Chapter 128 A good show

Style: Science Author: Be happy with yourselfWords: 2935Update Time: 24/01/18 14:39:32
Chapter 128 A good show

In order to let the governor understand Du Jin's abilities and hidden secrets more quickly, she could only temporarily give up using military direct communications with complex procedures but extremely high security, and instead directly use the vehicle-mounted communication array on the armored aerial vehicle. It is connected to the General Administration of Government through a nearby arms control information hub. This controlled-level communication method is an order of magnitude more secure than conventional quantum communication, but unfortunately, too many people "change hands" among them. , if it is a routine military situation or some sudden mission deployment, it will be fine to use this level of military communication, but if it is an extremely important secret mission or intelligence transmission, this level of communication method is somewhat unsafe.

It’s not because of the interference factor, not to mention the quantum communication used in the Blood Seal World, which is the more “traditional” military communication on the Blue Star. Anti-interference ability is also the minimum requirement and guarantee. Military wireless communication anti-interference technology can be effective. Protect the information transmission process during combat and ensure the security of information, which mainly includes frequency hopping anti-interference technology and spread spectrum anti-interference technology.

1. Military frequency hopping anti-interference technology. Military frequency hopping anti-interference technology can be divided into anti-tracking communication interference and anti-blocking communication interference. For the former, it mainly has the following advantages: First, it improves the overall information transmission speed and ensures the correctness of combat technology. Frequency hopping group Network is an important part of it. It can effectively guarantee the anti-reconnaissance capability during combat. Under the premise of accurate frequency hopping networking, the opponent cannot compare the frequency hopping frequency and each frequency hopping subnet, making it difficult to decipher the frequency hopping pattern and ensure information confidentiality.

In addition, through the routing relay function, the communication link is broadened, the interfered frequency hopping frequency is detected in real time, and the communication channel is switched, such as using frequency hopping feint, etc.; the second is to change the variable speed frequency hopping or frequency hopping frequency to reduce our frequency hopping Frequency dwell time, increase frequency hopping frequency within a reasonable range. When it is known that the frequency hopping pattern has been deciphered, anti-interference measures should be taken promptly, that is, the frequency hopping frequency should be immediately increased to the highest speed, in this way to avoid the other party's tracking interference; the third is to improve the use level of the frequency hopping pattern, which It can better resist waveform tracking interference. From the perspective of usage functions, by setting the correct frequency hopping pattern and upgrading the frequency hopping frequency that occurs during combat, such as increasing the difficulty of its algorithm.

From a technical perspective, the technology is required to have wide and narrow interval capabilities, long repetition periods, and high complexity. Anti-blocking communication anti-interference technology can be divided into: automatic replacement frequency table anti-interference technology, frequency domain two-dimensional processing anti-interference technology, real-time frequency adaptive anti-interference frequency hopping technology, and idle channel anti-interference search technology.

Automatically changing frequency table anti-interference technology: It is mainly aimed at the other party's blocking interference technology. When only a very small part of the frequency is left, it means that the communication capability has reached the limit. In order to improve the anti-interference capability of communication technology, this technology should be adopted to solve the problem. ; Frequency domain two-dimensional processing anti-interference technology: It is an electronic support solution. Combining it with real-time frequency adaptive anti-interference frequency hopping technology can better resist the opponent's dynamic blocking interference and integrate the frequency domain in communication technology. , the time domain is fixed, and the other party's interference information is effectively detected; idle channel anti-interference search technology: This anti-interference technology is applied in the entire communication process to monitor in real time whether the communication frequency has been stolen by the other party. If interference occurs, the frequency point is eliminated in time.

2. Military spread spectrum anti-interference technology. The spread spectrum anti-interference technology type is mainly established for anti-frequency interference technology and can be divided into anti-correlated interference technology and anti-irrelevant interference technology. The anti-correlated interference technology achieves the purpose of deciphering the spread spectrum related interference frequency by using variable code spread spectrum and other methods. It is based on anti-reconnaissance and takes shortening the communication time as the entry point to establish a scientific reconnaissance system and break the opponent's collection frequency rules. As a result, the reconnaissance aircraft cannot output a normal signal-to-noise ratio and improves its anti-interference ability.

At present, the more developed foreign code hopping method is "self-encoding spread spectrum". Its technical requirements are relatively high, but Xia Guo also has its own advantages in this aspect. In the actual combat process, the following anti-correlated interference methods can also be adopted: First, reduce the correlation between communication pseudo codes, break the opponent's reconnaissance frequency, and expand processing of some unimportant signals; second, increase the communication code The third is to increase the power of communication lines, but this method is usually only used at the last moment. Anti-non-correlated interference technology is divided into adaptive narrow-band filtering anti-interference technology and anti-broadband non-correlated anti-interference technology.

For the former, the technical requirements include: ensuring the frequency capability of communication technology, reducing the loss of communication signals, and improving the impact of narrowband interference; for the latter, the main measures include the following measures: reducing the frequency amplitude of communication interference, reasonably expanding processing gain, and increasing communication Technical line power improves the line's ability to receive signals.

This is true for military communications based on radio, not to mention quantum communications. It is based on quantum entanglement. Since quantum entanglement is non-local, that is, no matter how far apart two entangled particles are, measuring one of them The state of the particle must be able to obtain the state of another particle at the same time. The acquisition of this "information" is not limited by the speed of light. Therefore, physicists naturally thought about whether this kind of entangled state across space could be used for information transmission. Therefore, quantum communication based on quantum entangled state came into being. This kind of quantum communication using quantum entangled state is called "quantum communication". Teleportation" (quantumteleportation).

In simple terms, its mechanism has four steps:

(1) Prepare an entangled particle pair. Send particle 1 to point A and particle 2 to point B.

(2) At point A, another particle 3 carries a qubit Q that it wants to transmit. So particle 1 at point A and particle 2 at point B will form a total state for particle 3. Measure particle 1 and particle 3 simultaneously at point A to obtain a measurement result. This measurement will cause the entangled state of particle 1 and particle 2 to collapse, but at the same time particle 1 and particle 3 will be entangled together.

(3) The party at point A uses the classic channel (that is, classic communication methods, such as phone calls or text messages, etc.) to tell the party at point B about its measurement results.

(4) After the party at point B receives the measurement result from point A, it knows which state particle 2 at point B is in. As long as a simple operation is performed on particle 2, it will become the state of particle 3 before measurement. That is to say, the qubit carried by particle 3 is transmitted from point A to point B without loss, while particle 3 itself only stays at point A and does not go to point B.

The above is the method of realizing quantum teleportation through quantum entanglement, that is, transmitting a qubit from one place to another losslessly through quantum entanglement. This is also the most important way of quantum communication at present. This also means that Country M has traveled to The usual method of monitoring by "plugging in a few wires" at a certain relay point is completely ineffective. Of course, this kind of technology requires extremely high requirements for transceiver equipment and requires a lot of technology. In what way do people in the blood-stamped world use it? Whether it is widely used is unknown.

After several levels of identity confirmation, the female officer finally got through the call to the governor's office as she wished. Feng Jitong also knew the mission he had assigned to his men, and he also knew about the Heyi Cult attackers. The report had already been received. As the governor, he had a very efficient and rapid intelligence network for the colony, especially the star port. After confirming the identity of the communicating party, he said:

"Qiutong, I have already started to deal with this attack. You come back and report to me first. As for the previous mission..."

"Sir Governor, I encountered an attack. My current coordinates are at Starport Area C-45. I need emergency treatment and support."

Feng Jitong frowned immediately. He had heard something unusual from the words of his subordinate Fu Qiutong. The troops who had gone to support Fu Qiutong's attack position had only started on-site exploration and investigation operations with her authorization on the spot. Otherwise, the rapid reaction force would not have any authority to investigate the scene, but now Fu Qiutong has some "delayed" reporting, and the timing of his speech happened to be stuck in the handling and arrangement of Du Jin's affairs before he explained it. He has rich experience in espionage operations. He immediately understood the importance of the situation, otherwise Fu Qiutong would not have reported to him in such a coded way.

"Emergency support and treatment, treatment... The scene report records Qiutong leaving with key physical evidence and witnesses. It seems that This attack was probably premeditated by the Unity Church to deal with someone. As for the target..."

After thinking for a moment, he responded to Fu Qiutong:

"Grant the request. I will send combat units to your area to respond. The troops in charge will verify that the code is the CKL sequence special operations command. Please verify your identity."

After saying that, Fu Qiutong replied with a sentence of understanding and hung up the communication decisively. However, she did not ask the driver to stop and wait for the response of the armed forces. Instead, she took over the driving rights herself and turned off the automatic cruise and auxiliary correction modules. Flying in the other direction, the CKL sequence special action command, this string of codes does exist, and CKL is just the beginning of the code. The remaining 8-digit identification codes are what their direct relatives expected to know, and others have no way to do it. I know, but the purpose of this seemingly high-security code will be confusing to most people, because it is not a so-called identification code, but an orientation command.

Fu Qiutong naturally knew that Governor Feng Jitong could tell the meaning of this type of code, so when Dangjie drove the armored aerial vehicle towards the place indicated by the code, of course, before leaving the place where she reported, Fu Qiutong left behind A little "gift" set up a good show for the coming "support" troops.