• Title/Summary/Keyword: 전술망

Search Result 73, Processing Time 0.027 seconds

통신전자전의 ESM과 ECM

  • 이상근;유현중
    • The Magazine of the IEIE
    • /
    • v.15 no.1
    • /
    • pp.57-64
    • /
    • 1988
  • 이 글에서는 통신 전자전의 ESM과 ECM에 대한 일반적인 내용보다는, 그 중 한 특수 분야로서 전술 및 전략적으로 매우 큰 비중을 차지하고 있는 전파방향 탐지 및 방해기법을 위주로 하여 운용면 보다는 기술적 이론을 보안에 저촉되지 않는 한도내에서 상세히 설명하였다. 전파 방향 탐지 기법에 대해서는 주요 기법들의 분류 및 설명, 장비 구성방법을 비롯하여 이를 운용하며 방위각을 구하고 자동망에 의하여 위치표정을 하기까지의 주요 사항들을 항목별로 정리하였으며, 전파 방해 기법에 대해서는 기법별 특성에 대한 간략한 비교, 장비 구성방법과 필수 핵심부에 대한 분석 등을 수록하므로써 전파 방향 탐지 및 방해 기법의 전반에 걸친 내용을 다루었다.

  • PDF

Policy-based Dynamic Channel Selection Architecture for Cognitive Radio Tactical Wireless Networks (인지 전투무선망에서 정책기반 동적 채널 선택 구조에 대한 연구)

  • Kim, Jong-Yon;Kwon, Se-Hoon;Kim, Eun-Ho;Roh, Byeong-Hee;Choi, Geun-Kyung;Shin, Bong-Jhin;Park, Soo-Bum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.72-74
    • /
    • 2012
  • 본 논문은 미래 군에서 CR (Cognitive Radio) 기술을 적용한 전투무선망에서의 효율적인 주파수 사용을 위한 정책기반 동적 채널 선정 구조를 제안한다. 전투무선망에서는 상용의 기지국과 같은 Coordinator가 존재하지 않기 때문에 효율적인 채널 사용을 위해서 각 상황마다 어떻게 대응할 것인가에 대한 고려사항이 있다. 이에 대한 해결책으로 정책기반의 동적 채널 선택 구조를 제안하며, 이는 각 상황에 따른 규칙이나 행동을 사전에 정책으로 정의하여 특정 Coordinator가 없더라도 해당 상황이 발생하면 사전 정의된 정책에 의해서 동적 채널 선택을 하는 것이다. 즉, 전투무선망에서 작전상황이나 전술통신환경의 변화에 따라 PU (Primary User)나 SU (Secondary User)를 동적으로 할당하는 것을 의미한다. 모의 실험결과 별도의 정책 없이 Random하게 동적 채널을 선택하는 기존기법보다 정책기반의 기법이 월등한 성능향상을 보였다.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

Rapid Self-Configuration and Optimization of Mobile Communication Network Base Station using Artificial Intelligent and SON Technology (인공지능과 자율운용 기술을 이용한 긴급형 이동통신 기지국 자율설정 및 최적화)

  • Kim, Jaejeong;Lee, Heejun;Ji, Seunghwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1357-1366
    • /
    • 2022
  • It is important to quickly and accurately build a disaster network or tactical mobile communication network adapting to the field. In configuring the traditional wireless communication systems, the parameters of the base station are set through cell planning. However, for cell planning, information on the environment must be established in advance. If parameters which are not appropriate for the field are used, because they are not reflected in cell planning, additional optimization must be carried out to solve problems and improve performance after network construction. In this paper, we present a rapid mobile communication network construction and optimization method using artificial intelligence and SON technologies in mobile communication base stations. After automatically setting the base station parameters using the CNN model that classifies the terrain with path loss prediction through the DNN model from the location of the base station and the measurement information, the path loss model enables continuous overage/capacity optimization.

Multi-layer Network Virtualization for QoS Provisioning in Tactical Networks (전술망의 서비스 품질 보장을 위한 다계층 네트워크 가상화 기법)

  • Kim, Yohan;An, Namwon;Park, Juman;Park, Chan Yi;Lim, Hyuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.497-507
    • /
    • 2018
  • Tactical networks are evolving into an All-IP based network for network centric warfare(NCW). Owing to the flexibility of IP based network, various military data applications including real-time and multi-media services are being integrated in tactical networks. Because each application has diverse Quality-of-service(QoS) requirements, it is crucial to develop a QoS provisioning method for guaranteeing QoS requirements efficiently. Conventionally, differentiated services(DiffServ) have been used to provide a different level of QoS for traffic flows. However, DiffServ is not designed to guarantee a specific requirement of QoS such as delay, loss, and bandwidth. Therefore, it is not suitable for military applications with a tight bound of QoS requirements. In this paper, we propose a multi-layer network virtualization scheme that allocates traffic flows having different QoS requirements to multiple virtual networks, which are constructed to support different QoS policies such as virtual network functions(VNFs), routing, queueing/active queue management(AQM), and physical layer policy. The experiment results indicate that the proposed scheme achieves lower delays and losses through multiple virtual networks having differentiated QoS policies in comparison with conventional networks.

A Channel Allocation and Data Delivery Scheme Considering Channel Overlapping in Wireless Tactical Networks (군 전술망의 무선 이동 통신 체계의 통신 범위 중첩을 고려한 채널 할당 기법과 데이터 전달 기법)

  • Shin, Hyun-Sup;Chae, Sung-Yoon;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.501-508
    • /
    • 2011
  • In this paper, we propose a channel allocation algorithm of MSAP(Mobile Subscriber Access Point) and data delivery scheme exploiting the symbol level network coding. The network is comprised of TS(Tactical Switch) as a backbone node, MSAPs, and TMFTs(Tactical Multi-Function Terminal). The TS performs the channel allocation considering the communication range overlapping between the neighboring MSAPs and applies the symbol level network coding, if necessary, depending on the position of the TMFTs. Assuming the number of available antennas of TMFT and MSAP will be extended to two from one, we propose two schemes: single mode and dual mode. Through the simulation, we show that the proposed delivery scheme provides higher delivery ratio and lower delivery delay compared with the legacy store-and-forward scheme.

Research on Science DMZ scalability for the high performance research data networking (연구데이터의 고성능 네트워킹을 위한 Science DMZ 확장성 연구)

  • Lee, Chankyun;Jang, Minseok;Noh, Minki;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.22-28
    • /
    • 2019
  • A Science DeMilitarized Zone (DMZ) is an optimized network technology tailored to research data nature. The Science DMZ guarantees end-to-end network performance by forming a closed research network without redundant networking and security devices for the authorized researchers. Data Transfer Node (DTN) is an essential component for the high performance and security of the Science DMZ, since only transfer functions of research data are allowed to the DTN without any security- and performance-threatening functions such as commercial internet service. Current Science DMZ requires per-user DTN server installation which turns out a scalability limitation of the networks in terms of management overhead, entry barrier of the user, and networks-wise CAPEX. In order to relax the aforementioned scalability issues, this paper suggests a centralized DTN design where end users in a group can share the centralized DTN. We evaluate the effectiveness of the suggested sharable DTN design by comparing CAPEX against to that of current design with respect to the diverse network load and the state-of-the-art computing machine.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Target Prioritization for Multi-Function Radar Using Artificial Neural Network Based on Steepest Descent Method (최급 강하법 기반 인공 신경망을 이용한 다기능 레이다 표적 우선순위 할당에 대한 연구)

  • Jeong, Nam-Hoon;Lee, Seong-Hyeon;Kang, Min-Seok;Gu, Chang-Woo;Kim, Cheol-Ho;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.1
    • /
    • pp.68-76
    • /
    • 2018
  • Target prioritization is necessary for a multifunction radar(MFR) to track an important target and manage the resources of the radar platform efficiently. In this paper, we consider an artificial neural network(ANN) model that calculates the priority of the target. Furthermore, we propose a neural network learning algorithm based on the steepest descent method, which is more suitable for target prioritization by combining the conventional gradient descent method. Several simulation results show that the proposed scheme is much more superior to the traditional neural network model from analyzing the training data accuracy and the output priority relevance of the test scenarios.