• Title/Summary/Keyword: Network centric warfare

Search Result 146, Processing Time 0.025 seconds

Fast Distributed Network File System using State Transition Model in the Media Streaming System (미디어 스트리밍 시스템에서의 상태 천이 모델을 활용한 고속 분산 네트워크 파일 시스템)

  • Woo, Soon;Lee, Jun-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.145-152
    • /
    • 2012
  • Due to the large sizes of streaming media, previous delivery techniques are not providing optimal performance. For this purpose, video proxy server is employed for reducing the bandwidth consumption, network congestion, and network traffic. This paper proposes a fast distributed network file system using state transition model in the media streaming system for efficient utilization of video proxy server. The proposed method is composed of three steps: step 1. Training process using state transition model, step 2. base and decision probability generation, and step 3. storing and deletion based on probability. In addition, storage space of video proxy server is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, the proposed method provides the lowest user start-up latency and the highest bandwidth saving significantly.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

A Study on Acceptance Factors for MND-MDM (국방 MDM 수용요인에 관한 연구)

  • Lee, In-Seog;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.355-368
    • /
    • 2011
  • For an effective warfare under the condition of NCW, the sharing of data between systems must be essential. Thus, the standardization and the integration of data which is considered as the MND-EA improvement and the Megacenter is important. The purpose of this research is to investigate the factors that affected the BI(Behavioral Intention to USE) by using the TAM(Technology Acceptance Model), That is to introduce the MDM into the national defense field which is an issue in every agency sector for data sharing. Also, based on the implementation architecture of Gartner which applies depending on the business enterprise type, the preferred architecture should be selected considering the national defense environment and the characteristics, and suggest an effective MND-MDM plan by analysing the effects on the BI. The survey was done through 19th September till the 7th of October 2011, by investigating the people in charge of the development and maintenance of the national defense information systems and the SI company's national defense team people who have experienced the development of the national defense information systems.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

Performance Analysis of Position Based Routing Protocol for UAV Networks (UAV 네트워크 환경에 적합한 위치기반 라우팅 프로토콜의 성능 분석)

  • Park, Young-Soo;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.188-195
    • /
    • 2012
  • Many systems are developing for the realization of NCW(Network Centric Warfare). UAV(Unmanned Aerial Vehicle) Network is attracting attention in a lot of military applications. In general, UAVs have the potential to create an ad-hoc network and greatly reduce the hops from source to destination. However, UAV networks exhibit unique properties such as high mobility, high data rate, and real time service. The routing protocols are required to design the multi-hop routing protocols that can dynamically adapt to the requirements of UAV network. In this paper we analyse Geographic Routing Protocol is based on geographical distance between source and destination for efficient and reliable transmission. Geographic Routing Protocol is evaluated in video service scenarios with TDMA model in our simulation. The simulation results show that the performance of Geographic Routing Protocol is better than the MANET Routing Protocol in terms of packet received ratio, end to end delay, and routing traffic sent.

Performance Analysis of Unmanned Robot System based on LOS/NLOS channel (LOS/NLOS 채널에 따른 무인로봇체계의 시스템 성능분석)

  • Song, Yuchan;Cha, Gyeong Hyeon;Hwang, Yu Min;Lee, Jae-Seang;Han, Myoung-hun;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.12-16
    • /
    • 2015
  • Unmanned robot system has become a significant part of network centric warfare. Unnlike the commercial wireless system, however, it is tricky to provide reliable communication in the harsh environment: tactical and military communication. Therefore, it needs to be considered when the base station and mobile has poor communication channel. In this paper, we proposed an efficient operating algorithm for unammned robot system with ensuring communication survivability in the harsh environment. From the simulation, we adopted the SUI channel suitable for domestic mountainous area and open terrain with Rician factor K.

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터 기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1817-1823
    • /
    • 2012
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the voice communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the direct recording of video data for screen, another is the recording of an exchange of data. This study proposes the new data-oriented recording method to reduce the readiness time for replay and the improvement scheme.

An study on the common message design of Korean message format(KMTF) and direction of management procedure & tool (한국형 메시지포맷(KMTF)의 공통메시지 설계 및 관리 절차/도구 개발 방향 연구)

  • Ju, Jin-Chun;Kang, Suk-Jung;Lim, Dae-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.349-352
    • /
    • 2010
  • 인터넷의 등장은 세계를 초단위 정보 소통 영역으로 묶어 정보가 사회를 주도하는 형태로 발전시켰듯이, 미래 전쟁 양상도 정보가 전쟁의 승패를 결정하는 네트워크중심전(NCW)으로 발전되고 있으며, NCW의 핵심은 무기체계간 상호운용성이다. 무기체계간 상호운용성을 확보하기 위해서는 표준화된 정보를 활용해서 연동하는 중요하며, 우리 군은 무기체계간 연동을 위해 연동메시지인 KMTF를 활용하고 있다. 그러나 현 KMTF 표준은 메시지구조(message frame)만을 제시하고 세부적인 메시지는 정의하지 않아 각 체계 개발자가 나름대로 메시지를 정의함으로써 중복된 메시지를 각 체계별로 관리하고 있고, 동일한 메시지를 다른 방식으로 적용하는 부작용이 발생할 수 있으며, 체계간 연동을 위해 별도의 변환기를 개발해야 하는 문제점이 발생하고 있다. 이를 위해 본 논문에서는 첫째, 미군 메시지포맷인 USMTF를 벤치마킹하여 무기체계에 공통 적용이 가능한 공통메시지 설계방안을 제시하며, 둘째, 메시지 생명주기 관리 및 메시지 추가등록 절차 관리를 위한 KMTF 표준 관리 절차를 제시하고, 셋째, 개정된 메시지 규격에 맞는 KMTF 관리도구 개발의 방향을 제시한다.

  • PDF

GPS Jamming Resilient Location-based Routing for Unmanned Ground Vehicle Networks (무인 지상 차량 네트워크에서 GPS 재밍에 강인한 위치기반 라우팅)

  • Lee, Jinwoo;Jung, Woo-Sung;Kim, Yong-joo;Ko, Young-Bae;Ham, Jae-Hyun;Choi, Jeung-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.432-440
    • /
    • 2015
  • UGVs(Unmanned Ground Vehicles) are robots that can substitute humans in reconnaissance operations of potentially dangerous and contaminated sites. Currently, there have been active research on utilizing UGVs in military environments. Much resrach has been focused on exploiting the weakness of topology-based routing and instead utilize location-based routing for the networking of UGVs. It is generally assumed that location-based routing methods can fully utilize the location information gained from GPS. However, this may not be possible in tactical environments due to enemy GPS jamming and LOS(Line of Sight) limitations. To solve this problem, we propose a location-based routing scheme utilizing low control message that can calibrate the location information using GPS information as well as location of neighboring UGV, movement direct and speed information. Also utilizing topology-based routing scheme to solve incorrect location information in GPS jamming region.