Cloud Computing-Core Platform to Build Future Networking Data Links

Article Preview

Abstract:

In this paper,we analyzed the problems and challenges that US Army tactical data link system encountered when meeting the needs of network-centric warfare. On the basis of this, we put forward a new battlefield-oriented, demand-based, real-time serviced networking data link system---the joint data link system based on cloud computing, and discussed the key techniques in constructing the system. Simulation results show that the use of cloud technology in Joined Data Links can improve the system service level markedly.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2581-2584

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sun Mingyi, Yang Liping. Tactical Data Links in Information Based Warfare [M]. Beijing: Post University Press, (2005).

Google Scholar

[2] Wang Xiuhua, Wei Xin, Wang Haiyan. Network centric warfare analysis of US Army[J]. Lecture Notes in Electrical Engineering, 2012, vol. 36, pp: 573-578.

DOI: 10.1007/978-3-642-26001-8_74

Google Scholar

[3] LIU Xing, CHEN Chen, ZHOU Jin-lun, LUO Peng-cheng. An Essential-Task-Based Methodology for Development and Analysis of Information Exchange Requirements in Tactical Data Link [J]. Journal of Convergence Information Technology (JCIT), 2012, vol. 7, pp: 284-291.

DOI: 10.4156/jcit.vol7.issue6.34

Google Scholar

[4] YAN Zhao-lin, HE Zhao-xiong, LUO Xu-hui, LI Hai-yan. Towards Fixed Allocation Timeslot Number Prediction Method for TDMA Tactical Data Link based on Operation Requirements. International Journal of Advancements in Computing Technology [J]. 2011, vol. 3, pp: 57-64.

DOI: 10.4156/ijact.vol3.issue6.8

Google Scholar

[5] Folks, R. L. Network Centric Warfare in the Age of Cyberspace Operations[J] . Army War Coll., Carlisle Barracks, PA. 2011, vol. 5, pp: 34.

DOI: 10.21236/ada555809

Google Scholar

[6] Baskarada, S. Towards a Semiotic Information Position Framework for Network Centric Warfare [J]. Defence Science and Technology Organisation, Victoria (Australia). 2011, vol. 6, pp: 36.

DOI: 10.2139/ssrn.2142975

Google Scholar

[7] Rhee, Seung Hyong, Kim, Hwa-Sung; Sohn, Seung-Won. The effect of decentralized resource allocation in network-centric warfare[C]. International Conference on Information Networking, 2012, pp: 478-481.

DOI: 10.1109/icoin.2012.6164447

Google Scholar

[8] Casalicchio E, Galli E, Tucci S , Agent-based modelling of interde-pendent critical infrastructures[J]. International Journal of System of Systems Engineering, 2010, vol. 2, pp : 60-75.

DOI: 10.1504/ijsse.2010.035381

Google Scholar

[9] Wang, H., Zhu, L., Mao, S., Xu, B. Research on Information Sharing Method for Future C2 in Network Centric Environment. Nanjing Research Inst. of Electronics Engineering (China). 2011, vol. 6, pp: 33.

Google Scholar

[10] Saarelainen, Tapio, Timonen, Jussi . Tactical management in near real-time systems[C]. 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2011, pp: 240-247.

DOI: 10.1109/cogsima.2011.5753452

Google Scholar

[11] Li Fuqiang, Xu Yue. Comprehensive Application Research on Multiple Overseas Data Links [J] Modern Electronic Technology. 2010, vol. 327, pp: 96-100.

Google Scholar

[12] Chen Kang, Zheng Weimin. Cloud Computing: System Example and Research Status [J]. Software Journal, 2009, vol. 20 (5), pp: 1337−1348.

Google Scholar