VMF数据链中无连接可靠传输协议的仿真研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
VMF数据链是基于Internet协议的一种自动数字系统,采用Link 16数据元素来建立可变长度的报文,以便在带宽有限的战斗环境中用于近实时的数据交换。作为C4ISR的有效支持,VMF数据链必须具有实时性、准确性以及可靠性的特点。为满足这些要求,VMF数据链在应用层中采用了无连接可靠传输协议。
     由于设计仿真系统相对于建设真实系统具有构建周期短,成本低的特点,因而数据链仿真在数据链研究方面得到了广泛的应用。VMF数据链仿真平台便是通过在仿真软件中建立VMF数据链的仿真模型,然后利用仿真手段对VMF数据链的通信性能进行研究的系统。
     本文结合VMF数据链仿真平台,对VMF数据链中的无连接可靠传输协议进行了研究。针对VMF数据链的特点,设计了一种新型的无连接可靠传输协议,阐述了协议的主要设计思想,详细分析协议使用的关键机制,并通过仿真的手段对协议的关键参数进行了实验分析,结果对实际应用中参数的选取具有指导意义。针对VMF数据链的特点,本文主要做了以下工作:
     首先,本文设计了新的应用层首部,并针对VMF数据链中报文可变的特点,引入了分段/重组机制,然后为保证无线接传输的可靠性设计了确认重传机制,并在此基础上引入了发送窗口机制以控制应用层报文流量。
     其次,本文利用仿真软件OPNET,设计了协议的仿真模型,并结合VMF数据链仿真平台,对仿真模型的正确性进行了验证。然后,通过构建带有干扰的局域网对协议的有效性进行了验证。
     最后,通过大量的仿真实验对协议的关键参数——分段阈值进行实验分析,实验结果表明能不分段则尽量不分段,否则分段阈值的选择应与时隙容量成正比。?
VMF data-link is a kind of auto digital system based Internet. And it uses the elements of link 16 to produce VMF message. So it can be used to exchange data message in the real-time method. VMF data-link must have the character, such as real-time, nicety and reliability, to support the system named C4ISR. To suffice the demand of VMF data-link, the system uses the connectionless reliable transport protocol in the application layer.
     Because the time of building simulation system is shorter than real system and the cost of simulation is less than real system, the method in simulation is used in studying data-link largely. VMF data-link simulation platform is a kind of system which builds the simulation model in simulation software and is used to study the performance of VMF data-link.
     Using VMF data-link simulation platform, this paper studies the connectionless reliable transport protocol in the VMF data-link. And aiming at the character of VMF data-link, this paper designs a kind of new connectionless reliable transport protocol. The main idea in designing protocol is described in particular, and the key mechanism of protocol is analyzed deeply. Afterwards, the key parameter of protocol is analyzed in the method of simulating experiment, and the results of experiment have the important significance in choosing the parameter. Aiming at the character of VMF data-link, the designed protocol in this thesis gets some achievements described below.
     In the first place, the new protocol head in application layer is designed in this thesis. And in order to adapt to the character of VMF message, the segment and reconstruction mechanism is used. A retransmission mechanism is proposed to ensure the reliability of wireless transmission. Then, a window mechanism is introduced to control the flow of application layer message based on the retransmission mechanism. Secondly, the simulation model of protocol is designed in OPNET. And the correctness of simulation model is proved in using VMF data-link simulation platform. Then, the experimental scene with interference node is built in the OPNET, aiming to verify the validity of protocol. The experimental results show that this protocol can reliably transmit data with strong interference and the protocol is valid.
     Finally, a lot of experiment is made in this thesis. The main intention is that the key character of protocol named segment-size can be analyzed. The results of these experiments are that if the VMF message can be transported directly by bottom layer, the message doesn’t need to be disport. Otherwise the size of segment must be direct ratio with the capability of system.
引文
[1]孙继银,付光远,车晓村,张宇翔.战术数据链技术与系统.北京:国防工业出版社,2007.
    [2]李云茹.战术数据链及其应用技术.中国电子科学研究学院学报, 2007,2(2).
    [3]房英德等.战术数据链系统.北京:海潮出版社,1998.
    [4]邵玉斌,MATLAB/Simulink通信系统建模与仿真实例分析.北京:清华大学出版社.
    [5]刑智,戴浩.基于OPNET的Link-16数据链建模与仿真.计算机工程与设计.2007.
    [6] Andy S. Peng, David J. Lijia. Performance Evaluation of Navy’s Tactical Network using OPNET, Proceedings of International Conference on Communications, Circuits and Systems (ICCCAS), 2005.
    [7]崔昊,匡敬明,何遵文.Link16与VMF数据链互联建模与仿真研究.计算机工程与设计.2007,5 (28).
    [8] Wang Chonggang, Kazem Sohraby, Hu Yueming, et a1. Issues of transport control protocols for wireless sensor networks. Proceedings of International Conference on Communications, Circuits and Systems (ICCCAS), 2005, 5(1):422-426.
    [9] Dyer T. D., Boppana R. V.. A comparison of TCP performance over three routing protocols for mobile Ad Hoc networks. Proceedings of MOBIHOC. New York: ACM Press, 2001: 56~66.
    [10] Wang Feng, Zhang Yongguang. Improving TCP performance over mobile Ad Hoc Networks with out-of-order detection and response. Proceeding of ACM MOBIHOC. New York: ACM Press, 2002, 217~255.
    [11] Chandran K., Raghunathan S., Venkatesan S., et a1.A feedback-based scheme for improving TCP performance in ad hoc wireless networks. IEEE Personal Communications Magazine 2001, 8(1): 34~39.
    [12] Holland G., Vaidya N.. Analysis of TCP performance over mobile ad hoc networks. ACM Wireless Networks, 2002, 8(2): 275~288.
    [13] Kim D., Toh C. K., Choi Y.. TCP—BuS: Improving TCP performance in wireless Ad Hoe networks. Journal of Communications and Networks, 2001, 3(2): 1~12.
    [14] Liu J., Singh S.. ATCP: TCP for mobile Ad Hoe networks. IEEE Journal on Selected Areas in Communications, 2001, 19(7): 1300~13l5.
    [15] Sundaresan K.,Anatharaman Hsieh H.,et al.ATP:A reliable transport protocol for Ad Hoc networks. Proceeding of the ACM Mobihoc. New York: ACM Press. 2003: 64~75.
    [16]袁博,杨盘隆,田畅.美军MIL-STD-2045-47001协议的研究与实现.军事通信技术,2007,28(4).
    [17]陈敏.OPNET网络仿真.北京:清华大学出版社,2004.
    [18] Information Transfer Management Panel (IXMP) MIL-STD-47001C-2002 Interoperability standard for connectionless data transfer application layer standard[S]. USA: Department of Defense (DoD) , 2002.
    [19]商西达.一种基于UDP的可靠传输协议.计算机与网络,2006.
    [20]王海军,刘彩霞,程东年.一种基于UDP的可靠传输协议分析与研究.计算机应用研究,2005,22 (11) :181~184.
    [21] T. Bova, T. Krivoruchka. Reliable UDP Protocol. http://www. javvin.com/protocol/reliable-udp.pdf. 1999.
    [22]郭平,吴小锋,杨竹青.分组无线网应用层无连接可靠传输协议的设计与实现.军事通信技术,2003.
    [23]张力,戴冠中.一种无线Ad hoc网络中的可靠UDP协议.计算机仿真,2009,26(2).
    [24]刘巍,张慕华,刘永平,张伟.无连接多级可靠传输协议的研究与设计.计算机应用,2007,27(12).
    [25]王继刚,顾国昌,徐立峰等.可靠UDP数据传输协议的研究与设计.计算机工程与应用,2006,42(15):113~116.
    [26]刘红梅,张有光.SCTP在军事通信网络中的应用研究.无线电工程,2005,35(5):24~26.
    [27]王玉峰.用UDP实现数据可靠传输的机制及其程序设计.无线电通信技术,1996,22(1):29~33.
    [28]王文君,黄得所,何幼林,程志高.基于OPNET的跳频通信网络仿真模型研究.网络通信与安全,2008.
    [29]潘志辉,黄英君,骆志刚,管乃洋,黄高阳.数据链中导弹移动性的建模与仿真,系统仿真学报,2009.
    [30]王宇亮,章洋,郑昌文.短报文可靠传输协议的设计与实现.计算机工程与设计,2007,28(18).
    [31] Andrew S. Tanbaum著,潘爱民译.计算机网络.北京:清华大学出版社,2004.
    [32]王耀国,夏靖波等.无线传输帧分段机制研究与OPNET仿真.通信技术,2008,41(6).
    [33]王子才.仿真科学的发展与形成.系统仿真学报,2005,17(6).
    [34] Arthur J. D., Sargent R. G., Dbney J. B., et al. Verification and validation: what impact should project size and complexity have on attendant V&V activities and supporting in frastructure. Proceedings of the 1999 Winter Simulation Conference. Phoenix, AZ: IEEE, 1999: 148~155.
    [35]田斌鹏,陈林星,卢建川,张翠芳.基于QualNet的战术数据链多链建模与仿真.电讯技术,2008,48(3).
    [36] Osman Balci. Verification, Validation, and Certification of Modeling and simulation Applications. Proceedings of the 2003 Winter Simulation Conference, USA, 2003.
    [37] Robert G., Sargent. Verification and Validation of Simulation Models. Proceedings of 2005 Winter Simulation Conference, USA, 2005.
    [38]王子才,张冰,杨明.仿真系统的校核、验证与验收(VV&A):现状与未来.系统仿真学报,2003,15(7):925~930.
    [39] R. Gregory Burch, Jr. Paul D. Amer, Samuel C. Chamberlain. Performance Evaluation of MIL-STD 188-220 Interoperability standard for digital message transfer device subsystems. Proceedings of the 2002 Winter Simulation Conference, 2002.
    [40] Dr. David J. thuente, Timonthy E. Borchelt. Simulation Model and Studies of MIL-STD-188-220A. Proceedings of the 2002 Winter Simulation Conference, 2002.
    [41]郭平,冯宝理,田畅.可变报文格式及其报文传输.军事通信技术,2003,24(4):11~14.
    [42]杨静.地空数据链协议的研究与仿真.电子科技大学硕士学位论文,2007.5: 12~17.
    [43] Dr. David Thuente, Craig Brown, Tim Borchelt, Ed Hill. The Design and Analysis of the AFATDS Communication Networks using Simulation. Proceedings 1996 Tactical Communication Conf, 1996.
    [44]李献昌,刘凯,张军.S-TDMA协议点到点通信的仿真研究.系统仿真学报,2007,19(13).
    [45] Sgouridis S. P., Angelides D. C.. Simulation-based Analysis of Handing Inbound Containers in a Terminal. Proceedings of the 2002 Winter Simulation Conference, 2002: 1716~1724.
    [46] Dr. David J. Thuente, Tim Borchelt. Simulation Studies of MAC Algorithms for Combat Net Radio. Proceedings of the Seventh Software Technology Conference, Salt Lake City, UT, April 10-15, 1995.
    [47] Dr. David J. Thuente. System Complexity Requires Simulation Early and Often. Signal (AFCEA Publication) , August 1996: 65~67.
    [48] Dr. David J. Thuente, Craig Brown, Tim Borchelt, Ed Hill. AFATDS Network Simulation Report. Magnavox Electronic Systems , October 13,1995.
    [49] Dr. David J. Thuente. Design, Analysis, and Performance Modeling for Evolving Military Systems using Simulation. Proceedings of the Seventh Software Technology Conference, Salt Lake City, UT, April 10-15, 1995.
    [50] Dr. David J. Thuente, Robert L. Sedmeyer. Rate-Monotonic Analysis of an Advanced Field Artillery Data System. Proceeding of IEEE Workshop On Real-time Application, New York, NY, May 13-14, 1993: 92~96.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700