• Title/Summary/Keyword: 전술 네트워크

Search Result 174, Processing Time 0.02 seconds

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

Performance Analysis of TNS System for Improving DDS Discovery (DDS 검색 방식 개선을 위한 TNS 시스템 성능 분석)

  • Yoon, Gunjae;Choi, Jeonghyun;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.75-86
    • /
    • 2018
  • The DDS (Data Distribution Service) specification defines a discovery method for finding participants and endpoints in a DDS network. The standard discovery mechanism uses the multicast protocol and finds all the endpoints in the network. Because of using multicasting, discovery may fail in a network with different segments. Other problems include that memory space wastes due to storing information of all the endpoints. The Topic Name Service (TNS) solves these problems by unicasting only the endpoints, which are required for communication. However, an extra delay time is inevitable in components of TNS, i.e, a front-end server, topic name servers, and a terminal server. In this paper, we analyze the performance of TNS. Delay times in the servers of TNS and time required to receive endpoint information are measured. Time to finish discovery and number of receiving endpoints compare with the standard discovery method.

Research on Science DMZ scalability for the high performance research data networking (연구데이터의 고성능 네트워킹을 위한 Science DMZ 확장성 연구)

  • Lee, Chankyun;Jang, Minseok;Noh, Minki;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.22-28
    • /
    • 2019
  • A Science DeMilitarized Zone (DMZ) is an optimized network technology tailored to research data nature. The Science DMZ guarantees end-to-end network performance by forming a closed research network without redundant networking and security devices for the authorized researchers. Data Transfer Node (DTN) is an essential component for the high performance and security of the Science DMZ, since only transfer functions of research data are allowed to the DTN without any security- and performance-threatening functions such as commercial internet service. Current Science DMZ requires per-user DTN server installation which turns out a scalability limitation of the networks in terms of management overhead, entry barrier of the user, and networks-wise CAPEX. In order to relax the aforementioned scalability issues, this paper suggests a centralized DTN design where end users in a group can share the centralized DTN. We evaluate the effectiveness of the suggested sharable DTN design by comparing CAPEX against to that of current design with respect to the diverse network load and the state-of-the-art computing machine.

Walking path design considering with Slope for Mountain Terrain Open space

  • Seul-ki Kang;Ju-won Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.103-111
    • /
    • 2023
  • Mountains area, especially walking in open space is important for special active field which is based on mountain terrain. Recent research on pedestrian-path includes elements about pedestrian and various environment by analyzing network, but it is mainly focusing on limited space except for data-poor terrain like a mountain terrain. This paper proposes an architecture to generate walking path considering the slope for mountain terrain open space through virtual network made of mesh. This architecture shows that it reflects real terrain more effective when measuring distance using slope and is possible to generate mountain walking path using open space unlike other existing services, and is verified through the test. The proposed architecture is expected to utilize for pedestrian-path generation way considering mountain terrain open space in case of distress, mountain rescue and tactical training and so on.

Air Path Establishment Based on Multi-Criteria Decision Making Method in Tactical Ad Hoc Networks (전술 애드혹 네트워크에서 다속성 의사결정 방법 기반 공중 경로 생성 방안)

  • Kim, Beom-Su;Roh, BongSoo;Kim, Ki-Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.1
    • /
    • pp.25-33
    • /
    • 2020
  • Multipath routing protocols with unmanned aerial vehicles have been proposed to improve reliability in tactical ad hoc networks. Most of existing studies tend to establish the paths with multiple metrics. However, these approaches suffer from link loss and congestion problems according to the network condition because they apply same metric for both ground and air path or employ the simple weight value to combine multiple metrics. To overcome this limitation, in this study, we propose new routing metrics for path over unmanned aerial vehicles and use the multi-criteria decision making (MCDM) method to determine the weight factors between multiple metrics. For the case studies, we extend the ad-hoc on-demand distance vector protocol and propose a strategy for modifying the route discovery and route recovery procedure. The simulation results show that the proposed mechanism is able to achieve high end-to-end reliability and low end-to-end delay in tactical ad hoc networks.

A Study on Sharing Web Application between Battlefield Management System based on PKI Authentication (PKI 인증기반 전장관리체계 웹 연동에 관한 연구)

  • Kim, Young-Sung;Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.123-140
    • /
    • 2010
  • Interworking Web Application to share the resource between Battlefield Management Systems(BMS) is critical issues for accomplishment of information superior. However, authentication system of BMS differ from each other because of having the independent plan for system build. This problem causes inefficiency such as the information insufficiency owing to not share web application and the need of additional laptops. To solve the problem, in this paper, we propose the improved certificate acquisition and verification algorithm for the user of different BMS. By testing the proposed algorithm appling to the real field, we verify the performance of proposed method.

Implementation of Network Level Simulator for Tactical Network Performance Analysis (전술통신망 성능분석을 위한 네트워크 시뮬레이터 구현)

  • Choi, Jeong-In;Shin, Sang-Heon;Baek, Hae-Hyeon;Park, Min-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.666-674
    • /
    • 2013
  • This paper studied about the design and implementation of tactical communication network simulator in order to obtain tactical communication network parameter, such as link capacity and routing plan, and a number of exceptional cases that may occur during actual deployment by conducting simulation of a large-scale tactical communication networks. This tactical communication network simulator provides equipment models and link models of commercial OPNET simulator for tactical communication network. In addition, 6 types of simulation scenario writings convenience functions and traffic generation models that may occur in situations of tactical communication network environment were implemented in order to enhance user friendliness. By taking advantages of SITL(System-In-The-Loop) function of OPNET, the tactical communication network simulator allows users to perform interoperability test between M&S models and actual equipment in operating simulation of tactical communication network, which is run on software. In order to confirm the functions and performance of the simulator, small-scale of tactical communication network was configured to make sure interoperability between SITL-based equipment and a large-scale tactical communication network was simulated and checked how to cope with traffic generated for each network node. As the results, we were able to confirm that the simulator is operated properly.

A Probabilistic Routing Mechanism Considering the Encounter Frequency in the Battlefield Environment (전장 환경에서 접촉 횟수 정보를 고려한 확률적 라우팅 기법)

  • Lee, Jongmok;Kang, Kyungran;Cho, Young-Jong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.332-339
    • /
    • 2013
  • The network nodes in a tactical network moves continuously and due to the physical and electronic obstacles, the connections are not always available. Due to the frequent disconnections, it is hard to discover the path among the nodes in a DTN. According to PROPHET(Probabilistic Routing Protocol using History of Encounters and Transitivity), one of the most well-known DTN routing protocols, a DTN node determines whom to forward a packet according to the packet delivery probability. From the viewpoint of a node, the packet delivery probability of another node is degraded while the nodes are disconnected whereas it is improved when they encounter. In this paper, we enhance the algorithm estimating the packet probability by considering the encounter count as an additional parameter. Our algorithm prefers the node that encounters the destination more frequently in selecting the next hop toward the destination. We evaluated the performance of our algorithm by simulating military operations using a DTN-dedicated simulator. Through the simulations, we show that our proposed algorithm achieve higher packet delivery ratio with similar overhead compared with PROPHET.

Detection and Management of Misbehaving Node in Tactical Ad-Hoc Networks (전술 Ad-hoc 네트워크에서의 비정상행위 노드 탐지 및 관리)

  • Jang, Beom-Geun;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.333-343
    • /
    • 2009
  • Tactical Information Communication Network(TICN) is a concept-type integrated Military Communication system that enables precise command control and decision making by unifying the diversified military communication network and conveying diverse range of battle field information on real-time, at right place at right time. TICN is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network is consist of mobile nodes and nodes in the network depends on the cooperation of other nodes for forwarding of packets. In this context, some non-cooperating nodes may delay forwarding of packets or drop the packets. This may hamper the network as a whole and disrupt communication between the cooperating nodes. To solve this problem, we present a solution with a Node Weight Management Server(NWMS), which manages each node's weight according to its behavior in local area. When the NWMS detects misbehaving node, it increases the node's weight. If the node's weight exceeds a predefined threshold then the NWMS broadcasts the node's information into network to isolate the misbehaving node from the network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

A Routing Protocol for Improving Node Survivability in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 노드 생존성 향상을 위한 프로토콜 설계)

  • Kim, Young-An;Park, Gun-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.56-64
    • /
    • 2013
  • TICN, a next-generation tactical communication network based on a wireless network, acts as the backbone of the whole network. TICN requires the routing which takes both survivability of passage, reliability, and safety of wireless link into consideration. A tactical network like TICN may maintain the passage for just a short period of time due to topology's frequent changes; In this process all nodes, dependent on batteries for their necessary energy, are restricted by batteries' durability in due course. To overcome this shortcoming, the up-to-date protocols consider only either of diminishing or balancing out energy consumptions. Thus there was a limitation to enhancing both throughput and energy efficiency. The thesis proposes a protocol which regards both throughput and energy efficiency, and enhances node survivability by means of minimizing and balancing energy consumption of the whole network. The protocol brings out an improvement in throughput and makes each node's energy usage more effective.