Accession Number : ADA469964

Title :   Awareness of Emerging Wireless Technologies: Ad-hoc and Personal Area Networks Standards and Emerging Technologies (Sensibilisation a l'emergence des technologies sans fil: technologies emergeantes et normes de reseaux personnels et ad-hoc)

Descriptive Note : Final rept.


Personal Author(s) : Stassinopoulos, George ; Boucher, L ; Churavy, M ; Plesse, T ; Marquart, D ; Kyriazakos, S ; Papaoulakis, N ; Nikitopoulos, D ; Maseng, T

Full Text :

Report Date : Apr 2007

Pagination or Media Count : 122

Abstract : How wireless technologies and devices are proliferating, finding wide acceptance and possibilities for deployment, is the key target of this report. Range, bandwidth and power constraints are, as in the civilian world, prominent issues and each technology described is placed for covering part of these conflicting requirements. The report starts with ad-hoc networking concepts and maturing technological solutions. Ad-hoc networking is a necessary companion to wireless communication, due to the inherent lack of reliability of any wireless based link level protocol. It is particularly important in the military case, where flexible deployment, need for reconfiguration, and adaptation to changing scenarios and situations bring ad-hoc requirements up to the application level. The pertinent wireless technologies of the 802.11 families are then described one by one in their physical, medium access and link layer aspects. Point-to-point, point-to-multipoint and fully symmetric arrangements listed against range (tens of meters up to several kilometers) and offered bandwidth call for the examination of the 802.16 series of standards. For ranges in the order of meters, special technologies apply, discussed under the heading of PANs (Personal Area Networks). These technologies, with emphasis on low power, have to be seen also in the context of a wider range of terminals (sensors, personal weapons, low end, and possibly throw away devices) supplementing the traditional needs of data and voice communications. Comparative tables are used to summarize key characteristics and to demarcate the ranges of possible usage for each technology. Attention is drawn to security issues for each particular technology giving the present (usually unsatisfactory status) and possible ways to ensure characteristics more acceptable for military applications. Testing and verification methodologies, also upcoming and relevant possibilities, are overviewed.


Subject Categories : Radio Communications
      Military Forces and Organizations

Distribution Statement : APPROVED FOR PUBLIC RELEASE