• Title/Summary/Keyword: Aspect of Warfare

Search Result 26, Processing Time 0.025 seconds

A Study on the Method of Assigning Ipv6 address for M-BcN (M-BcN을 위한 IPv6 주소 할당 방안 연구)

  • Kim, Gweon-Il;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.87-100
    • /
    • 2007
  • The aspect of future warfare is NCW(Network Centric Warfare) in accordance with the IT development, so MND have the planning of M-BcN(Military Broadband convergence Network) establishment as the basic system of NCW by the end of 2008. IPv6 address must be managed systematically as a essential element of NCW. In the previous study, it is designed on the basis of the present military information communication network topology. However, it makes some problems. First, it is difficult for present topology to adapt the future M-BcN which is different from the present military network topology. Second, it has defects of inefficiency of route aggregation and enlargement of routing table size. In this paper, we improved the route aggregation and routing table size by assigning the hierarchical address on the basis of M-BcN topology and adjusting the position of field identifying service network. Furthermore, it is proved by the network simulation program(OPNET 12.0).

A Method for IPv6 Address Assignments of the Next Generation Defense Network (차세대 국방정보통신망을 위한 IPv6 주소 할당 방안)

  • Kim, Kwon-Il;Lee, Sang-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.441-445
    • /
    • 2008
  • Korean military is propelling the M&S on new warfare concept, such as NCW(Network Centric Warfare) which is the aspect of future war. IPv6 is the essential element of next generation defense network which is supporting the future battlefield. There have been many studies on allocating the IPv6 address for next generation defense network. However, they assigned the address by level on the basis of the military organization or assigned it from the service network, so it had the defect, the big size routing table. This study reviews the topology of next generation defense network and adjusts the position of service network ID on the basis of the network topology. Finally, it improved the efficiency of route aggregation and minimized the routing table size in comparison with the previous studies and it was proved by OPNET simulator.

A study on the improvement of antenna switching module structure of ground based ES equipment (지상용 ES장비의 안테나전환기 구조 개선에 관한 연구)

  • Kim, Seung-Woo;Lee, Kang-Ho;Chin, Hui-cheol;Choi, Jae-In
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.151-159
    • /
    • 2017
  • The aspect of modern warfare is gradually changing to a network of warfare, and its central information electronic warfare is evolving every day. Recently, domestic equipment of electronic warfare, which have succeeded in domestic localization, are strongly influenced by the nature of the environment. Therefore, the structural reliability of the antenna switching module that connects the mast and antenna of the ES equipment is the most important. This study proposed a structure that has an improved structure of antenna switching module by currently analyzing the structure of the antenna switching module and the environmental influence. By modifying the structure of the antenna switching module welding method and part of the reinforcement block, the structure was improved and the validity of the improved antenna switching module was simulated using a load test. The simulation showed that the safety factors of antenna switching module welding point and reinforced block part was enhanced 5.3 and 1.5 times compared to the existing values. These values were verified by load (181kg) test results, which was each 3.7Mpa and 64.4Mpa. The load test results were similar to the simulation results and load supporting capacity of the proposed antenna switching module was enhanced.

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

A General Purpose Engagement Simulator using a Tactical Data-link (범용 전술데이터링크 교전 시뮬레이터)

  • Yun, Keun-Ho;Jin, Jung-Hun;Kim, Seh-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.218-226
    • /
    • 2010
  • The tactical data-link is useful to exchanging automatic information and controling command in combat environment. This is a essential factor of interoperability in the future combat situation of network centric warfare. In a aspect of a weapon system development, Modeling & Simulation can save expense. HLA RTI is a standard communication protocol in M&S. So, we suggest that Link Simulator connect tactical data-link through RTI. This simulator has the interoperability between M&S and tactical data-link, the reusability through adabing M&S framework, and the wide usability by automatic engagement function.

AN HISTORY OF MAXILLOFACIAL PROSTHESES (악안면 보철물의 역사)

  • Min, Seung-Ki
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.22 no.4
    • /
    • pp.383-396
    • /
    • 2000
  • Before the advent of early plastic or maxillofacial reconstructive surgery, facial features could only be replaced and mimicked by prosthetic, artificial means. Facial deformity or dysfunction, whether congenital or acquired by trauma or mutilating disease, has long been an area of constant research, development and innovation in many cultures of the world. One of the greatest contributors to the need for maxillofacial prosthetics has been physical conflict and warfare. The use of maxillofacial prostheses is not merely the replacement of a missing or disfigured aspect of the face, but the rehabilitation of that individual back into the society from which they originate. Rehabilitation includes the restoration of the person's self worth and confidence, not just physically but psychologically. In sixteenth century, Ambroise Pare, French military surgeon, first have tried many maxillofacial prosthetics for injured war soldiers with papier-mache, silver, gold and copper. According to patient's demand who lost their maxillofacial figures, maxillofacial personnel have increased and prosthetic's skill have been advanced all of the world. Over the last decade, there has been a very rapid development in technical possibilities to provide patients with facial prostheses retained by skin penetrating implants. This article will present overall history of maxillofacial prostheses and some background information on the materials used from the old world. And to overcome still many limitation of prosthetic, new minds and new ideas for technique and materials should be developed.

  • PDF

A Simulation Study on Performance Improvement of the military AS/RS Based Travel Time of S/R machine (군 자동화 창고 성능개선을 위한 자동크레인 이동시간 기반 시뮬레이션 연구)

  • Jang, Young-Soo;Lee, Bum-Lyul;Lee, Hong-Chul
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.63-76
    • /
    • 2009
  • The rapid development of IT and Science & Technology has greatly influenced the aspect of future warfare. Accordingly, the Army Forces require efficient logistics support, hence the importance of AS/RS has steadily increased. This research validated mathematical propriety of the management problem of S/R machine in AS/RS with mathematical analysis based on its travel time and simulation analysis using Automod. After all, we could improve the performance of S/R machine based on its dwell point and turn-over distribution.

Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry (국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안)

  • Baek, Jaejong;Moon, Byoung-Moo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1263-1269
    • /
    • 2014
  • Since the cyber defense has been dependent on commercial products and protection systems, in aspect of the recent trends, our cyber defence ecosystem can be more vulnerable. In case of general defense weapon companies, they have to be observed by the government such as certain proprietary technologies and products for the protection from the enemy. On the contrary, most cyber weapon companies have not been managed like that. For this reason, cyber attack can reach to the inside of our military through the security hole of commercial products. In this paper, we enhanced a military cyber protection ecosystems out of enemy attacks and analyze the hypothetical scenarios to evaluate and verify the vulnerability, and finally more securable ecosystem of military protection system is presented politically and technically.

Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector (국방 사이버전 분야에 적용 가능한 유망 민간 정보보호 기술 선정 방법론에 대한 고찰)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1571-1582
    • /
    • 2015
  • This paper suggests a methodology for linking technology classification of nongovernmental information security field and technology classification of cyber-warfare in national defense field. Based on this methodology, Multi-Attribute Utility Theory(MAUT) is applied for the purpose of selecting promising nongovernmental technology that is worthy of later introduction or development. After studying the result of the survey regarding the research progression plan of the selected promising technology, the following three facts are discovered: Firstly, the greater the social spillover effect, the greater the need for the government lead R&D. Secondly, among the spillover effects, the social aspect has the highest correlation with respect to the need for the government lead R&D, while the economical aspect and the technological aspect come in the second and the third place, respectively. Finally, according to the correlation analysis, the defense application and the technological importance do not affect the subject of investment or the subject of development. This indicates that even though the R&D for technology with high social spillover effect should be lead by the government, the subject of the investment or the development cannot be determined solely by factors such as military application and technological importance.