• Title/Summary/Keyword: 국방 전술 망

Search Result 14, Processing Time 0.031 seconds

Heterogeneous Network Gateway Architecture and Simulation for Tactical MANET (전술 에드혹 환경에서 이종망 게이트웨이 구조 및 시뮬레이션 연구)

  • Roh, Bong Soo;Han, Myoung Hun;Kwon, Dae Hoon;Ham, Jae Hyun;Yun, Seon Hui;Ha, Jae Kyoung;Kim, Ki Il
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • The tactical mobile ad-hoc network(MANET) consists of distributed autonomous networks between individual ground nodes, which is effective in terms of network survivability and flexibility. However, due to constraints such as limited power, terrain, and mobility, frequent link disconnection and shadow area may occur in communication. On the other hand, the satellite network has the advantage of providing a wide-area wireless link overcoming terrain and mobility, but has limited bandwidth and high-latency characteristic. In the future battlefield, an integrated network architecture for interworking multi-layer networks through a heterogeneous network gateway (HNG) is required to overcome the limitations of the existing individual networks and increase reliability and efficiency of communication. In this paper, we propose a new HNG architecture and detailed algorithm that integrates satellite network and the tactical MANET and enables reliable data transfer based on flow characteristics of traffic. The simulations validated the proposed architecture using Riverbed Modeler, a network-level simulator.

차세대 공중 전술국방통신망을 위한 서비스 시나리오에 따른 주변 기지국 스캐닝 연구

  • Mun, Jeong-Min;Kim, Ju-Yeop;Jang, Ho-Jong;Eom, Ui-Seok
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.16-23
    • /
    • 2009
  • 차세대 전술국방통신망에서는 기존 전술국방통신망의 용량 및 커버리지 확대 등을 위하여 고속이동성 기술, 용량 및 성능개선 기술, 망 구성관리 기술 등에 관한 연구를 수행 중에 있다. 본 연구에서는 시속 400km 이상 고속으로 움직이는 차세대 공중 전술국방통신망을 통해 제공할 수 있는 서비스 시나리오를 제시하고, 각 서비스별 문제점 및 한계 기술에 대해 분석하였으며, 여러 가지 한계기술 중에서 매우 중요한 기술 중의 하나인 핸드오버를 위하여 단말이 가지는 제한된 정보를 통해 간단하게 주변 기지국을 스캐닝하는 방안을 제안하고, 이에 대한 시뮬레이션을 통해 차세대 공중 전술통신망에 적용할 수 있음을 보여주고 있다.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

세계사에서의 무기발달과 전술 전략의 변화 VIII

  • Heo, Jung-Gwon
    • Defense and Technology
    • /
    • no.2 s.264
    • /
    • pp.54-63
    • /
    • 2001
  • 샤를마뉴가 발전시킨 군사 제도 중 핵심 요소는 국경의 요새화된 기지와 도시의 이용에 있었다. 이러한 것은 모든 정복된 지역들의 국경을 따라 구축되어, 국경을 따라 이어진 도로망에 의해 서로 연결되어 있었다. 여기에 추가하여 각각의 소도시들과 연결되는 이전의 국경에 직접적으로 연결되는 도로망이 있었다. 보급품을 저장한 이 요새들은 훈련된 프랑크 기병부대의 기동 기지가 되었고, 정복된 지역들에 질서를 유지하게 하였고, 차후의 작전을 구사하는 프랑크 군의 힘이 되었다.

  • PDF

지상 전술 $C^4I$체계의 위치보고체계 구축을 위한 제대간 데이터 통신망 구성 방안 (3)

  • Kim, Yong-Yun
    • Defense and Technology
    • /
    • no.4 s.254
    • /
    • pp.54-65
    • /
    • 2000
  • 셀룰라망을 이용한 위치보고체계는 전파통달거리를 고려한 셀 단위로 구축하였기 때문에 지휘망을 이용하는 방안에 비해 신뢰성 있는 보고를 기대할 수 있으며, 동일한 정보를 1, 2차 상급부대에 중복 보고할 필요가 없고, 일정거리 이상의 다른 셀에서 같은 대역의 주파수를 사용해도 무방하므로 주파수 재사용의 효과도 거둘 수 있다. 아울러 인터넷과 데이터 베이스 관리 시스템을 소프트웨어로 효과적으로 연동시킴으로써 현재 상용에서 각광 받고 있는 Web-Server 개념을 군 무선 데이터 통신에 도입하고 하드웨어도 대용량의 지능망으로 발전한다면 위치보고 뿐만 아니라 늘어나는 정보를 효과적으로 처리하기에 충분하리라 판단된다.

  • PDF

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Tactical Service Mesh for Intelligent Traffic QoS Coordination over Future Tactical Network (미래 전술망의 지능적 트래픽 QoS 조율을 위한 전술 서비스 메쉬)

  • Kang, Moonjoong;Shin, Jun-Sik;Park, Juman;Park, Chan Yi;Kim, JongWon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.369-381
    • /
    • 2019
  • As tactical networks are gradually shifting toward IP-based flexible operation for diversified battlefield services, QoS(Quality-of-Service) coordination for service differentiation becomes essential to overcome the heterogeneous and scarce networking resources limitations. QoS coordination for tactical network traffic should be able to monitor and react the dynamic changes in underlying network topology and service priorities. In this paper, by adopting the emerging cloud-native service mesh concept into tactical network context, we study the feasibility of intelligent QoS coordination by employing tactical service mesh(TSM) as an additional layer to support enhanced traffic quality monitoring and control. The additional TSM layer can leverage distributed service-mesh proxies at tactical mesh WAN(Wide Area Network) nodes so that service-aware differentiated QoS coordination can be effectively designed and integrated with TSM-assisted traffic monitoring and control. Also, by validating the feasibility of TSM layer for QoS coordination with miniaturized experimental setup, we show the potential of the proposed approach with several approximated battlefield traffics over a simulated TSM-enabled tactical network.

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

Analysis On Optimized WNW Topology And Traffic Modeling Under Tactical Environment (군 전술환경에 적합한 WNW의 최적 구조와 트래픽 해석)

  • Jang, Jae-Young;Kim, Jung-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1114-1121
    • /
    • 2014
  • Armed forces conducts war under volatile and unpredictable situation. Constructing communication system which ensures a victory is very important and difficult work. Traffic modeling has been conducted to derive WNW topology which meets operational requirements and capability under tactical environment. The result of study explains based on DTaQ's IER that company level cluster has 10~20% better packet receive rate than brigade level size.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.