• Title/Summary/Keyword: 전술 데이터 망

Search Result 27, Processing Time 0.022 seconds

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

A Study on HCI Design based on Tactical Data Link integrated in KDDX Combat Management System for Korean-Type Mobile Fleet Control (차기구축함 전투관리체계에 통합된 전술데이터링크 기반의 한국형 기동함대 통제 HCI 설계에 관한 연구)

  • Song, Ha-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.482-492
    • /
    • 2019
  • The naval ship consists of a variety of classes, including patrol, frigate, destroyer and landing ship. There are various means of communication between combat ships belonging to the mobile fleet, including voice network, text message network and tactical data link. The operation at the existing mobile fleet level was conducted mainly on voice and text message, and tactical data link were used mainly to share tactical information between combat ships. This study intended to design HCI for commander like as KDDX of fleet level based on tactical data link, a means of communication between ships, to secure operational control of the mobile fleet. Recently, naval ships have been developed in the organization of various sensors, weapons and tactical data links integrated into the combat management system, and this study also designed the HCI based on the tactical data links integrated in the combat management system. The purpose of this study was to secure the operational efficiency of the tactical data link based on the combat management system in operation of the mobile fleet, and to improve the capability of the fleet commander to recognize the battlefield situation awareness.

Mobility Prediction Based Autonomous Data Link Connectivity Maintenance Using Unmanned Vehicles in a Tactical Mobile Ad-Hoc Network (전술 모바일 애드혹 네트워크에서 무인기를 이용하는 이동 예측 기반의 데이터 링크 연결 유지 알고리즘)

  • Le, Duc Van;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.34-45
    • /
    • 2013
  • Due to its self-configuring nature, the tactical mobile ad hoc network is used for communications between tactical units and the command and control center (CCC) in battlefields, where communication infrastructure is not available. However, when a tactical unit moves far away from the CCC or there are geographical constraints, the data link between two communicating nodes can be broken, which results in an invalid data route from the tactical units to CCC. In order to address this problem, in this paper we propose a hierarchical connectivity maintenance scheme, namely ADLCoM (Autonomous Data Link Connectivity Maintenance). In ADLCoM, each tactical unit has one or more GW (gateway), which checks the status of data links between tactical units. If there is a possibility of link breakage, GWs request ground or aerial unmanned vehicles to become a relay for the data link. The simulation results, based on tactical scenarios, show that the proposed scheme can significantly improve the network performance with respect to data delivery ratio.

Heterogeneous Network Gateway Architecture and Simulation for Tactical MANET (전술 에드혹 환경에서 이종망 게이트웨이 구조 및 시뮬레이션 연구)

  • Roh, Bong Soo;Han, Myoung Hun;Kwon, Dae Hoon;Ham, Jae Hyun;Yun, Seon Hui;Ha, Jae Kyoung;Kim, Ki Il
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • The tactical mobile ad-hoc network(MANET) consists of distributed autonomous networks between individual ground nodes, which is effective in terms of network survivability and flexibility. However, due to constraints such as limited power, terrain, and mobility, frequent link disconnection and shadow area may occur in communication. On the other hand, the satellite network has the advantage of providing a wide-area wireless link overcoming terrain and mobility, but has limited bandwidth and high-latency characteristic. In the future battlefield, an integrated network architecture for interworking multi-layer networks through a heterogeneous network gateway (HNG) is required to overcome the limitations of the existing individual networks and increase reliability and efficiency of communication. In this paper, we propose a new HNG architecture and detailed algorithm that integrates satellite network and the tactical MANET and enables reliable data transfer based on flow characteristics of traffic. The simulations validated the proposed architecture using Riverbed Modeler, a network-level simulator.

지상 전술 $C^4I$체계의 위치보고체계 구축을 위한 제대간 데이터 통신망 구성 방안 (3)

  • Kim, Yong-Yun
    • Defense and Technology
    • /
    • no.4 s.254
    • /
    • pp.54-65
    • /
    • 2000
  • 셀룰라망을 이용한 위치보고체계는 전파통달거리를 고려한 셀 단위로 구축하였기 때문에 지휘망을 이용하는 방안에 비해 신뢰성 있는 보고를 기대할 수 있으며, 동일한 정보를 1, 2차 상급부대에 중복 보고할 필요가 없고, 일정거리 이상의 다른 셀에서 같은 대역의 주파수를 사용해도 무방하므로 주파수 재사용의 효과도 거둘 수 있다. 아울러 인터넷과 데이터 베이스 관리 시스템을 소프트웨어로 효과적으로 연동시킴으로써 현재 상용에서 각광 받고 있는 Web-Server 개념을 군 무선 데이터 통신에 도입하고 하드웨어도 대용량의 지능망으로 발전한다면 위치보고 뿐만 아니라 늘어나는 정보를 효과적으로 처리하기에 충분하리라 판단된다.

  • PDF

A Study on Effective Emergency Message Transmission in Combat Radio Network (전투무선망에서의 효과적인 긴급 메시지 전송 방안에 대한 연구)

  • Kim, Hyung-Seok;Shin, Sang-Heon;Lee, Jeong-Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.285-286
    • /
    • 2019
  • 본 논문에서는 전투무선망에서 효과적인 긴급 메시지 전송 방안에 대한 방안을 제시한다. NCW 환경에서 대대급 이하 전투부대들은 전투무전기와 전술단말기를 활용하여 아군, 적군 위치와 속성정보, 활동 정보 등을 상호간 공유하여 통합적이고 효율적인 전투를 수행해야 하지만, 낮은 대역폭과 낮은 전송속도를 사용할 수밖에 없는 전투무선망을 활용하고 있으므로, 각 노드별 메시지 전송 전송성공률을 높이기 위해 전투무선망의 특성을 반영해야 한다. 이에 본 논문에서는 전투무선망에서의 긴급 메시지(적 발견 보고, 화생방 보고 등) 전송 시 부대 운용구조를 활용하여 모든 노드에 데이터가 효과적으로 전달될 수 있는 방안을 제시한다.

  • PDF

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.

Study on Korean Variable Message Format Construction for Battlefield Visualization (전장가시화를 위한 한국형 지상전술데이터링크 구축 연구)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.104-112
    • /
    • 2011
  • During the ground operation of Korean army, the voice message is mainly used for exchanging informations related to the surveillance and reconnaissance, command and control, and precision strike. However, in order to the battlefield visualization among fighting powers participating in the ground force operation, automatic situational awareness and variable message format (VMF) for command and control are required. For securing core technologies necessary for the battlefield visualization, message standard and message handler are established through several applied researches. Besides, the VMF for equipping a weapon system is in development. In this paper, a study on the Korean variable message format (KVMF), where interoperability of integrated battle management system (BMS) is guaranteed due to performing joint, ground, and combined operations so that the situation awareness and strike system can be automated in almost real time, is presented. From the modeling and simulation (M&S) results of the message processor, delay time is varied in accordance with the number of nodes in unit platoon network, message length, and generation interval of routine messages. Therefore, it is shown that the system performance can be optimized by establishing proper network protocol for each situation.

An Efficient Ad Hoc Routing Method for Tactical Networks using Integrated Metrics and Traffic Characteristics (전술 네트워크 환경의 트래픽 특성을 고려한 통합 매트릭 기반 애드혹 라우팅 기법)

  • Roh, Bong-Soo;Hoh, Mi-Jeong;Hwang, Ki-Min;Park, Gui-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1676-1684
    • /
    • 2010
  • Tactical network environments are characterized by unreliable connectivity, communication links which has limited bandwidth compared to commercial networks and distributed architecture where users have high mobility. The best route should be selected based on the required traffic characteristics which can be a wireless channel environments and a status of nodes which are moving. Those characteristics are self aware and should be a routing decision factor in order to guarantee a reliable data transfer. In this paper we define the requirements of services and traffic characteristics on tactical network environments and suggest the new routing method "AODV-IMTC" based on selective routing metric to enable efficient data transfer in wireless ad hoc networks.

An Effective Transmission for Vice Traffic in UWB Mobile Ad Hoc Network (UWB 전술망에서의 효과적인 음성 데이터 전송)

  • Kim, Jong-Hwan;Koo, Myung-Hyun;Lee, Hyunseok;Shin, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.279-290
    • /
    • 2013
  • In this paper, we propose a transmission scheme of MAC protocol that enables secure voice communications by exploiting the wide spectrum and low signal strength characteristics of the ultra wide band technology. In addition, it also supports high level of terminal mobility by deploying mobile ad hoc network schemes. While most of existing UWB MAC protocols are operated as a synchronous mode, the proposed scheme operates in an asynchronous mode for supporting high mobility and sends voice packets without RTS/CTS control packets for efficient voice traffic transmission without retransmission. With simulation program, we prove that the proposed scheme satisfies the required voice quality and packet delivery time.