• Title/Summary/Keyword: Network Centric Operation

Search Result 54, Processing Time 0.023 seconds

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

The Extended-Military Multimedia Systems Based on Real-Time Scheduling Scheme (실시간 스케줄링을 적용한 Extended-Military Multimedia Systems)

  • Park, Sang-Hyuk;Kim, Jai-Hoon;Han, Chang-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2011
  • It is very important for more effective military operation to share information required in recognizing a situation by monitoring battlefield. The recognition of situations is offered visually though multi-media systems such as a COP(Common Operation Picture), UAV etc. The operating method has rapidly changed into Network-Centric Warfare (NCW). As a result, the data that these Multimedia systems should control is increasing. Improved performance of Multimedia systems is required to deal with them. In this paper, we propose Extended-Military Multimedia System(E-MMS) applying the most excellent scheduling method in terms of meet-ratio in real time when Multimedia systems carry out assigned information in real time for monitoring as the method of improved performance. As a result of utility about proposed system, it is verified that realtime EDF(Earliest Deadline First) scheduling method is more improved up to 20% compared to non-realtime FCFS(First Come First Service) in terms of the deadline meet ratio.

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Market Share Analysis by Railroad Service Change (철도의 서비스 변동이 철도내 분담률에 미치는 영향)

  • Kim Kyoung-Tae;Lee Jin-Sun
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.1097-1100
    • /
    • 2005
  • This study explored the ridership pattern between Seoul and Busan after the introduction of KTX in 2004. Since the KTX opening, average daily passengers on the Kyungbu lines have increased. These figures clearly indicate that the transportation network is becoming railroad-centric. However, the operation. of the KTX will leave many existing Saemaul and Mugunghwa train sets idle, which will be put into operation for areas, not covered by the KTX. Statistics show that the railroad ridership is clarified the distinction between train service levels. So, our paper studied the change of market share by service levels between Seoul-Busan line which is a long distance route.

  • PDF

A Study on the Conceptual Design of an Unmanned Surface Vehicle(USV) for the Korean Navy (한국형 무인 경비정(USV)의 개념설계에 관한 연구)

  • Boo Sung Youn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.3 s.18
    • /
    • pp.59-68
    • /
    • 2004
  • Unmanned surface vehicles(USVs) have been developed for special operations in foreign navies. These will be employed to conduct critical missions including inspection, coast guard, ISR, fire protection, precision strike, mine interception warfare and antisubmarine warfare. It is also known the USVs will be deployed at the front line of the network-centric warfare to replace the manned naval operations. The unmanned operation can, thus, minimize unnecessary risk to personnel and enhance the success probability for the imposed mission. In this research, the USVs which are under operation and development in foreign navies are investigated. Based on this, an USV with $7\~10m$ of length and 10ton of weight for the Korean Navy which can be deployed near the Northern Limit Line(NLL), is proposed.

Design and Implementation of The EIGRP based on the SDN (SDN 기반의 EIGRP 라우팅 프로토콜 설계 및 구현)

  • Choi, Youngjun;Kwon, Taewook
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.178-185
    • /
    • 2019
  • Recently, due to the rapid growth of the internet the existing network architecture is showing limitations. In order to overcome these problems SDN has been proposed as a new paradigm. EIGRP is a modern routing protocol with many advantages but little research has been done on operation in SDN. In this paper we propose a controller-centric EIGRP based on the SDN environment. To construct the SDN network, We seperate the control function and the data transfer function and the EIGRP is operated by a separated controller. Experiments have shown that the proposed scheme can actually work and be used effectively.

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.

A proposal of new MOE to assess the combat power synergistic effect of warfare information system. (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Kim, Yong-Heup;Lee, Jae-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.104-112
    • /
    • 2008
  • In modern war information system development makes battlefield materialize, and combat factors can maximize combat power exhibition as that apply synchronization. Information system is the core of combat power operation under NCW(Network centric Warfare). This paper proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of information system at the theater joint fire operation in NCW environment. This methodology applied the rule of Newton's second law $F=(m{\Delta}{\upsilon})/t{\Rightarrow}(M{\upsilon}I)/T$) Details factor in combat power evaluation is as following. (1) M : Network power; (2) v : Movement velocity; (3) I : Information superiority; (4) T : C2(command and control) time. We applied this methodology to the "JFOS-K(Joint Fire Operating System-Korea) in Joint Chief of Staff" in the real military affair section.

  • PDF

A Proposal of New MOE to Assess the Combat Power Synergistic Effect of Warfare Information System (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Jung, Whan-Sik;Kim, Yong-Heup;Lee, Jae-Yeong
    • IE interfaces
    • /
    • v.22 no.3
    • /
    • pp.205-213
    • /
    • 2009
  • Warfare information system is a core factor of future combat operation under NCW(Network centric Warfare) environment. In this paper, we proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of warfare information system in the theater-level joint fire operation. This new MOE uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}(M{\upsilon}I)/T$). Four factors considered in combat power evaluation are network power(M), movement velocity(v), information superiority(I), command and control time(T). We applied this new MOE to the JFOS-K(Joint Fire Operating System-Korea) to assess its combat power effect and compared with other's effects obtained from different MOE.

Design of Security Management Function for SNMPv3 using Role-Based Access Control Model (역할기반 접근통제 모델을 이용한 SNMPv3 보안관리기능 설계)

  • 이형효
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.1-10
    • /
    • 2001
  • SNMPv3 provides the security services such as authentication and privacy of messages as well as a new flexible and extensible administration framework. Therefore, with the security services enabled by SNMPv3, network managers can monitor and control the operation of network components more secure way than before. But, due to the user-centric security management and the deficiency of policy-based security management facility, SNMPv3 might be inadequate network management solution for large-scaled networks. In this paper, we review the problems of the SNMPv3 security services, and propose a Role-based Security Management Model(RSM), which greatly reduces the complexity of permission management by specifying and enforcing a security management policy far entire network.

  • PDF