• Title/Summary/Keyword: Tactical Information Communication Network

Search Result 108, Processing Time 0.08 seconds

UAV based Wireless Ad hoc Network Performance Analysis (공중무인기 기반의 무선애드혹 네트워크 성능 분석)

  • Chun, Jeong-myong;Ha, Dong-hun;Park, Jae-seong;Yoon, Seok-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.123-125
    • /
    • 2015
  • Wireless ad hoc network which is comprised of wireless nodes that have the limited communication range is utilized to monitoring disaster area, tracing object, and tactical system. But in the case of wireless node on the ground, a network performance decrease because wireless channel is affected from obstacle or the node deployment is restricted. In this paper, we consider wireless network based on UAV(Unmanned Aerial Vehicle) which has little spatial constraint and quickly deploy a position. We implement test-bed included ground nodes and UAV, and measure throughput and PDR(Packet Delivery Ratio) according to the usage of UAV. We show that network performance is improved by relaying data on UAV.

  • PDF

Performance Analysis of Routing Protocols for Mobile Ad-hoc Network under Group Mobility Environment (그룹 이동 환경에서의 무선 애드혹 네트워크 라우팅 알고리즘 성능 분석)

  • Yang, Hyo-Sik;Yeo, In-Ho;Rhee, Jong-Myung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.52-59
    • /
    • 2008
  • Most pier performance analysis results for ad-hoc routing protocols have been based upon the model which each node in the network moves independently without restriction. In most real environments, however, it is very common for a group or multiple groups to move under the direction of group leader or group leaders instead of each node's independent movement. This paper presents the performance analysis of routing protocols for mobile ad-hoc network under group mobility environment. The comparative simulations have been made between a table-driven protocol, DSDV, and two on-demand protocols, AODV and DSR, under a group mobility model, RPGM, which is suitable for the practical applications such as military tactical operation. Multiple group movements are also included. The results show that the protocol performances for single group movement are very similar to node independent movement case. However some differences have been observed by varying pause time and connectivity.

A Study of Mobile Ad-hoc Network Protocols for Ultra Narrowband Video Streaming over Tactical Combat Radio Networks (초협대역 영상전송 전투무선망을 위한 Mobile Ad-hoc Network 프로토콜 연구)

  • Seo, Myunghwan;Kim, Kihun;Ko, Yun-Soo;Kim, Kyungwoo;Kim, Donghyun;Choi, Jeung Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.371-380
    • /
    • 2020
  • Video is principal information that facilitates commander's immediate command decision. Due to fading characteristics of radio link, however, it is difficult to stably transmit video in a multi-hop wireless environment. In this paper, we propose a MANET structure composed of a link adaptive routing protocol and a TDMA MAC protocol to stably transmit video traffic in a ultra-narrowband video streaming network. The routing protocol can adapt to link state change and select a stable route. The TDMA protocol enables collision-free video transmission to a destination using multi-hop dynamic resource allocation. As a result of simulation, the proposed MANET structure shows better video transmission performance than proposed MANET structure without link quality adaption, AODV with CSMA/CA, and OLSR with CSMA/CA structures.

QoS Enhancement Based on Link Quality in Tactical Data Link of KVMF (KVMF 전술네트워크에서 링크 품질에 기반한 QoS 향상 방안)

  • Kwon, Koo-Hyung;Jeong, Hyun-Sook;Lim, Won-Gi;Yoon, Young-Deuk;Kim, Sang-Soo;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.139-150
    • /
    • 2014
  • This paper suggests an algorithm to improve QoS by using DTR bit employed in the MIL-STD-188-220 protocol, when there is a multi-path between source and destination in the environment of KVMF tactical network supporting NCW. The MIL-STD-188-220 protocol can evaluate the link quality relatively but it cannot support optimal path selection for QoS. In order to solve this problem, we design an algorithm for selecting path using topology table which reflects measured DTR of path after the completion of transmission. The performance of the proposed algorithm has been evaluated by OPNET simulator. As a result of the simulation, it is found that QoS of proposed algorithm is enhanced higher than that of the MIL-STD-188-220 in the aggravated communication environment.

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

An Effective Location-based Packet Scheduling Scheme for Adaptive Tactical Wireless Mesh Network (무선 메쉬 네트워크의 군 환경 적용을 위한 효율적인 위치기반 패킷 스케줄링 방식)

  • Kim, Young-An;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.719-727
    • /
    • 2007
  • The Wireless Mesh Network technology is able to provide an infrastructure for isolated islands, in which it is difficult to install cables or wide area such as battlefield of armed forces. Therefore, Wireless Mesh Network is frequently used to satisfy needs for internet connection and active studies and research on them are in progress However, as a result of increase in number of hops under hop-by-hop communication environment has caused a significant decrease in throughput and an increase in delay. Considering the heavy traffic of real-time data, such as voice or moving pictures to adaptive WMN, in a military environment, it is restricted for remote units to have their Mesh Node to get real-time services. Such phenomenon might cause an issue in fairness. In order to resolve this issue, the Location-based Packet Scheduling Scheme, which can provide an fair QoS to each mesh node that is connected to each echelon's AP and operates based on WRR method that gives a priority to emergency message and control packet. The performance of this scheme is validated.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

Logic implementation of HDB3 Codec (HDB3 Codec의 로직 구현)

  • Eom, Joon;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.397-399
    • /
    • 2017
  • The HDB3 code, a type of line code, is a data coding method used for digital data transmission. It is used to remove the DC wander on the transmission line which occurs when the DC component data is transmitted continuously. The military tactical communication network uses HDB3 code for data transmission and develops equipment using commercial HDB3 Codec IC. Because it is operated for more than 10 years due to the characteristics of military equipment, if a failure occurs in the equipment, the equipment can not be repaired due to the discontinuance of the part, so that the entire equipment may not be used. In this paper, we implement the HDB3 Codec as a logic to solve this problem and verify that the performance is equivalent to that of commercial parts.

  • PDF

Performance Simulations of Wireless Grid Communication Networks

  • Abdulsam, Ibraheem Read;Kim, Se Mog;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.18-22
    • /
    • 2014
  • Satellite communications consist of communications between base stations of the ground and satellites. For efficient satellite communications, ground networks should be organically utilized. Grid networks are frequently used in and outside the country for wireless communications. The performance of wireless communications is determined by mobility, topography, and jamming signals. Therefore, continuous studies of grid networks are necessary for the utilization of next period satellite networks. Since military communications are used based on wireless systems, they can be considered as a sample of utilization of grid networks. Therefore, this paper presented the results of simulations conducted for the improvement of the performance of the grid networks used in military communications that employing the OSPF, a popular routing protocol for military applications. First we investigate the effects of changing the bit error rate (BER) and number of routers. Then we discuss the effects of maximum segment size (MSS) on network behavior and stability. In this way, we can determine the appropriate MSS for a grid network under various values of BER and number of routers. Such results can be also applied to commercial grid network evaluations.