Font Size: a A A

On Applied Research Of Network Real-time In Militarily

Posted on:2009-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z LiFull Text:PDF
GTID:2178360272976624Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This topic face the modern high tech combat and the new time our army military informationization construction's total duty and the request, take the military demand as a goal, take the army network en-vironment as the backing, take the network real-time communication technology application as the method, focuses in the development use armed forces net resources, sharpens army's operational control ability and the comprehensive construction level, has studied the army network construction and the real-time com-munication technology in the armed forces on-line application, its academic thought mainly includes the military and the technical two aspects, militarily, the synthesis has utilized theories and so on information operation, network-centric warfare, automated command, army informationization construction, like:"real-time dynamic operational control","interconnection, intercommunication, interoper ability network","synthesis integration system","a peacetime and wartime body's construction pattern""nimble, highly eff-ective, simple operation requirements"; Technically, main application system integration technology, integrated utilization technologies and so on computer network, multimedia correspondences, network security, based on"hierarchization""component""a body China"military software development construction re-quest, modern military theory and present information technology organic union.Central Military Commission, made in a timely manner to achieve our military in the new era "mechanized", "information technology" strategy of dual historical tasks identified using information technology to stimulate mechanization in order to promote mechanization and informatization of the whole idea of the building. However, information-based army building has just started, theory and technology is relatively backward in military theory, the system construction, personnel training, laws and regulations, and so there are a lot of problems. As a result, the Central Military Commission, called on the army to focus on "mechanized", "information technology" dual historic mission, action, in-depth study, and continuously explore new era military construction and development in new situations and new contradictions and new problems, and continuously Come up with the military to promote the construction and development of new solutions and new approaches, new initiatives. Military information technology to accelerate the pace of construction of the letter, some of the new military doctrine before our eyes, such as: "Network Centric Warfare", "digital battlefield" and "Digital Force", "C4ISR (Command, Control, Communication, Computer , Intelligence, Surveillance, Reconnaissance) command automation system "," GIG global grid network "," Joint Operations Data Link ", the new theory has been in the recent local wars have played an important role.Because this article studies the key point places to the network real-time communication value excavation, therefore uses five chapters the contents to elaborate separately. First chapter and the second chapter through the introduction network real-time communication's function and the application, as well as the network real-time communication to modernization of the armed forces's significance, emphasized the network real-time communication is the modern combat's prerequisite and the request. The modern operational requirements realizes real-time or near real-time operational control and the army motion, namely must realize the real-time survey, the real-time discovery, the real-time decision-making, the real-time direction, real-time mobile, the real-time attack, the real-time appraisal, the real-time safeguard and so on, all these prerequisite is the real-time battlefield information transmission, the network real-time communication may solve this problem well.The third chapter"the network real-time communication's basic principle and the technology"and the fourth chapter"the network real-time communication's safety control request", these two chapters through to real-time communication's essential connotation, in the real-time communication technology implementation process's safety control two aspect's system analysis, promulgate this technology the theory present situation with the realistic question which faces. The network real-time communication's basic principle is achieves the network service based on TCP/IP and UDP, the former is by the data stream form, will transmit the data after the division, the pack, establishes the empty electric circuit through two machines, carries on continual, bidirectional, the strict guarantee data accurate file transfer protocol. The latter by the data newspaper's form, after analyzing the data arrives at the order not to make the request successively the file transfer protocol. The network real-time communication application is widespread, the development is rapid, but because it is based on the network, its safety control is a major issue, if does not solve the network security management problem, uses in the government work, the business management, electronic commerce it not being impossible to obtain very well applies, the military application has a higher safety control to request. At present entire network's safety control has many problems, our army's network construction start is late, with actual requests the phase difference to the network security management's research and the actual level to be very big, this is also the present army network cannot obtain a very good use primary cause. Therefore, must the method which in armed forces on-line application network real-time communication this function superior, facilitates quickly, we must take the network the safety control, carries out the network security management thoroughly the research, takes the effective action, the network safety tube technical considers, does first before. Faced with network all sorts of threats, while strengthen the networking guard, strengthens the network security management is very effective has the cost low method and the method. Network system's strict management is the organization, the organization and individual user is exempt from the attack the important measure. May in fact, many organizations, the organization and individual user, also has not given the enough value in the thought that also in the actual system, the software, the website has not taken the effective action, some blind optimistic, in the network security condition diagnosis report indicated according to 2004 about the network security management degree of satisfaction's investigation, is very satisfied to this unit network security protection capability or thought this unit network security protection capability"high"and"general"the grand total occupied 85%, Had reflected fully the user universal safety idea weak, the safety control level low, the safety managers lack training, the security funds investment insufficiency and the security product cannot satisfy questions and so on request.This article tries hard to focus the apply theory to reality, from the development use network resource, enhances the network application potency, service safeguard army's each work, the promotion army's informationization construction embarks, to enable the network real-time communication for the military work, the army to construct truly serves, to increase its feasibility, the feasibility, synthesizes the above research and the analysis, this article in the fifth chapter"the network real-time communication system model design", in this chapter of content, has designed the network real-time communication system model. According to army stipulations and so on automated system related construction, development, use and management, rest on C4ISR the architecture request, according to clings the modern combat and the army constructs the demand, to insist unifies the plan and the technical system, the full use mature technology and pay great attention to innovate, the reasonable use resources, to strengthen the metasynthesis, the perfect security system, to pay great attention to construct the benefit the principle, uses the military command automation system construction request the systems engineering law, the fast prototype law, the critical path method, the system integration law, the approach gain law, the experiment methodology and so on, the prominent timeliness, the functionality, the usability, the security carry on the design with to realize.The military multimedia communication network the local area network, WAN, the satellite net and has, the wireless communications network and so on organically to unify when together, forms three-dimensional entire Uygur covers all-weather, entire unimpeded, may to each kind of network service provision of service technical support and the safeguard. And, take the entire armed forces army network as backbone military WAN, is the multimedia network hard cores. At present, the skeleton line uses the fiber optic transmission completely, the user uses the special line turning on form completely, may guarantee that 1-2M the band width, its through-put capacity may satisfy in the wide band network the voice, the data, the image and the video frequency service and so on, and may carry on the good resource management and the network control safeguard information, director, the work, the training and so on each kind of information prompt, rapid, the security, the uninterrupted transmission.The network real-time communication constructs in usually the army may also play the influential role. The network real-time communication may take one kind of comprehensive information platform, wide range, cross network movement in the entire armed forces net, the war zone net, the local area network, widely apply in army's daily work, the education and training, the army manage, the synthesis safeguard and so on, but promotes army's direction work level effectively, enhances the education and training effect, the Reinforced unit management and so on, overcomes the network application system"the chimney to stand in great numbers"now, the respective isolation, cannot exchange and so on a series of questions.
Keywords/Search Tags:C4ISR, Informalization, Computer network, Real-time communication, Multimedia Communications, Network security, TCP/IP, Winsock Programming
PDF Full Text Request
Related items