Communications, Radar and Electronic Warfare

A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author...

Full description

Saved in:
Bibliographic Details
Main Author: Graham, Adrian
Format: eBook Book
Language:English
Published: Chichester, N.J Wiley 2011
John Wiley & Sons, Incorporated
Wiley-Blackwell
John Wiley & Sons Ltd
Edition:1
Subjects:
ISBN:9780470688717, 0470688718, 9780470977170, 0470977175, 9780470977163, 0470977167, 0470977140, 9780470977149
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Preface. Glossary. PART ONE – BASIC THEORY. 1 Introduction. 1.1 The Aim of this Book. 1.2 Current Radio Technology. 1.3 Factors Constraining Radio Communications. References and Further Reading. 2 Management of the Radio Spectrum. 2.1 Spectrum Management Fundamentals. 2.2 Civil Spectrum Management. 2.3 Military Spectrum Management. 2.4 Management of EWActivities. References and Further Reading. 3 The Radio Channel. 3.1 Frequency Aspects of the Radio Channel. 3.2 Narrowband Signals. 3.3 Frequency Hopping Signals. 3.4 Wideband Signals. 3.5 The Effect of Movement on the Radio Channel. References and Further Reading. 4 Radio Links in the Presence of Noise. 4.1 Sources of Radio Noise. 4.2 Effects of Noise. 4.3 The Radio Receiver. 4.4 Radio Link Budgets in the Presence of Noise. References and Further Reading. 5 Radio Links in the Presence of Interference. 5.1 Sources of Radio Interference. 5.2 Interference in the Spectral Domain. 5.3 Interference in the Time Domain. 5.4 Interference Mitigation Techniques. References and Further Reading. 6 Radio Links and Deliberate Jamming. 6.1 The Purpose of Jamming. 6.2 How Jamming Works. 6.3 Types of Communications Jammers. 6.4 Jamming Mitigation Techniques. References and Further Reading. 7 Radar and Radar Jamming. 7.1 Introduction to Radars. 7.2 The Radar Equation. 7.3 Types of Radar. 7.4 Radar Jamming Techniques. 7.5 Radar Jamming Mitigation Techniques. References and Further Reading. 8 Radio-Controlled Improvised Explosive Devices. 8.1 The Poor Man’s Weapon of Choice: IEDs. 8.2 Radio Control for IEDs. 8.3 Detection of IED Radio Control Systems. References and Further Reading. PART TWO – PRACTICAL. 9 Predicting HF Radio. 9.1 Propagation at HF. 9.2 HF Skywave Link Budgets. 9.3 Groundwave. References and Further Reading. 10 VHF to SHF Radio Prediction. 10.1 Propagation above HF. 10.2 Modelling Methods. 10.3 Deterministic Models. 10.4 Empirical Models. 10.5 Combined Models. 10.6 Link Budgets. References and Further Reading. 11 Data Requirements for Radio Prediction. 11.1 Why Consider Modelling Requirements? 11.2 Communications System Parameters. 11.3 ES Specific Parameters. 11.4 EA Specific Parameters. 11.5 Radar Specific Parameters. 11.6 Third-Party Characteristics. 11.7 General Antenna Characteristics. 11.8 Antenna Environment Considerations. 11.9 Terrain Data. 11.10 Ground and Radio Clutter Data. 11.11 Sunspots, Ionospheric and Atmospheric Data. References and Further Reading. 12 Planning and Optimising Radio Links. 12.1 Path Profile Prediction. 12.2 Optimising a Link. 12.3 Re-Broadcast Links. 12.4 Linked Networks. References and Further Reading. 13 Planning Radio Networks for Coverage. 13.1 Coverage Predictions. 13.2 Optimisation of Radio Networks. 13.3 Limiting Coverage. References and Further Reading. 14 Interference Analysis. 14.1 Introduction to Radio Interference Analysis. 14.2 Fading Considerations. 14.3 Interference from other Channels. 14.4 Different Ways of Representing Co-Existing Signals. References and Further Reading. 15 Management Techniques for Interference. 15.1 Preventing Interference. 15.2 Managing Interference. 15.3 Interference Reports. References and Further Reading. 16 Management of Interference at a Radio Site. 16.1 Special Features of Radio Sites with Multiple Systems. 16.2 Sources of Interference at a Radio Site. 16.3 Methods of Managing Interference at Radio Sites. References and Further Reading. 17 Communications Electronic Warfare. 17.1 Introduction. 17.2 Detection and Intercept Networks. 17.3 Direction Finding Networks. 17.4 Communications Jammers. 17.5 The Role of Unmanned Airborne Vehicles. 17.6 Countering Enemy Communications Electronic Warfare. References and Further Reading. 18 Non-Communications Electronic Warfare. 18.1 Non-Communications EW. 18.2 Radar Jamming Techniques. 18.3 Platform Self Protection Methods. 18.4 Parametric Information Collection Methods. References and Further Reading. 19 Countering Radio-Controlled IEDs. 19.1 Introduction to IEDs. 19.2 Radio Controlled IED. 19.3 Basic IED Counter Methods. 20 Summary and Conclusions. Appendix A: Working with Decibels. Appendix B: Common Conversion Formulae and Reference Tables. Index.
  • 5.3.1 Time Slots, Frequency Hopping Systems and Activity Ratios -- 5.3.2 Non-Continuous Interference -- 5.4 Interference Mitigation Techniques -- References and Further Reading -- 6 Radio Links and Deliberate Jamming -- 6.1 The Purpose of Jamming -- 6.2 How Jamming Works -- 6.3 Types of Communications Jammers -- 6.4 Jamming Mitigation Techniques -- References and Further Reading -- 7 Radar and Radar Jamming -- 7.1 Introduction to Radars -- 7.2 The Radar Equation -- 7.3 Types of Radar -- 7.3.1 Basic Pulse Radar -- 7.3.2 Pulse Doppler Radar -- 7.3.3 Pulse Compression Radar -- 7.3.4 Chirped Radar -- 7.3.5 Digitally Modulated Pulses -- 7.3.6 Continuous Wave Radar -- 7.3.7 Moving Target Indicator Radar -- 7.3.8 Phase Array Radar -- 7.3.9 Synthetic Aperture Radar -- 7.3.10 Broadband (LPI) Radar -- 7.3.11 Secondary Radar -- 7.4 Radar Jamming Techniques -- 7.5 Radar Jamming Mitigation Techniques -- References and Further Reading -- 8 Radio-Controlled Improvised Explosive Devices -- 8.1 The Poor Man's Weapon of Choice: IEDs -- 8.2 Radio Control for IEDs -- 8.3 Detection of IED Radio Control Systems -- References and Further Reading -- Part Two: Practical -- 9 Predicting HF Radio -- 9.1 Propagation at HF -- 9.1.1 Skywave -- 9.2 HF Skywave Link Budgets -- 9.3 Groundwave -- References and Further Reading -- 10 VHF to SHF Radio Prediction -- 10.1 Propagation above HF -- 10.1.1 Introduction -- 10.1.2 Short-Range VHF and UHF Links -- 10.1.3 Long Range VHF and UHF Links -- 10.1.4 Variability at VHF and UHF -- 10.1.5 SHF and Above -- 10.2 Modelling Methods -- 10.3 Deterministic Models -- 10.3.1 Free Space Loss Model -- 10.3.2 Two-Ray Models -- 10.3.3 Common Deterministic Models -- 10.4 Empirical Models -- 10.4.1 Basic Form of Empirical Models -- 10.4.2 Okumura Hata and COST 231 Hata -- 10.4.3 ITU-R P.1546 -- 10.4.4 ITU-528 Aeronautical Model
  • 10.4.5 Clutter and Absorption Modelling -- 10.4.6 Fading Characteristics -- 10.5 Combined Models -- 10.5.1 Combining Propagation Models -- 10.5.2 The ITM Model -- 10.5.3 Combination Checklist -- 10.6 Link Budgets -- 10.6.1 Generic Analog Link Budgets -- 10.6.2 Generic Digital Link Budgets -- 10.6.3 Spread-Spectrum Link Budgets -- 10.6.4 Radar Primary Radar Link Budgets -- 10.6.5 HF Link Budgets -- References and Further Reading -- 11 Data Requirements for Radio Prediction -- 11.1 Why Consider Modelling Requirements? -- 11.2 Communications System Parameters -- 11.3 ES Specific Parameters -- 11.4 EA Specific Parameters -- 11.5 Radar Specific Parameters -- 11.6 Third-Party Characteristics -- 11.7 General Antenna Characteristics -- 11.8 Antenna Environment Considerations -- 11.9 Terrain Data -- 11.9.1 Introduction to Terrain Data -- 11.9.2 Sources of Terrain Data -- 11.9.3 Geographic Projections and Datums -- 11.9.4 Terrain Data Resolution -- 11.9.5 Required Precision -- 11.10 Ground and Radio Clutter Data -- 11.10.1 Ground Conductivity and Permittivity -- 11.10.2 Radio Clutter -- 11.11 Sunspots, Ionospheric and Atmospheric Data -- 11.11.1 Sunspots -- 11.11.2 Ionospheric Conditions -- 11.11.3 Gaseous Absorption -- 11.11.4 Precipitation -- References and Further Reading -- 12 Planning and Optimising Radio Links -- 12.1 Path Profile Prediction -- 12.2 Optimising a Link -- 12.3 Re-Broadcast Links -- 12.4 Linked Networks -- References and Further Reading -- 13 Planning Radio Networks for Coverage -- 13.1 Coverage Predictions -- 13.2 Optimisation of Radio Networks -- 13.3 Limiting Coverage -- References and Further Reading -- 14 Interference Analysis -- 14.1 Introduction to Radio Interference Analysis -- 14.2 Fading Considerations -- 14.3 Interference from other Channels -- 14.4 Different Ways of Representing Co-existing Signals
  • COMMUNICATIONS, RADAR AND ELECTRONIC WARFARE -- Contents -- Preface -- Glossary -- Part One: Basic Theory -- 1 Introduction -- 1.1 The Aim of this Book -- 1.2 Current Radio Technology -- 1.2.1 Introduction -- 1.2.2 Military Communications -- 1.2.3 Quasi-Military Type Operations -- 1.2.4 Civilian Communications -- 1.2.5 Cross-Over Technologies -- 1.3 Factors Constraining Radio Communications -- 1.3.1 The Basic Radio Link -- 1.3.2 Useful Conversion Formulae -- 1.3.3 Environmental Factors -- 1.3.4 Fading in Radio Systems -- References and Further Reading -- 2 Management of the Radio Spectrum -- 2.1 Spectrum Management Fundamentals -- 2.2 Civil Spectrum Management -- 2.3 Military Spectrum Management -- 2.3.1 Introduction -- 2.3.2 Spectrum Demand Assessments -- 2.3.3 Spectrum Protection -- 2.3.4 Assignment and Allotment Process -- 2.3.5 The BSM Plan -- 2.3.6 BSM Plan Dissemination -- 2.3.7 Interference Management -- 2.4 Management of EW Activities -- References and Further Reading -- 3 The Radio Channel -- 3.1 Frequency Aspects of the Radio Channel -- 3.2 Narrowband Signals -- 3.2.1 Rayleigh Fading -- 3.2.2 Ricean Fading -- 3.3 Frequency Hopping Signals -- 3.4 Wideband Signals -- 3.5 The Effect of Movement on the Radio Channel -- References and Further Reading -- 4 Radio Links in the Presence of Noise -- 4.1 Sources of Radio Noise -- 4.2 Effects of Noise -- 4.3 The Radio Receiver -- 4.4 Radio Link Budgets in the Presence of Noise -- References and Further Reading -- 5 Radio Links in the Presence of Interference -- 5.1 Sources of Radio Interference -- 5.2 Interference in the Spectral Domain -- 5.2.1 Co-Channel Interference -- 5.2.2 Adjacent and Other Channel Offset Interference -- 5.2.3 Overlapping Bandwidth Calculations -- 5.2.4 Interference between Dissimilar Systems -- 5.2.5 Multiple Interferers -- 5.3 Interference in the Time Domain
  • References and Further Reading -- 15 Management Techniques for Interference -- 15.1 Preventing Interference -- 15.1.1 Spatial Methods -- 15.1.2 Spectral Methods -- 15.1.3 Time-Based Methods -- 15.2 Managing Interference -- 15.3 Interference Reports -- References and Further Reading -- 16 Management of Interference at a Radio Site -- 16.1 Special Features of Radio Sites with Multiple Systems -- 16.1.1 Introduction -- 16.1.2 EMC Issues -- 16.1.3 Co-Site Radio Layout -- 16.2 Sources of Interference at a Radio Site -- 16.2.1 Blocking -- 16.2.2 Harmonics -- 16.2.3 Intermediate Frequencies -- 16.2.4 Image Frequencies -- 16.2.5 Inter-Modulation Products -- 16.3 Methods of Managing Interference at Radio Sites -- 16.3.1 Prevention -- 16.3.2 Curing -- References and Further Reading -- 17 Communications Electronic Warfare -- 17.1 Introduction -- 17.2 Detection and Intercept Networks -- 17.2.1 Introduction -- 17.2.2 Detection Capability -- 17.2.3 Intercept Systems -- 17.2.4 Planning Detection and Interception Networks -- 17.3 Direction Finding Networks -- 17.3.1 Introduction -- 17.3.2 History of Direction Finding -- 17.3.3 Operational Uses of DF Systems -- 17.3.4 Basic Principles of DF -- 17.3.5 Types of Direction Finders -- 17.3.6 The DF Baseline -- 17.3.7 Optimisation of the DF Baseline -- 17.3.8 Airborne DF -- 17.3.9 DF Assets and Communications -- 17.4 Communications Jammers -- 17.4.1 Introduction -- 17.4.2 Legality of Jamming -- 17.4.3 Spot Jamming -- 17.4.4 Barrage Jamming -- 17.4.5 Responsive Jamming -- 17.4.6 Adaptive Jamming -- 17.4.7 Smart Jamming -- 17.5 The Role of Unmanned Airborne Vehicles -- 17.5.1 UAV Roles -- 17.5.2 UAV Advantages -- 17.5.3 UAV Disadvantages -- 17.5.4 UAV Communications and Spectrum Management -- 17.6 Countering Enemy Communications Electronic Warfare -- 17.6.1 Poacher-Gamekeeper Approach -- 17.6.2 EPM
  • 17.6.3 Tactical Methods of Countering Enemy CEW -- References and Further Reading -- 18 Non-Communications Electronic Warfare -- 18.1 Non-Communications EW -- 18.1.1 Broadcast -- 18.1.2 Navigation Systems -- 18.1.3 Secondary Radar Systems -- 18.2 Radar Jamming Techniques -- 18.2.1 Cover Jamming -- 18.2.2 Range Gate Pull Off and Pull In -- 18.2.3 Velocity Gate Pull Off -- 18.2.4 Angle Stealing -- 18.2.5 Inverse Gain Jamming -- 18.2.6 Other Jamming Methods -- 18.3 Platform Self Protection Methods -- 18.3.1 Platform Types and Protection Required -- 18.3.2 Decoys -- 18.4 Parametric Information Collection Methods -- 18.4.1 Collection of Electronic Order of Battle Information -- 18.4.2 Management of EORBAT Information -- 18.4.3 Radar Threat Characteristics -- 18.4.4 Communications Parameters -- 18.4.5 Collection Methods -- 18.4.6 Collection versus Detection -- 18.4.7 Example Collection Activity -- References and Further Reading -- 19 Countering Radio-Controlled IEDs -- 19.1 Introduction to IEDs -- 19.1.1 Asymmetric Warfare -- 19.1.2 Types of IED -- 19.1.3 Threat Mix -- 19.2 Radio Controlled IED -- 19.3 Basic IED Counter Methods -- 19.3.1 Detection of Enemy Activities -- 19.3.2 Non-EW Methods -- 19.3.3 EW Methods -- 20 Summary and Conclusions -- Appendix A: Working with Decibels -- Appendix B: Common Conversion Formulae and Reference Tables -- Index