首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
王翔  白翔  潘莉丽 《通信技术》2013,(12):34-37
在研究北约STANAG5522协议标准的基础上,对Link22系统的消息传输策略进行了详细描述,分析了该系统典型的消息处理流程和传输策略;研究了DLP与SNC之间的接口关系,并参考典型的服务原语方式对该接口进行了补充;针对数据链系统对战术消息时效性的需求,给出了区分优先级的调度策略,可以为高优先级业务提供传输时延保证。研究Link22系统的消息传输原理,可以为我国设计先进的数据链系统提供参考依据。  相似文献   

2.
为了满足目前安防领域对标准化、网络化的视频监控的需求,通过对Hi3531的媒体处理平台、Onvif及流媒体技术的分析和研究,设计并提出了一种基于Hi3531芯片的标准化的网络视频监控系统的设计方案。阐释了网络视频监控系统的总体框架及Hi3531的软硬件模块的设计方法,重点讨论了网络视频监控系统的消息交互的设计和媒体处理平台模块的实现。最后,给出了运行效果。  相似文献   

3.
通过分析机载战术数据系统的通用要求,设计了战术数据系统框架,包含定时器、消息机制、任务监控、数据记录和通信设备管理,并在VxWorks操作系统下实现了该框架。它适用于多种平台的战术数据系统,可移植到其他操作系统下。  相似文献   

4.
齐涛涛  刘小龙  唐政 《现代导航》2022,13(4):284-291
针对跨域协同作战异构信息分发处理需求,设计自适应战术协同信息分发处理架构,开发基于语义语用的信息自动处理与交互模型,研究消息处理流程自动化编排方法,实现信息按需、高效地分发处理,提升多平台协同作战水平。  相似文献   

5.
现代战术多源信息融合系统越来越多地使用各种多媒体信息,并经常引入战术应用领域的“深”知识进行各种类型的推理。本文基于一个多传感器多平台多目标战术数据仿真系统,分析多源信息融合对DBMS(数据库管理系统)的需求,其结果可供设计战术DBMS参考。  相似文献   

6.
电力需求侧管理与服务集成平台是智能电网的重要组成部分。针对需求侧复杂环境下的电信息采集与控制数据交互问题,以及基于分布式计算通信需求问题,提出了基于ZeroMQ(Zero Message Queue,零消息队列)消息中间件的分布式通信架构,并设计了能够传输需求侧数据采集与需求响应及其它复杂消息的通用消息格式。ZeroMQ的优秀性能使得该通信架构可有效支撑分布式计算平台在异构系统间快速交换数据,缩短了智能电网高级应用分析的数据交互与计算时间,增加了系统的容错性。利用佛山市需求侧服务集成平台的实际工程环境进行了部署和测试,测试结果证明了该通信架构的可行性。  相似文献   

7.
黄波  黄大庆 《电子工程师》2010,36(11):26-28,56
光电平台通常安装在飞机上,实施对地面目标或空间目标的跟踪,并给出目标的精确位置信息,是常规武器靶场和机载光电测量、光电跟踪中必不可少的设备。文中先简要介绍无人机光电平台在实际应用中的战术使用指标,然后根据无人机战术使用指标给出了设计光电平台技术指标的方法,并举例说明。  相似文献   

8.
为了让战术数据链仿真系统能够实时加载真实的消息业务,使仿真精确性和可信度得到提高,基于QualNet仿真软件,设计并实现了一种战术数据链的半实物系统。同时,对半实物仿真下的战术数据链性能指标进行仿真,得出了性能曲线并对其进行了分析。  相似文献   

9.
基于QualNet的战术数据链半实物仿真   总被引:1,自引:0,他引:1  
为了让战术数据链仿真系统能够实时加载真实的消息业务,使仿真精确性和可信度得到提高,基于QualNet仿真软件,设计并实现了一种战术数据链的半实物系统.同时,对半实物仿真下的战术数据链性能指标进行仿真,得出了性能曲线并对其进行了分析.  相似文献   

10.
刘宏波  肖思帅  卢洽然  孟进 《电讯技术》2023,63(8):1139-1144
针对无线通信条件下数据链网络性能测试和评估难题,设计了数据链网络性能评估方法。首先,采集数据链的记录数据;然后,通过对战术数据系统(Tactical Data System, TDS)数据的消息协议解析,按照数据链消息标准格式化TDS数据,提取时间、消息类型、数据链平台和收发消息四维变量;最后,结合集合映射理论,分析通信网络连通性,生成连通性评估报告和战术消息时序图。基于数据链网络实际业务数据,分析了测试样本经过传输造成的丢包、误码和时延抖动等影响,验证了多源融合方法的可行性和有效性。  相似文献   

11.
任意拓扑结构战术地域分组交换网的性能分析   总被引:1,自引:0,他引:1  
郝川  李英涛 《通信学报》1997,18(1):22-26
本文以战术地域分组交换网为基础建立具有不规则拓扑结构网络模型,在给出网络的拓扑结构、网络用户业务量和路由选择算法的条件下,提出了一种计算网络链路传输业务量的方法,并用于分析网络的传输性能。同时,还用计算机仿真方法对同一网络进行模拟。分析结果说明:这类通信网的路由选择算法的设计应更重视网络内部流量的均匀分配  相似文献   

12.
Tactical communications networks are multihop wireless networks in which switches and endpoints are mobile nodes. In a tactical environment, system performance degrades when switching nodes and/or communication links fail to operate. Fast algorithms for performance analysis are desirable for optimizing the network in a timely fashion. Further, tactical networks commonly use preemptive priorities to achieve low blocking probabilities for high-priority calls when the loss of equipment in the battlefield is not trivial. This paper discusses three measures and analytical algorithms for the performability evaluation of a two-tier tactical communications network where preemptive priority service discipline is employed and traffic is divided into multiple classes to provide multiple grades of service. Each class of traffic has its distinct characteristics, such as average call-arrival rate, average call-holding time, and service priority. The three performability measures are devised to evaluate the impact of nodes/links failures on system performance. Experiments show that the preemption does provide robust service for higher priority traffic. The techniques for performability evaluation presented in this paper may also be useful in other rapidly deployable networks, where mobility, communication efficiency, and computational complexity for adapting the network to unpredictable environments are of significant concern.  相似文献   

13.
Performance analysis of an asynchronous frequency hopping packet radio network and numerical results are given. The network has mixed traffic, one type of packet needs an Acknowledgement(Ack), the other type does not need, the background of such a network is tactical missile systems. A reasonable network model is given, based on which the effect of various parameters under multiaccess interference is investigated. The performance curves of throughput and average packet delay is given in this paper.  相似文献   

14.
Partitioning QoS management for secure tactical wireless ad hoc networks   总被引:1,自引:0,他引:1  
Addressing quality of service in military wireless ad hoc communication networks involves unique challenges due to imposed tactical requirements and,conditions, such as heterogeneous traffic with stringent-real-time and survivability requirements, mobile wireless nodes in hostile environments, and limited spectrum availability. Encryption adds another layer of complexity because of the partitioning of the network into plain text (unencrypted) and cipher text (encrypted) parts that, by definition, cannot communicate QoS information to one another. A typical communication shelter is composed of unencrypted LANs connected to a packet-encrypted backbone network. This article presents a partitioned QoS approach, focusing on QoS management at the unencrypted LAN that complements QoS management done at the encrypted backbone. Some of the unencrypted LAN QoS techniques being considered for the Warfighter Information Network-Tactical (the future Army tactical backbone network) are outlined.  相似文献   

15.
Military tactical network is one of the most important applications of ad hoc network. Currently the existing routing protocols are put forward based on the simple and universal network model which has the ability of multi-hop routing but cannot work efficiently in the special military applications. The narrow bandwidth and limited energy of the wireless network make general routing protocols seem to be more redundant. In order to satisfy military needs properly, this letter makes a detailed analysis of physical nodes and traffic distribution in military network, uses cross-layer design concept for reference, combines traffic characteristic of application layer with routing protocol design. It categorized routing problem as crucial routes and non-crucial routes which adopted separate maintenance methods. It not only realizes basic transmission function but also works efficiently. It is quite fit for military application.  相似文献   

16.
The command and control communication system that supported the 24th Infantry Division (Mechanized) during their charge into Iraq in Operation Desert Storm is discussed. The three primary types of communications used were the tactical telephone network, single channel radios, and hard copy or message traffic. Background on the communication systems is presented, and planning for the operation and deployment of the command and control communication system, including command post configurations, are described  相似文献   

17.
认知无线电技术具有智能电磁频谱感知、干扰避免和动态频谱接入的能力,因此利用认知无线电技术可以提升战术网络的性能.由于战术作战的复杂性,需要建立适用于战术任务的认知无线电架构.首先分析了战术通信的特点和认知无线电技术在战术网络中的运用,以及目前国外战术认知无线网络的建设情况.结合战术通信网络移动性高、电磁对抗复杂的特点,利用对抗环境下的战术网络结构和模型,提出了分层的战术认知无线电网络结构以及面向作战任务的网络管理方法,形成拓扑结构分层次、管理运行分阶段的网络架构.该网络架构均衡考虑了网络的灵活性和稳定性,适用于动态变化的战术网络,为认知无线电在战术通信中的技术应用和网络设计提供了参考.  相似文献   

18.
Carrier-grade Ethernet challenges for IPTV deployment   总被引:1,自引:0,他引:1  
Carrier-grade Ethernet standardization and deployment is gaining momentum due to the ease of deployment, lower cost, and compatibility with existing networks on the access end. When Internet protocol television (IPTV) is deployed using Ethernet as the underlying interconnect fabric infrastructure, meeting fine-grained traffic management (TM) requirements on the service provider side to meet quality of service (QoS), billing, and security features implementation on the user side poses several challenges. Such challenges could be met using the TM features built into network processors (NPs).  相似文献   

19.
基于层次分析法的战术通信网络效能评估   总被引:9,自引:3,他引:6  
为了评估战术通信网络在复杂战场环境中的综合效能,采用系统科学中常用的层次分析法(AHP)对战术通信网络效能进行层次化分析,并依据系统效能的定义,从可用性、可信性与固有能力三个方面提出了战术通信网络效能层析结构模型,最后通过对两种战术通信网络波形的评估,验证了层次分析法在战术通信网络效能评估领域的科学性。  相似文献   

20.
Code division multiple access (CDMA) ad hoc networks have been considered a promising multiple-channel networking architecture for connecting tactical platforms in battle fields. In this paper we consider a network of a swarm of unmanned aerial vehicles (UAVs) that are used in a tactical surveillance mission. The UAVs are assumed to have multiuser detection capability and form a CDMA-based ad hoc network. A token circulation scheme is proposed to conduct functions required at the medium access control layer including detection of hidden/lost neighbors, code assignment and schedule-based cooperative transmission scheduling. In the proposed scheme, a token continuously circulates around the network based on the “receive-forward” module. Through circulation of the token, each UAV can detect its hidden and/or lost neighbors in near real-time, assign codes enabling the spatial reuse of code channels without incurring code collision, and schedule data transmissions in a cooperative and distributed manner. In addition, the proposed scheme is able to take advantage of multiuser detection functionality and allows for simultaneous transmissions from multiple transmitters to a same receiver. The performance of the proposed token circulation scheme is evaluated, both analytically and through simulations. It is shown that the latency of the token is at most linearly proportional to the network size, and the average delay of a data packet increases with either the packet generation rate or the network size. The results also show that the proposed token circulation scheme is suitable for large-scale CDMA-based UAV ad hoc networks with even heavy network traffic load.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号