Joint Data Link System Based on Cloud Computing

Article Preview

Abstract:

In order to meet the requirements of multiple data links cooperative combat in network centric battle field, we analyzed the problems and challenges that US Army tactical data link system encountered when meeting the needs of network-centric warfare, and elaborated the turning point that the ideas of cloud computing service mode construct the networking data link system in network-centric battle field. On the basis of this, we put forward a new battlefield-oriented, demand-based, real-time serviced networking data link system---the joint data link system based on cloud computing, and proved that the use of cloud technology in Joined Data Links can improve the system service level markedly.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2317-2323

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sun Mingyi, Yang Liping. Tactical Data Links in Information Based Warfare [M]. Beijing: Post University Press, (2005).

Google Scholar

[2] Wang Xiuhua, Wei Xin, Wang Haiyan. Network centric warfare analysis of US Army[J]. Lecture Notes in Electrical Engineering, 2012, vol. 36, pp: 573-578.

DOI: 10.1007/978-3-642-26001-8_74

Google Scholar

[3] LIU Xing, CHEN Chen, ZHOU Jin-lun, LUO Peng-cheng. An Essential-Task-Based Methodology for Development and Analysis of Information Exchange Requirements in Tactical Data Link [J]. Journal of Convergence Information Technology (JCIT), 2012, vol. 7, pp: 284-291.

DOI: 10.4156/jcit.vol7.issue6.34

Google Scholar

[4] YAN Zhao-lin, HE Zhao-xiong, LUO Xu-hui, LI Hai-yan. Towards Fixed Allocation Timeslot Number Prediction Method for TDMA Tactical Data Link based on Operation Requirements. International Journal of Advancements in Computing Technology [J]. 2011, vol. 3, pp: 57-64.

DOI: 10.4156/ijact.vol3.issue6.8

Google Scholar

[5] Folks, R. L. Network Centric Warfare in the Age of Cyberspace Operations[J] . Army War Coll., Carlisle Barracks, PA. 2011, vol. 5, pp: 34.

DOI: 10.21236/ada555809

Google Scholar

[6] Baskarada, S. Towards a Semiotic Information Position Framework for Network Centric Warfare [J]. Defence Science and Technology Organisation, Victoria (Australia). 2011, vol. 6, pp: 36.

DOI: 10.2139/ssrn.2142975

Google Scholar

[7] Rhee, Seung Hyong, Kim, Hwa-Sung; Sohn, Seung-Won. The effect of decentralized resource allocation in network-centric warfare[C]. International Conference on Information Networking, 2012, pp: 478-481.

DOI: 10.1109/icoin.2012.6164447

Google Scholar

[8] Casalicchio E, Galli E, Tucci S , Agent-based modelling of interde-pendent critical infrastructures[J]. International Journal of System of Systems Engineering, 2010, vol. 2, pp : 60-75.

DOI: 10.1504/ijsse.2010.035381

Google Scholar

[9] Wang, H., Zhu, L., Mao, S., Xu, B. Research on Information Sharing Method for Future C2 in Network Centric Environment. Nanjing Research Inst. of Electronics Engineering (China). 2011, vol. 6, pp: 33.

Google Scholar

[10] Saarelainen, Tapio, Timonen, Jussi . Tactical management in near real-time systems[C]. 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2011, pp: 240-247.

DOI: 10.1109/cogsima.2011.5753452

Google Scholar

[11] Li Fuqiang, Xu Yue. Comprehensive Application Research on Multiple Overseas Data Links [J] Modern Electronic Technology. 2010, vol. 327, pp: 96-100.

Google Scholar

[12] Wu Zhuhua. Analyzing on Cloud Computing Core Technology [M]. Beijing: People's Post Press , (2011).

Google Scholar

[13] Ge Junwei, Zhang Bo, Fang Yiqiu. Study on resource monitoring model in cloud computing environment[J]. Computer Engineering, 2011, vol. 37, pp : 31-34.

Google Scholar

[14] Xie Haohui, Gao Ji. Research and implementation of PaaS platform based on norm-governed and policy-driven autonomic mode[J]. Application Research of Computers, 2011, vol. 28( 5) , pp: 1839-1842.

Google Scholar

[15] MELL P, GRANCE T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, (2011).

Google Scholar

[16] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Above the Clouds: A Berkeley View of Cloud computing, University of California at Berkley, USA, (2009).

DOI: 10.1145/1721654.1721672

Google Scholar

[17] FOSTER I, ZHAO Y, RAICU I, et al. Cloud computing and grid computing 360-degree compared Proceedings of Grid Computing Environment s Worksho, November 12216, 2008, Austin, TX, USA: 1210.

DOI: 10.1109/gce.2008.4738445

Google Scholar

[18] VAQUERO L M, RODERO2MERINO L, CACERES J, et al . A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 2009, vol. 39 (1), pp : 50-55.

DOI: 10.1145/1496091.1496100

Google Scholar

[19] RITTINGHOUSE J W, RANSOME J F. Cloud computing: implementation, management, and security. Boca Raton, FL, USA: CRC Press, (2010).

Google Scholar

[20] Wu Jiyi; Shen Qianli; Zhang Jianlin; Shen Zhonghua; Ping Lingdi. Cloud Computing: From Cloud Security to Credible Cloud [J] Computer Research and Development, 2011, vol. S1, pp: 53-61.

Google Scholar

[21] Mazda Salmanian1, Li Pan2, Jiangxin Hu2, and Ming Li. On the Efficiency of Establishing and Maintaining Security Associations in Tactical MANETs in Group Formation [C]. The 2011 Military Communications Conference . 2011, pp: 1176-1182.

DOI: 10.1109/milcom.2011.6127459

Google Scholar

[22] Chen Kang, Zheng Weimin. Cloud Computing: System Example and Research Status [J]. Software Journal, 2009, vol. 20 (5), pp: 1337−1348.

Google Scholar