Font Size: a A A

The Research And Exploitation Of The Message-Oriented Middleware In Military Simulation Conduct System

Posted on:2007-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:H YanFull Text:PDF
GTID:2178360182996022Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer technology, the application ofsimulation technology has been extended to many fields accordingly. Now,matured simulation technology has been widely used in the field of themilitary affairs, it is a basal instrument in the military training. A veryimportant part of military simulation is the military simulation conduct.Military simulation conduct can implement simulation in the process of themilitary conduct and many military drillings of tactics on the simulationfield, it can improve the familiar extent to all kinds of weaponry, it also cansee about the military's capability when they are faced with the abruptevents.Military Simulation Conduct System (MSCS for short) which we aretalking about in this discourse is a loose-coupling distributed computingsystem. Message Oriented Middleware (MOM for short) is the maincommunion mode. So in the exploitation process of this system, we shoulduse MOM technology and set up the uniform mechanism to receive andsend message. In this way, we can sharply reduce the complexity in theapplication.In this article, by using MOM technology in MSCS, it gives you alegible introduce about the development of MOM technology, analyses theinevitability and superiority of MOM, it also tells you some ideas and flowin the exploitation process of MOM. The article emphasizes MOM shouldbe exploited independently and has its own exploitation flow. By exploitingthis system, we summarize the experience of exploitation MOM, discuss theinformation analysis method, the molding method, the process workflow inthe exploitation and the test method of MOM. We also finger out somedeficiency that need to investigate in this article. This article is composed ofsix chapters:Chapter one is the exordium. It elaborates the source of the task,which comes from somewhere Department in Beijing. The focus of theresearch is on the information analysis method, the molding method, theprocess workflow in the exploitation and the test method of MOM in MSCS.In this part, we are not only known the status of MOM, but also realized themethod and process in the exploitation of MOM.Chapter two is the summarization. In this section, we introduce thedevelopment of military simulation technology and the application of MOM.On one hand, by the change of politics and military affairs, the developmentroute has been changed from military conflict to peaceful develop, themodern war put its emphases on bringing up combine-campaign capabilityand exercising tactics. Military simulation conduct must be very importantfor military affairs;On the other hand, MSCS is a loose-coupling distributedcomputing system. Message transmission is the main communion mode, sothis system can be wildly used in many fields.Chapter three is the particular introduction about the MOM. Wediscuss the definition, the working method, the superiority and the designmethod of the MOM. As an absolute system, software or the program forservice, the MOM helps distributed software share resource betweendifferent technology. Middleware is not a peculiarly software but a kind ofsoftware, it belongs to the reusable software. Message software bases onmessage transfer. By using this message transfer mechanism, messagesoftware can transfer the data between different flat so that it achieves thedistributed integration and manipulation. Message software can carry outthe retractility and expansionary of the distributed system easily. When acourse happens, the MOM will inform the system how to do. In the processof design, we extraordinarily consider the framework of sound code and thecirculate structure. Such as, the security of system, the administrable of thefunction and collectivity performance. Exploitation the MOM must obeysome rules, it can assure the capability and the quality of the system.Chapter four makes a specific introduction of UML modeling method.The MOM in MSCS provides rock-bottom message server for simulationsystem. It is a sub-system, also is a component. Because componentmodeling by UML is adopted at large in the design of MOM, this chapter, atfirst, is the summarization to UML modeling method and introduces itsmain content including graphic modeling, the UML view and the differentstages in the exploitation process. Next, I introduce a few popular andmature component technologies including COM and CORBA nowadayswhich can be used in the development of MOM in MSCS. I also compareCOM with CORBA, tell you their different. At last, I elaborates componentmodeling based on UML, I also give you a brief introduce about ROSE,which is wildly used in UML modeling method as modeling method.Chapter five makes a specific introduction about the MOM which isused in MSCS. First, as a sub-system, the MOM belongs to the wholesystem. So MOM should be exploited independently and has its ownexploitation flow. Second, by showing the distributed view of the system, itdepicts the idiographic composing of MSCS, you can know more about theapplied field of the MOM. Third, the exploitation process of MOM is areduplicative iterative the process. We analyze, design and implement theMOM by using UML modeling method. First of all, by using semanticenvironment diagram and use case diagram, it tells you the functionality andunfunctionality requirement for the MOM. Then, analyze the MOM bymaking using of sequence diagram and class diagram Depict the basalobject of MOM by using data dictionary. Last, test the system by usingincrement and press mixed method. Then, settle some arisen problems.Chapter six is the conclusion of this research. Because of message isthe main method in the communion, MOM must be very important inMSCS. An excellent MOM can ease burden of other sub-systemsdevelopment and running, being advantageous to the whole system haleness.First of all, as belong to the whole system, MOM system must be workedwhen the interface is steady-going and independent. Then, because thissystem is very complicated, we need to prescribe and administer themessage before modeling. Last, the exploitation process of MOM alsofollows the method of RUP, including Business engineering, Requirements,Analysis, Design, Implementation and Test. At the same time, we also pointout the shortage of this research as follow: first, some message contains alot of data, when the length of the message overstep bourn, this system can'tdispose this problem accurately. Second, because of the confine of theinternet, the transmission of the message may be delayed. It will affect onthe effect of the system and some real time-conduct can't be implementedsometimes. Third, I don't acquaint the operation of military conduct exactly,so there is still have some problem when design the structure of message.
Keywords/Search Tags:Message-Oriented
PDF Full Text Request
Related items