Font Size: a A A

Research On Connectivity And Invulnerability Of Interface Scheme Of Various Tactical Data Links

Posted on:2011-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:X R CengFull Text:PDF
GTID:2132360308985623Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
At present, tactical data link is the principal means to carry out real-time data exchange, the"bond"of coordinated combat and the"multiplier"of combat effectiveness of battlefield platforms. One tactical data link (TDL) cannot meet all combat requirements because of the differences of combat technologies and objects. At the interfaces of TDLs, the interface scheme of various TDLs (ISVTDL) is to specify interface unit should work in which TDL or as a transmit unit. This can be evaluated by connectivity and invulnerability that strongly affect the performance of various TDLs system, efficiency of coordinated combat of various TDLs and battle effectiveness of system of systems.Based on the characteristics of interfaces and interface scheme of TDLs, the methods of modeling, simulation and analysis were put forward to study on connectivity and invulnerability of ISVTDL. The research results can be applied in the networking optimization of TDL and coordinated combated optimization of various TDLs. The research of this dissertation shows great significance and practical value in the design and development, interconnection test & verification, and network plan of TDL.The research contents of this dissertation include:(1)The basic concepts of interfaces and ISVTDL. The functions and structure of interfaces and the concepts and contents of normal operation and concurrent operation were introduced. The merits and demerits of concurrent operation comparing with normal operation were given.(2)The connectivity of ISVTDL was studied. The analysis method of connectivity of ISVTDL was put forward. The interfaces and interface scheme were introduced; the connectivity of ISVTDL was modeled and the analysis indexes such as complete connectivity, residual connectivity and the probability of isolated nodes were presented; the analysis of connectivity in TADIL B interface scheme without attacks was given; to simulate the connectivity of ISVTDL, the algorithms of random attack and incomplete information attack were put forwarded respectively, the Monte Carlo method of nodes'selection with equal probability was presented, and the simulation of these two algorithms in normal operation and concurrent operation of TADIL B interface scheme were given respectively.(3)The invulnerability of ISVTDL was studied. The analysis method of invulnerability of ISVTDL was presented. The invulnerability of ISVTDL was modeled and the analysis indexes such as the degree distribution entropy, average degree and invulnerability were presented; the analysis of invulnerability in TADIL B interface scheme without attacks was given; to simulate the invulnerability of ISVTDL, the algorithms of random attack and incomplete information attack were put forwarded respectively, and the simulation of these two algorithms in normal operation and concurrent operation of TADIL B interface scheme were given respectively.
Keywords/Search Tags:Tactical data link, interface scheme, connectivity, invulnerability
PDF Full Text Request
Related items