You are on page 1of 1

In BPSK, only one sinusoid is taken as the basis function.

Modulation is achieved by varying the phase of the sinusoid depending on the message bits. Therefore, within a bit duration , the two different phase states of the carrier signal are represented as,

SRI RAMAKRISHNA ENGINEERING COLLEGE


DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
ACTIVE LEARNING METHOD REPORT: 20EC215 MICROWAVE AND OPTICAL COMMUNICATION: 6
TITLE: OPTICAL COMMUNICATION SYSTEM FOR SECURE DATA TRANSMISSION IN MILITARY FIELD OPERATIONS

NGNs are influenced by mechanisms for creating


INTRODUCTION FEAUTURES OF SCIP PROTOCOL
paths/tunnels in the network, procedures for
✓ defining channels for signaling and encrypted
The Armed Forces’ communications systems and guaranteeing service quality and communication user data is carried out at the application layer
networks (so-called private or special security, and user mobility. (Layer 7 OSI model),
communications systems), in which the exchange ✓ minimum transmission requirements for
of information is carried out at various levels of various technologies and communication
protocols are specified below the network layer
confidentiality, play a special role in the state (Layer 3 OSI model),
security system. Different types of Armed Forces
✓ SCIP channels have their own error control
use separate, but characterized by interoperability, system SCIP Reliable Transport Channel,
information systems as part of a joint strategy for
management and command of armed forces and SCIP PROTOCOL
cooperating with other components of the state
The International Interoperability Communications
defense system. In the types of Armed Forces,
Working Group (IICWG) was established within
COMMUNICATION SECURITY
from the operational and functional point of view,
STRATEGIES NATO to implement and test national solutions
basic components of combat units (companies,
using the SCIP protocol for secure communication
The security of information systems, computer
battalions, brigades, divisions, etc.) are organized,
systems. STANAG 5068 contains the necessary
networks, and telecommunications networks has
which have their own command systems
guidelines for implementing the SCIP protocol in
been a major concern since the inception of
(command posts) and the necessary information
the armed forces. The SCIP protocol enables secure Conclusion
communication services. The security architecture
infrastructure
COMMUNICATION(communications systems).
TECHNOLOGIES communication through heterogeneous Due to the wide range of topics related to
in relation to the security dimensions has been
Communication technologies have seen significant telecommunications networks with a low telecommunications systems/networks, including the so-
included in recommendation X.805 ITU-T.
progress over the past decades, with convergence transmission speed of 2.4 Kbps or 7.2 Kbps for called special communication systems, the article focuses
Communications and Information Systems
and synergy being the driving forces behind their broadband radio media. It provides simple work and only on some aspects of a wide range of issues related to the
Security (CISS) includes organizational, system,
development. The networks with a stack of TCP/IP properties and functionality of selected communication
point-to-point or point-to-multipoint communication
and technical mechanisms such as security solutions and technologies in the context of end-to-end
protocols are relatively simple in operation, with IP and includes a cryptographic component for the
architecture assessment, technology analysis, communication security.
being the basic solution in the network layer. In the coalition, mission, or national cryptography. SCIP
security management, cryptographic information It should also be noted that for several years there has been
data link layer, various communication techniques also enables transmission of multimedia data with
security, and research in interoperability and an intensive development of new solutions (concepts) in the
and technologies are used, including the Ethernet speeds of up to 10 Mbps in E2E relation with higher area of broadly understood information technology (ICT),
compatibility of information systems affects secure
standard and its evolution, MPLS, and ATM. Next- bandwidths available.
communication between users in an end-to-end
generation networks (NGNs) consolidate specialized PRESENTED BY :
relationship. multi-domain separated Security
overlay communication technologies into one
Private Networks (SPNs) and open Heterogeneous VIGNESH S (2002260)
solution based on IP, with migration to multimedia
Public Networks (HPNs).
services based on the IP protocol.
RESEARCH POSTER PRESENTATION DESIGN © 2015

www.PosterPresentations.com

You might also like