maglomanic said:
I was under the impression that Chinese systems have Link 16. I would consider it very much possible. Chinese have tried to stick to western standards as much as they can. China was buying Phalcon which is a western system. The chinese AWACS program is inspired by the whole Phalcon dabacle. I would think that what they created or atleast tried to adhere to what they saw in Phalcon. But then again like you said there havent been any reports regarding Chinese link 16.
Regarding your network example, i have programmed in winsock and done lots of network programming. As long as you have native api for two different hardwares (considering the standard bus MIL-STD 1553B even China uses i think that makes it even simpler for their hadware to talk to western systems). Worse come worse, you need an emulator that would take more resources but can over come seamless hardware connectivity problems.
I'm not sure USA would let China have the specs for link 16.
I don't think you get what I meant by networking. When you do programming through winsock, you are using existing network protcol like TCP/IP and such. When you use the drivers for those protocols, you get send and receive function prototypes, so you know what to call, but you don't know the implementation of these send/receive.
In any kind of network communication, there are probably 6 or 7 layers. But only about 4 well known layers: application, transport, network and link. You are basically normally programming at application level. If you are really hardcore, you might get to program the transport level drivers (UDP, TCP), very few people know what's going on a network level (IP, ...), let alone link level. If you have one side sending at transport layer with TCP and the other side receiving with UDP. It's never going to work.
In any kind of data link, the protocol developers have to think about the following:
1. how big are the header size
2. how big are the data size
3. what format are the packet sent
4. how to ensure that the packet if received by a malicious party, cannot be decrypted.
5. how to ensure that the packet will eventually be sent to the receiving side (ie: how to guarantee delivery of data)
6. how to ensure that malicious party cannot fake sending a packet, how to distinguish between a good and a tampered packet.
7. if successfully sent a packet, how to proceed from there and if failed sending a packet, what to do.
basically, in order to achieve LPI and resistance toward jamming, you will have to reduce the packet size (so, you get less collissions of your packets and harder for opponent to recognize that you sent real data).
But if you do this, you have to sacrifice the data size (which would result in lower data rate) and/or header size (less information for receiving side, header size normally cannot go too low).
In order to guarantee delivery, you have to have certain header fields to indicate what the current count of delivery is and how many retries, and size of packet and several other information to be delivered. So, header size can never be too little.
And then there is the idea of frequency hopping. You send the first packet at certain frequency, and then you have to have a good algorithm to indicate to the receiver where the next packet is coming in at. (although, the actual process of recognizing packets is at link layer, I haven't really studied it and then there is the good old physical layer). Basically, when the other side is jamming you, you are going to have a lot of trouble sending packets through. There are different protocols in which you can deal with jamming. And the Chinese one is probably different from Link-16. If China knows exactly how link-16 works, China would be able to explore certain weaknesses in it. For example, maybe link-16 is weak against malicious party sending garbage data to it and such. Chinese jammers could exploit this if it exists.
As for phalcon, China could easily put its own transport layer driver on Phalcon. The Israeli software would only need to operate at the application level and use the interface given by China to interact with the transport layer. And then the Chinese data link would do the rest of the work.
It goes like
application->transport->network->link->physical
receive on the other side physical->link->network->transport->application
a lot of passing data around.
for a quick reference, you can check the 7 layers of OSI model