National Academies Press: OpenBook

The Global Positioning System: A Shared National Asset (1995)

Chapter: Possible Interim Operational Procedures

« Previous: Improved L2 Ionospheric Correction
Suggested Citation:"Possible Interim Operational Procedures." National Research Council. 1995. The Global Positioning System: A Shared National Asset. Washington, DC: The National Academies Press. doi: 10.17226/4920.
Page 116

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

PERFORMANCE IMPROVEMENTS TO THE EXISTING GPS CONFIGURATION 116 Military receivers should be developed that compensate for ionospheric errors when L1 is jammed, by improved software modeling and use of local-area ionospheric corrections. Possible Interim Operational Procedures The NRC committee believes that the most significant shortcoming of a GPS denial strategy is the current inability to operate in high levels of enemy jamming, while at the same time denying GPS to an adversary. The implementation of technical enhancements to military user equipment, such as direct Y-code acquisition capability, improved nulling antennas, better inertial aiding capabilities, enhanced signal processors, and improved L2 ionospheric corrections would assist in the optimal solution to this problem. Although the NRC committee believes that these technical capabilities are now available, unfortunately, such capabilities are not currently fielded by the military. GPS receivers are especially vulnerable during their signal acquisition phase. This weakness is magnified by the inability of most military GPS receivers to acquire the Y-code during periods when the C/A-code is being jammed. Future receivers capable of direct Y-code acquisition will go a long way toward solving this problem. In any event, tactics must be developed and put in place to facilitate acquisition during jamming. Some possible disciplines that can be implemented in the near-term are presented below. (1) Develop military procedures to remove jammers and DGPS stations. As with existing plans to destroy radars in a hostile area, plans and procedures should be developed to remove jammers and DGPS stations. (2) Acquire the Y-code outside the jamming area. Prior to entering the jamming area, the C/A-code can be used to acquire the Y-code. Once the Y-code is obtained, and while still within the active jamming area, PPS receivers should be operated continuously or be re-powered every few hours in order to maintain accurate time. Accurate time will aid in faster, direct reacquisition of the Y-code. This technique can be extended to aircraft-based GPS-guided munitions using low-powered C/A- code retransmissions aboard, or by hardwiring of time-transfer circuits. (3) Review training exercises, procedures, and policy manuals. The current training procedures and policy manuals should be examined to make sure U.S. troops are properly instructed to operate in both hostile jamming and denial jamming environments. For example, ground forces can make use of natural terrain and man-made obstructions to obtain some shielding from ground-based jammers.

The Global Positioning System: A Shared National Asset Get This Book
Buy Paperback | $61.00 Buy Ebook | $48.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The Global Positioning System (GPS) is a satellite-based navigation system that was originally designed for the U.S. military. However, the number of civilian GPS users now exceeds the military users, and many commercial markets have emerged. This book identifies technical improvements that would enhance military, civilian, and commercial use of the GPS. Several technical improvements are recommended that could be made to enhance the overall system performance.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook,'s online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!