INNOVATING TACTICAL NETWORKS: A SOFTWARE-DEFINED NETWORK APPROACH
Weitzel, John P.
Xie, Geoffrey G.
Volpano, Dennis M.
MetadataShow full item record
The current traditional network paradigm used in the Marine Corps has a demonstrated pattern of success in decades of austere environment operations. However, the adoption of a new idea to reduce time, effort, and manpower related to the installation, operation, and maintenance of tactical networks that simultaneously improves current network capability and capacity is attractive. That new idea is software-defined networks. Three primary keys will encourage the Marine Corps to embrace this new network technology: it must work with current network inventory, it must be capable of maintaining current configuration standards, and it must have the potential to greatly improve upon the current network model. On a physical test bed, this work seeks to evaluate all three requirements. Working topologies that consist of both software-defined and traditional network elements seamlessly connect to create a hybrid solution with near-term relevance. Then, the effective inclusion of virtual local area networks and access control lists on software-defined switches validate the ability to maintain current configuration standards. Lastly, instances of scripted configuration, resident topology constructs, and local central configuration tools show the automation potential of software-defined networks.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation Cullum, James; Irvine, Cynthia E.; Levin, Tim (International Conference on Warfare and Security (ICIW) Naval Postgraduate School , Monterey, California, USA 8-9 March 2007 pp.33-46, 2007-03-00);The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the ...
Parker, Thomas C. (Monterey, California: Naval Postgraduate School, 2015-09);Software-defined networks are revolutionizing networking by providing unprecedented visibility into and control over data communication networks. The focus of this work is to develop a method to extract network features, ...
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...