用户名: 密码: 验证码:
战术数据链组网技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
战术数据链是针对特定的战术任务而设计规划和配置的,应用于军事领域的数字通信系统。战术数据链需要在部署实施前进行网络结构设计、资源分配和相关参数配置,根据特定的作战需求形成“最适合”的战术数据链组网方案,在初始化时加载到战术数据链终端上,这个过程称为战术数据链组网。战术数据链的组网配置直接取决于当前面临的作战任务、参战单元和作战区域。只有这样,才能保证各个战术数据链参与成员(网络单元/参战平台)在作战中信息的互联互通,满足实际作战需求。
     本文给出了战术数据链组网的定义,提出了一种战术数据链组网流程框架,其中包括组网设计、组网规划和组网验证三个方面。研究了包括战术数据链信息交换需求概念建模、网络资源分配数量预测、网络角色选择、网络资源均匀分配以及组网仿真等的组网技术。本文的研究可以为战术数据链的作战运用、作战效能研究以及装备研发提供理论方法和技术。
     本文主要工作包括如下四个方面:
     (1)在阐述战术数据链组网的重要性和必要性的基础上,给出战术数据链组网的定义。通过对战术数据链组网进行系统分析,提出一种战术数据链组网流程框架,该框架包括三个部分:组网设计、组网规划和组网验证;明确三者相互间的逻辑关系和主要研究内容,以及其中包含的相关技术。
     (2)在分析战术数据链组网设计中的主要研究内容的基础上,指出组网设计需要确认作战平台之间的信息交换需求以支持预定的战术任务,选择各种网络功能以支持各个作战行动,以及根据每种网络功能的需要适当分配网络资源。
     提出了战术数据链信息交换需求概念建模方法。从任务空间概念模型和EATI模板的基本理论和方法入手,根据“通用联合作战任务清单”[1]的任务过程对作战任务进行分解,制定映射规则以获取通信业务需求,通过UML建立实施作战任务过程的信息交换需求概念模型,最后给出相应的应用案例。
     提出了战术数据链网络资源分配数量预测方法。从满足作战需求角度上,深入分析了消息响应时间、消息传输率以及消息冲突概率与固定分配时隙数量的关系,分别对其相应的时隙资源分配数量进行预测,并利用仿真进行验证。仿真结果表明该预测方法不仅能基本满足作战需求,同时也可实现系统资源的合理利用。
     (3)在分析战术数据链组网规划中的主要研究内容的基础上,指出组网规划主要包括支撑战术数据链网络正常运行的网络角色指派,对每一个战术数据链网络成员(同时也是参战单元)分配网络资源,以及其他一些使所有网络成员协同运作的网络配置等。
     提出了战术数据链网络角色选择方法。给出了战术数据链各种网络角色及其角色指派优先准则,根据战术数据链中继技术的特点,定义并计算各个候选中继节点的权重,通过权重指导中继角色的选择,既可降低了泛洪开销,又可最大程度地满足作战任务要求,也可实现了中继节点数的优化。仿真结果表明该方法是一种快速的分布式计算方法,不仅能确保网络的连通性,还能在得到具有极大权重的中继节点集合同时保证中继节点数量的极小性,可以有效地应用于战术数据链中继角色指派。
     提出了战术数据链网络资源均匀分配方法。为解决获得最小时延抖动的时隙分配问题,利用图论求解包含确定边数的最短路径环,从而通过对时隙资源的均匀分配实现最小时延抖动。仿真结果表明该方法确保了分配给各个网络成员的时隙块中相邻时隙间隔最为平均。
     (4)为了保证战术数据链组网方案能在预计的作战环境下实现预期的作战效能,需要根据给定的战术任务对该组网方案进行仿真试验。由此本文提出了一种面向组网验证的战术数据链仿真方法。给出了战术数据链组网仿真框架,设计了战术数据链协议体系模型,由此建立了相应的战术数据链仿真模型,通过对案例模拟仿真验证本文研究的战术数据链组网技术的有效性。
Tactical Data Link (TDL) is a digital communication system used in the militaryfield, which is designed, planned and configured for specific tactical operations. Thereis, therefore, a need for network design, resource allocation and parameter configurationto be carried out before deployment. It is achieved through a TDL “NetworkingProcess”, which is the process of forming the fittest TDL network program loaded toTDL terminals based on specific operational requirements while initialization..Networking process directly depends on the current operation mission, combat units andenvironment. Only by so doing will it be possible to maintain the interoperability ofintended TDL participants in war, to meet the actual operational needs, and ultimately tosupport the planned tactical operations.
     The definition of TDL networking process is given. Further, it is divided into threeparts, including network design, network planning and network evaluation. Also theconceptual modeling for TDL information exchange requirements (IER), the predictionof network resource allocation, the designation of network roles, the uniformassignment of network resource and the network simulation technologies are studied.This study can provide theoretical approaches and technologies for TDL operations,TDL efficiency, and TDL equipment development.
     The main works are as following.
     (1) The significance and necessity of TDL networking process are illustrated andthe definition is given. Through the analysis of TDL networking process the frameworkis proposed. Moreover it can be divided into three parts, namely, network design,network planning and network evaluation. Furthermore the relationship among them isidentified, the content is classified and the networking process technologies are pointedout.
     (2) The main content of TDL network design is analyzed. It is defined as theprocess of specifying the information exchange or communication requirements insupport of planned tactical operations, selecting a variety of network functions tosupport various operations, and then allocating network resources according their needs.
     A conceptual modeling methodology for TDL IER is presented. Firstly the basictheory and method of CMMS (Conceptual Models of the Mission Space) and EATI(Entity-Action-Task-Interaction) template are studied. And the operation task isdisaggregated by the UJTL (Universal Joint Task List). Then the IER is obtainedthrough the mapping rules. After that the conceptual model is build and descripted withUML. Finally an application case is given.
     A prediction methodology of network resource allocation is presented. Based onoperation requirements, the analyses of the relationship between timeslot number and message response time, transmission rate or collision ratio are proposed. Respectively,the allocation timeslot number prediction methods are given. Then simulation tests areare carried out to demonstrate these methods. The results show that they can not onlymeet the operational needs, but also utilize network resources effectively.
     (3) The main content of TDL network planning is analyzed. It is defined as theprocess of designating the network roles, assigning network resources to each unit,together with other planning details which will enable all participants to operate in thenetwork in a coordinated manner.
     A designation methology of TDL network roles is presented. Firstly the networkroles in TDL are introduced. Then relay technical characteristics in TDL are analyzed.And the weight of relay candidates is defined and calculated. By selecting the relynodes through their weights, it can reduce the flooding overhead, meet operational needto the best extend and optimize the number of relay nodes. The simulation results showthat it is a fast method for distributed computing. It can not only ensure the networkconnectivity, but also form a relay node set with great weight and less number.Consequently, it can be well applied to assign the relay role in TDL.
     A uniform assignment methodology of network resource is presented. Firstlyproblem of timeslot allocation with minimum jitter is described. Further it istransformed to the problem of seeking the shortest ring with determinate number ofedges in the grath. In this way the minimum jitter can be achieved. The simulationresults show that this method can ensures that the interval of adjacent timeslot allocatedis uniform.
     (4) In order to ensure the network program can achieve the desired effectiveness inthe battlefield, the simulation test should be carried out according to the specific tacticaloperation. A framework of TDL network simulation is introduced. And a TDL protocolarchitecuture model is designed. Respectively the simulation model is build and thesimulation process is given. A case is studied to validate the above networking processtechnologies.
引文
[1] Universal Joint Task List [R]. Joint Staff, Washington, D.C.,2005.
    [2]评估联军空袭利比亚战果[EB/OL].http://v.ifeng.com/v/kongxi20110321/index.shtml#aed1f95f-4def-4794-83c8-80ed9de0bd52,
    [3]军事专家:多国对利比亚空战协同依赖美军预警机[EB/OL].http://news.ifeng.com/world/special/libiya/content-0/detail_2011_03/21/5271284_0.shtml,2011.
    [4]罗杰.战术数据链技术的发展和应用研究[J].国际航空,2007,3:15-17.
    [5]孙义明,杨丽萍.信息化战争中的战术数据链[M].北京邮电大学出版社,2005.
    [6] Real-Time Exchange of Tactical Data [EB/OL].2001.
    [7] RN K S, GUY S. Joint Data Link Management Organisation (JDLMO) Brief [R].Joint Data Link Management Organisation,2006.
    [8] TADIL J-Introduction to Tactical Digital Information Link J and QuickReference Guide [R]. Air Land Sea Application Center,2000.
    [9]骆光明,杨斌,邱志和,李云茹.数据链——信息系统连接武器系统的捷径[M].国防工业出版社,2008.
    [10]让人振奋的全军综合数据链[EB/OL].http://13856477078.blog.163.com/blog/static/12101834020098205489415/,
    [11]任培,王文政,周经伦,罗鹏程.数据链时延对超视距空战影响的分析[J].计算机工程,2009,35(14):249-251.
    [12]李云茹.战术数据链及其应用技术[J].中国电子科学研究院学报,2007,第2期.
    [13]俄嘲笑F-22缺陷成堆无法空袭利比亚声名扫地[EB/OL].http://mil.huanqiu.com/Observation/2011-04/1615371_1.html,
    [14] JTIDS/MIDS. Spectrum users guide (Version1.1)[EB/OL]. United States ofAmerica Department of Defense,2000.
    [15]杨光,周经伦,罗鹏程. JTIDS数据链在部分频带干扰下的性能分析[J].国防科技大学学报,2010,32(1):122-127.
    [16] Aerosystems International [EB/OL].http://www.link11.com/netscape/products/index.htm,
    [17] Northrop Grumman [EB/OL].http://www.is.northropgrumman.com/products/link_management/index.html,
    [18] United Kingdom Casts Battlefield Communications Network [EB/OL].http://www.afcea.org/signal/articles/templates/SIGNAL_Article_Template.asp?articleid=787&zoneid=139,
    [19] WHAT IS LINK-16?[EB/OL]. http://prodevweb.prodev.usna.edu,2007.
    [20]梅文华,蔡善法. JTIDS/Link16数据链[M].国防工业出版社,2007.
    [21]许锐. JTIDS系统网络管理分析[J].导航,2003,2:62-71.
    [22]赵曙光.战术数据链组织与规划技术[J].通信技术,2009,42(10):111-113.
    [23]司小江,吴礼发,胡谷雨.数据链规划技术[J].解放军理工大学学报(自然科学版),2003,4(4):23-26.
    [24]司小江,吴礼发,胡谷雨.数据链规划问题的贪心算法[J].国防科技大学学报,2003,6(25):45-49.
    [25]张辉,沈林成,朱华勇. Link16时隙选择算法分析[J].舰船电子工程,2005,25(4):120-123.
    [26]刘强. JTIDS网络设计方案及其辅助软件实现[J].火力与指挥控制,2009,34(6):119-123.
    [27]张海勇,魏玮,任重,王睿. TDMA数据链的组网流程研究[J].现代防御技术,2010,35(5):45-49.
    [28] Joint capabilities and integration development system [R].2003.
    [29] Levis A H, Wagenhals L W. C4ISR architectures: Ⅰ. Developing a Process forC4ISR Architecture Design [R].2000.
    [30] Wagenhals L W, Shin I, Kim D, Levis A H. C4ISR architectures: Ⅱ. AStructured Ananlysis Approach for Architecture Design [R].2000.
    [31] Bienvenu M P, Shin I, Levis A H. C4ISR architectures: Ⅲ. An Object OrientedApproach for Architecture Design [R].2000.
    [32] MODAF [EB/OL]. http://en.wikipedia.org/wiki/MODAF,
    [33] Bailey C W, Grabutt M. Developing Coherent, Concise And ComprehensiveUser Requirements Using The MoD Architectural Framework (MODAF)[R].2005.
    [34]杜英,李君,麻勇,赵师.基于需求功能映射的装甲兵侦察概念模型构建[J].计算机仿真,2007,24(12).
    [35]张佩,陈洪辉,刘俊先,舒振. Theme方法在C4ISR系统需求建模中的应用[J].火力与指挥控制,2010,35(9):22-25.
    [36]王智学.一种业务概念模型驱动的需求分析与获取方法[J].军事运筹与系统工程,2006,20(1):18-22.
    [37]王智学,董庆超,陈彬,陈剑.基于UML模型的C4ISR系统能力需求分析与验证[J].系统工程与电子技术,2009,31(9):2167-2171.
    [38] Lau Y-T. Service-Oriented Architecture and the C4ISR Framework [J].CrossTalk-The Journal of Defense Software Engineering,2004,17(9):11-14.
    [39] Ring S J, Nicholson D, Thilenius J, Harris S. An Activity-Based Methodologyfor Development and Analysis of Integrated DoD Architectures-"The Art ofArchitecture"[C].2004Command and Control Research and TechnologySymposium,2004,
    [40] Lam S S. Delay analysis of a time division multiple access (TDMA) channel [J].IEEE TRANSACTIONS ON COMMUNICATIONS,1977,25(12):1489-1494.
    [41] Rubin I, Zhang Z. Message delay and queue-size analysis for circuit-switchedTDMA systems [J]. IEEE TRANSACTIONS ON COMMUNICATIONS,1991,39(6):905-914.
    [42] Khan K, Peyravi H. Delay and Queue Size Analysis of TDMA with GeneralTraffic [C]. Sixth IEEE International Symposium on Modeling, Analysis, andSimulation of Computer and Telecommunication Systems (MASCOTS'98),Montreal, Canada:1998,217-225.
    [43] Neuts M F, Guo J, Zukerman M, Vu H L. Delay analysis for a finite bufferTDMA model [C]. IEEE International Conference on Communications2003(ICC'03),2003,3,1791-1795.
    [44] Shortle J F, Brill P H, Fischer M J, Gross N, Masi D M B. An Algorithm toCompute the waiting time distribution for the M_G_1Queue [J]. INFORMSJournal on Computing,2004,16(2):152-161.
    [45] Ullah S, Higgins H, Cho Y-W, Lee H-S, Kwak K S. Towards RFCommunication and Multiple Access Protocols in a Body Sensor Network [J].International Journal of Digital Content Technology and its Applications,2008,2(3):9-16.
    [46]任培,周经伦,罗鹏程,王文政.基于排队论的数据链系统信息传输延迟分析[J].计算机科学,2008,35(8).
    [47]任培,周经伦,罗鹏程,杨光. JTIDS信息传输时间延迟分析[J].计算机工程,2008,34(21):23-25.
    [48]任培.战术数据链传输时延及其作战效果影响分析方法研究[D].国防科学技术大学,2009.
    [49]周忠宝,任培,马超群,周经伦.数据链系统消息传输时间延迟及其影响因素仿真分析[J].计算机科学,2010,37(9):44-47.
    [50]夏白桦,陶晓宇.数据链时隙需求及仿真分析[J].计算机工程,2010,36(18):259-261.
    [51]夏白桦,陶晓宇,陶晓环.基于响应时间的时隙需求与仿真分析[J].舰船电子工程,2010,30(4):119-122.
    [52]任培,周经伦,罗鹏程,刘伟. Link16数据链时隙冲突概率分析[J].火力与指挥控制,2007,32(9):39-42.
    [53]夏白桦,李洪业.数据链时隙争抢占用方式的冲突分析[J].舰船电子工程,2010,30(6):66-69.
    [54]夏白桦,李洪业.基于作战需求的数据链网络消息更新率分析[J].舰船电子工程,2009,29(10):66-69.
    [55]夏白桦,李洪业.基于作战需求的数据链平台定位报告周期分析[J].舰船电子工程,2009,29(12):62-65.
    [56]高斌,唐晓斌,彭益,魏立柱.复杂电磁环境下的数据链资源分配技术研究[J].中国电子科学研究院学报,2010,5(3):258-253.
    [57]高建文,李丹镝.通信网频率分配算法设计[J].无线电通信技术,1999,25(5):27-28.
    [58] Mosera V M. JTIDS INTEGRATED SITING TOOL (JIST) TECHNICALOVERVIEW [EB/OL]. IEEE,1992.
    [59]张海宁,刘家康,王崇,项慧慧.基于OPNET的JTIDS NTR接替机制仿真与实现[EB/OL].http://www.paper.edu.cn/index.php/default/releasepaper/content/200907-430,2009.
    [60]齐征,刘家康,项慧慧,王崇.基于Link-16的NTR分布式接替机制技术研究[EB/OL].http://www.paper.edu.cn/index.php/default/releasepaper/content/201108-35,2011.
    [61] Qayyum A, Viennot L, Laouiti A. Multipoint Relaying for Flooding BraodcastMessage in Mobile Wireless Networks [C]. the35th Hawaii InternationalConference on System Sciences,2002,
    [62] Williams B, Camp T. Comparison of Broadcasting Techniques for Mobile AdHoc Networks [EB/OL].2002.
    [63] Ni S-Y, Tseng Y-C, Chen Y-S, Sheu J-P. The Broadcast Storm Problem in aMobile Ad Hoc Network [EB/OL].1999.
    [64] Yan X, Sun Y, Wang Y. A Heuristic Algorithm for Minimum ConnectedDominating Set with Maximal Weight in Ad Hoc Networks [J]. Lecture Notes inComputer Science,2004,3033:719-722.
    [65] Wu J, Dai F. A Generic Broadcast Protocol in Ad Hoc Networks Based onSelf-Pruning [C]. the17th International Symposium on Parallel and DistributedProcessing, Washington, DC, USA:2003,
    [66] Peng W, Lu X-C. On the reduction of broadcast redundancy in mobile ad hocnetworks [C]. the1st ACM international symposium on Mobile ad hocnetworking&computing, Boston, Massachusetts:2000,129-130.
    [67] Lim H, Kim C. Multicast Tree Construction and Flooding in Wireless Ad HocNetworks [C]. the3rd ACM International Workshop on Modeling, Analysis andSimulation of Wireless and Mobile Systems (MSWIM),2000,61-68.
    [68] Badis H, Munaretto A, Agha K A, Puiolle G. Optimal Path Selection in a LinkState QoS Routing Protocol [C]. IEEE59th Vehicular Technology Conference,2005,5,2570-2574.
    [69] Shaio J, Piper J R. A Slot Allocation Algorithm for Survivability of TacticalTDMA Networks [R]. the MITRE Corporation,2010.
    [70] Xiang H, Liu J, Kuang J, Malik A S, Wang C. A Backup Relay Technology forthe Paired Slot Relay of JTIDS [C]. the5th International Conference on WirelessCommunications, Networking and Mobile Computing (WiCOM'09),2009,
    [71] Xiang H, Liu J, Kuang J, Wang C, Zhang H. A Dynamic Relay HandoverTechnology for the Paired Slot Relay of JTIDS under Selective Attacks [C].International Conference on Computational Intelligence and SoftwareEngineering (CiSE), Wuhan, China:2009,1-4.
    [72] Chui J-M, Ko Y-B. A Performance Evaluation for Ad Hoc Routing Protocols inRealistic Military Scenarios [C]. the9th International Conference on Cellular andIntelligent Communications (CIC2004),2004,
    [73] Perkins C E, Royer E M. RFC3561-Ad-hoc On-Demand Distance VectorRouting [EB/OL].2003.
    [74] Johnson D B, Maltz D A. Dynamic Source Routing in Ad Hoc WirelessNetworks [J]. Mobile Computing,1996,353:153-181.
    [75] Ko Y-B, Vaidya N H. Location-Aided Routing (LAR) in Mobile Ad HocNetworks [J]. Wireless Networks,2000,6(4):307-321.
    [76] Clausen T, Jacquet P. RFC3626-Optimized Link State Routing Protocol (OLSR)[EB/OL].2003.
    [77]杨光.战术数据链可靠传输设计及分析技术研究[D].国防科技大学,2009.
    [78]曾向荣,杨光,罗鹏程.数据链中面向可靠传输的泛洪算法及应用分析[J].小型微型计算机系统,2010,31(3):340-345.
    [79]阎新芳,孙雨耕,胡华东.基于极大权的最小连通支配集启发式算法[J].电子学报,2004,32(11):1774-1777.
    [80]阎新芳.无线Ad hoc网络分层路由问题研究[D].天津大学,2005.
    [81]阎新芳,刘爱琴,杨挺.基于极小独立支配集的MANET虚拟骨干网算法[J].电子学报,2007,35(6):1134-1138.
    [82]王凌燕,张奇,刘爱民.自组织网络分布式最小连通支配集创建算法[J].计算机应用研究,2009,26(6):2241-2243.
    [83]艾小锋.协同作战能力(CEC)中实时信息分发控制技术研究[D].国防科技大学,2007.
    [84]蔡善法.美军空中通信平台频率管理算法简介[J].电讯技术,2003,5:7-10.
    [85] Ahn G-S, Hong S G, Miluzzo E, Campbell A T, Cuomo F. Funneling-MAC: ALocalized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks [C].the4th International Conference on Embedded Networked Sensor Systems,Boulder, Colorado, USA:2006,293-306.
    [86] Rhee i, Warrier A, Aia M, Min J. Z-MAC: a Hybrid MAC for Wireless SensorNetworks [C]. the3rd ACM Conference on Embedded Networked SensorSystems (SenSys2005),2005,16,511-524.
    [87] Song W-Z, Huang R, Shirazi B, LaHusen R. TreeMAC: Localized TDMA MACProtocol for Real-Time High-Data-Rate Sensor Networks [C]. the2009IEEEInternational Conference on Pervasive Computing and Communications,2009,1-10.
    [88] Hull B, Jamieson K, Balakrishnan H. Mitigating Congestion in Wireless SensorNetworks [C]. the2nd International Conference on Embedded Networked SensorSystems, Baltimore, MD, USA:2004,134-147.
    [89] Nunes M, Grilo A, Macedo M. Interference-Free TDMA Slot Allocation inWireless Sensor Networks [C]. the32nd IEEE Conference on Local ComputerNetworks,2007,239-241.
    [90] Ergen S C, Varaiya P. TDMA Scheduling Algorithms for Wireless SensorNetworks [J]. Wireless Netw,2009,16:985-997.
    [91] Lee W L, Datta A, Cardell-Oliver R. FlexiTP: A Flexible-Schedule-BasedTDMA Protocol for Fault-Tolerant and Energy-Efficient Wireless SensorNetworks [J]. IEEE Transactions on Parallel and Distributed Systems,2008,19(6):851-864.
    [92] Cui S, Madan R, Goldsmith A J, Lall S. Energy-Delay Tradeoffs for DataCollection in TDMA-based Sensor Networks [C].2005IEEE InternationalConference on Communications, South Korea:2005,1-7.
    [93] Djukic P, Valaee S. Link Scheduling for Minimum Delay in Spatial Re-UseTDMA [C]. the IEEE International Conference on Computer Communications(INFOCOM'07), Anchorage, AK:2007,28-37.
    [94] Gandham S, Zhang Y, Huang Q. Distributed Time-Optimal Scheduling forConvergecast in Wireless Sensor Networks [J]. Computer Networks,2007,52(3):610-629.
    [95] Rowe A, Mangharam R, Rajkumar R. RT-Link: A Global Time-SynchronizedLink Protocol for Sensor Networks [J]. Elsevier Ad Hoc Networks, Special Issueon Energy Efficient Design in Wireless Ad Hoc and Sensor Networks,2007,6(8):1201-1210.
    [96] Lu G, Krishnamachari B, Raghavendra C S. An Adaptive Energy-Efficient andLow-Latency Mac for Data Gathering in Wireless Sensor Networks [C]. the18thInternational Parallel and Distributed Processing Symposium (IPDPS'04), SantaFe, New Mexico:2004,26-30.
    [97] Rajendran V, Obraczka K, Garcia-Luna-Aceves J J. Energy-Efficient,Collision-Free Medium Access Control for Wireless Sensor Networks [J].Wireless Networks,2006,12(1):63-78.
    [98] Hoesel L F W v, Havinga P J M. A Lightweight Medium Access Protocol(LMAC) for Wireless Sensor Networks [C]. the First International Workshop onNetworked Sensing Systems (INSS2004), Tokyo, Japan:2004,1-4.
    [99] Wang Y, I. H. A Deterministic Distributed TDMA Scheduling Algorithm forWireless Sensor Networks [C]. International Conference on WirelessCommunications, Networking and Mobile Computing (WICOM'07), Shanghai,China:2007,2759-2762.
    [100] Ye W, Heidemann J, Estrin D. An Energy-Efficient MAC Protocol for WirelessSensor Networks [C]. The21st Conference of the IEEE Computer andCommunications Society (INFOCOM),2002,1567-1576.
    [101] Tao L Q, Yu F Q. Low-jitter Slot Assignment Algorithm for Deadline-awarePacket Transmission in Wireless Video Surveillance Sensor Networks [J].INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS,2011,24:810-827.
    [102]流量管理[EB/OL]. http://baike.baidu.com/view/5552994.htm,
    [103]王文政.战术数据链时隙分配协议及其仿真研究[D].国防科技大学,2010.
    [104] Tao L Q, Yu Q F. A Distributed Slot Assignment Algorithm with Minimum Jitterand Delay Guarantee for Real Time Applications for Wireless Sensor Networks[C].201012th IEEE International Conference on High Performance Computingand Communications,2010,383-390.
    [105] Wang W-z, Zhou J-l, Zheng L, Luo P-c. Message-Streams Oriented Hybrid SlotAllocation Protocol for Tactical Data Link System [C].2009Seventh AnnualCommunication Networks and Services Research Conference,2009,
    [106] Dong L, Melhem R, Mosse D. Time Slot Allocation for Real-Time Message withNegotiable Distance Constrains [C]. IEEE Real-time Technology andApplications Symposium,1998,131-136.
    [107] Dong L, Melhem R, Mosse D. Scheduling Algorithms for Dynamic messageStreams with Distance Constraints in TDMA Protocol [C].12th EuromicroConference on Real-Time Systems,2000,239-246.
    [108] Dong L, Melhem R, Mossé D. Effect of scheduling jitter on end-to-end delay inTDMA protocols [J]. IEEE,2000.
    [109]朱灿斌,毛玉泉,李晓楠,雷雨.航空数据链系统TDMA时隙分配研究[J].火力与指挥控制,2009,34(6):104-107.
    [110]梁爽,毛玉泉,赵伟光,夏峥,燕东渭.地空数据链中的时隙分配算法[J].空军工程大学学报,2006,6(3):12-15.
    [111] Data Link Test Tool [EB/OL]. http://gateway.spawar.navy.mil/,
    [112] Yanni P. A VMF/Link-16/Simulation Gateway: Addressing the Complexity ofDatalink Interoperability [C]. Spring Simulation Interoperability Workshop,Orlando Florida, USA:1999,
    [113] Data Link Simulator: Router Delay Simulator [EB/OL].http://www.data-link-simulator.com/index.htm,
    [114] Goldstein F, McDonough M. Joint Tactical Information Distribution System(JTIDS)/Multi-Link Test Device (MLTD) Laboratory Environment Test System[J].1997.
    [115] Data Link Processing and Management [EB/OL].http://www.is.northropgrumman.com/products/data_link_processing_and_manag/,
    [116] Engman J. Technical Specification for the Link16Test and Simulation Tool [R].VG VoV Led,2006.
    [117] Melby J. JTRS and the evolution toward software-defined radio [C]. MILCOM2002,2002,2,1286-1290.
    [118] Hansen S, Warren G, Segraves S, Bane C. Modeling and Simulation Analyses ofthe Joint Tactical Radio System (JTRS)[C]. IEEE Aerospace Conference, BigSky, MT, USA2001,3,1065-1074.
    [119] Network Warfare Simulation [EB/OL].http://findarticles.com/p/articles/mi_m0OBA/is_3_22/ai_n6338483/pg_4/,
    [120] Cruz C I. Netwars Based Study of a Joint Stars Link-16Network [D]. Air ForceInstitute of Technology,2004.
    [121] Alspaugh C, Davé N, Hepner T, Leidy A, Stell M, Tran C, Woods H, Youm W,Legaspi A. Modeling and Simulation in Support of Network Centric WarfareAnalysis [R]. Navy Modeling and Simulation Management Office,2000.
    [122]王莹,方旭明.战术数据链Link11的仿真与评测[C].第十二届全国青年通信学术会议,北京:2007,474-478.
    [123]董超,田畅,倪明放,皋伟.战术数据链性能评估方法研究[J].军事运筹与系统工程,2007,21(3):62-67.
    [124]田斌鹏.战术数据链实时性研究[D].西南交通大学,2007.
    [125]赵春芬. Link11系统的QualNet仿真[J].电讯技术,2008,48(2):86-91.
    [126] Mitchell G E, F.Gander J. Impact of Time Delays on the JTIDS Network [C]. theIEEE1990National Aerospace and Electronics Conference (NAECON1990),Dayton, OH, USA:1990,1,440-445.
    [127]崔昊,匡镜明,何遵文.基于OPNET的Link16建模与仿真[J].计算机工程与设计,2006,第27卷第17期.
    [128]刑智,戴浩.基于OPNET的Link16数据链建模与仿真[J].军事运筹与系统工程,2005,第19卷第1期.
    [129]余晓刚,匡镜明,王华,刘强. JTIDS网络建模与仿真平台设计[J].计算机工程,2005,31(18):108-110.
    [130]杨静,黄巍,曾勇,陈远,李乐民.一种数据链协议与建模仿真[J].电讯技术,2008,48(2):77-81.
    [131]陈春明,王可人,郭建蓬.基于OPNET的Link16网络仿真平台设计[J].通信对抗,2005,第2期.
    [132]陈春明,王可人.基于OPNET的JTIDS网络仿真平台设计[J].舰船电子工程,2005,第25卷第6期.
    [133]阳彩燕.数据链仿真关键技术研究[D].西安电子科技大学,2009.
    [134]李昆明. QualNet环境下战术数据链TDMA协议研究[D].西南交通大学,2009.
    [135]李昆明,陈林星,范平志,卢建川.一种战术消息流量管理器的设计及其性能分析[J].电讯技术,2008,48(8):47-51.
    [136]赵春芬.网络环境下的战术数据链底层建模及仿真[J].电讯技术,2009,第49卷第10期:74-79.
    [137]申振宁,曾兴雯,周子琛,王薇. JTIDS系统仿真与性能分析[J].计算机仿真,2005,22(2):23-25.
    [138]帅国祥. Link16协议开发和关键技术研究[D].南京:东南大学,2008.
    [139]骆睿,陈林星,周宁,卢建川. QualNet环境下战术数据链的性能对比[J].电讯技术,2008,第48卷第10期.
    [140]骆睿. QualNet环境下战术数据链的性能仿真研究[D].成都:电子科技大学,2008.
    [141]崔昊,匡镜明,何遵文. Link16与VHF数据链互连建模与仿真研究[J].计算机工程与设计,2007,第28卷第5期:1119-1121.
    [142]田斌鹏,陈林星,卢建川,张翠芳.基于QualNet的战术数据链多链建模与仿真[J].电讯技术,2008,48(3):44-48.
    [143]郭强,毕义明.基于任务空间概念模型的导弹作战想定研究[J].计算机仿真,2008,25(12):88-91.
    [144]赵曙光,吕翠霞.一种基于连通矩阵的Link16网络设计方法[J].无线电通信技术,2009,35(6):7-8.
    [145]孙继银,付光远,车晓春,张宇翔.战术数据链技术与系统[M].国防工业出版社,2007.
    [146] DOD. TACTICAL DATA LINK (TDL)16MESSAGE STANDARD [EB/OL].2002.
    [147] Baruah S, Bestavros A. Pinwheel Scheduling for Fault-tolerant Broadcast Disksin Real-time Database Systems [C].13th International Conference on DataEngineering, Birmingham, UK:1996,543-551.
    [148] Sproles N. The Difficult Problem of Establishing Measures of Effectiveness forCommand and Control: A Systems Engineering Perspective [J]. Journal ofSystem Engineering,2001,4(2):145-155.
    [149] HE Z-x, LIU X. Modeling and Simulation of Link-16System in NetworkSimulator2[C].2010International Conference on Multimedia InformationNetworking and Security, Nanjing, China:2010,154-159.
    [150] Joint Simulation System (JSIMS)[R]. The Joint Simulation System Joint ProjectOffice,,1996.
    [151] Davis P K. Conceptual Models of the Mission Space [EB/OL].ftp://ftp.dmso.mil/pub/documents/initiatives/cmms/98s_siw_infoprp.pdf,1998.
    [152] Modeling and Simulation (M&S) Master Plan [R]. Defence Modeling andSimulaition Ofiice,1995.
    [153] Booch G, Rumbaugh J, Jacobson I. UML用户指南[M].人民邮电出版社,2006.
    [154] Kruchten P. The4+1View Model of Architecture [J]. IEEE Software,1995,12(8):42-50.
    [155]郑怀洲,刘兵.装备指挥训练模拟需求概念模型研究[J].系统仿真学报,2009,21(Suppl.1):28-31.
    [156] Golliday C L. Data Link Communications in Tactical Air Command and ControlSystems [J]. IEEE JOURNAL ON SELECTED AREAS INCOMMUNICATIONS,1985,3(5):779-791.
    [157] Lokuta R S. JTIDS Electromagnetic Compatibility in the960-1215MHz Band[R]. Bedford, Massachusetts: The MITRE Corporation,1992.
    [158] Wei S, Shan-ping L, Zhao-hui Y. An Optimized Flooding Algorithm based onMultipoint Relaying for Mobile Ad Hoc Networks [J]. Journal of ComputerResearch and Development,2007,44(6):924-931.
    [159] Wu J, Li H. On Calculating Connected Dominating Set for Efficient Routing inAd Hoc Wireless Networks [C]. the3rd international workshop on Discretealgorithms and methods for mobile computing and communications, Seattle,Washington, United States:1999,7-14.
    [160]周锐锐,陈振华,崔蕴华,毕笃彦.战术数据链层次化网络拓扑模型研究[J].弹箭与制导学报,2007,27(4):330-332.
    [161] Sidi R M. Multiple Access Protocols: performance and analysis [J].1989.
    [162] Chen J, Jiang S. Analysis and Implementation of Time-Slot Allocation in TDMASystem with Limited Queue Constraint in WLANs [C]. Vehicular TechnologyConference2006(VTC-2006), Montreal, Que:2006,1-5.
    [163] Calvo R o A u, Campo J u P e. Adding Multiple Interface Support in NS-2[R].University of Cantabria,2007.
    [164] Babich F, Comisso M, Dorni A, Barisi F, Mani`a A. The Simulation of SmartAntennas in Network Simulator-2Using MATLAB [J]. Computer AidedModeling and Design of Communication Links and Networks,2009:51-56.
    [165] WEI G, ZHANG D. Versatile Model Architecture for Multi-channel MACSimulation in NS2[J]. The4th International Conference on Mobile Ad-hoc andSensor Networks,2008:288-294.
    [166] Davies P J. IDLS2007-Link16[R].2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700