HOME
*





Link 1
Link 1 is a computer network standard developed by NATO to provide information exchange for air defence. General description Link 1 is a point-to-point, duplex, non-encrypted, digital NATO Tactical Data Link (TDL) Standard for the automatic exchange of Track and Strobe data, combined with link and data management messages between ground based ASACS-elements / e.g. CRC and CAOC, specific units (TACCS / MC) and data link buffers (SSSB, CSI). In everyday language, the different meaning of the wording ''Link 1 TDL Standard (format)'' and ''Link 1 information content (subject matter)'' to be transmitted on this particular TDL Standard is mixed up in many cases. Remark: * TACCS / MC = Tactical Air Command and Control Service / (NATO) Major Command) * SSSB = Ship Shore Ship Buffer * CSI = CRC/SAM Interface : SAM = Surface-to-air missile History Link 1 is a NATO ''first Generation's'' TDL Standard. It was developed in the 1950s as pure ''Air Surveillance'' data link format ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies. The nodes of a computer network can include personal computers, servers, networking hardware, or other specialised or general-purpose hosts. They are identified by network addresses, and may have hostnames. Hostnames serve as memorable labels for the nodes, rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol. Computer networks may be classified by many criteria, including the transmission medium used to carry signals, bandwidth, communications pro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


IT Architecture
Information technology architecture is the process of development of methodical information technology specifications, models and guidelines, using a variety of information technology notations, for example Unified Modeling Language (UML), within a coherent information technology architecture framework, following formal and informal information technology solution, enterprise, and infrastructure architecture processes. These processes have been developed in the past few decades in response to the requirement for a coherent, consistent approach to delivery of information technology capabilities. They have been developed by information technology product vendors and independent consultancies, such as for example the Open Group, based on real experiences in the information technology marketplace and collaboration amongst industry stakeholders. Best practice information technology architecture encourages the use of open technology standards and global technology interoperability. Infor ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Electronic Countermeasure
An electronic countermeasure (ECM) is an electrical or electronic device designed to trick or deceive radar, sonar, or other detection systems, like infrared (IR) or lasers. It may be used both offensively and defensively to deny targeting information to an enemy. The system may make many separate targets appear to the enemy, or make the real target appear to disappear or move about randomly. It is used effectively to protect aircraft from guided missiles. Most air forces use ECM to protect their aircraft from attack. It has also been deployed by military ships and recently on some advanced tanks to fool laser/IR guided missiles. It is frequently coupled with stealth advances so that the ECM systems have an easier job. Offensive ECM often takes the form of jamming. Self-protecting (defensive) ECM includes using blip enhancement and jamming of missile terminal homers. History The first example of electronic countermeasures being applied in a combat situation took place durin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

IT Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distributio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Aviation Transponder Interrogation Modes
The aviation transponder interrogation modes are the standard formats of pulsed sequences from an interrogating Secondary Surveillance Radar (SSR) or similar Automatic Dependent Surveillance-Broadcast (ADS-B) system. The reply format is usually referred to as a "code" from a transponder, which is used to determine detailed information from a suitably equipped aircraft. In its simplest form, a "Mode" or interrogation type is generally determined by pulse spacing between two or more interrogation pulses. Various modes exist from Mode 1 to 5 for military use, to Mode A, B, C and D, and Mode S for civilian use. Interrogation modes Several different RF communication protocols have been standardized for aviation transponders: Mode A and Mode C are implemented using air traffic control radar beacon system as the physical layer, whereas Mode S is implemented as a standalone backwards-compatible protocol. ADS-B can operate using Mode S-ES or Universal Access Transceiver as its transport ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Identification Friend Or Foe
Identification, friend or foe (IFF) is an identification system designed for command and control. It uses a transponder that listens for an ''interrogation'' signal and then sends a ''response'' that identifies the broadcaster. IFF systems usually use radar frequencies, but other electromagnetic frequencies, radio or infrared, may be used. It enables military and civilian air traffic control interrogation systems to identify aircraft, vehicles or forces as friendly and to determine their bearing and range from the interrogator. IFF is used by both military and civilian aircraft. IFF was first developed during World War II, with the arrival of radar, and several friendly fire incidents. IFF can only positively identify friendly aircraft or other forces. If an IFF interrogation receives no reply or an invalid reply, the object is not positively identified as foe; friendly forces may not properly reply to IFF for various reasons such as equipment malfunction, and parties in the ar ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

E-3A
The Boeing E-3 Sentry is an American airborne early warning and control (AEW&C) aircraft developed by Boeing. E-3s are commonly known as AWACS (Airborne Warning and Control System). Derived from the Boeing 707 airliner, it provides all-weather surveillance, command, control, and communications, and is used by the United States Air Force, NATO, French Air and Space Force, Royal Saudi Air Force and Chilean Air Force. The E-3 is distinguished by the distinctive rotating radar dome (rotodome) above the fuselage. Production ended in 1992 after 68 aircraft had been built. In the mid-1960s, the U.S. Air Force (USAF) was seeking an aircraft to replace its piston-engined Lockheed EC-121 Warning Star, which had been in service for over a decade. After issuing preliminary development contracts to three companies, the USAF picked Boeing to construct two airframes to test Westinghouse Electric and Hughes's competing radars. Both radars used pulse-Doppler technology, with Westinghous ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Airborne Early Warning
Airborne or Airborn may refer to: Arts, entertainment, and media Films * ''Airborne'' (1962 film), a 1962 American film directed by James Landis * ''Airborne'' (1993 film), a comedy–drama film * ''Airborne'' (1998 film), an action film starring Steve Guttenberg * ''Airborne'' (2012 film), a horror film Games * ''Airborne!'', a 1985 computer game by Silicon Beach Software * ''Airborne Ranger'', a 1987 computer game by Microprose * '' Asphalt 8: Airborne'', a 2013 video game * '' Medal of Honor: Airborne'', a 2007 video game Literature * ''Airborn'' (novel), a 2004 young adult novel by Kenneth Oppel *''Airborn'' (''Hijos del aire''), a poetry collection by Octavio Paz, English translation Charles Tomlinson 1981 Music Groups * Airbourne (band), an Australian hard rock band * The Airborne Toxic Event, an indie rock band Albums * ''Airborn'' (album) * ''Airborne'' (Curved Air album), 1976 * ''Airborne'' (Don Felder album) * ''Airborne'' (The Flying Burrito Brothers alb ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Integrated NATO Air Defense System
The NATO Integrated Air Defense System (short: NATINADS) is a command and control network combining radars and other facilities spread throughout the NATO alliance's air defence forces. It formed in the mid-1950s and became operational in 1962 as NADGE. It has been constantly upgraded since its formation, notably with the integration of Airborne Early Warning aircraft in the 1970s. The United Kingdom maintained its own network, but was fully integrated with the network since the introduction of the Linesman/Mediator network in the 1970s. Similarly, the German network maintained an independent nature through GEADGE. Development Development was approved by the NATO Military Committee in December 1955. The system was to be based on four air defense regions (ADRs) coordinated by SACEUR (Supreme Allied Commander Europe). Starting from 1956 early warning coverage was extended across Western Europe using 18 radar stations. This part of the system was completed by 1962. Linked to exist ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Partnership For Peace
The Partnership for Peace (PfP; french: Partenariat pour la paix) is a North Atlantic Treaty Organization (NATO) program aimed at creating trust between the member states of NATO and other states mostly in Europe, including post-Soviet states; 20 states are members. The program contains six areas of cooperation, which aims to build relationships with partners through military-to-military cooperation on training, exercises, disaster planning and response, science and environmental issues, professionalization, policy planning, and relations with civilian government. Amidst security concerns in Eastern Europe after the Cold War and dissolution of the Soviet Union, and also due to the failure of the North Atlantic Cooperation Council (NACC), the program was launched during the summit in Brussels, Belgium between January 10 and 11, 1994. In the process, neutral countries also faced a situation in which they had to reconsider maintaining military neutrality; therefore, countries ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]