Supply point logistics integrated communications environment (SPLICE) local area computer network design issues for communications
Download
Author
Inman, Kenneth A., Jr.
Marthouse, Robert C., Jr.
Date
1985-03Advisor
Schneidewind, N.F.
Metadata
Show full item recordAbstract
This thesis examines the topology and transmission mediums for a local computer network to support interconnection of heterogenous computing devices within the Supply Point Logistics Communications Environment (SPICE). A topology and appropriate network protocols for management of the intranetwork communications are recommended. Additionally, a protocol to ensure proper delivery of messages which must pass outside the local network to reach another SPICE configuration via an interconnecting network is discussed.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Topology control of tactical wireless sensor networks using energy efficient zone routing
Thulasiraman, Preetha; White, Kevin A. (Chongqing University of Posts and Communications, 2016);The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is problematic ... -
C2 at the edge: operating in a disconnected low-bandwidth environment
Beachy, Alexander J. (Monterey, California: Naval Postgraduate School, 2015-06);A practical solution to providing effective command, control, and communications (C3) information from the warfighting commander to the edge of the battle space involves using light-weight, handheld devices connected on ... -
A Technique for Presenting a Deceptive Dynamic Network Topology
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...