Joint mobile network operations routing design and quality of service configuration

Download
Author
Norton, David K.
Date
2007-09Advisor
Xie, Geoffrey
Second Reader
Gibson, John
Metadata
Show full item recordAbstract
Current inter-Service military networking is inefficient and lacks the desired level of Joint interoperability. Generally, the different Service branches build stove-piped networks that do not allow sharing of resources with the other branches. This approach is taken because the individual networks do not see the benefits of interconnectivity as worth the effort required to build secure, stable, and operationally effective network solutions. The Joint Mobile Network Operations (JMNO) project seeks standard solutions to the networking challenges of tactical military units. Through the publication of these standards, the intent is to reduce the complexity of finding networking solutions. This, in turn, reduces the perceived cost of inter-Service networking, making it more attractive to military units. This thesis provides some specific solutions that can be included in the JMNO standards. It examines network routing and provides recommendations for protocol selection and configuration. It also recommends implementing certain Quality of Service (QoS) controls to make more efficient use of available bandwidth, to provide preferred handling of critical time-sensitive traffic, and to provide individual networks a means of protecting their links from misuse by mobile units.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
Vordos, Ioannis (Monterey, California. Naval Postgraduate School, 2009-03);A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of DoS in which an attacker uses the ... -
Innovations in e-business: can government contracting be adapted to use crowdsourcing and open innovation?
Lauterbach-Hagan, Brian (Monterey, California. Naval Postgraduate School, 2010-09);This report investigates the scope and boundaries surrounding Open Innovation methodologies, Web 2.0 technologies and Crowdsourcing to determine their appropriateness for government use and how/when they can be used. Open ... -
Establishing semantic interoperability, under denied, disconnected, intermittant, and limited telecommunications conditions
Tebai, Wissem (Monterey, California: Naval Postgraduate School, 2014-06);The different approaches and technologies used for system integration and interoperability are explored in this thesis. Of particular interest is the use of the Data Distribution Service (DDS) open standard to integrate ...