CN108184264A - Tactical data link system dynamic networking implementation method based on TDMA - Google Patents
Tactical data link system dynamic networking implementation method based on TDMA Download PDFInfo
- Publication number
- CN108184264A CN108184264A CN201711434926.1A CN201711434926A CN108184264A CN 108184264 A CN108184264 A CN 108184264A CN 201711434926 A CN201711434926 A CN 201711434926A CN 108184264 A CN108184264 A CN 108184264A
- Authority
- CN
- China
- Prior art keywords
- ntr
- networking
- time
- tdma
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006855 networking Effects 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 title claims abstract description 18
- 101000772461 Arabidopsis thaliana Thioredoxin reductase 1, mitochondrial Proteins 0.000 description 14
- 101000772460 Arabidopsis thaliana Thioredoxin reductase 2 Proteins 0.000 description 14
- 101000591392 Leishmania infantum Probable flavin mononucleotide-dependent alkene reductase Proteins 0.000 description 14
- 102000017921 NTSR1 Human genes 0.000 description 14
- 102000017938 NTSR2 Human genes 0.000 description 14
- 238000004891 communication Methods 0.000 description 7
- 238000013461 design Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/001—Synchronization between nodes
- H04W56/0015—Synchronization between nodes one node acting as a reference for the others
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0685—Clock or time synchronisation in a node; Intranode synchronisation
- H04J3/0694—Synchronisation in a TDMA node, e.g. TTP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses the tactical data link system dynamic networking implementation methods based on TDMA, include the following steps:S1:Initial time is provided in initialization command to data-link terminal LU by link management machine;S2:At least one LU is selected as Network Time Base NTR;S3:Fixation time slots of the NTR using T as the period sends networking invitation message to the LU of non-NTR;S4:When the LU of non-NTR receives one group of message before networking, judge whether this message is networking invitation message;If it is networking invitation message to receive, the LU write-in NTR current time informations of non-NTR.The present invention is based on the tactical data link system dynamic networking implementation methods of TDMA, by way of it will NTR be set in LU so that tactical data chain network can carry out networking by NTR of any one LU, and networking mode becomes dynamic group net, very flexibly, terminal can effectively network into Mobile state.
Description
Technical field
The present invention relates to fields of communication technology, and in particular to the tactical data link system dynamic networking realization side based on TDMA
Method.
Background technology
At present, tactical data link technology has become the core technology of modern military electronic information, is various military affairs
The technical foundation of information system, the network interconnection and information service intercommunication.By tactical data link, it can pass the information on, believe
Breath obtains, information control and information processing closely link together, and links up all combat units, originally independent commander is controlled
Center processed, command post at different levels, belligerent army and weapon platform are organically hinged together by data-link, form sea, land and sky,
Its integration, and with unified, the coordination ability data communication network.To be provided up to headquarter, down toward basic combat unit
Each required various information of node, make battlefield to one's own side's information one-way transparent so that various information can be according to the letter of regulation
Cease form, in real time, it is automatic, securely swap and transmit, so as to fulfill the whole network information resources share.
The main feature of existing tactical data link system embodies the interconnection and interflow of task based access control between users, i.e., in advance
The network planning is carried out according to combat duty and messaging parameter is formulated, and before network startup, user terminal needs loading in advance initial
Change parameter, can realize and be in communication with each other.Detailed process includes:After assigning operation prediction scheme, carrying out the intention of operation and communication first needs
Analysis is asked, determines the user of participation task to system time gap demand;Network design is then carried out, i.e., is in need according to task
The user terminal distribution of communication sends and receives time slot, network No., transmission key and message key etc.;Finally, design result is with first
The form of beginningization parameter is distributed to user terminal, and use is in communication with each other for user terminal.The user terminal that network design is not directed to,
Network cannot be added in, that is, can not achieve the communication between user arbitrary in network.As it can be seen that current tactical data chain network is
Static Design, lack flexibility, can not realize that the dynamic of user terminal networks.
Invention content
The technical problems to be solved by the invention are that current tactical data chain network is Static Design, lack flexibility,
It can not realize that the dynamic of user terminal networks, and it is an object of the present invention to provide the tactical data link system dynamic networking realization side based on TDMA
Method solves the above problems.
The present invention is achieved through the following technical solutions:
Tactical data link system dynamic networking implementation method based on TDMA, includes the following steps:S1:By link management machine
Initial time is provided in initialization command to data-link terminal LU;S2:At least one LU is selected as Network Time Base
NTR;S3:Fixation time slots of the NTR using T as the period sends networking invitation message to the LU of non-NTR;S4:The LU of non-NTR is before networking
When receiving one group of message, judge whether this message is networking invitation message;If it is networking invitation message to receive, non-
The LU write-in NTR current time informations of NTR.
In the prior art, tactical data chain network is Static Design at present, lacks flexibility, can not realize user terminal
Dynamic network.The present invention is in application, using TDMA access ways, and each user must keep network time synchronization in system, when
Between to synchronize be that each data-link terminal LU clocks kept are calibrated, so first by link management machine to all data
Chain terminal LU provide initial time in initialization command;And in order to by networking LU by directly with NTR or other with net
The message exchange of network time synchronization LU is automatically performed without any manual intervention, need using it is any participation LU all have as
The ability of Network Time Base NTR work, at this point, at least one LU is selected to establish net in this way as Network Time Base NTR
During network, the LU clocks for being appointed as NTR are exactly the time reference of network, and when network works without adjusting the clock of oneself, and
All LU not networked, that is, the top priority of non-NTR is exactly to add in network;So NTR is using T as the fixation time slot in period
When the LU of LU transmission networking invitation messages rather than NTR to non-NTR receives one group of message before networking, judge that this message is
No is networking invitation message;If it is networking invitation message to receive, the LU write-in NTR current time informations of non-NTR, this
When show to have completed thick synchronization.The present invention in LU by way of it will set NTR so that tactical data chain network can be with
Networking is carried out by NTR of any one LU, networking mode becomes dynamic group net, and very flexibly, terminal can be effectively into action
State networks.
Further, step S3 includes following sub-step:The NTR is using T as the corresponding message in cipher of fixation time slot in period
Breath is encoded.
Further, the time shaft time error of the NTR and the non-NTR of access are less than T/2.
The present invention can be carried effectively in application, by further being limited cycle T and time shaft time error
The safety of high networking.
Further, the invention also includes following steps:S5:Be written NTR current time informations after, non-NTR start according to
Schedule works.
Further, networking invitation message described in step S3 changes with time slot, and adjacent networking invitation message is different.
Compared with prior art, the present invention it has the following advantages and advantages:
1st, the present invention is based on the tactical data link system dynamic networking implementation method of TDMA, by the way that NTR will be set in LU
Mode so that tactical data chain network can carry out networking by NTR of any one LU, and networking mode becomes dynamic group net,
Very flexibly, terminal can effectively network into Mobile state;
2nd, the present invention is based on the tactical data link system dynamic networking implementation method of TDMA, by cycle T and time shaft
Time error is further limited, and can effectively improve the safety of networking.
Description of the drawings
Attached drawing described herein is used for providing further understanding the embodiment of the present invention, forms one of the application
Point, do not form the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is 3 schematic diagram of the embodiment of the present invention;
Fig. 2 is 4 schematic diagram of the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiment and attached drawing, to this
Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make
For limitation of the invention.
Embodiment 1
The present invention is based on the tactical data link system dynamic networking implementation methods of TDMA, include the following steps:S1:By link
Supervisor provides initial time to all data-link terminal LU in initialization command;S2:At least one LU is selected as net
Network time reference NTR;S3:Fixation time slots of the NTR using T as the period sends networking invitation message to the LU of non-NTR;S4:Non- NTR's
When LU receives one group of message before networking, judge whether this message is networking invitation message;If it is to network to invite to receive
Please message, then non-NTR LU write-in NTR current time informations.
When the present embodiment is implemented, using TDMA access ways, each user must keep network time synchronization, time in system
It is that each data-link terminal LU clocks kept are calibrated to synchronize, so first by link management machine to all data-links
Terminal LU provide initial time in initialization command;And in order to by networking LU by directly with NTR or other with network
The message exchange of time synchronization LU is automatically performed without any manual intervention, needs all to have any participation LU as net
The ability of network time reference NTR work, at this point, at least one LU is selected to establish network in this way as Network Time Base NTR
When, the LU clocks for being appointed as NTR are exactly the time reference of network, and when network works without adjusting the clock of oneself, and institute
There is the LU not networked, that is, the top priority of non-NTR is exactly to add in network;So NTR using T as the period fixation time slot to
When the LU transmission networking invitation messages of non-NTR rather than the LU of NTR receive one group of message before networking, whether this message is judged
For networking invitation message;If it is networking invitation message to receive, the LU write-in NTR current time informations of non-NTR, at this time
Show to have completed thick synchronization.The present invention in LU by way of it will set NTR so that tactical data chain network can be with
Any one LU carries out networking for NTR, and networking mode becomes dynamic group net, and very flexibly, terminal can be effectively into Mobile state
It networks.
Embodiment 2
For the present embodiment on the basis of embodiment 1, step S3 includes following sub-step:The NTR is using T as the fixation in period
The corresponding encrypted message of time slot is encoded.The time shaft time error of the NTR and the non-NTR of access are less than T/2.The present invention
It is further comprising the steps of:S5:After NTR current time informations are written, non-NTR starts to work according to Schedule;In step S3
The networking invitation message changes with time slot, and adjacent networking invitation message is different.
It, can be effective by further being limited cycle T and time shaft time error when the present embodiment is implemented
Improve the safety of networking.
Embodiment 3
As shown in Figure 1, the present embodiment, on the basis of embodiment 2, the cycle T uses 12 seconds, by NTR and access non-
The time shaft time error of NTR is defined as △ t, and as △ t >=6s, when NTR current time frames are N, non-NTR1 and non-NTR2 be not
Before networking, current time frame is t ∈ (t1, t2), wherein t1≤(12N-6), t2 >=(12N+6).Below to two kinds of situations
Illustrate respectively:
t1≤(12N-6):Non- situation of the NTR1 times earlier than NTR, the time t of initialization are only i.e. shown in Fig. 1
One of tri- kinds of situations of t1rw1, t1rw2, t1rw3.It is invited in the case of these three when the time frame of non-NTR1 runs to NTR to send to network
At the time of, the when frame number that non-NTR1 and NTR are calculated needed for password is inconsistent, can not network.Non- NTR1 was at 12 seconds in the case of so
It is interior to network;
t2≥(12N-6):The non-NTR2 times are later than the situation of NTR i.e. shown in Fig. 1, and the time t of initialization is only
T2rw1, t2rw2 one of two things.Under both of these case when the time frame of non-NTR2 run to NTR send network invite when
It carves, the when frame number that non-NTR2 and NTR are calculated needed for password is inconsistent, can not network.Non- NTR2 nothings in 12 seconds in the case of so
Method networks.By analyze above it is found that non-NTR relative to NTR time shaft time error △ t >=6 when, non-NTR can not network.
Embodiment 4
As shown in Fig. 2, the present embodiment is in the difference of embodiment 3, by the time shaft time of NTR and the non-NTR of access
Error is defined as △ t, △ t < 6s;
When NTR current time frames be N when, non-NTR1 and non-NTR2 before not networking, current time frame for t ∈ (t1,
T2), wherein (12N-6) < t1 < 12N, 12N < t2 < (12N+6).Two kinds of situations are illustrated respectively below:
(12N-6) < t1 < 12N:Non- situation of the NTR1 times earlier than NTR, the time t of initialization are only i.e. shown in Fig. 2
T1rw1, t1rw2 one of two things.
As t=t1rw1, NTR current time frames are N-1, and N time frames are changed to when NTR time frames run to the time of 12 seconds,
The time frame of non-NTR1 is N at this time, therefore non-NTR1 is consistent with the encrypted message that NTR is calculated, and can normally network;
As t=t1rw2, NTR current time frames are N, and the when frame number that non-NTR1 calculates needed for password is N+1, until non-
NTR1 will be replaced when calculating time frame needed for password without networking invitation message, can not be networked;When non-NTR1 time frames run to 12
N+1 time frames are changed to during the time of second, N+1 time frames are changed to until NTR time frames run to 12 seconds, at this time non-NTR1 and NTR
The encrypted message being calculated is consistent, can normally network.
It follows that NTR1 non-in the case can normally network in 12 seconds.
12N < t2 < (12N+6):That is Fig. 2 show the situation for the non-NTR2 times being later than NTR, and the time t of initialization can only
For t2rw1, t2rw2 one of two things.
As t=t2rw1, NTR current time frames are N, and the when frame number that non-NTR2 calculates needed for password is N, until non-NTR2
It replaces when calculating time frame needed for password all without networking invitation message, therefore can not network;When non-NTR2 time frames run to 6 seconds
The correspondence password of N+1 time frames is changed to, N+1 time frames are changed to until NTR time frames run to 12 seconds and send networking invitation message,
Non- NTR2 is consistent with the encrypted message that NTR is calculated at this time, can normally network;
As t=t2rw2, NTR current time frames are N, and the when frame number that non-NTR2 calculates needed for password is N+1, when NTR time frames
N+1 time frames are changed to during the time for running to 12 seconds, non-NTR2 is consistent with the encrypted message that NTR is calculated at this time, Ke Yizheng
Often network.
It follows that NTR2 non-in the case can normally network in 12 seconds.
From embodiment 3 and embodiment 4 it can be seen that, when networking invitation message by NTR with 12 seconds for the period a certain solid
Timing gap is sent, it is desirable that non-NTR is relative to the time shaft time error of NTR when within ± 6 seconds, it is ensured that non-NTR can be
It networks in 12 seconds.Since current tactical data chain network is Static Design, networking invitation message is changeless, Di Fangzhen
Network can be added in by observing primary networking invitation message and cracking, therefore lack flexibility and safety.What the present invention designed enters
Net invitation message converts at any time, even if enemy spies out networking invitation message and cracked this group of message, wants to add in net at it
During network, networking invitation message has occurred and that variation, and enemy can not add in network, improve safety;In addition networking mode is not
With advance planning, therefore very flexibly, terminal can effectively network into Mobile state;The present invention is accessed by TDMA and networking is invited
Please message variation the mode that is combined of mode, realizing tactical data chain network has very strong flexibility also to have very by force
Safety, produce unexpected technique effect, be inventor's long-term practice and by creative work obtain.
Above-described specific embodiment has carried out the purpose of the present invention, technical solution and advantageous effect further
It is described in detail, it should be understood that the foregoing is merely the specific embodiment of the present invention, is not intended to limit the present invention
Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (5)
1. the tactical data link system dynamic networking implementation method based on TDMA, which is characterized in that include the following steps:
S1:Initial time is provided in initialization command to data-link terminal LU by link management machine;
S2:At least one LU is selected as Network Time Base NTR;
S3:Fixation time slots of the NTR using T as the period sends networking invitation message to the LU of non-NTR;
S4:When the LU of non-NTR receives one group of message before networking, judge whether this message is networking invitation message;If it connects
It is networking invitation message to receive, then the LU write-in NTR current time informations of non-NTR.
2. the tactical data link system dynamic networking implementation method according to claim 1 based on TDMA, which is characterized in that
Step S3 includes following sub-step:
Fixation time slot corresponding encrypted messages of the NTR using T as the period is encoded.
3. the tactical data link system dynamic networking implementation method according to claim 1 based on TDMA, which is characterized in that
The time shaft time error of the NTR and the non-NTR of access are less than T/2.
4. the tactical data link system dynamic networking implementation method according to claim 1 based on TDMA, which is characterized in that
It is further comprising the steps of:
S5:After NTR current time informations are written, non-NTR starts to work according to Schedule.
5. the tactical data link system dynamic networking implementation method according to claim 1 based on TDMA, which is characterized in that
Networking invitation message described in step S3 changes with time slot, and adjacent networking invitation message is different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711434926.1A CN108184264A (en) | 2017-12-26 | 2017-12-26 | Tactical data link system dynamic networking implementation method based on TDMA |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711434926.1A CN108184264A (en) | 2017-12-26 | 2017-12-26 | Tactical data link system dynamic networking implementation method based on TDMA |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108184264A true CN108184264A (en) | 2018-06-19 |
Family
ID=62547185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711434926.1A Pending CN108184264A (en) | 2017-12-26 | 2017-12-26 | Tactical data link system dynamic networking implementation method based on TDMA |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108184264A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111123249A (en) * | 2019-12-10 | 2020-05-08 | 陕西凌云电器集团有限公司 | Distance measurement method and system based on TDMA network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035327A (en) * | 2007-04-13 | 2007-09-12 | 华为技术有限公司 | Radio communication system and air interface synchronization method, base station and its controller |
CN104184535A (en) * | 2014-09-12 | 2014-12-03 | 四川九洲电器集团有限责任公司 | Clock synchronization method and clock synchronization device |
CN105553592A (en) * | 2015-12-10 | 2016-05-04 | 中国航空工业集团公司西安航空计算技术研究所 | IMA processor system clock synchronization method |
CN106993331A (en) * | 2017-05-11 | 2017-07-28 | 深圳合优科技有限公司 | A kind of sensor group network method and use this method sensor network |
CN107483140A (en) * | 2016-06-07 | 2017-12-15 | 航天恒星科技有限公司 | TDMA-based networking method |
-
2017
- 2017-12-26 CN CN201711434926.1A patent/CN108184264A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035327A (en) * | 2007-04-13 | 2007-09-12 | 华为技术有限公司 | Radio communication system and air interface synchronization method, base station and its controller |
CN104184535A (en) * | 2014-09-12 | 2014-12-03 | 四川九洲电器集团有限责任公司 | Clock synchronization method and clock synchronization device |
CN105553592A (en) * | 2015-12-10 | 2016-05-04 | 中国航空工业集团公司西安航空计算技术研究所 | IMA processor system clock synchronization method |
CN107483140A (en) * | 2016-06-07 | 2017-12-15 | 航天恒星科技有限公司 | TDMA-based networking method |
CN106993331A (en) * | 2017-05-11 | 2017-07-28 | 深圳合优科技有限公司 | A kind of sensor group network method and use this method sensor network |
Non-Patent Citations (3)
Title |
---|
吴晓嫣 等: "Linkl6战术数据链入网同步研究", 《2009中国西部第六届青年通信学术会议》 * |
朱磊 等: "一种TDMA网络精确时间同步技术", 《电子世界-技术交流》 * |
杨志飞 等: "Linkl6数据链网络同步的改进算法", 《舰船电子工程》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111123249A (en) * | 2019-12-10 | 2020-05-08 | 陕西凌云电器集团有限公司 | Distance measurement method and system based on TDMA network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Blockchain-based secure distributed control for software defined optical networking | |
CN108958678A (en) | Throw screen method, the sharing method of screen content and device | |
NO319437B1 (en) | Procedure for ad hoc buffer | |
US20220322320A1 (en) | Resource configuration method, apparatus, and device | |
US8503652B2 (en) | Telephone conference call management | |
CN110222280A (en) | Data processing method and device for sharing | |
CN109934546A (en) | Data sharing method and device across group | |
CN109219052B (en) | A resource information transmission method, related equipment and system | |
CN108184264A (en) | Tactical data link system dynamic networking implementation method based on TDMA | |
Ling et al. | Hash access in blockchain radio access networks: Characterization and optimization | |
CN114285680A (en) | Team cooperative communication method and system applied to network target range | |
CN108307416A (en) | A kind of internet-of-things terminal management method | |
CN118014543A (en) | Method and system for sharing human resource data based on Internet environment | |
TAN et al. | Analysis of industrial internet of things and digital twins | |
CN103685180B (en) | The method and apparatus of display and control | |
CN116015519A (en) | An In-band Clock Synchronization Method for Hopping Networks | |
CN115310872A (en) | Activity planning and scheduling method and system based on activity management platform | |
Moussa et al. | Power allocation-based noma and underlay d2d communication for public safety users in the 5g cellular network | |
CN111585679B (en) | Method and equipment for time self-synchronization in synchronous network | |
FI129827B (en) | Authorization of time synchronization messages | |
US20250184922A1 (en) | Transmit power determining method, terminal, and storage medium | |
US20250023690A1 (en) | Resource processing method and apparatus, and terminal | |
EP4472318A1 (en) | Dmrs generation method, and terminal and network-side device | |
Tariq et al. | Quality of service study in synchronized time-triggered aerial networks | |
Zhang et al. | The coordination of nodes in the internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180619 |