T
Törölt tag 1945
Guest
EW104
Contents
Preface
1 Introduction
2 Spectrum Warfare
2.1 Changes in Warfare
2.2 Some Specific Propagation Related Issues
2.3 Connectivity
2.3.1 The Most Basic Connectivity
2.3.2 Connectivity Requirements
2.3.3 Long-Range Information Transmission
2.3.4 Information Fidelity
2.4 Interference Rejection
2.4.1 Spreading the Transmitted Spectrum
2.4.2 Commercial FM Broadcast
2.4.3 Military Spread Spectrum Signals
2.5 Bandwidth Requirements for Information Transfer
2.5.1 Data Transfer Without a Link
2.5.2 Linked Data Transmission
2.5.3 Software Location
2.6 Distributed Military Capability
2.6.1 Net-Centric Warfare
2.7 Transmission Security Versus Message Security
2.7.1 Transmission Security Versus Transmission Bandwidth
2.7.2 Bandwidth Limitations
2.8 Cyber Warfare Versus EW
2.8.1 Cyber Warfare
2.8.2 Cyber Attacks
2.8.3 Parallels Between Cyber Warfare and EW
2.8.4 Difference Between Cyber Warfare and EW
2.9 Bandwidth Trade-Offs
2.9.1 Bit-Error Critical Cases
2.10 Error Correction Approaches
2.10.1 Error Detection and Correction Codes
2.10.2 Example of a Block Code
2.10.3 Error Correction Versus Bandwidth
2.11 EMS Warfare Practicalities
2.11.1 Warfare Domains
2.12 Steganography
2.12.1 Steganography Versus Encryption
2.12.2 Early Stenographic Techniques
2.12.3 Digital Techniques
2.12.4 How Does Steganography Relate to Spectrum Warfare?
2.12.5 How Is Steganography Detected?
2.13 Link Jamming
2.13.1 Communication Jamming
2.13.2 Required J/S for Jamming Digital Signals
2.13.3 Protections Against Link Jamming
2.13.4 The Net Impact on Link Jamming
3 Legacy Radars
3.1 Threat Parameters
3.1.1 Typical Legacy Surface-to-Air Missile
3.1.2 Typical Legacy Acquisition Radar
3.1.3 Typical Anti-Aircraft Gun
3.2 EW Techniques
3.3 Radar Jamming
3.3.1 Jamming-to-Signal Ratio
3.3.2 Self-Protection Jamming
3.3.3 Remote Jamming
3.3.4 Burn-Through Range
3.4 Radar-Jamming Techniques
3.4.1 Cover Jamming
3.4.2 Barrage Jamming
3.4.3 Spot Jamming
3.4.4 Swept Spot Jamming
3.4.5 Deceptive Jamming
3.4.6 Range Deception Techniques
3.4.7 Angle Deceptive Jamming
3.4.8 Frequency Gate Pull Off
3.4.9 Jamming Monopulse Radars
3.4.10 Formation Jamming
3.4.11 Formation Jamming with Range Denial
3.4.12 Blinking
3.4.13 Terrain Bounce
3.4.14 Cross-Polarization Jamming
3.4.15 Cross-Eye Jamming
Reference
4 Next Generation Threat Radars
4.1 Threat Radar Improvements
4.2 Radar Electronic Protection Techniques
4.2.1 Useful Resources
4.2.2 Ultralow Side Lobes
4.2.3 EW Impact of Reduced Side-Lobe Level
4.2.4 Side-Lobe Cancellation
4.2.5 Side-Lobe Blanking
4.2.6 Monopulse Radar
4.2.7 Cross-Polarization Jamming
4.2.8 Anti-Cross-Polarization
4.2.9 Chirped Radar
4.2.10 Barker Code
4.2.11 Range Gate Pull-Off
4.2.12 AGC Jamming
4.2.13 Noise-Jamming Quality
4.2.14 Electronic Protection Features of Pulse Doppler Radars
4.2.15 Configuration of Pulse Doppler Radar
4.2.16 Separating Targets
4.2.17 Coherent Jamming
4.2.18 Ambiguities in PD Radars
4.2.19 Low, High, and Medium PRF PD Radar
4.2.20 Detection of Jamming
4.2.21 Frequency Diversity
4.2.22 PRF Jitter
4.2.23 Home on Jam
4.3 Surface-to-Air Missile Upgrades
4.3.1 S-300 Series
4.3.2 SA-10 and Upgrades
4.3.3 SA-12 and Upgrades
4.3.4 SA-6 Upgrades
4.3.5 SA-8 Upgrades
4.3.6 MANPADS Upgrades
4.4 SAM Acquisition Radar Upgrade
4.5 AAA Upgrades
4.6 EW Implications of Capabilities Described
4.6.1 Increased Lethal Range
4.6.2 Ultralow Side Lobes
4.6.3 Coherent Side-Lobe Cancelling
4.6.4 Side-Lobe Blanking
4.6.5 Anti-Cross-Polarization
4.6.6 Pulse Compression
4.6.7 Monopulse Radar
4.6.8 Pulse-Doppler Radar
4.6.9 Leading-Edge Tracking
4.6.10 Dicke-Fix
4.6.11 Burn-Through Modes
4.6.12 Frequency Agility
4.6.13 PRF Jitter
4.6.14 Home-on-Jam Capability
4.6.15 Improved MANPADS
4.6.16 Improved AAA
Reference
5 Digital Communication
5.1 Introduction
5.2 The Transmitted Bit Stream
5.2.1 Transmitted Bit Rate Versus Information Bit Rate
5.2.2 Synchronization
5.2.3 Required Bandwidth
5.2.4 Parity and EDC
5.3 Protecting Content Fidelity
5.3.1 Basic Fidelity Techniques
5.3.2 Parity Bits
5.3.3 EDC
5.3.4 Interleaving
5.3.5 Protecting Content Fidelity
5.4 Digital Signal Modulations
5.4.1 Single Bit per Baud Moduatlions
5.4.2 Bit Error Rates
5.4.3 m-ary PSK
5.4.4 I&Q Modulations
5.4.5 BER Versus Eb/N0 for Various Modulations
5.4.6 Efficient Bit Transition Modulation
5.5 Digital Link Specifications
5.5.1 Link Specifications
5.5.2 Link Margin
5.5.3 Sensitivity
5.5.4 Eb/N0 Versus RFSNR
5.5.5 Maximum Range
5.5.6 Minimum Link Range
5.5.7 Data Rate
5.5.8 Bit Error Rate
5.5.9 Angular Tracking Rate
5.5.10 Tracking Rate Versus Link Bandwidth and Antenna Types
5.5.11 Weather Considerations
5.5.12 Antispoof Protection
5.6 Antijam Margin
5.7 Link Margin Specifics
5.8 Antenna Alignment Loss
5.9 Digitizing Imagery
5.9.1 Video Compression
5.9.2 Forward Error Correction
5.10 Codes
Reference
Contents
Preface
1 Introduction
2 Spectrum Warfare
2.1 Changes in Warfare
2.2 Some Specific Propagation Related Issues
2.3 Connectivity
2.3.1 The Most Basic Connectivity
2.3.2 Connectivity Requirements
2.3.3 Long-Range Information Transmission
2.3.4 Information Fidelity
2.4 Interference Rejection
2.4.1 Spreading the Transmitted Spectrum
2.4.2 Commercial FM Broadcast
2.4.3 Military Spread Spectrum Signals
2.5 Bandwidth Requirements for Information Transfer
2.5.1 Data Transfer Without a Link
2.5.2 Linked Data Transmission
2.5.3 Software Location
2.6 Distributed Military Capability
2.6.1 Net-Centric Warfare
2.7 Transmission Security Versus Message Security
2.7.1 Transmission Security Versus Transmission Bandwidth
2.7.2 Bandwidth Limitations
2.8 Cyber Warfare Versus EW
2.8.1 Cyber Warfare
2.8.2 Cyber Attacks
2.8.3 Parallels Between Cyber Warfare and EW
2.8.4 Difference Between Cyber Warfare and EW
2.9 Bandwidth Trade-Offs
2.9.1 Bit-Error Critical Cases
2.10 Error Correction Approaches
2.10.1 Error Detection and Correction Codes
2.10.2 Example of a Block Code
2.10.3 Error Correction Versus Bandwidth
2.11 EMS Warfare Practicalities
2.11.1 Warfare Domains
2.12 Steganography
2.12.1 Steganography Versus Encryption
2.12.2 Early Stenographic Techniques
2.12.3 Digital Techniques
2.12.4 How Does Steganography Relate to Spectrum Warfare?
2.12.5 How Is Steganography Detected?
2.13 Link Jamming
2.13.1 Communication Jamming
2.13.2 Required J/S for Jamming Digital Signals
2.13.3 Protections Against Link Jamming
2.13.4 The Net Impact on Link Jamming
3 Legacy Radars
3.1 Threat Parameters
3.1.1 Typical Legacy Surface-to-Air Missile
3.1.2 Typical Legacy Acquisition Radar
3.1.3 Typical Anti-Aircraft Gun
3.2 EW Techniques
3.3 Radar Jamming
3.3.1 Jamming-to-Signal Ratio
3.3.2 Self-Protection Jamming
3.3.3 Remote Jamming
3.3.4 Burn-Through Range
3.4 Radar-Jamming Techniques
3.4.1 Cover Jamming
3.4.2 Barrage Jamming
3.4.3 Spot Jamming
3.4.4 Swept Spot Jamming
3.4.5 Deceptive Jamming
3.4.6 Range Deception Techniques
3.4.7 Angle Deceptive Jamming
3.4.8 Frequency Gate Pull Off
3.4.9 Jamming Monopulse Radars
3.4.10 Formation Jamming
3.4.11 Formation Jamming with Range Denial
3.4.12 Blinking
3.4.13 Terrain Bounce
3.4.14 Cross-Polarization Jamming
3.4.15 Cross-Eye Jamming
Reference
4 Next Generation Threat Radars
4.1 Threat Radar Improvements
4.2 Radar Electronic Protection Techniques
4.2.1 Useful Resources
4.2.2 Ultralow Side Lobes
4.2.3 EW Impact of Reduced Side-Lobe Level
4.2.4 Side-Lobe Cancellation
4.2.5 Side-Lobe Blanking
4.2.6 Monopulse Radar
4.2.7 Cross-Polarization Jamming
4.2.8 Anti-Cross-Polarization
4.2.9 Chirped Radar
4.2.10 Barker Code
4.2.11 Range Gate Pull-Off
4.2.12 AGC Jamming
4.2.13 Noise-Jamming Quality
4.2.14 Electronic Protection Features of Pulse Doppler Radars
4.2.15 Configuration of Pulse Doppler Radar
4.2.16 Separating Targets
4.2.17 Coherent Jamming
4.2.18 Ambiguities in PD Radars
4.2.19 Low, High, and Medium PRF PD Radar
4.2.20 Detection of Jamming
4.2.21 Frequency Diversity
4.2.22 PRF Jitter
4.2.23 Home on Jam
4.3 Surface-to-Air Missile Upgrades
4.3.1 S-300 Series
4.3.2 SA-10 and Upgrades
4.3.3 SA-12 and Upgrades
4.3.4 SA-6 Upgrades
4.3.5 SA-8 Upgrades
4.3.6 MANPADS Upgrades
4.4 SAM Acquisition Radar Upgrade
4.5 AAA Upgrades
4.6 EW Implications of Capabilities Described
4.6.1 Increased Lethal Range
4.6.2 Ultralow Side Lobes
4.6.3 Coherent Side-Lobe Cancelling
4.6.4 Side-Lobe Blanking
4.6.5 Anti-Cross-Polarization
4.6.6 Pulse Compression
4.6.7 Monopulse Radar
4.6.8 Pulse-Doppler Radar
4.6.9 Leading-Edge Tracking
4.6.10 Dicke-Fix
4.6.11 Burn-Through Modes
4.6.12 Frequency Agility
4.6.13 PRF Jitter
4.6.14 Home-on-Jam Capability
4.6.15 Improved MANPADS
4.6.16 Improved AAA
Reference
5 Digital Communication
5.1 Introduction
5.2 The Transmitted Bit Stream
5.2.1 Transmitted Bit Rate Versus Information Bit Rate
5.2.2 Synchronization
5.2.3 Required Bandwidth
5.2.4 Parity and EDC
5.3 Protecting Content Fidelity
5.3.1 Basic Fidelity Techniques
5.3.2 Parity Bits
5.3.3 EDC
5.3.4 Interleaving
5.3.5 Protecting Content Fidelity
5.4 Digital Signal Modulations
5.4.1 Single Bit per Baud Moduatlions
5.4.2 Bit Error Rates
5.4.3 m-ary PSK
5.4.4 I&Q Modulations
5.4.5 BER Versus Eb/N0 for Various Modulations
5.4.6 Efficient Bit Transition Modulation
5.5 Digital Link Specifications
5.5.1 Link Specifications
5.5.2 Link Margin
5.5.3 Sensitivity
5.5.4 Eb/N0 Versus RFSNR
5.5.5 Maximum Range
5.5.6 Minimum Link Range
5.5.7 Data Rate
5.5.8 Bit Error Rate
5.5.9 Angular Tracking Rate
5.5.10 Tracking Rate Versus Link Bandwidth and Antenna Types
5.5.11 Weather Considerations
5.5.12 Antispoof Protection
5.6 Antijam Margin
5.7 Link Margin Specifics
5.8 Antenna Alignment Loss
5.9 Digitizing Imagery
5.9.1 Video Compression
5.9.2 Forward Error Correction
5.10 Codes
Reference