• Title/Summary/Keyword: 네트워크 중심전

Search Result 344, Processing Time 0.024 seconds

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.

Dynamic TDMA Protocol for Transmission of Tactical Information in Wireless Network (무선통신망에서 전술정보 전송을 위한 동적 시분할 다중접속프로토콜)

  • Park, Chang-Un;Kim, Tae-Kon;Lim, Man-Yeob;Lee, Youn-Jeong;Kim, Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1640-1650
    • /
    • 2010
  • To prepare for the network centric warfare, Korea Joint Tactical Data Link System(KJTDLS) has been developed by the South Korean military recently and its development is divided into two phases: basic and complete ones. Due to the limited bandwidth and low transmission efficiency of the developing KJTDLS (basic), lots of problems could be occurred when the TDMA protocol in Link-16 is applied. In this paper, a new dynamic TDMA frame structure for KJTDLS(basic) is proposed and the performance of the proposed is evaluated through the implementation of simulation.

C4I Maintenance Priority Decision using fault analysis methods (결함분석 기법을 활용한 C4I체계 유지보수 관리 우선순위 선정)

  • Kim, Kiwang;Kang, DongSu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.25-28
    • /
    • 2017
  • 네트워크 중심전에서 C4I체계의 안정적 운용을 통한 전장에서의 정보우위 달성을 위해 체계의 신뢰성 확보가 필요하여 각 군 C4I체계는 외주 용역업체를 통해 유지보수를 수행 중에 있다. 유지보수는 C4I체계의 수명 주기 중 가장 오랜 기간을 차지하고 있으며 결함 데이터 등의 실증적인 자료를 확보할 수 있는 기간이다. 따라서 유지보수 기간 중 수집한 결함 데이터를 결함분석기법을 통해 분석(치명도, 발생빈도)하고, 주요기능별 활용도를 이용하여 C4I체계 유지보수 관리 우선순위 선정기법을 제안한다. 이 후 제안 기법을 해군 C4I체계의 군적용 사례연구를 통해 유지보수 관리 우선순위를 선정함으로써 유지보수의 제한된 자원(예산, 인력, 시간 등)을 효율적으로 활용하기 위한 판단의 근거로 사용이 가능함을 보인다. 뿐만 아니라 체계화된 결함분석과정을 통해 축적된 자료를 활용하여 유지보수의 연속성 보장과 향후 성능개량사업간 시스템 분석의 참고자료로 활용함에 따라 궁극적으로 C4I체계의 신뢰성을 향상시킬 수 있다.

  • PDF

Principles of War under the NCW environment (네트워크 중심전(NCW)하에서의 군사작전 원칙)

  • Choi, Seong-Su
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.311-350
    • /
    • 2010
  • War has been existing with human history. There seems to be two approaches of war study. One is to deter war among politicians, the other is to get victory in a war among soldiers. Many scholars and soldiers tried to find out the way of victory at war, that is, the major factors of victory at war. They found out some factors that dominate the victory of war through numerous experiences of war, and we call it 'principles of war'. The principles of war which we are using has been shaped during past three centuries. But, nowadays rapid change in the environment of war has brought the change of features of warfare and method of waging war. NCW may be the most typical example of new environment of war. The Iraque War may be the most recent modem war performed under the NCW environment. And the Iraque War brought up the need of new principles of war adaptable to the NCW environment. This article is focusing on new principles of war that comprehends future wars. I suggest that some principles of war which we are using should be supplemented to be understood its own conception, and new principles are needed such as principle of paralysis, principle of synchronization & Integration.

  • PDF

A P2P Based Tactical Information Sharing System for Mobile Nodes (P2P 기반의 모바일 노드간의 전술 정보 공유 시스템)

  • Lee, Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).

M&S Case Study for Information Sharing Enabled Combat Entities (전투 개체간의 정보 공유가 가능한 모델링 및 시뮬레이션 사례 분석)

  • Kho, Younghoon;Lim, Byungyoun;Park, Sangchul;Kwon, Yongjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.395-403
    • /
    • 2014
  • Recent technological advancement has a profound effect on the ways that the war is being conducted and fought. The advanced communications, information, computing and sensor technologies enable the combat units to be integrated in the battlefield management network. By exchanging and sharing real-time battlefield information that is critical for the successful outcome of military engagement, the legacy forces are becoming much more effective and lethal than ever before, The bigger picture of such phenomena can be summarized as the concept of Network Centric Warfare(NCW). The main purpose of this study is to compare the outcome of regional combat engagement between the legacy forces and the future combat systems(FCS). The FCS capitalizes on the advanced technologies within the frame of NCW. This study uses the modeling and simulation methodology to assess the effectiveness of two different combat forces. The simulation results show that the FCS is more effective, hence vindicating the superiority of technologically advanced combat units.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

Dynamics of Global Liner Shipping Network and Strategy of Korean Ports (국제 컨테이너 선대 운항네트워크 변화와 우리항만의 전략)

  • Park, Byungin
    • Journal of Korea Port Economic Association
    • /
    • v.34 no.3
    • /
    • pp.133-158
    • /
    • 2018
  • The role and ratio of national vessels in the global container shipping market have reduced significantly due to the bankruptcy of Hanjin Shipping in early 2017. All import-export companies, as well as container ports in Korea, are facing a crisis. The Trump's tariff and trade battles have had a negative impact on the increase in the North American cargo. However, Chinese and Japanese container shipping companies, which merged with domestic container shipping companies, and mega carriers such as Maersk and CMA CGM have benefited from the decline in shipping supplies due to the collapse of Hanjin Shipping, the world's 10th largest container carrier in Korea. The import/export freight trade in Korea is witnessing the increasing stronghold of foreign carriers. This scenario is expected to weaken Korea's negotiation powers with overseas shipping companies in domestic ports, such as Busan and Kwangyang, thereby making it more challenging to attract shipping carriers. This study compares the global container-shipping network in 2007 and 2017 by combining the network topology of the social network analysis and the economics of the liner shipping connectivity index (LSCI) and the container port connectivity index (CPCI) analysis. The findings of this study are that the role of the ports across the world can be identified, and CPCI has a high correlation with the centrality index and freight volume data. These findings can contribute toward the utilization of the meaning of the necessary centrality index without an additional centrality analysis. This study can be applied not only to the call strategy of container carriers but also to the alliance and development strategy of Korean ports.