• Title/Summary/Keyword: Tactical network

Search Result 218, Processing Time 0.024 seconds

A P2P Based Tactical Information Sharing System for Mobile Nodes (P2P 기반의 모바일 노드간의 전술 정보 공유 시스템)

  • Lee, Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).

Application Study of FQ-CoDel Algorithm based on QoS-guaranteed Class in Tactical Network (전술환경에서 QoS 보장을 위한 클래스 기반 FQ-Codel 알고리즘 적용 연구)

  • Park, Juman
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.53-58
    • /
    • 2019
  • This paper proposes a class-based FQ-CoDel(Flow Queue-Control Delay) algorithm. A variety of application system services create bottlenecks in tactical communication network and the bottlenecks cause some problems such as traffic loss and delay. Therefore, more research on effective traffic processing is needed. The proposed class-based FQ-CoDel algorithm, suggests dynamic buffer management and scheduling, classifies specific packets in each queue according to service attribute and criticality and checks periodically latency of the packets in each queue. Also, it abandons the packets if some packets stay in queue above schedule time and manages the total amount of traffic stored in queue with certain level.

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

Analysis and Design a Optimum Protocol for TICN Tactical Backbone (TICN 전술백본망 최적의 프로토콜 분석 및 설계)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1722-1727
    • /
    • 2011
  • The Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment and conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. And We got the result that It could improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments by adjusting some time parameters of IS-IS protocol. This paper modified and designed the IS-IS protocol in order to support the QoS strategies of TICN and analyzed it's adaptability through simulation.

The Development of Tactical Training Evaluation System using WMN (WMN 기반 전술훈련 평가시스템(TTES) 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.191-196
    • /
    • 2012
  • The tactical training system that was applied to wire at open terrain and field is no training accomplishment in conformity with battlefield situation portrayal. Therefore, this paper developed the tactical training and evaluation system for growing fruitfully that is installed as a tactical training monitoring system by USN WMN through controlled sensing interlock for collecting sensing data and guaranteed training equipment status and report training result for serviceability of manager. additionally we implemented controller for managing server of sending and manipulating of being gathered training data by sensor using USN and system as GUI methods. This system is easy for adapting new and improved protocol in order to processing many function of H/W and algorithms which is generated by controlled system is applicable easily.

Operation Scheme of Aerial Relay Networks and the Analysis of Its Effectiveness against Failures of Terrestrial Tactical Networks (지상 전술망 장애에 대비한 공중중계망 운용 방안 및 이의 효과도 분석)

  • Ghil, Joon-ho;Lee, Gyu-min;Lee, Seungwoon;Roh, Byeong-hee;Kim, Jae-hyun;Kim, Donghyun;Lee, Jaemoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.172-180
    • /
    • 2017
  • Korean army has been trying to construct a future tactical network in collaboration with TICN at the ground level and the next-generation military satellite system in the space level. However, due to the low bandwidth and high operational cost, the satellite system has the limitation to exchange all kind of tactical information through it. To overcome the limitation, there have been several researches to construct airborne networks. In this paper, we propose an effective interworking architecture and operation scheme between terrestrial tactical networks and aerial relay networks to counteract against the communication breaks of terrestrial terminals. And, we also propose a way to analyze its effectiveness. The experimental results show that the interworking of aerial relay networks can manage the failure situations in terrestrial tactical networks very effectively.

Learning-Backoff based Wireless Channel Access for Tactical Airborne Networks (차세대 공중전술네트워크를 위한 Learning-Backoff 기반 무선 채널 접속 방법)

  • Byun, JungHun;Park, Sangjun;Yoon, Joonhyeok;Kim, Yongchul;Lee, Wonwoo;Jo, Ohyun;Joo, Taehwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.12-19
    • /
    • 2021
  • For strengthening the national defense, the function of tactical network is essential. tactics and strategies in wartime situations are based on numerous information. Therefore, various reconnaissance devices and resources are used to collect a huge amount of information, and they transmit the information through tactical networks. In tactical networks that which use contention based channel access scheme, high-speed nodes such as recon aircraft may have performance degradation problems due to unnecessary channel occupation. In this paper, we propose a learning-backoff method, which empirically learns the size of the contention window to determine channel access time. The proposed method shows that the network throughput can be increased up to 25% as the number of high-speed mobility nodes are increases.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

Distributed Mobility Management Scheme for the Tactical Network (전술망을 위한 분산 이동성 관리 기법)

  • Kim, Yongsin;Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1078-1087
    • /
    • 2014
  • In the conventional centralized mobility management schemes, it can lead to single points of failure, occurrence of a bottleneck, since all data and control are concentrated on the mobility anchor which is located in home network. In the current research of distributed mobility management, it is doing research into distributed mobility management which is supported by distributed mobility anchors. Such schemes do not consider a failure of the mobility anchor. However, it could be an issue under tactical environment since it occur non-service problem due to anchor movement, maintenance, failure, etc. In this paper, we proposed new DMM scheme named T-DMM(Tactical-Distributed Mobility Management) which can support handover even if mobility anchor breaks down. From the numerical analysis, we evaluate signaling cost and handover latency.