Cover image for Communications, Radar and Electronic Warfare.
Communications, Radar and Electronic Warfare.
Title:
Communications, Radar and Electronic Warfare.
Author:
Graham, Adrian.
ISBN:
9780470977163
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (400 pages)
Contents:
COMMUNICATIONS, RADAR AND ELECTRONIC WARFARE -- Contents -- Preface -- Glossary -- Part One: Basic Theory -- 1 Introduction -- 1.1 The Aim of this Book -- 1.2 Current Radio Technology -- 1.2.1 Introduction -- 1.2.2 Military Communications -- 1.2.3 Quasi-Military Type Operations -- 1.2.4 Civilian Communications -- 1.2.5 Cross-Over Technologies -- 1.3 Factors Constraining Radio Communications -- 1.3.1 The Basic Radio Link -- 1.3.2 Useful Conversion Formulae -- 1.3.3 Environmental Factors -- 1.3.4 Fading in Radio Systems -- References and Further Reading -- 2 Management of the Radio Spectrum -- 2.1 Spectrum Management Fundamentals -- 2.2 Civil Spectrum Management -- 2.3 Military Spectrum Management -- 2.3.1 Introduction -- 2.3.2 Spectrum Demand Assessments -- 2.3.3 Spectrum Protection -- 2.3.4 Assignment and Allotment Process -- 2.3.5 The BSM Plan -- 2.3.6 BSM Plan Dissemination -- 2.3.7 Interference Management -- 2.4 Management of EW Activities -- References and Further Reading -- 3 The Radio Channel -- 3.1 Frequency Aspects of the Radio Channel -- 3.2 Narrowband Signals -- 3.2.1 Rayleigh Fading -- 3.2.2 Ricean Fading -- 3.3 Frequency Hopping Signals -- 3.4 Wideband Signals -- 3.5 The Effect of Movement on the Radio Channel -- References and Further Reading -- 4 Radio Links in the Presence of Noise -- 4.1 Sources of Radio Noise -- 4.2 Effects of Noise -- 4.3 The Radio Receiver -- 4.4 Radio Link Budgets in the Presence of Noise -- References and Further Reading -- 5 Radio Links in the Presence of Interference -- 5.1 Sources of Radio Interference -- 5.2 Interference in the Spectral Domain -- 5.2.1 Co-Channel Interference -- 5.2.2 Adjacent and Other Channel Offset Interference -- 5.2.3 Overlapping Bandwidth Calculations -- 5.2.4 Interference between Dissimilar Systems -- 5.2.5 Multiple Interferers -- 5.3 Interference in the Time Domain.

5.3.1 Time Slots, Frequency Hopping Systems and Activity Ratios -- 5.3.2 Non-Continuous Interference -- 5.4 Interference Mitigation Techniques -- References and Further Reading -- 6 Radio Links and Deliberate Jamming -- 6.1 The Purpose of Jamming -- 6.2 How Jamming Works -- 6.3 Types of Communications Jammers -- 6.4 Jamming Mitigation Techniques -- References and Further Reading -- 7 Radar and Radar Jamming -- 7.1 Introduction to Radars -- 7.2 The Radar Equation -- 7.3 Types of Radar -- 7.3.1 Basic Pulse Radar -- 7.3.2 Pulse Doppler Radar -- 7.3.3 Pulse Compression Radar -- 7.3.4 Chirped Radar -- 7.3.5 Digitally Modulated Pulses -- 7.3.6 Continuous Wave Radar -- 7.3.7 Moving Target Indicator Radar -- 7.3.8 Phase Array Radar -- 7.3.9 Synthetic Aperture Radar -- 7.3.10 Broadband (LPI) Radar -- 7.3.11 Secondary Radar -- 7.4 Radar Jamming Techniques -- 7.5 Radar Jamming Mitigation Techniques -- References and Further Reading -- 8 Radio-Controlled Improvised Explosive Devices -- 8.1 The Poor Man's Weapon of Choice: IEDs -- 8.2 Radio Control for IEDs -- 8.3 Detection of IED Radio Control Systems -- References and Further Reading -- Part Two: Practical -- 9 Predicting HF Radio -- 9.1 Propagation at HF -- 9.1.1 Skywave -- 9.2 HF Skywave Link Budgets -- 9.3 Groundwave -- References and Further Reading -- 10 VHF to SHF Radio Prediction -- 10.1 Propagation above HF -- 10.1.1 Introduction -- 10.1.2 Short-Range VHF and UHF Links -- 10.1.3 Long Range VHF and UHF Links -- 10.1.4 Variability at VHF and UHF -- 10.1.5 SHF and Above -- 10.2 Modelling Methods -- 10.3 Deterministic Models -- 10.3.1 Free Space Loss Model -- 10.3.2 Two-Ray Models -- 10.3.3 Common Deterministic Models -- 10.4 Empirical Models -- 10.4.1 Basic Form of Empirical Models -- 10.4.2 Okumura Hata and COST 231 Hata -- 10.4.3 ITU-R P.1546 -- 10.4.4 ITU-528 Aeronautical Model.

10.4.5 Clutter and Absorption Modelling -- 10.4.6 Fading Characteristics -- 10.5 Combined Models -- 10.5.1 Combining Propagation Models -- 10.5.2 The ITM Model -- 10.5.3 Combination Checklist -- 10.6 Link Budgets -- 10.6.1 Generic Analog Link Budgets -- 10.6.2 Generic Digital Link Budgets -- 10.6.3 Spread-Spectrum Link Budgets -- 10.6.4 Radar Primary Radar Link Budgets -- 10.6.5 HF Link Budgets -- References and Further Reading -- 11 Data Requirements for Radio Prediction -- 11.1 Why Consider Modelling Requirements? -- 11.2 Communications System Parameters -- 11.3 ES Specific Parameters -- 11.4 EA Specific Parameters -- 11.5 Radar Specific Parameters -- 11.6 Third-Party Characteristics -- 11.7 General Antenna Characteristics -- 11.8 Antenna Environment Considerations -- 11.9 Terrain Data -- 11.9.1 Introduction to Terrain Data -- 11.9.2 Sources of Terrain Data -- 11.9.3 Geographic Projections and Datums -- 11.9.4 Terrain Data Resolution -- 11.9.5 Required Precision -- 11.10 Ground and Radio Clutter Data -- 11.10.1 Ground Conductivity and Permittivity -- 11.10.2 Radio Clutter -- 11.11 Sunspots, Ionospheric and Atmospheric Data -- 11.11.1 Sunspots -- 11.11.2 Ionospheric Conditions -- 11.11.3 Gaseous Absorption -- 11.11.4 Precipitation -- References and Further Reading -- 12 Planning and Optimising Radio Links -- 12.1 Path Profile Prediction -- 12.2 Optimising a Link -- 12.3 Re-Broadcast Links -- 12.4 Linked Networks -- References and Further Reading -- 13 Planning Radio Networks for Coverage -- 13.1 Coverage Predictions -- 13.2 Optimisation of Radio Networks -- 13.3 Limiting Coverage -- References and Further Reading -- 14 Interference Analysis -- 14.1 Introduction to Radio Interference Analysis -- 14.2 Fading Considerations -- 14.3 Interference from other Channels -- 14.4 Different Ways of Representing Co-existing Signals.

References and Further Reading -- 15 Management Techniques for Interference -- 15.1 Preventing Interference -- 15.1.1 Spatial Methods -- 15.1.2 Spectral Methods -- 15.1.3 Time-Based Methods -- 15.2 Managing Interference -- 15.3 Interference Reports -- References and Further Reading -- 16 Management of Interference at a Radio Site -- 16.1 Special Features of Radio Sites with Multiple Systems -- 16.1.1 Introduction -- 16.1.2 EMC Issues -- 16.1.3 Co-Site Radio Layout -- 16.2 Sources of Interference at a Radio Site -- 16.2.1 Blocking -- 16.2.2 Harmonics -- 16.2.3 Intermediate Frequencies -- 16.2.4 Image Frequencies -- 16.2.5 Inter-Modulation Products -- 16.3 Methods of Managing Interference at Radio Sites -- 16.3.1 Prevention -- 16.3.2 Curing -- References and Further Reading -- 17 Communications Electronic Warfare -- 17.1 Introduction -- 17.2 Detection and Intercept Networks -- 17.2.1 Introduction -- 17.2.2 Detection Capability -- 17.2.3 Intercept Systems -- 17.2.4 Planning Detection and Interception Networks -- 17.3 Direction Finding Networks -- 17.3.1 Introduction -- 17.3.2 History of Direction Finding -- 17.3.3 Operational Uses of DF Systems -- 17.3.4 Basic Principles of DF -- 17.3.5 Types of Direction Finders -- 17.3.6 The DF Baseline -- 17.3.7 Optimisation of the DF Baseline -- 17.3.8 Airborne DF -- 17.3.9 DF Assets and Communications -- 17.4 Communications Jammers -- 17.4.1 Introduction -- 17.4.2 Legality of Jamming -- 17.4.3 Spot Jamming -- 17.4.4 Barrage Jamming -- 17.4.5 Responsive Jamming -- 17.4.6 Adaptive Jamming -- 17.4.7 Smart Jamming -- 17.5 The Role of Unmanned Airborne Vehicles -- 17.5.1 UAV Roles -- 17.5.2 UAV Advantages -- 17.5.3 UAV Disadvantages -- 17.5.4 UAV Communications and Spectrum Management -- 17.6 Countering Enemy Communications Electronic Warfare -- 17.6.1 Poacher-Gamekeeper Approach -- 17.6.2 EPM.

17.6.3 Tactical Methods of Countering Enemy CEW -- References and Further Reading -- 18 Non-Communications Electronic Warfare -- 18.1 Non-Communications EW -- 18.1.1 Broadcast -- 18.1.2 Navigation Systems -- 18.1.3 Secondary Radar Systems -- 18.2 Radar Jamming Techniques -- 18.2.1 Cover Jamming -- 18.2.2 Range Gate Pull Off and Pull In -- 18.2.3 Velocity Gate Pull Off -- 18.2.4 Angle Stealing -- 18.2.5 Inverse Gain Jamming -- 18.2.6 Other Jamming Methods -- 18.3 Platform Self Protection Methods -- 18.3.1 Platform Types and Protection Required -- 18.3.2 Decoys -- 18.4 Parametric Information Collection Methods -- 18.4.1 Collection of Electronic Order of Battle Information -- 18.4.2 Management of EORBAT Information -- 18.4.3 Radar Threat Characteristics -- 18.4.4 Communications Parameters -- 18.4.5 Collection Methods -- 18.4.6 Collection versus Detection -- 18.4.7 Example Collection Activity -- References and Further Reading -- 19 Countering Radio-Controlled IEDs -- 19.1 Introduction to IEDs -- 19.1.1 Asymmetric Warfare -- 19.1.2 Types of IED -- 19.1.3 Threat Mix -- 19.2 Radio Controlled IED -- 19.3 Basic IED Counter Methods -- 19.3.1 Detection of Enemy Activities -- 19.3.2 Non-EW Methods -- 19.3.3 EW Methods -- 20 Summary and Conclusions -- Appendix A: Working with Decibels -- Appendix B: Common Conversion Formulae and Reference Tables -- Index.
Abstract:
A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes systems working in the HF bands and SHF. Furthermore, the author examines the performance of these systems, and also the effects of noise, interference and deliberate jamming, as well as the performance of jamming, detection and intercept systems. Particular attention is paid to the problems caused by Radio Controlled Improvised Explosive Devices (RCIEDs). Key Features: A practical handbook on the topic of radio communications and propagation Written by an expert in both the civilian and military applications of the technology Focuses on methods such as radio and radar jamming, and radio-controlled improvised explosive devices (IEDs) Contains problems and solutions to clarify key topics.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: