Abstract
MIL-SD-188-220 standard has specified the operations and functions of narrowband-based tactical networks. While the conventional tactical networks have mainly dealt with voice and short message data services, the future tactical networks are evolving towards broadband and multimediaenabled wireless Ad-Hoc networks. Therefore, this paper evaluates a network access method of the standard from the wideband network perspective, not narrowband perspective. In this paper, Deterministic Adaptable Priority Net Access Delay (DAP-NAD), one of the channel access methods specified in MIL-STD-188-220D with Change 1 standard, is simulated and evaluated over Wideband Networking Waveform–like environments in terms of Urgent precedence traffic. The simulation results conclude that unlike the narrowband environments, Bump-Slot, which is a unique time slot specified by the standard, does not play a critical role to enhance the performance in transmitting Urgent traffic over the wideband networks.
This research was supported in part by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (2011-0005360) and in part by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency” (NIPA-2011- (C1090-1121-0011)))
Chapter PDF
Similar content being viewed by others
References
MIL-STD-188-220D with Change1 Digital Message Transfer Device Subsystem (June 23, 2008)
JPEO JTRS Standard, http://sca.jpeojtrs.mil
Abacus Programming Corporation, http://www.abacuscorp.com/se.htm
Spectrum Signal Processing by Vecima, http://www.spectrumsignal.com/products/pdf/wnw_starter_kit.pdf
Burch, R.G., Chamberlain, S.C.: Performance evaluation of MIL-STD-188-220 interoperability standard for digital message transfer device subsystems. In: 14th Military Communications Conference, pp. 427–432 (1995)
Thuente, D.J., Borchelt, T.E.: Simulation studies of MAC algorithms for combat net radio. In: 16th Military Communications Conference, pp. 193–199 (1997)
Thuente, D.J., Borchelt, T.E.: Simulation model and studies of MIL-STD-188-220A. In: 17th Military Communications Conference, pp. 198–204 (1998)
Thuente, D.J., Borchelt, T.E.: Efficient data and voice media access control algorithm for MIL-STD-188-220B. In: 19th Military Communications Conference, pp. 115–121 (2000)
Thuente, D.J., Whiteman, J.K.: Modified CSMA/Implicit token passing algorithm for MIL-STD-188-220B. In: 20th Military Communication Conference, pp. 838–844 (2001)
Thuente, D.J.: Improving quality of service for MIL-STD-188-220C. In: 21st Military Communication Conference, pp. 1194–1200 (2002)
Yang, J., Liu, Y.: An improved implicit token passing algorithm for DAP-NAD in MIL-STD-188-220C. In: 2nd International Conference on Wireless Communications, pp. 1–4 (2006)
Liu, Y., An, J., Liu, H.: The modified DAP-NAD-CJ algorithm for multicast applications. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4 (2008)
Kim, B.-S.: Comparative Study of MIL-STD-188-220D Standard over IEEE802.11 Standard. SK Telecommunications Review 20(1) (2010)
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE Std. 802.11 (June 12, 2007)
Calyam, P., Sridharan, M., Mandrawa, W., Schopis, P.: Performance Measurement and Analysis of H.323 Traffic. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 137–146. Springer, Heidelberg (2004)
International Telecommunication Union, http://www.itu.int/itudoc/itu-t/workshop/qos
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Han, S., Kim, BS. (2011). Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks. In: Altman, E., Shi, W. (eds) Network and Parallel Computing. NPC 2011. Lecture Notes in Computer Science, vol 6985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24403-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-24403-2_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24402-5
Online ISBN: 978-3-642-24403-2
eBook Packages: Computer ScienceComputer Science (R0)