Technical and operational analysis of the fortress secure wireless access bridge (ES-520) in support of tactical military coalition operations
Fisher, Edward L.
Ehlert, James F.
MetadataShow full item record
Technology Studies (COASTS) field experimentation program, utilize an access point, wireless bridge, switch, and security gateway. Reducing equipment requirements in the field is most desirable to minimize the equipment footprint, cost, and power required. The COASTS research group, involved in developing a scalable, multi-mission, system of systems for coalition environments, relies heavily on Commercial-Off-The-Shelf (COTS) network technology. Evaluating the performance of COTS technology such as the Fortress Secure Wireless Access Bridge (ES-520) directly supports the programs objectives. This thesis will analyze the performance of the Fortress Secure Wireless Access Bridge (ES-520) vs. traditional 802.11a/b/g wireless access points. Additionally, radio frequency (RF) propagation performance will be analyzed for distance, mobility, sustainability, and technical advantages/disadvantages with respect to varying antenna configurations and physical parameters such as climate and terrain. Testing and evaluation will be accomplished under the COASTS field experimentation program.
Showing items related by title, author, creator and subject.
Gibson, J.; Kaminski, A.; Xie, Geoffrey (2005-06);Acoustic communications provide a viable means for underwater networking. However, extreme propagation delays, limited bandwidth, and half duplex communications, with its inherent use of delay inducing collision avoidance ...
Schofield, Brandan R.; Snelgrove, Brittany (Monterey, CA; Naval Postgraduate School, 2019-09);The Marine Corps Operating Concept (MOC) outlines critical tasks which will have a significant impact on current Marine Corps logistics Major Automated Information Systems (MAIS), especially as tactical units operate in ...
Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E. (A Linux Implementation of Temporal Access Controls, 2007-06-01);Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval ...