Problem Statement:
What is the optimal solution for integrating the capabilities associated with typical smart phones into a secure and reliable wireless ad-hoc highly mobile tactical military communications network?
Questions to investigate:
Primary Research Question: Is it feasible, while maintaining cost efficiency and security integrity, to establish with a connection via a standard cell phone device to an ad-hoc wireless highly mobile tactical network with the ability to send data or voice across the attached wide area network?
Subsidiary research question #1: Is it feasible to create a secure wireless cellular network from a tactical radio network via standard military waveforms without significant hardware change or compromising military communications security (COMSEC) requirements?
Subsidiary research question #2: Is it feasible to create a secure wireless cellular network from a tactical radio network via an external 3G/4G bridge device without significant hardware changes to standard cell phones or compromising military COMSEC requirements?
Subsidiary research question #3: Is it feasible to wirelessly connect a cell phone to a dual mode / channel tactical radio via a Radio Frequency (RF) 3G/4G chip-set internal to the tactical radio?
Subsidiary research question #4: Which of the three topologies listed as question 1, 2, and 3 are more effective in delivering information to end host?
Subsidiary research question #5: Is it feasible to create an ad-hoc wireless network of cell phones without the attachment of cell towers (i.e. using mobile base stations instead)?
Subsidiary research question #6: Is it feasible to reprogram the radio stack onboard open source cell phones?
Subsidiary research question #7: Is it feasible to reprogram the radio stack onboard inherent tactical radios to integrate a cellular stack?
Subsidiary research question #8: What limitations arise for the tactical and cellular wireless links in realistic operational channels (fading channels with Doppler effects)?
Subsidiary research question #9: What capabilities does the cell phone bring to the network?
Subsidiary research question #10: What is the data throughput for each of the proposed topologies?
Subsidiary research question #11: What communication security issues develop?
Subsidiary research question #12: Of the new security vulnerabilities, what actions can be taken to minimize risk?
Subsidiary research question #13: What are the disadvantages / advantages of the traditional MSC-BSC architecture (centralized approach)?
Subsidiary research question #14: What are the disadvantages / advantages of the independent modular mobile base station and tactical radio combination (decentralized approach)?
Subsidiary research question #15: What modulation and/or coding techniques should be considered when designing the next generation WNW and/or SRW for JTRS?
|