An assessment of the Integrated Services Digital Network in support of Command, Control, Communications, and Intelligence Systems
Barnette, Mark Francis
Borger, Dan C.
MetadataShow full item record
This thesis explores the technology of the Integrated Services Digital Network (ISDN) and assess its value to strategic U.S. command, control, communications and intelligence (C3I). The author provides a brief overview of how telecommunications systems support the concept of C2 and what some of the problems are in this area. A review of the ISDN concept is provided which serves as the foundation for assessing the significance of ISDN to the military and its value in meeting the particular requirements associated with C3I telecommunication networks. Some of the more substantive issues of transitioning to ISDN are addressed such as network management and security. The author concludes that ISDN is an attractive long-term goal architecture. They are, however, several significant areas (applications, network management requirements, security architecture) that must be proactively addressed before ISDN is suitable for application in the C3I environment.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation Cullum, James; Irvine, Cynthia E.; Levin, Tim (International Conference on Warfare and Security (ICIW) Naval Postgraduate School , Monterey, California, USA 8-9 March 2007 pp.33-46, 2007-03-00);The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the ...
Goodwin, Michael S. (Monterey California. Naval Postgraduate School, 2005-09);"The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC). This threat ...