-based approach to Smart Grid network communications
Intelligence-based approach to Smart Grid network communications Modeling and simulation tool ensures a cost-effective, successful strategy Executive summary Smart Grid objectives are driving utilities
Characterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
Radio Frequency (RF) Survey
Municipal Wireless Broadband and the Digital Community Report Radio Frequency (RF) Survey for the City and County of San Francisco July 21, 2006 Preface This document describes Civitium s findings and
Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008
Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Guide for Performing a Wireless Site Survey. 2.4 GHz IEEE 802.11g/802.11b/802.15.4
Guide for Performing a Wireless Site Survey 2.4 GHz IEEE 802.11g/802.11b/802.15.4 1 Table of Contents Table of Contents 2 Introduction 3 Wireless Characteristics 3 AMX Site Survey Tools 5 Creating a Channel
White Paper A Case Study of GPS Retransmission Inside Military Ground Vehicles
White Paper A Case Study of GPS Retransmission Inside Military Ground Vehicles Brian Paul October 2010 Introduction Global Positioning System (GPS) technology has seen increased use in many different military
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Information Briefing and Reception. Chris Van Metre President, SCRA Applied R&D December 4, 2014
Information Briefing and Reception Chris Van Metre President, SCRA Applied R&D December 4, 2014 Overview OT Consortium Business Model Section 845 Other Transactions Agreement DoD Spectrum Enterprise (DSE)
Body SAR and EU. B. Derat
Body SAR and EU B. Derat Overview / Outline New Approach: Directive / Standards Current applicable standard IEC/EN 62209-2:2010 Tablet case study Future of EU body SAR testing Maintenance of IEC 62209-2
A Proven Approach for Successful Systems Integration
FIS POSITION PAPER A Proven Approach for Successful Systems Integration David Luttig FIS Consulting Services 1 800 822 6758 Introduction System integration involves integrating existing (often disparate)
Lecture 8. Systems engineering L E C T U R E. SIMILAR process. Zuzana Bělinová. Faculty of Transportation Sciences, CTU in Prague
L E C T U R E 8 SIMILAR process LECTURE 8 - OVERVIEW Theoretical foundations of many methodologies - Typical SE process SYSTEMS ENGINEERING BASIC FACTS Systems Engineering is responsible for creating a
WHITE PAPER. Emerging IoT Wireless Communication
WHITE PAPER Emerging IoT Wireless Communication ABSTRACT It is quite apparent by now that cellular technologies, built primarily for voice traffic, cannot currently provide a scalable solution for long-range
The main purpose of the study was to answer the three following questions:
MEETING DATE: March 19, 2003 SUBJECT: Cellular Phones In The Subway RECOMMENDATION It is recommended that: 1. the Commission authorize staff to issue a Request for Expression of Interest (REOI) to determine
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
SERVICES. Designing, deploying and supporting world class communications solutions.
Designing, deploying and supporting world class communications solutions. DESIGN Expertise, technologies, tools and ideas Business environments, regulation, expansion and obsolescence are drivers that
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
The Technical Management (TM) and Systems. Engineering Programs. Samuel J. Seymour and Alexander Kossiakoff INTRODUCTION PARTNERSHIPS
The Technical Management and Systems Engineering Programs Samuel J. Seymour and Alexander Kossiakoff The Master s of Science programs in Technical Management and Systems Engineering have several unique
Network Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Experts in wireless device and infrastructure test solutions
www.anite.com Experts in wireless device and infrastructure test solutions Anite is now part of Keysight Technologies When customers expect more from mobile devices we help you deliver Anite is the mobile
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks SEAN YUN. June 2009. Software Solutions in Radiocommunications
Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks June 2009 SEAN YUN 2 2 Abstract In an effort to help preserve the ozone and the availability of diminishing natural
STATEMENT BY BEFORE THE SUBCOMMITEE ON TACTICAL AIR AND LAND FORCES COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES
RECORD VERSION STATEMENT BY MAJOR GENERAL JEFF SORENSON DEPUTY ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND TECHNOLOGY) FOR ACQUISITION AND SYSTEMS MANAGEMENT BEFORE THE SUBCOMMITEE ON TACTICAL
Antenna Properties and their impact on Wireless System Performance. Dr. Steven R. Best. Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013
Antenna Properties and their impact on Wireless System Performance Dr. Steven R. Best Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013 Phone (603) 627-7877 FAX: (603) 627-1764 Email: [email protected]
Selecting the Optimal 700MHz LTE Antenna for Public Safety Communications. By Jerry Posluszny, Director of Engineering, Mobile Mark
Selecting the Optimal 700MHz LTE Antenna for Public Safety Communications By Jerry Posluszny, Director of Engineering, Mobile Mark Public safety industry communications methods are rapidly evolving as
The Information Technology Program Manager s Dilemma
The Information Technology Program Manager s Dilemma Rapidly Evolving Technology and Stagnant Processes Kathy Peake 26 Since inception, the Department of Defense s development of acquisition policies and
Testing a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
Troubleshooting Problems Affecting Radio Frequency Communication
Troubleshooting Problems Affecting Radio Frequency Communication Document ID: 8630 Refer to the Cisco Wireless Downloads (registered customers only) page in order to get Cisco Aironet drivers, firmware
Evaluating Cell Phone and Personal Communications Equipment and their EMC Effects on Automotive Audio and In-Cabin Modules
Evaluating Cell Phone and Personal Communications Equipment and their EMC Effects on Automotive Audio and In-Cabin Modules Craig W. Fanning Elite Electronic Engineering, Inc. 1516 Centre Circle Downers
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
Wireless Broadband: Health & Safety Information
Wireless Broadband: Health & Safety Information Introduction The increasing use of mobile phones and other wireless technology has been accompanied by public debate about possible adverse effects on health.
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point
Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point Overview To optimize the overall performance of a WLAN in an outdoor deployment it is important to understand how to maximize coverage
Wireless Technologies in Industrial Markets
SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi
Matthew O. Anderson Scott G. Bauer James R. Hanneman. October 2005 INL/EXT-05-00883
INL/EXT-05-00883 Unmanned Aerial Vehicle (UAV) Dynamic-Tracking Directional Wireless Antennas for Low Powered Applications That Require Reliable Extended Range Operations in Time Critical Scenarios Matthew
Agile ETRM from Allegro
Agile ETRM from Allegro Allegro energy trading and risk management software delivers the fastest realization of business objectives and greatest flexibility with minimal risk and disruption to our customers
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Digital C4I Interoperability: The EM Protection Issue
Digital C4I Interoperability: The EM Protection Issue Robert Pfeffer U.S. Army Nuclear and Chemical Agency ATTN: ATNA-NU (R. Pfeffer) 7150 Heller Loop Suite 101 Springfield, VA 22150-3198 Abstract In this
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189
CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
Radio Access Networks Design and Optimization Technology
Radio Access Networks Design and Optimization Technology UMEMOTO Kenichi, IMAMURA Tomoyasu, TAKAHASHI Gen Abstract The rapid advances in recent years of the broadband implementation of wireless networks,
FPGAs in Next Generation Wireless Networks
FPGAs in Next Generation Wireless Networks March 2010 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1 FPGAs in Next Generation
12. INDOOR INSTALLATION
12. INDOOR INSTALLATION 1. Introduction Previous editions of this book have focused on wide-area outdoor wireless as a means of connecting communities with each other and to the Internet. However, with
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
RECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,
Rec. ITU-R F.1113 1 RECOMMENDATION ITU-R F.1113 RADIO SYSTEMS EMPLOYING METEOR-BURST PROPAGATION (Question ITU-R 157/9) (1994) Rec. ITU-R F.1113 The ITU Radiocommunication Assembly, considering a) that
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Maximizing Throughput and Coverage for Wi Fi and Cellular
Maximizing Throughput and Coverage for Wi Fi and Cellular A White Paper Prepared by Sebastian Rowson, Ph.D. Chief Scientist, Ethertronics, Inc. www.ethertronics.com March 2012 Introduction Ask consumers
EMIT. RF Cosite and Coexistence RFI Modeling and Mitigation
RF Cosite and Coexistence RFI Modeling and Mitigation EMIT provides a powerful new capability to the ANSYS RF Option. It is used to predict radio frequency interference (RFI) in complex environments containing
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Radio Frequency Exposure Test Report
Radio Frequency Exposure EN 62311 January 2008 Assessment of electronic and electrical equipment related to human exposure restrictions for electromagnetic fields (0Hz 300GHz) (IEC 62311:2007, modified)
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.09 November 21, 2012 USD(P) SUBJECT: Autonomy in Weapon Systems References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes DoD policy and assigns
Increasing Business Efficiency and Agility for ATGbased. Systems. the business challenge: upgrading the development pipeline
Increasing Business Efficiency and Agility for ATGbased ecommerce Systems This case study follows a Tier 1 retailer migrating to an ATG-based ecommerce platform and upgrading its software development process
Cisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
