WorldWideScience

Sample records for fy06 ipv6 deployment

  1. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  2. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  3. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  4. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  5. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  6. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    gaming, and many other new applications cost even higher to be deployed on IPv4 ... mitigate the effects of the imminent depletion of the IPv4 address space and .... The government of Korea plans to achieve complete IPv6 transition in the.

  7. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  8. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  9. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  10. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  11. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  12. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  13. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  14. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  15. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  16. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  17. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  18. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  19. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  20. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  1. IPv6-protokolla

    OpenAIRE

    Hautanen, Jukka-Pekka

    2012-01-01

    Tämän työn tarkoituksena on tutkia IPv6-protokollaa ja IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työn alussa tarkastellaan IPv6-protokollan historiaa ja tämän hetkistä levinneisyyttä. Työssä paneudutaan tarkemmin IPv6-protokollan pääpiirteisiin: IPv6-protokollan osoitetyypit ja niiden esitystavat, aliverkotus, IPv6-protokollan uudistetun otsikon rakenne ja uudet lisäotsikot. Edellä mainittuja pääpiirteitä verrataan tarvittaessa IPv4-protokollaan, jotta nähdään parannukset...

  2. IPv6:n tietoturvaominaisuudet

    OpenAIRE

    Sorsa, Kari

    2013-01-01

    Opinnäytetyön tavoitteena on esitellä IPv6-protokolla ja selvittää sen tärkeimmät tietoturvaominaisuudet ja -riskit. Työtä tullaan käyttämään teoreettisena apuna Turun Ammattikorkeakoulun Lemminkäisenkadun toimipisteen laboratorioverkon siirtämisessä IPv6:een. Opinnäytetyö on jaettu kolmeen osaan. Ensimmäisessä esitellään lyhyesti IPv6:n historia ja kehitysvaiheet sekä uuden protokollan ominaisuudet. Toinen osa koostuu ominaisuus- ja tietoturvavertailusta IPv4:n ja IPv6:n välillä, jo...

  3. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  4. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  5. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  6. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  7. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  8. IPv6 geolokace a vizualizace

    OpenAIRE

    Suchomel, Tomáš

    2011-01-01

    Tato diplomová práce se zabývá problematikou geolokace IPv6 adres a vizualizace jejich lokalit. Má za úkol prozkoumat oblast IPv6, dále porovnává současné přístupy ke geolokaci. Jejím hlavním cílem je vybudovat systém, který dokáže vytvořit geolokační databázi s pravidelnou aktualizací a který bude schopen zobrazit geografickou lokalitu IPv6 adresy na světové mapě. Geolokační systém nejprve získá geografické adresy pro jednotlivé prefixy IPv6 z veřejně přístupného systému Whois. Tyto adresy t...

  9. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  10. A Brief History of MPLS Usage in IPv6

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2016-01-01

    Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is st...

  11. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  12. Esimerkkiyrityksen IPv6-lähiverkko

    OpenAIRE

    Palkki, Ville

    2013-01-01

    Insinöörityön tavoitteena oli suunnitella ja toteuttaa esimerkkiyrityksen IPv6-lähiverkko. Toisena tavoitteena oli suunnitella esimerkkiyrityksen siirtyminen IPv4-protokollasta IPv6-protokollaan. Työssä käsiteltiin IPv6-protokollaa ensin teoreettisesti ja tämän jälkeen suunniteltiin sekä rakennettiin toimiva IPv6-lähiverkko. Aluksi työssä käytiin läpi IPv6-protokollan etuja verrattuna vanhaan IPv4-protokollaan. Teoriaosuudessa selvitettiin myös IPv6-protokollan rakennetta ja lähetysformaa...

  13. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  14. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  15. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  16. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  17. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  18. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when...

  19. Current Status of IPv6 Management

    OpenAIRE

    Astic , Isabelle; Festor , Olivier

    2002-01-01

    Nowadays, we are at an important time of the development of the IPv6 (Internet Protocol version 6) network. Until now, this protocol was used only between IPv6 «islands». These islands were connected by IPv4 (Internet Protocol version 4) networks. So the transport of IPv6 packets was made through IPv4 ones, or into MPLS (MultiProtocol Label Switching) tunnels. Now, that real IPv6 native equipment appears, it is possible to create real native IPv6 networks.Because in these networks, IPv4 does ...

  20. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    39 List of References 43 Initial Distribution List 47 vii THIS PAGE INTENTIONALLY LEFT BLANK viii List of Figures Figure 1.1 Google User IPv6 Adoption...2 Figure 1.1: Google User IPv6 Adoption Statistics, from June 2014 [3] For example, as a result of expanding use of IPv6, it is hypothesized that a...excessive annoyance of poorly crafted advertising emails, they can sometimes contain attachments or links to scam offers, phishing attempts, or malicious

  1. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  2. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    ground truth datasets. In doing so, we investigate the following: • What is the accuracy of CBG when geolocating IPv6 hosts? • What are the accuracy...the overall PL is shorter for IPv6 than IPv4 which is consistent to what was found in recent work discussed in Section 3.5. Note that the average PL...growth of IPv6 addresses has increased significantly since 2010.The rate of increase of IPv6 usage is expected to continue; thus the need to determine

  3. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  5. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  6. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  7. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  8. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  9. Siirtyminen IPv6-protokollaan yrityksen verkkolaitteistossa

    OpenAIRE

    Lindén, Kalle

    2012-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, mitä muutoksia Päijät-Hämeen koulutuskonsernin (PHKK) tietoverkon runkolaitteissa tarvitsee tehdä, jotta voidaan ottaa IPv6-protokolla käyttöön. Siirtyminen IPv6-protokollaan tulee olemaan välttämätön toimenpide, koska IPv4-protokollasta loppuvat uudet yksilölliset osoitteet. IPv4- ja IPv6-protokollien suurimmat erot ovat osoitekentän koon kasvaminen 32 bitistä 128 bittiin. Aluksi IPv4-osoitteistuksessa oli käytössä luokallinen osoitejärjest...

  10. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  11. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far t...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses.......The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...

  12. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  13. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  14. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  15. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  16. A Literature Survey on Handoff for Mobile IPv6

    OpenAIRE

    Zongpu Jia; Gaolei Wang; Ran Zhao

    2011-01-01

    With the development of network technology, IPv6 will be widely used in the next generation Internet, IPv6 will be used in the next generation Internet, IPv6 could combine mobile networks and fixed wireless networks closely, which brings great convenience to people’s live. The handoff delay of Mobile IPv6 seriously affected the real-time communication service quality, therefore various improvement methods based on the basic Mobile IPv6 protocol are proposed. The working principle of Mob...

  17. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  18. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  19. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  20. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  1. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  2. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  3. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  4. Wind Powering America FY06 Activities Summary

    Energy Technology Data Exchange (ETDEWEB)

    2007-02-01

    The Wind Powering America FY06 Activities Summary reflects the accomplishments of our state wind working groups, our programs at the National Renewable Energy Laboratory, and our partner organizations. The national WPA team remains a leading force for moving wind energy forward in the United States. WPA continues to work with its national, regional, and state partners to communicate the opportunities and benefits of wind energy to a diverse set of stakeholders. WPA now has 29 state wind working groups (welcoming New Jersey, Indiana, Illinois, and Missouri in 2006) that form strategic alliances to communicate wind's benefits to the state stakeholders. More than 120 members of national and state public and private sector organizations from 34 states attended the 5th Annual WPA All-States Summit in Pittsburgh in June.

  5. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  6. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  7. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  8. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  9. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  10. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  11. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  12. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  13. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  14. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  15. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  16. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  17. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  18. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  19. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  20. RIPng- A next Generation Routing Protocal (IPv6) | Falaye | Journal ...

    African Journals Online (AJOL)

    ... Information Protocol Next Generation (RIPng) owing to the current depletion rate of IPv4. ... that support the Internet Protocol Version 6 (IPv6).addressing scheme. ... A brief history is given; its various versions are discussed, and detailed ...

  1. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  2. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  3. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  4. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  5. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  6. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  7. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  8. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  9. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  10. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  11. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  12. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  13. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  14. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  15. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  16. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  17. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  18. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  19. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  20. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Science.gov (United States)

    2010-09-17

    ... importance of the Internet to U.S. innovation, prosperity, education, and political and cultural life, NTIA... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Internet..., the U.S. Government, and the Internet Economy AGENCY: National Telecommunications and Information...

  1. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  2. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  3. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  4. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  5. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  6. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  7. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  8. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  9. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  10. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  11. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  12. CORPORATE MIGRATION FROM IPv4 TO IPv6 USING DIFFERENT TRANSITION MECHANISMS

    OpenAIRE

    Nellore Karthikeyan*, K.Chandra Mouli

    2016-01-01

    Currently, the Internet world is confronting the huge issue that is exhaustion of IP addresses with the IPv4 protocol. This paper contains the imperative hypothetical ideas of new era Internet Protocol IPv6 which tackles the issue of IP tending to furthermore concentrate on IPv6 address design, directing and three mechanisms of migration from IPv4 to IPv6 system: Dual Stack, Translation and Tunneling utilizing Network Simulator as Packet tracer. This paper more accentuation on network migrati...

  13. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  14. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  15. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  16. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  17. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  18. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  19. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  20. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  1. IPv6:n käyttöönotto PK-yrityksessä

    OpenAIRE

    Salonen, Arttu Petteri

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, kuinka IPv6-yhteydet otetaan käyt-töön PK-yrityksessä. Työssä selvitetään minkälaiset vaatimukset IPv6 asettaa lait-teistolle ja minkälaisia käytännön asioita yrityksen täytyy huomioida IPv6:n käyt-töönotossa. Lisäksi työssä on laboratoriosimulaation avulla havainnollistettu eri käyt-töjärjestelmien tukea IPv6:lle ja käyttöönottoon liittyviä reititin- ja osoitekonfiguraati-oita. Käyttöönoton lisäksi opinnäytetyössä esitellään IPv6-protokoll...

  2. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  3. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  4. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  5. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  6. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  7. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  8. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  9. IPv4 to IPv6 Transition: Optimal Routing Protocol within Dual Stack and Tunneling

    OpenAIRE

    Aparna Sivaprakash; S. Kayalvizhi

    2016-01-01

    The number of global internet users has been growing exponentially, necessitating a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet the current requirement for IP addresses. To meet the future IP address requirement, a new version IPv6 has been introduced since 1999. However IPv6 is not backward compatible with IPv4.since it is not possible to migrate all the networking devices to ...

  10. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  11. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  12. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  13. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  14. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  15. Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter

    OpenAIRE

    Andersson, David

    2012-01-01

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.   Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då...

  16. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  17. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  18. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  19. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  20. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  1. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  2. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  3. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  4. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  5. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  6. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  7. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  8. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  9. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  10. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  11. Estudi d'implantació de la IPv6 al CTTC

    OpenAIRE

    Escoda Ramon, Jordi

    2017-01-01

    In recent years, the number of devices connected to Internet has increased exponentially and in fact, it is estimated that the demand keep on increasing. When IPv4 protocol was introduced, this evolution was not expected. Over the years several limitations have arosen, including scalability and the unsustainable growth of the Internet routing table. In the late 90s, IPv6 protocol was defined to solve these issues and add new features. Currently, the Centre Tecnològic de Telecomunicacions de C...

  12. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  13. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  14. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  15. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  16. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  17. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  18. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  19. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  20. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  1. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  2. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  3. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  4. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  5. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  6. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  7. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  8. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  9. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  10. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  11. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  12. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  13. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  14. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  15. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  16. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  17. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  18. Implantación de IPv6 : red, mecanismos de transición IPv4-IPv6, servicios de aplicación y migración de aplicaciones

    OpenAIRE

    Rodríguez Hervella, Juan Francisco

    2003-01-01

    El presente proyecto fin de carrera trata los aspectos más importantes de la gestión y migración de las redes IP hacia el nuevo protocolo de red IPv6 y pone gran énfasis en experiencias de implantación de los mismos. A lo largo de este proyecto se profundiza sobre los distintos mecanismos de transición IPv4/IPv6 existentes, concretamente se describen y se prueban (en entornos Linux y FreeBSD) los siguientes: .Túneles 6t04, automáticos, configurados. .Mecanismo DSTM, TRT, ISATAP, NAT-PT. Tambi...

  19. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  20. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  1. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  2. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  3. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  4. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  5. Modelování IPv6 v prostředí OMNeT++

    OpenAIRE

    Černý, Marek

    2011-01-01

    OMNeT++ je diskrétní simulátor hojně používaný k vytváření nejrůznějších síťových simulací. Lze jej dále rozšířit např. frameworkem INET, který obsahuje modely protokolů a zařízení z prostředí TCP/IP síti. V této práci se soustředíme na zkoumání současných možností balíku INET modelovat internetový protokol verze 6. Obzvláště se zaměřujeme na podporu směrování. V rámci implementace pak byly vytvořeny moduly dual-stack směrovače a dual-stack klienta s podporou manuální i automatické IPv6 adres...

  6. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  7. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  8. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  9. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  10. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  11. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  12. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  13. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  14. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    Science.gov (United States)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  15. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  16. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  17. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  18. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  19. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  20. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  1. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  2. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  3. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  4. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  5. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  6. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  7. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  8. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  9. Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti směrování

    OpenAIRE

    Filip, Tomáš

    2015-01-01

    This master thesis deals with integration of IPv6 network protocol into production computer network of Mendel University in Brno in the routing field. The integration includes the Dual Stack transition mechanism, IPv6 address plan, static routing at the perimeter of the university network, and OSPFv3 and MP-BGP routing protocols. Proposed integration plan was verified in the Laboratory of computer networking at the Department of Informatics at FBE MENDELU, and it serves as a template for a fi...

  10. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  11. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  12. Mobile IPv6における分散ホームエージェントの実現

    OpenAIRE

    福田, 浩章

    2005-01-01

    電子機器端末の小型化技術や通信技術の発達により、身の周りのあらゆる電子機器がなんらかのかたちでインターネットに接続されるようになってきた。こうしたときにさらなる利便性として求められるものが、移動通信のサポートである。Mobile IPv6 技術は、移動中の継続的な通信を支援する技術の一つである。MobileIPv6 では移動中でも同じIP アドレスを使い続けることができる。これはホームエージェントと呼ばれるノードが移動端末の所在を把握し、他の端末との通信を仲介することにより実現される。このホームエージェントは、基本的には1 台の設置を前提として仕様が決められている。本研究では複数のホームエージェントをネットワーク上に分散して配置する仕組みを提案し、実現する。それにより、Mobile IPv6 の運用における全体的なネットワークの効率化と負荷分散を目指す。...

  13. ApertosオペレーティングシステムによるIPv6ルータの構築

    OpenAIRE

    伊藤, 純一郎; 横手, 靖彦; 所, 真理雄; Jun-ichiro, Itoh; Yasuhiko, Yokote; Mario, Tokoro; 慶応義塾大学理工学研究科計算機科学専攻:Sony CSL; ソニー(株)アーキテクチャ研究所; 慶応義塾大学:Sony CSL; Department of Computer Science, Keio University:Sony CSL; Architecture Laboratory, Sony Corporation; Keio University:Sony CSL

    1997-01-01

    インターネットで現在利用されているIPv4プロトコルは,インターネットの爆発的成長に耐えられない,という指摘がある.このため,IPv6プロトコルが提案され,現在移行へ向けた考察が行われている.しかしながら,現在のルータソフトウェア構成法では,今後行われるプロトコル策定やプロトコルの仕様変更などに柔軟に対処することが困難である.本論文では,Apertosオペレーティングシステム上にIPv6ルータのプロトコル処理部を実装することで,これらの問題の解決を目指している.本方法では,並行オブジェクトによるソフトウェア構成によりプロトコル処理部のモジュール間の独立性を確保し,自己反映計算に基づくOSアーキテクチャの利用によりプログラマに最適なプログラミング環境を提供することができる....

  14. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    OpenAIRE

    Nelson Enrique Vera Parra; Danilo Alfonso López; Héctor Cristyan Manta Caro

    2014-01-01

    En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN), redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M), al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro....

  15. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  16. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  17. PROTOTIPO PARA EL ANÁLISIS DEL RENDIMIENTO EN EL TRÁFICO DE UN SERVICIO BROADCAST UTILIZANDO LOS PROTOCOLOS HTTP Y RTP SOBRE IPV6 EN UNA RED ACADÉMICA DE TECNOLOGÍA AVANZADA

    Directory of Open Access Journals (Sweden)

    Roberto Ferro

    2011-08-01

    Full Text Available En el presente artículo se condensan los resultados obtenidos de la implementación y modelado de un Prototipo de Servicio Streaming sobre el Sistema Operativo Fedora 13 con el Programa VLC en la Red de Investigación y  Tecnología Avanzada de la Universidad Distrital RITA-UD sobre IPV6 utilizando como cliente la Universidad Minuto de Dios vía RUMBO mediante un Tunel 6a4.

  18. Framework en estructuras con direccionamiento IPV6 sobre OSSTMM para la corrección de vulnerabilidades de seguridad en un laboratorio de la academia CISCO de la ESPOCH

    OpenAIRE

    Martínez Santander, Carlos José

    2015-01-01

    Se elaboró una propuesta para realizar un Framework en estructuras con direccionamiento IPv6 sobre Open Source Security Testing Methodology Manual (OSSTMM) para la corrección de vulnerabilidades de seguridad en un laboratorio de Academia Local de redes (CISCO) de la Escuela Superior Politécnica de Chimborazo.Se recopilo tendencias sobre vulnerabilidades de seguridad, además de una experimentación, análisis y aplicación, para solucionar errores de seguridad en arquitecturas I...

  19. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  20. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    Directory of Open Access Journals (Sweden)

    Nelson Enrique Vera Parra

    2014-04-01

    Full Text Available En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN, redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M, al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro. Estas redes de nueva generación imponen restricciones en cuanto al poder de procesamiento, ancho de banda y recursos de energía, lo que re¬presenta una gran limitante en la implementación de mecanismos de seguridad. En este sentido, en lo últimos años han surgido diversas propuestas para la administración de claves, procedimientos de firma digital y cifrado de datos basados en curvas elípticas e híper-elípticas, que logran niveles de seguridad equivalentes a los algoritmos convencionales basados en algoritmos Diffie-Hellman y Rivest-Shamir-Adleman (RSA, pero que reducen la longitud de clave y, por ende, los recursos computacionales y de red asociados. Este artículo examina los algoritmos basados en criptografía de curvas elípticas (ECC y su aplicación a redes móviles e inalámbricas de nueva generación habilitadas para IPv6. Así mismo, describe un modelo de simulación para la evaluación de ECC, donde se comparan los recursos computacionales necesarios y las limitaciones en mecanismos ligeros de seguridad.

  1. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  2. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    emphasis on wireless networks, distributed ... their own processing power, memory and other resources. The interconnection may be ... Networks that transfer data in the form of packets are called packet switched networks. Here, the data to.

  3. Domain Name Server Security (DNSSEC) Protocol Deployment

    Science.gov (United States)

    2014-10-01

    Platform How IPv6 and DNSSEC Change the Intranets OARC Workshop San Francisco, March 2011 Materials available at: https://indico.dns-oarc.net...DNSSEC In Operation NIC .sn The Mensa project - Measuring DNS Health and Security How IPv6 and DNSSEC change the Intranets DNSSEC Update for DE...Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill Global IPv6 Summit, Taipei, Taiwan, November 2011 TWCERT/CC

  4. Router Dual IPv4/IPv6: una transición hacia las Redes IPv6

    OpenAIRE

    Marco Hernández; César Acevedo; César Berdeja; Keith Peña

    2006-01-01

    Desde su inicio, Internet ha crecido rápidamente transformándose desde una red de investigación a una red comercial con un alcance mundial. Internet se ha convertido en un medio apropiado y económico para la colaboración de usuarios, aprendizaje, comercio electrónico y entretenimiento. Un consenso común indica que Internet se podría transformar en el medio común para la convergencia de la comunicación de voz, video y datos. Al mismo tiempo, está evolucionando desde un servicio sin garantías h...

  5. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  6. Deployment Repeatability

    Science.gov (United States)

    2016-08-31

    large cohort of trials to spot unusual cases. However, deployment repeatability is inherently a nonlinear phenomenon, which makes modeling difficult...and GEMS tip position were both tracked during ground testing by a laser target tracking system. Earlier SAILMAST testing in 2005 [8] used...recalls the strategy used by SRTM, where a constellation of lights was installed at the tip of the boom and a modified star tracker was used to track tip

  7. Message Oriented Communication For Ipv6 Enabled Pervasive Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Szydlo

    2013-01-01

    Full Text Available An increasing number of electronic devices in our environment is equipped with radio interfaces used for exposing and using their functionality by other devices and applications. Wireless communication in this class of devices is exposed to a number of situations that may occur including limited energy resources, equipment failures, nodes mobility and loss of communication between nodes. It causes that commonly used standards and protocols for sharing services are not practical and do not take into account the occurrence of these problems. The paper presents the concept of communication that relies on the exchange of messages between wireless pervasive devices available in the environment.

  8. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  9. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    Science.gov (United States)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  10. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  11. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  12. Quality function deployment

    International Nuclear Information System (INIS)

    1981-10-01

    This book indicates quality function deployment with quality and deployment of quality function, process and prospect of quality function deployment and development, product process and conception of quality table, deployment of quality demand, design of quality table and application of concurrent multi design, progress design and quality development, main safe part and management of important function part, quality development and deployment of method of construction, quality deployment and economics, total system of quality function deployment and task of quality function deployment in the present and future.

  13. Solar sail deployment experiment

    OpenAIRE

    Shimose, Shigeru; 下瀬 滋

    2006-01-01

    Solar Sail move by receiving momentum of photons in sunlight. This paper presents results of some Spin-Stabilized Solar Sail deployment experiment. ISAS has successfully deployed, for the first time in the world, the polyimide Solar Sail taking advantage of centrifugal force in space. Based on this result, the new deployment mechanism is being developed which retracts the 50 m diameter sail.

  14. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  15. Tether Deployer And Brake

    Science.gov (United States)

    Carroll, Joseph A.; Alexander, Charles M.

    1993-01-01

    Design concept promises speed, control, and reliability. Scheme for deploying tether provides for fast, free, and snagless payout and fast, dependable braking. Developed for small, expendable tethers in outer space, scheme also useful in laying transoceanic cables, deploying guidance wires to torpedoes and missiles, paying out rescue lines from ship to ship via rockets, deploying antenna wires, releasing communication and power cables to sonobuoys and expendable bathythermographs, and in reeling out lines from fishing rods.

  16. RSOI: Force Deployment Bottleneck

    National Research Council Canada - National Science Library

    D'Amato, Mark

    1998-01-01

    This study uses The Theory Of Constraints (TOC) management methodology and recent military missions to show that RSOI operations are generally the limiting constraint to force deployment operations...

  17. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  18. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    .... Gulf War health questions have resulted in controversy over potentially hazardous exposures during the deployment, the possibility of adverse affects from preventive health measures, and the role...

  19. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  20. Part 8. Deployment considerations

    International Nuclear Information System (INIS)

    Dance, K.D.; Chang, Y.I.; Daly, T.A.

    1980-01-01

    This report addresses considerations of fast breeder reactor development and deployment from a national perspective. Nations vary greatly in their expertise and interest relative to nuclear power, and hence a single set of steps to be taken by a nation in decision-making on breeder development and deployment cannot be presented. The approach taken in this report is to present discussions on key factors influencing the breeder development and deployment decisions, especially in non-breeder nations, by drawing upon historical perspectives of the Light Water Reactor for comparison

  1. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    ... of stress in causing chronic illness. The lack of comprehensive deployment health surveillance has made it difficult to determine possible causes of adverse health effects reported by Gulf War veterans...

  2. Modeling EERE deployment programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge for future research.

  3. RSOI: Force Deployment Bottleneck

    National Research Council Canada - National Science Library

    D'Amato, Mark

    1998-01-01

    .... This runs counter to the popular belief that strategic lift is the limiting constraint. The study begins by highlighting the genesis of the military's current force projection strategy and the resulting importance of rapid force deployments...

  4. Deployable Brake for Spacecraft

    Science.gov (United States)

    Rausch, J. R.; Maloney, J. W.

    1987-01-01

    Aerodynamic shield that could be opened and closed proposed. Report presents concepts for deployable aerodynamic brake. Brake used by spacecraft returning from high orbit to low orbit around Earth. Spacecraft makes grazing passes through atmosphere to slow down by drag of brake. Brake flexible shield made of woven metal or ceramic withstanding high temperatures created by air friction. Stored until needed, then deployed by set of struts.

  5. Advanced OS deployment system

    OpenAIRE

    Galiano Molina, Sebastián

    2007-01-01

    The main project’s objective is to design and build an OS deployment system taking advantage of the Linux OS and the Open Source community developments. This means to use existing technologies that modularize the system. With this philosophy in mind, the number of developed code lines within the project is keeping as small as possible. As REMBO, the OS deployment system to develop has to be transparent to the user. This means a system with a friendly user interface and no te...

  6. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, Katherine A.; Hostick, Donna J.; Belzer, David B.; Livingston, Olga V.

    2007-11-08

    The purpose of this report is to compile information and conclusions gathered as part of three separate tasks undertaken as part of the overall project, “Modeling EERE Deployment Programs,” sponsored by the Planning, Analysis, and Evaluation office within the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE). The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address improvements to modeling in the near term, and note gaps in knowledge where future research is needed.

  7. Remote Systems Design & Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  8. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  9. Cooperative Technolgy Deployed

    NARCIS (Netherlands)

    Koenders, E.; Velt, R. in 't

    2011-01-01

    After the successful demonstrations of cooperative technology by the CVIS and Safespot projects the question remains how this technology can be successfully deployed. This question is explored by the Field Operational Test project FREILOT, which aims to provide fuel economy applications that must be

  10. Fusion Power Deployment

    International Nuclear Information System (INIS)

    Schmidt, J.A.; Ogden, J.M.

    2002-01-01

    Fusion power plants could be part of a future portfolio of non-carbon dioxide producing energy supplies such as wind, solar, biomass, advanced fission power, and fossil energy with carbon dioxide sequestration. In this paper, we discuss key issues that could impact fusion energy deployment during the last half of this century. These include geographic issues such as resource availability, scale issues, energy storage requirements, and waste issues. The resource needs and waste production associated with fusion deployment in the U.S. should not pose serious problems. One important feature of fusion power is the fact that a fusion power plant should be locatable within most local or regional electrical distribution systems. For this reason, fusion power plants should not increase the burden of long distance power transmission to our distribution system. In contrast to fusion power, regional factors could play an important role in the deployment of renewable resources such as wind, solar and biomass or fossil energy with CO2 sequestration. We examine the role of these regional factors and their implications for fusion power deployment

  11. Large Deployable Reflector (LDR)

    Science.gov (United States)

    Alff, W. H.

    1980-01-01

    The feasibility and costs were determined for a 1 m to 30 m diameter ambient temperature, infrared to submillimeter orbiting astronomical telescope which is to be shuttle-deployed, free-flying, and have a 10 year orbital life. Baseline concepts, constraints on delivery and deployment, and the sunshield required are examined. Reflector concepts, the optical configuration, alignment and pointing, and materials are also discussed. Technology studies show that a 10 m to 30 m diameter system which is background and diffraction limited at 30 micron m is feasible within the stated time frame. A 10 m system is feasible with current mirror technology, while a 30 m system requires technology still in development.

  12. Deployable reflector configurations

    Science.gov (United States)

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  13. Treatment Deployment Evaluation Tool

    International Nuclear Information System (INIS)

    M. A. Rynearson; M. M. Plum

    1999-01-01

    The U.S. Department of Energy (DOE) is responsible for the final disposition of legacy spent nuclear fuel (SNF). As a response, DOE's National Spent Nuclear Fuel Program (NSNFP) has been given the responsibility for the disposition of DOE-owned SNF. Many treatment technologies have been identified to treat some forms of SNF so that the resulting treated product is acceptable by the disposition site. One of these promising treatment processes is the electrometallurgical treatment (EMT) currently in development; a second is an Acid Wash Decladding process. The NSNFP has been tasked with identifying possible strategies for the deployment of these treatment processes in the event that a treatment path is deemed necessary. To support the siting studies of these strategies, economic evaluations are being performed to identify the least-cost deployment path. This model (tool) was developed to consider the full scope of costs, technical feasibility, process material disposition, and schedule attributes over the life of each deployment alternative. Using standard personal computer (PC) software, the model was developed as a comprehensive technology economic assessment tool using a Life-Cycle Cost (LCC) analysis methodology. Model development was planned as a systematic, iterative process of identifying and bounding the required activities to dispose of SNF. To support the evaluation process, activities are decomposed into lower level, easier to estimate activities. Sensitivity studies can then be performed on these activities, defining cost issues and testing results against the originally stated problem

  14. Economics of ALMR deployment

    International Nuclear Information System (INIS)

    Delene, J.G.; Fuller, L.C.; Hudson, C.R.

    1994-01-01

    The Advanced Liquid Metal Reactor (ALMR) has the potential to extend the economic life of the nuclear option and of reducing the number of high level waste repositories which will eventually be needed in an expanding nuclear economy. This paper reports on an analysis which models and evaluates the economics of the use of ALMRs as a component of this country's future electricity generation mix. The ALMR concept has the ability to utilize as fuel the fissile material contained in previously irradiated nuclear fuel (i.e., spent fuel) or from surplus weapons grade material. While not a requirement for the successful deployment of ALMR power plant technology, the reprocessing of spent fuel from light water reactors (LWR) is necessary for any rapid introduction of ALMR power plants. In addition, the reprocessing of LWR spent fuel may reduce the number of high level waste repositories needed in the future by burning the long-lived actinides produced in the fission process. With this study, the relative economics of a number of potential scenarios related to these issues are evaluated. While not encompassing the full range of all possibilities, the cases reported here provide an indication of the potential costs, timings, and relative economic attractiveness of ALMR deployment

  15. ALMR deployment economic analysis

    International Nuclear Information System (INIS)

    Delene, J.G.; Fuller, L.C.; Hudson, C.R.

    1993-06-01

    This analysis seeks to model and evaluate the economics of the use of Advanced Liquid Metal Reactors (ALMR) as a component of this country's future electricity generation mix. The ALMR concept has the ability to utilize as fuel the fissile material contained in previously irradiated nuclear fuel (i.e., spent fuel). While not a requirement for the successful deployment of ALMR power plant technology, the reprocessing of spent fuel from light water reactors (LWR) is necessary for any rapid introduction of ALMR power plants. In addition, the reprocessing of LWR spent fuel may reduce the number of high level waste repositories needed in the future by burning the long-lived actinides produced in the fission process. With this study, the relative economics of a number of potential scenarios related to these issues are evaluated. While not encompassing the full range of all possibilities, the cases reported here provide an indication of the potential costs, timings, and relative economic attractiveness of ALMR deployment

  16. Complex Deployed Responsive Service

    Science.gov (United States)

    Parry, Glenn; McLening, Marc; Caldwell, Nigel; Thompson, Rob

    A pizza restaurant must provide product, in the form of the food and drink, and service in the way this is delivered to the customer. Providing this has distinct operational challenges, but what if the restaurant also provides a home delivery service? The service becomes deployed as the customer is no-longer co-located with the production area. The business challenge is complicated as service needs to be delivered within a geographic region, to time or the pizza will be cold, and within a cost that is not ­prohibitive. It must also be responsive to short term demand; needing to balance the number of staff it has available to undertake deliveries against a forecast of demand.

  17. Implementation and Evaluation of DSMIPv6 for MIPL

    Science.gov (United States)

    Wang, Mingli; Hu, Bo; Chen, Shanzhi; Sun, Qinxue

    Mobile IPv6 performs mobility management to mobile node within IPv6 networks. Since IPv6 is not widely deployed yet, it’s an important feature to let Mobile IPv6 support mobile node moving to IPv4 network and maintaining the established communications. DSMIPv6 specification extends Mobile IPv6 capabilities to allow dual stack mobile nodes to move within IPv4 and IPv6 networks. This paper describes the implementation of this feature based on open source MIPL under Linux. By performing experiments on testbed using the implementation, it is confirmed that the DSMIPv6 works as expected.

  18. CCT deployment considerations

    International Nuclear Information System (INIS)

    Yamagata, B.

    1993-01-01

    The deployment of Clean Coal Technologies (CCT) is discussed by asserting that in the case of commercializing CCT, the government's involvement should not stop at the demonstration gate. Two areas in this regard are described. First, the need for the domestic DOE CCT Program to focus on the domestic deployment of demonstrated technologies, and second, the need to recognize that to participate in the phenomenal growth of international power markets through use of clean coal or advanced coal technologies an aggressive partnering between the government and industry to demonstrate technologies abroad will be required. The Clean Coal Technology Coalition's (CCT) primary mission has been to promote the development and use of CCTs. The CCT is a strong advocate for the DOE CCT Program and applauds the Department's and industry's success at developing many coal-based technologies. By current design, the DOE program is said to go no further than the initial demonstration of a technology. Since the inception of CCT in 1986, the Coalition has advocated the need to pursue a partnership with government in which more than one demonstration of the same or similar technology is supported by the clean coal program. Only in this way can one be assured of widespread acceptance of any given technology. There exists a gap (call it a open-quotes risk gapclose quotes) between CCTs that have been successfully demonstrated (and presumably available for commercial use) and their widespread commercial use. A technology matrix has been developed in which the developmental status of a variety of clean coal technologies is demonstrated. While still too early to pass judgment, it appears that while success is being achieved in demonstrating advanced coal technologies, the market place - for several reasons - is not, indeed may have no plans, to adopt these technologies

  19. CMS software deployment on OSG

    International Nuclear Information System (INIS)

    Kim, B; Avery, P; Thomas, M; Wuerthwein, F

    2008-01-01

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment

  20. CMS software deployment on OSG

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B; Avery, P [University of Florida, Gainesville, FL 32611 (United States); Thomas, M [California Institute of Technology, Pasadena, CA 91125 (United States); Wuerthwein, F [University of California at San Diego, La Jolla, CA 92093 (United States)], E-mail: bockjoo@phys.ufl.edu, E-mail: thomas@hep.caltech.edu, E-mail: avery@phys.ufl.edu, E-mail: fkw@fnal.gov

    2008-07-15

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment.

  1. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  2. Infrastructure Engineering and Deployment Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Infrastructure Engineering and Deployment Division advances transportation innovation by being leaders in infrastructure technology, including vehicles and...

  3. Annual report of the international nuclear energy research initiative OSMOSE project (FY06).

    Energy Technology Data Exchange (ETDEWEB)

    Klann, R. T.; Hudelot, J. P.; Drin, N.; Zhong, Z.; Nuclear Engineering Division; Commissariat a l Energie Atomique

    2007-08-29

    The goal of the OSMOSE program is to measure the reactivity effect of minor actinides in known neutron spectra of interest to the Generation-IV reactor program and other programs and to create a database of these results for use as an international benchmark for the minor actinides. The results are then compared to calculation models to verify and validate integral absorption cross-sections for the minor actinides. The OSMOSE program includes all aspects of the experimental program--including the fabrication of fuel pellets and samples, the oscillation of the samples in the MINERVE reactor for the measurement of the reactivity effect, reactor physics modeling of the MINERVE reactor, and the data analysis and interpretation of the experimental results.

  4. FY06 NRL DoD High Performance Computing Modernization Program Annual Reports

    Science.gov (United States)

    2007-10-31

    nonequilibrium MD with isokinetic thermostatting. We have explored both the Green - Kubo and the mean-square displacement approaches to transport...codes. The flow solver was combined with adaptive re-meshing techniques for these transient problems with moving grids and was also integrated with the...simple one-dimensional eddy viscosity to a fully three-dimensional direct numerical simulation. Coupling between fluid and sediment phases varies from

  5. 300 Area D4 Project 2nd Quarter FY06 Building Completion Report

    International Nuclear Information System (INIS)

    Smith, David S.

    2006-01-01

    This report documents the deactivation, decontamination, decommissioning, and demolition of 16 buildings in the 300 Area of the Hanford Site. The D4 of these facilities included characterization, engineering, removal of hazardous and radiologically contaminated materials, equipment removal, utility disconnection, deactivation, decontamination, demolition of the structure, and stabilization or removal of the remaining slab and foundation as appropriate.

  6. FY06 L2C2 HE program report Zaug et al.

    Energy Technology Data Exchange (ETDEWEB)

    Zaug, J M; Crowhurst, J C; Howard, W M; Fried, L E; Glaesemann, K R; Bastea, S

    2008-08-01

    The purpose of this project is to advance the improvement of LLNL thermochemical computational models that form the underlying basis or input for laboratory hydrodynamic simulations. Our general work approach utilizes, by design, tight experimental-theoretical research interactions that allow us to not empirically, but rather more scientifically improve LLNL computational results. The ultimate goal here is to confidently predict through computer models, the performance and safety parameters of currently maintained, modified, and newly designed stockpile systems. To attain our goal we make relevant experimental measurements on candidate detonation products constrained under static high-pressure and temperature conditions. The reduced information from these measurements is then used to construct analytical forms that describe the potential surface (repulsive energy as a function of interatomic separation distance) of single and mixed fluid or detonation product species. These potential surface shapes are also constructed using input from well-trusted shock wave physics and assorted thermodynamic data available in the open literature. Our potential surfaces permit one to determine the equations of state (P,V,T), the equilibrium chemistry, phase, and chemical interactions of detonation products under a very wide range of extreme pressure temperature conditions. Using our foundation of experimentally refined potential surfaces we are in a position to calculate, with confidence, the energetic output and chemical speciation occurring from a specific combustion and/or detonation reaction. The thermochemical model we developed and use for calculating the equilibrium chemistry, kinetics, and energy from ultrafast processes is named 'Cheetah'. Computational results from our Cheetah code are coupled to laboratory ALE3D hydrodynamic simulation codes where the complete response behavior of an existing or proposed system is ultimately predicted. The Cheetah thermochemical code is also used by well over 500 U.S. government DoD and DOE community users who calculate the chemical properties of detonated high explosives, propellants, and pyrotechnics. To satisfy the growing needs of LLNL and the general user community we continue to improve the robustness of our Cheetah code. The P-T range of current speed of sound experiments will soon be extended by a factor of four and our recently developed technological advancements permit us to, for the first time, study any chemical specie or fluid mixture. New experiments will focus on determining the miscibility or coexistence curves of detonation product mixtures. Our newly constructed ultrafast laser diagnostics will permit us to determine what chemical species exist under conditions approaching Chapman-Jouguet (CJ) detonation states. Furthermore we will measure the time evolution of candidate species and use our chemical kinetics data to develop new and validate existing rate laws employed in future versions of our Cheetah thermochemical code.

  7. Fabrication Equipment for Periodic Material Assemblies and Ph Assemblies and Photonic Crystals (DURIP FY06)

    Science.gov (United States)

    2008-04-29

    An exhaust hood is necessary for binder removal. Cooling requires a fan at a second speed setpoint . Firing profiles need to be precisely...29,935.06 from Ohio match. Plasmalab 80 Plus Compact etching system (left) and heater/ chiller unit (right). CAHN TherMax 500 High Pressure TGA...the current research is aimed to optimize parameters of the structure, in order to improve the resonant properties of the periodic layered structures

  8. Joint Service Chemical and Biological Defense Program: FY 06-07 Overview

    Science.gov (United States)

    2006-01-01

    Performers Molecular model of human plasma-derived butyryl Electronmicrograph of bacillus spores adhering to cell membrane processes 38866_BATT_TX 11...agents, and radioactive fallout. CPS is integrated with the ship’s Heating, Ventilation, and Air-Conditioning ( HVAC ) systems and provides filtered air...molecules for intervention against protein NTA. • Identify and evaluate effectiveness of spore germination inhibitors. • Expand drug discovery program

  9. Comprehensive Maritime Awareness (CMA) - Joint Capabilities Technology Demonstration (JCTD), FY 06-09

    National Research Council Canada - National Science Library

    Dwyer, Chris

    2006-01-01

    ...) vision is to share maritime shipping information and tracks throughout the world to deter use of commercial maritime shipping for terrorism, WMD proliferation, drugs, piracy, and human trafficking...

  10. Endangered Species Management Plan for Fort Hood, Texas: FY06-10

    Science.gov (United States)

    2007-05-01

    Texas red oak, post oak, Texas ash (Fraxinus texensis), shin oak, blackjack oak (Quercus marilandica), slippery elm (Ulmus rubra), cedar elm ...by Ashe juniper and Texas oak. Other important tree species included live oak, cedar elm (Ulmus crassifolia), Lacey oak (Quercus laceyi), Arizona...0.83 m (Cimprich 2005). Nest substrates include shin oak, Texas red oak, Texas redbud, Ashe juniper, Texas ash, Plateau live oak, cedar elm , rusty

  11. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  12. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  13. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  14. Efficient and scalable IPv6 communication functions for wireless outdour lighting networks

    NARCIS (Netherlands)

    Mamo, S.T.

    2014-01-01

    Outdoor lighting today is becoming increasingly network-connected. The rapid development in wireless communication technologies makes this progress faster and competitive. Philips Research and Philips Lighting are part of the leading forces in exploration and development of a wide spectrum of

  15. Migración de redes de voz IPv4 a IPv6

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-03-01

    Full Text Available This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from measuring and evaluating outstanding parametersdelay, jitter and packet loss.

  16. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    Science.gov (United States)

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  17. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  18. High-Frequency Mapping of the IPV6 Internet Using YARRP

    Science.gov (United States)

    2017-03-01

    Network CIDR Classless Inter-Domain Routing DNS Domain Name System HMAC Hashed Message Authentication Code HTTP Hypertext Transfer Protocol IANA...is connected (i.e., the interconnection of the routers that make up the network). Topology mapping can be conducted through either passive or active...means. In passive topology mapping, inferences are made about network connections based on data-plane traffic observed at specific points such as web

  19. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  20. Family Reintegration Following Guard Deployment

    Science.gov (United States)

    2010-09-20

    Somalia Peacekeepers. Journal of Consulting and Clinical Psychology, 72(5), 909-913. Haas DM . Pazdernik LA. Olsen CH. A cross-sectional survey of the...relationship between partner deployment and stress in pregnancy during wartime. Haas DM . Pazdernik LA. Partner deployment and stress in pregnant...Identify 3-5 key words relating to the proposal. (Required) I used MESH Headings instead of the CRISP Thesaurus for key

  1. When Loved Ones Get Deployed

    Science.gov (United States)

    ... different from hearing about conflicts and violence that break out in the world during our own time. If someone you care about is in the military and is deployed for duty, it's natural to worry about their safety. That's especially true if the person is going ...

  2. Non-traditional Infrasound Deployment

    Science.gov (United States)

    McKenna, M. H.; McComas, S.; Simpson, C. P.; Diaz-Alvarez, H.; Costley, R. D.; Hayward, C.; Golden, P.; Endress, A.

    2017-12-01

    Historically, infrasound arrays have been deployed in rural environments where anthropological noise sources are limited. As interest in monitoring low energy sources at local distances grows in the infrasound community, it will be vital to understand how to monitor infrasound sources in an urban environment. Arrays deployed in urban centers have to overcome the decreased signal-to-noise ratio and reduced amount of real estate available to deploy an array. To advance the understanding of monitoring infrasound sources in urban environments, local and regional infrasound arrays were deployed on building rooftops on the campus at Southern Methodist University (SMU), and data were collected for one seasonal cycle. The data were evaluated for structural source signals (continuous-wave packets), and when a signal was identified, the back azimuth to the source was determined through frequency-wavenumber analysis. This information was used to identify hypothesized structural sources; these sources were verified through direct measurement and dynamic structural analysis modeling. In addition to the rooftop arrays, a camouflaged infrasound sensor was installed on the SMU campus and evaluated to determine its effectiveness for wind noise reduction. Permission to publish was granted by Director, Geotechnical and Structures Laboratory.

  3. SATWG networked quality function deployment

    Science.gov (United States)

    Brown, Don

    1992-01-01

    The initiative of this work is to develop a cooperative process for continual evolution of an integrated, time phased avionics technology plan that involves customers, technologists, developers, and managers. This will be accomplished by demonstrating a computer network technology to augment the Quality Function Deployment (QFD). All results are presented in viewgraph format.

  4. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  5. Supply strategy for SMR deployment

    International Nuclear Information System (INIS)

    Coccagna, A.F.

    2013-01-01

    This document provides a description of Babcock and Wilcox's deployment strategy for the mPower™ Small Modular Reactor from the perspective of Supply Chain and Manufacturing. A desirable future state of readiness is described as one which leverages and revitalizes an existing supply chain and manufacturing infrastructure, as well as leveraging an existing workforce of engineering, construction, and project management employees. B and W's mPower™ SMR value proposition offers many desired design and operating advantages to the SMR market. (author)

  6. RSG Deployment Case Testing Results

    Energy Technology Data Exchange (ETDEWEB)

    Owsley, Stanley L.; Dodson, Michael G.; Hatchell, Brian K.; Seim, Thomas A.; Alexander, David L.; Hawthorne, Woodrow T.

    2005-09-01

    The RSG deployment case design is centered on taking the RSG system and producing a transport case that houses the RSG in a safe and controlled manner for transport. The transport case was driven by two conflicting constraints, first that the case be as light as possible, and second that it meet a stringent list of Military Specified requirements. The design team worked to extract every bit of weight from the design while striving to meet the rigorous Mil-Spec constraints. In the end compromises were made primarily on the specification side to control the overall weight of the transport case. This report outlines the case testing results.

  7. Supporting Knowledge Transfer in IS Deployment Projects

    Science.gov (United States)

    Schönström, Mikael

    To deploy new information systems is an expensive and complex task, and does seldom result in successful usage where the system adds strategic value to the firm (e.g. Sharma et al. 2003). It has been argued that innovation diffusion is a knowledge integration problem (Newell et al. 2000). Knowledge about business processes, deployment processes, information systems and technology are needed in a large-scale deployment of a corporate IS. These deployments can therefore to a large extent be argued to be a knowledge management (KM) problem. An effective deployment requires that knowledge about the system is effectively transferred to the target organization (Ko et al. 2005).

  8. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2016-07-01

    Response rate for Wave 8 = 88% Our final sample contained 554 men and 556 women (n = 554 cross- sex couples, 1 same- sex couple). Individuals were...story in the Killeen Daily Herald (10 April 2016) http://kdhnews.com/news/local/ kids -deployments-when-a-parent-deploys-children-face- tough...years old), and (c) “Me getting sick and having to go to sick call.” (deployed Army husband, 25 years old). Sex and fidelity. Comments fell into

  9. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections....

  10. Low Mass Aeroshell Deployment Mechanism, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protective systems (TPS) panels to...

  11. Low Mass Aeroshell Deployment Mechanism, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protection system (TPS) panels to...

  12. Concurrent engineering: effective deployment strategies

    Directory of Open Access Journals (Sweden)

    Unny Menon

    1996-12-01

    Full Text Available This paper provides a comprehensive insight into current trends and developments in Concurrent Engineering for integrated development of products and processes with the goal of completing the entire cycle in a shorter time, at lower overall cost and with fewer engineering design changes after product release. The evolution and definition of Concurrent Engineering are addressed first, followed by a concise review of the following elements of the concurrent engineering approach to product development: Concept Development: The Front-End Process, identifying Customer Needs and Quality Function Deployment, Establishing Product Specifications, Concept Selection, Product Architecture, Design for Manufacturing, Effective Rapid Prototyping, and The Economics of Product Development. An outline of a computer-based tutorial developed by the authors and other graduate students funded by NASA ( accessible via the world-wide-web . is provided in this paper. A brief discussion of teamwork for successful concurrent engineering is included, t'ase histories of concurrent engineering implementation at North American and European companies are outlined with references to textbooks authored by Professor Menon and other writers. A comprehensive bibliography on concurrent engineering is included in the paper.

  13. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2017-07-01

    reintegration. Communication and Generalized Anxiety The emotional cycle of deployment model provides a descrip- tive framework for understanding the...counseling. Thus, communication can have a reciprocal influence on the very appraisals and emotions that motivate interaction in the first place. Communication...of service members back into family life after deployment can be extremely challenging for military couples. Understanding the factors that

  14. 5-Beam ADCP Deployment Strategy Considerations

    Science.gov (United States)

    Moore, T.; Savidge, D. K.; Gargett, A.

    2016-02-01

    With the increasing availability of 5 beam ADCPs and expanding opportunities for their deployment within both observatory and dedicated process study settings, refinements in deployment strategies are needed.Measuring vertical velocities directly with a vertically oriented acoustic beam requires that the instrument be stably mounted and leveled within fractions of a degree. Leveled shallow water deployments to date have utilized divers to jet pipes into the sand for stability, manually mount the instruments on the pipes, and level them. Leveling has been guided by the deployed instrument's pitch and roll output, available in real-time because of the observatory settings in which the deployments occurred. To expand the range of feasible deployments to deeper, perhaps non-real-time capable settings, alternatives to diver deployment and leveling must be considered. To determine stability requirements, mooring motion (heading, pitch and roll) has been sampled at 1Hz by gimballed ADCPs at a range of instrument deployment depths, and in shrouded and unshrouded cages. Conditions under which ADCP cages resting on the bottom experience significant shifts in tilt, roll or heading are assessed using co-located wind and wave measurements. The accuracy of estimating vertical velocities using all five beams relative to a well leveled vertical single beam is assessed from archived high frequency five beam data, to explore whether easing the leveling requirement is feasible.

  15. Renewable Energy: Policy Considerations for Deploying Renewables

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This information paper accompanies the IEA publication Deploying Renewables 2011: Best and Future Policy Practice (IEA, 2011a). It provides more detailed data and analysis on policies for Deploying Renewables, and is intended to complement the main publication. It provides an account of the strategic drivers underpinning renewable energy (RE) technology deployment (energy security, economic development and environment protection) and assesses RE technologies with respect to these drivers, including an estimate of GHG emissions reductions due to RE technologies. The paper also explores the different barriers to deploying renewables at a given stage of market maturity and discusses what tools policy makers can avail of to succeed in removing deployment barriers. An additional topical highlight explores the challenges associated with accelerating the diffusion of RE technologies in developing countries.

  16. Rover deployment system for lunar landing mission

    Science.gov (United States)

    Sutoh, Masataku; Hoshino, Takeshi; Wakabayashi, Sachiko

    2017-09-01

    For lunar surface exploration, a deployment system is necessary to allow a rover to leave the lander. The system should be as lightweight as possible and stored retracted when launched. In this paper, two types of retractable deployment systems for lunar landing missions, telescopic- and fold-type ramps, are discussed. In the telescopic-type system, a ramp is stored with the sections overlapping and slides out during deployment. In the fold-type system, it is stored folded and unfolds for the deployment. For the development of these ramps, a design concept study and structural analysis were conducted first. Subsequently, ramp deployment and rover release tests were performed using the developed ramp prototypes. Through these tests, the validity of their design concepts and functions have been confirmed. In the rover release test, it was observed that the developed lightweight ramp was sufficiently strong for a 50-kg rover to descend. This result suggests that this ramp system is suitable for the deployment of a 300-kg-class rover on the Moon, where the gravity is about one-sixth that on Earth. The lightweight and sturdy ramp developed in this study will contribute to both safe rover deployment and increase of lander/rover payload.

  17. Miniature field deployable terahertz source

    Science.gov (United States)

    Mayes, Mark G.

    2006-05-01

    Developments in terahertz sources include compacted electron beam systems, optical mixing techniques, and multiplication of microwave frequencies. Although significant advances in THz science have been achieved, efforts continue to obtain source technologies that are more mobile and suitable for field deployment. Strategies in source development have approached generation from either end of the THz spectrum, from up-conversion of high-frequency microwave to down-conversion of optical frequencies. In this paper, we present the design of a THz source which employs an up-conversion method in an assembly that integrates power supply, electronics, and radiative component into a man-portable unit for situations in which a lab system is not feasible. This unit will ultimately evolve into a ruggedized package suitable for use in extreme conditions, e.g. temporary security check points or emergency response teams, in conditions where THz diagnostics are needed with minimal planning or logistical support. In order to meet design goals of reduced size and complexity, the inner workings of the unit ideally would be condensed into a monolithic active element, with ancillary systems, e.g. user interface and power, coupled to the element. To attain these goals, the fundamental component of our design is a THz source and lens array that may be fabricated with either printed circuit board or wafer substrate. To reduce the volume occupied by the source array, the design employs a metamaterial composed of a periodic lattice of resonant elements. Each resonant element is an LC oscillator, or tank circuit, with inductance, capacitance, and center frequency determined by dimensioning and material parameters. The source array and supporting electronics are designed so that the radiative elements are driven in-phase to yield THz radiation with a high degree of partial coherence. Simulation indicates that the spectral width of operation may be controlled by detuning of critical dimensions

  18. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  19. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  20. Building the Internet of Things with IPv6 and MIPv6 the evolving world of m2m communications

    CERN Document Server

    Minoli, Daniel

    2013-01-01

    ""If we had computers that knew everything there was to know about things-using data they gathered without any help from us-we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.""-Kevin Ashton, originator of the term, Internet of Things An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with

  1. Aplicación de Multicast IPv6 Seguro a Servicios de Información en Entornos Grid

    OpenAIRE

    Trejo, Natalia Bibiana

    2008-01-01

    Los Servicios de Información constituyen piezas fundamentales de la infraestructura de los sistemas Grid. Estos servicios tienen por objetivo realizar el descubrimiento inicial y posterior monitorización de la disponibilidad y estado de los recursos y servicios puestos a disposición por los participantes de las llamadas organizaciones Virtuales. El servicio de información utilizado por sistemas Grid basados en el middleware Globus Toolkit 4, se conoce como Sistema de Monitorización y Descubri...

  2. Metodología de Implementación de Ipv6 en La Red de La Universidad de Oriente

    Directory of Open Access Journals (Sweden)

    Luis Armando Gurris Aragón

    2010-07-01

    Full Text Available Este trabajo presenta una estrategia para adoptar el Protocolo de Internet versión 6 en la red de la Universidad de Oriente (UOnet. El nuevo protocolo ha surgido para sustituir a la versión 4 actualmente en uso de manera global, debido al florecimiento de un conjunto de deficiencias en este último, provocado principalmente por el crecimiento exponencial de Internet y el desarrollo de nuevas tecnologías y servicios, que demandan mayor calidad en el desempeño del Protocolo de Internet. Además de los principales aspectos a tener en cuenta para emprender una transición hacia esta nueva tecnología, tales como: mecanismos de transición y otros elementos fundamentales a considerar como el Sistema de Nombres de Dominio, métodos de configuración de direcciones, sistemas operativos y aplicaciones. Este análisis constituye una guía para la implementación del protocolo en el escenario existente en la UOnet, y a su vez es aplicable en otras redes locales del país.

  3. Project implementation plan: ASTD remote deployment

    International Nuclear Information System (INIS)

    CRASS, D.W.

    1999-01-01

    This document is the project implementation plan for the ASTD Remote Deployment Project. The Plan identifies the roles and responsibilities for the project and defines the integration between the ASTD Project and the B-Cell Cleanout Project

  4. Office of Civilian Response Deployment Tracking System

    Data.gov (United States)

    US Agency for International Development — The purpose of OCR DTS is to establish, manage and track relevant Civilian Response Corps teams for deployment by sector experience, training, education etc.

  5. RadNet Air Quality (Deployable) Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — RadNet Deployable Monitoring is designed to collect radiological and meteorological information and data asset needed to establish the impact of radiation levels on...

  6. Self-Deploying, Composite Habitats, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's VeritexTM materials. These...

  7. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  8. Community integration after deployment to Afghanistan

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Armour, Cherie; Andersen, Søren B.

    2015-01-01

    OBJECTIVE: In the years following military deployment, soldiers may experience problems integrating into the community. However, little is known about the nature and prevalence of these problems and if they relate to posttraumatic symptomatology. METHODS: In a prospective, longitudinal study...

  9. Deployment strategies of managed lanes on arterials.

    Science.gov (United States)

    2015-02-01

    This report investigates issues related to planning, financing, deployment, and operation of managed : lanes on arterials. In this report, a strategy for managed lanes refers to a combination of the managed : lane type, the design and implementation,...

  10. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  11. Deployable structures for a human lunar base

    Science.gov (United States)

    Gruber, Petra; Häuplik, Sandra; Imhof, Barbara; Özdemir, Kürsad; Waclavicek, Rene; Perino, Maria Antoinetta

    2007-06-01

    The study Lunar exploration architecture—deployable structures for a lunar base was performed within the Alcatel Alenia Space “Lunar Exploration Architecture” study for the European Space Agency. The purpose of the study was to investigate bionic concepts applicable to deployable structures and to interpret the findings for possible implementation concepts. The study aimed at finding innovative solutions for deployment possibilities. Translating folding/unfolding principles from nature, candidate geometries were developed and researched using models, drawings and visualisations. The use of materials, joints between structural elements and construction details were investigated for these conceptual approaches. Reference scenarios were used to identify the technical and environmental conditions, which served as design drivers. Mechanical issues and the investigation of deployment processes narrowed the selection down to six chosen concepts. Their applicability was evaluated at a conceptual stage in relation to the timescale of the mission.

  12. Military Families: Child Care Support During Deployments

    Science.gov (United States)

    ... temporary caregiver far in advance will make your children feel more secure. Try to have the caregiver connect prior to deployment through visits, phone calls, or social media. If you will be relocating to a family ...

  13. Concept of Deployable Network Operations Center (DNOC)

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Thiry, Jeff; Johnson, Shawn

    2005-01-01

    .... The increasing use of expeditionary and special operations forces in ad hoc, dynamic, and tactical environments poses a need for an adaptable, flexible, and responsive deployable network operations center (DNOC...

  14. In-Flight Suppressant Deployment Temperatures

    National Research Council Canada - National Science Library

    Bein, Donald

    2006-01-01

    .... An assessment is made of the model output versus some aircraft measurement data, fire suppressant boiling point criterion, as well as the history of altitude/temperature at which fire suppressants have been deployed...

  15. Demonstration and Deployment Strategy Workshop: Summary

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2014-05-01

    This report is based on the proceedings of the U.S. Department of Energy Bioenergy Technologies Office Demonstration and Deployment Strategy Workshop, held on March 12–13, 2014, at Argonne National Laboratory.

  16. A Novel Methodology for Charging Station Deployment

    Science.gov (United States)

    Sun, Zhonghao; Zhao, Yunwei; He, Yueying; Li, Mingzhe

    2018-02-01

    Lack of charging stations has been a main obstacle to the promotion of electric vehicles. This paper studies deploying charging stations in traffic networks considering grid constraints to balance the charging demand and grid stability. First, we propose a statistical model for charging demand. Then we combine the charging demand model with power grid constraints and give the formulation of the charging station deployment problem. Finally, we propose a theoretical solution for the problem by transforming it to a Markov Decision Process.

  17. State perspectives on clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Moreland, T. [State of Illinois Washington Office, Washington, DC (United States)

    1997-12-31

    State governments have been funding partners in the Clean Coal Technology program since its beginnings. Today, regulatory and market uncertainties and tight budgets have reduced state investment in energy R and D, but states have developed program initiatives in support of deployment. State officials think that the federal government must continue to support these technologies in the deployment phase. Discussions of national energy policy must include attention to the Clean Coal Technology program and its accomplishments.

  18. DRAGON - 8U Nanosatellite Orbital Deployer

    Science.gov (United States)

    Dobrowolski, Marcin; Grygorczuk, Jerzy; Kedziora, Bartosz; Tokarz, Marta; Borys, Maciej

    2014-01-01

    The Space Research Centre of the Polish Academy of Sciences (SRC PAS) together with Astronika company have developed an Orbital Deployer called DRAGON for ejection of the Polish scientific nanosatellite BRITE-PL Heweliusz (Fig. 1). The device has three unique mechanisms including an adopted and scaled lock and release mechanism from the ESA Rosetta mission MUPUS instrument. This paper discusses major design restrictions of the deployer, unique design features, and lessons learned from development through testing.

  19. Deploying Renewables - Best and Future Policy Practice

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-11-23

    The global energy system faces urgent challenges. Concerns about energy security are growing, as highlighted by the recent political turmoil in Northern Africa and the nuclear incident in Fukushima. At the same time, the need to respond to climate change is more critical than ever. Against this background, many governments have increased efforts to promote deployment of renewable energy -- low-carbon sources that can strengthen energy security. This has stimulated unprecedented rise in deployment, and renewables are now the fastest growing sector of the energy mix. This 'coming of age' of renewable energy also brings challenges. Growth is focused on a few of the available technologies, and rapid deployment is confined to a relatively small number of countries. In more advanced markets, managing support costs and system integration of large shares of renewable energy in a time of economic weakness and budget austerity has sparked vigorous political debate. The IEA's new report, Deploying Renewables 2011: Best and Future Policy Practice: - Provides a comprehensive review and analysis of renewable energy policy and market trends; - Analyses in detail the dynamics of deployment and provides best-practice policy principles for different stages of market maturity; - Assesses the impact and cost-effectiveness of support policies using new methodological tools and indicators; - Investigates the strategic reasons underpinning the pursuit of RE deployment by different countries and the prospects for globalisation of RE. This new book builds on and extends a 2008 IEA publication, drawing on recent policy and deployment experience world-wide. It provides guidance for policy makers and other stakeholders to avoid past mistakes, overcome new challenges and reap the benefits of deploying renewables -- today and tomorrow.

  20. Simulating CubeSat Structure Deployment Dynamics, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — There is high value in simulating the nonlinear dynamics of stowing, deploying, and performance of deployable space structures, especially given the profound...

  1. A Remotely Deployable Wind Sonic Anemometer

    Directory of Open Access Journals (Sweden)

    Muhammad Awais

    2017-12-01

    Full Text Available Communication and computing shape up base for explosion of Internet of Things (IoT era. Humans can efficiently control the devices around their environment as per requirements because of IoT, the communication between different devices brings more flexibility in surrounding. Useful data is also gathered from some of these devices to create Big Data; where, further analysis assist in making life easier by developing good business models corresponding to user needs, enhance scientific research, formulating weather prediction or monitoring systems and contributing in other relative fields as well. Thus, in this research a remotely deployable IoT enabled Wind Sonic Anemometer has been designed and deployed to calculate average wind speed, direction, and gust. The proposed design is remotely deployable, user-friendly, power efficient and cost-effective because of opted modules i.e., ultrasonic sensors, GSM module, and solar panel. The testbed was also deployed at the roof of Computer & Information Systems Engineering (CIS department, NED UET. Further, its calibration has been carried out by using long short-term memory (LSTM, a deep learning technique; where ground truth data has been gathered from mechanical wind speed sensor (NRG-40 H deployed at top of Industrial & Manufacturing (IM department of NED UET. The obtained results are satisfactory and the performance of designed sensor is also good under various weather conditions.

  2. Environmental issues affecting clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.J. [Electric Power Research Inst., Palo Alto, CA (United States)

    1997-12-31

    The author outlines what he considers to be the key environmental issues affecting Clean Coal Technology (CCT) deployment both in the US and internationally. Since the international issues are difficult to characterize given different environmental drivers in various countries and regions, the primary focus of his remarks is on US deployment. However, he makes some general remarks, particularly regarding the environmental issues in developing vs. developed countries and how these issues may affect CCT deployment. Further, how environment affects deployment depends on which particular type of clean coal technology one is addressing. It is not the author`s intention to mention many specific technologies other than to use them for the purposes of example. He generally categorizes CCTs into four groups since environment is likely to affect deployment for each category somewhat differently. These four categories are: Precombustion technologies such as coal cleaning; Combustion technologies such as low NOx burners; Postcombustion technologies such as FGD systems and postcombustion NOx control; and New generation technologies such as gasification and fluidized bed combustion.

  3. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current......This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  4. Deploying Embodied AI into Virtual Worlds

    Science.gov (United States)

    Burden, David J. H.

    The last two years have seen the start of commercial activity within virtual worlds. Unlike computer games where Non-Player-Character avatars are common, in most virtual worlds they are the exception — and until recently in Second Life they were non-existent. However there is real commercial scope for Als in these worlds — in roles from virtual sales staff and tutors to personal assistants. Deploying an embodied AI into a virtual world offers a unique opportunity to evaluate embodied Als, and to develop them within an environment where human and computer are on almost equal terms. This paper presents an architecture being used for the deployment of chatbot driven avatars within the Second Life virtual world, looks at the challenges of deploying an AI within such a virtual world, the possible implications for the Turing Test, and identifies research directions for the future.

  5. Deployment Instabilities of Lobed-Pumpkin Balloon

    Science.gov (United States)

    Nakashino, Kyoichi

    A lobed-pumpkin balloon, currently being developed in ISAS/JAXA as well as in NASA, is a promising vehicle for long duration scientific observations in the stratosphere. Recent ground and flight experiments, however, have revealed that the balloon has deployment instabilities under certain conditions. In order to overcome the instability problems, a next generation SPB called 'tawara' type balloon has been proposed, in which an additional cylindrical part is appended to the standard lobed-pumpkin balloon. The present study investigates the deployment stability of tawara type SPB in comparison to that of standard lobed-pumpkin SPB through eigenvalue analysis on the basis of finite element methods. Our numerical results show that tawara type SPB enjoys excellent deployment performance over the standard lobed-pumpkin SPBs.

  6. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    OBJECTIVE: Insight on how different missions have impacted rates of mental health service (MHS) utilization is unexplored. We compared postdeployment MHS utilization in a national cohort of first-time deployed to missions in Balkan, Iraq, and Afghanistan respectively. METHODS: A prospective...... national cohort study of 13 246 first-time deployed in the period 1996 through 2012 to missions in Balkan area, Iraq, or Afghanistan respectively. Soldiers 'MHS utilization was also compared with a 5:1 sex-, age-, and calendar year-matched never-deployed background population. Postdeployment utilization...... of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  7. Industrial deployment of system engineering methods

    CERN Document Server

    Romanovsky, Alexander

    2013-01-01

    A formal method is not the main engine of a development process, its contribution is to improve system dependability by motivating formalisation where useful. This book summarizes the results of the DEPLOY research project on engineering methods for dependable systems through the industrial deployment of formal methods in software development. The applications considered were in automotive, aerospace, railway, and enterprise information systems, and microprocessor design.  The project introduced a formal method, Event-B, into several industrial organisations and built on the lessons learned to

  8. Challenges to Deploy Service Design in Organizations

    DEFF Research Database (Denmark)

    Akasaka, Fumiya; Ohno, Takehiko; Jensen, Mika Yasuoka

    2016-01-01

    More and more companies are applying service design approaches to develop services and products. Not every project, however, has achieved its goals. In many cases, difficulties arise from organizational issues such as organization structure and evaluation system. In this research, we held workshops...... where success and failure factors of service design projects in organization are presented. By analysing the results, we construct a model that explains the “difficulties of deploying the service design approach in organization.” On the basis of the model, this paper discusses the challenges...... to the deployment of the service design approach in organizations....

  9. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  10. Iron Status of Deployed Military Members

    Science.gov (United States)

    2017-01-04

    ready force Deploy with and care for the warrior Care for all entrusted to our care Nursing Competencies and Practice: Patient outcomes...duties, physical activities, iron intake through diet ). This additional information would improve the ability to determine factors associated with

  11. Microsoft System Center Configuration Manager advanced deployment

    CERN Document Server

    Coupland, Martyn

    2014-01-01

    If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this book.

  12. Military Deployment and Elementary Student Achievement

    Science.gov (United States)

    Phelps, Terri; Dunham, Mardis; Lyons, Robert

    2010-01-01

    This study investigated the impact that military deployment has upon academic achievement of elementary school students. TerraNova test scores of 137 fourth and fifth grade students in two elementary schools with a high proportion of military dependent children were examined for two consecutive years. Although the academic test performance fell…

  13. 77 FR 36903 - Accelerating Broadband Infrastructure Deployment

    Science.gov (United States)

    2012-06-20

    ... the Nation's global competitiveness in the 21st century, driving job creation, promoting innovation, and expanding markets for American businesses. Broadband access also affords public safety agencies... infrastructure has been deployed in a vast majority of communities across the country, today too many areas still...

  14. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    August 8, 2013; Ta Kung Pao, August 12, 2013. 22 Sam Kim, “N. Korea Deploys Medium-Range Missiles, Bolsters Special Forces,” Yonhap, Seoul, February 23...building up its submarine force (both nuclear-powered and diesel-electric). In November 2004, the PLA Navy sent a Han -class nuclear attack submarine

  15. Very Low Head Turbine Deployment in Canada

    International Nuclear Information System (INIS)

    Kemp, P; Williams, C; Sasseville, Remi; Anderson, N

    2014-01-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  16. Very Low Head Turbine Deployment in Canada

    Science.gov (United States)

    Kemp, P.; Williams, C.; Sasseville, Remi; Anderson, N.

    2014-03-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  17. Abstracting application deployment on Cloud infrastructures

    Science.gov (United States)

    Aiftimiei, D. C.; Fattibene, E.; Gargana, R.; Panella, M.; Salomoni, D.

    2017-10-01

    Deploying a complex application on a Cloud-based infrastructure can be a challenging task. In this contribution we present an approach for Cloud-based deployment of applications and its present or future implementation in the framework of several projects, such as “!CHAOS: a cloud of controls” [1], a project funded by MIUR (Italian Ministry of Research and Education) to create a Cloud-based deployment of a control system and data acquisition framework, “INDIGO-DataCloud” [2], an EC H2020 project targeting among other things high-level deployment of applications on hybrid Clouds, and “Open City Platform”[3], an Italian project aiming to provide open Cloud solutions for Italian Public Administrations. We considered to use an orchestration service to hide the complex deployment of the application components, and to build an abstraction layer on top of the orchestration one. Through Heat [4] orchestration service, we prototyped a dynamic, on-demand, scalable platform of software components, based on OpenStack infrastructures. On top of the orchestration service we developed a prototype of a web interface exploiting the Heat APIs. The user can start an instance of the application without having knowledge about the underlying Cloud infrastructure and services. Moreover, the platform instance can be customized by choosing parameters related to the application such as the size of a File System or the number of instances of a NoSQL DB cluster. As soon as the desired platform is running, the web interface offers the possibility to scale some infrastructure components. In this contribution we describe the solution design and implementation, based on the application requirements, the details of the development of both the Heat templates and of the web interface, together with possible exploitation strategies of this work in Cloud data centers.

  18. Garden State Parkway Corridor : ITS early deployment planning study : strategic deployment plan

    Science.gov (United States)

    1997-12-01

    This Strategic Deployment Plan describes ways of improving travel within the Garden : State Parkway Corridor using intelligent transportation systems (ITS) and without : constructing additional roadway lanes. Travel improvements will be possible with...

  19. Deployable reflector configurations. [for space telescope

    Science.gov (United States)

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    1983-01-01

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  20. Planning and Management of Technology Deployment Center

    International Nuclear Information System (INIS)

    Park, Jae Won; Joo, Po Kook; Kim, Jun Yeon and others

    2005-08-01

    The R and D contents are summarized as follows ; Models were set-up for transferring the developed technologies to the industry and managing technology deployment center to vitalize the commercialization and then the set-up model was tried to apply for transferring technologies for commercialization and to define interfaces between the R and D and industrial applications In this project, new products and processes were developed for promoting the commercialization. Infra-structures were firmly set-up for the venture company promotion and technology deployment developed during executing the proton Engineering frontier Project. Commercialization methodology connection with industrial companies were studied by outside specializing institute. Development of gem-stone coloring and new photo catalyst producing techniques are very high value-adding technologies, therefore, experimental and theoretical R and D were transacted simultaneously to obtain the originality of the technology. The theoretical R and D was committed to a specialist outside

  1. Towards the Ubiquitous Deployment of DNSSEC

    Science.gov (United States)

    2016-01-01

    and Session Initiation Protocol ( SIP ). However, it remains to be seen how quickly these enhancements are picked up and deployed. The second...Security RDI Resources for the DNSSEC Initiative System (the C&A system) RFC Request For Comments SIP Session Initiation Protocol SMTP Simple Mail...DISTRIBUTION UNLIMITED 1 Summary The Secure Extensions to the Domain Name System (DNSSEC) comprise of a set of protocol extensions that fix a

  2. THE PROTECTION AND DEPLOYMENT OF FINANCIAL INNOVATION

    OpenAIRE

    PETER GIANIODIS; JILL A. BROWN

    2013-01-01

    Prevailing theory suggests that firms that effectively protect technological discoveries from emulation will create and capture value. Despite its importance, little research has examined the specific mechanisms of how to protect technological discoveries, and have heretofore emphasized the importance of inherent resource attributes to limit competitor emulation. Using a sample of financial patents, we test theory regarding the effects of resource attributes and deployment mechanisms on resou...

  3. IRIS. Progress in licensing and toward deployment

    International Nuclear Information System (INIS)

    Petrovic, B.; Carelli, M.D.; Kling, C.L.; Cavlina, N.; Grgic, D.

    2006-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light water cooled, pressurized reactor of smaller generating capacity (1000 MWt, or 335 MWe). It is being developed through a strong international partnership by a team lead by Westinghouse and including organizations from 10 countries. The main objective of the project is to offer a simple nuclear power plant with outstanding safety, attractive economics and enhanced proliferation resistance characteristics ready for deployment within the next decade. IRIS embodies the requirements set forth by the recently announced US DOE Global Nuclear Energy Partnership (GNEP) program for worldwide deployment of a smaller-scale reactors and provides a viable bridge to Generation IV reactors. IRIS is designed to address the needs of both developed and emerging markets. Its smaller power level provides deployment flexibility in larger developed markets, and makes it in particular well suited for markets with limited grids or where the annual energy demand growth is moderate. Due to its short construction time and the staggered build option, IRIS significantly reduces the required financing, improves cash flow, and provides a viable solution for economies with limited resources. While based on proven and worldwide accepted LWR technology, IRIS introduces a number of innovative solutions to simplify its design and improve safety and operational characteristics, including the integral primary system and its components, as well as the safety-by-design approach. These features will be tested and demonstrated in a testing program that has been initiated. As its centerpiece, the program will include the integral test facility. Results of this program will support licensing with the US NRC. A multinational licensing is considered to facilitate worldwide deployment. (author)

  4. Bomber Deployments: A New Power Projection Strategy

    Science.gov (United States)

    2016-08-21

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY BOMBER DEPLOYMENTS: A NEW POWER PROJECTION STRATEGY by...operating base (FOB), main operating base ( MOB ) and intermediate staging base (ISB).10 Each type of base requires certain actions to make it suitable for...closure of many main operating bases ( MOB ) overseas and the reluctance of many nations to permit permanent military bases on their soil.”15 This

  5. Quality Function Deployment for Large Systems

    Science.gov (United States)

    Dean, Edwin B.

    1992-01-01

    Quality Function Deployment (QFD) is typically applied to small subsystems. This paper describes efforts to extend QFD to large scale systems. It links QFD to the system engineering process, the concurrent engineering process, the robust design process, and the costing process. The effect is to generate a tightly linked project management process of high dimensionality which flushes out issues early to provide a high quality, low cost, and, hence, competitive product. A pre-QFD matrix linking customers to customer desires is described.

  6. Reactor power system deployment and startup

    International Nuclear Information System (INIS)

    Wetch, J.R.; Nelin, C.J.; Britt, E.J.; Klein, G.; Rasor Associates, Inc., Sunnyvale, CA; California Institute of Technology, Pasadena)

    1985-01-01

    This paper addresses issues that should receive further examination in the near-term as concept selection for development of a U.S. space reactor power system is approached. The issues include: the economics, practicality and system reliability associated with transfer of nuclear spacecraft from low earth shuttle orbits to operational orbits, via chemical propulsion versus nuclear electric propulsion; possible astronaut supervised reactor and nuclear electric propulsion startup in low altitude Shuttle orbit; potential deployment methods for nuclear powered spacecraft from Shuttle; the general public safety of low altitude startup and nuclear safe and disposal orbits; the question of preferred reactor power level; and the question of frozen versus molten alkali metal coolant during launch and deployment. These issues must be considered now because they impact the SP-100 concept selection, power level selection, weight and size limits, use of deployable radiators, reliability requirements, and economics, as well as the degree of need for and the urgency of developing space reactor power systems. 5 references

  7. Remotely deployable aerial inspection using tactile sensors

    Science.gov (United States)

    MacLeod, C. N.; Cao, J.; Pierce, S. G.; Sullivan, J. C.; Pipe, A. G.; Dobie, G.; Summan, R.

    2014-02-01

    For structural monitoring applications, the use of remotely deployable Non-Destructive Evaluation (NDE) inspection platforms offer many advantages, including improved accessibility, greater safety and reduced cost, when compared to traditional manual inspection techniques. The use of such platforms, previously reported by researchers at the University Strathclyde facilitates the potential for rapid scanning of large areas and volumes in hazardous locations. A common problem for both manual and remote deployment approaches lies in the intrinsic stand-off and surface coupling issues of typical NDE probes. The associated complications of these requirements are obviously significantly exacerbated when considering aerial based remote inspection and deployment, resulting in simple visual techniques being the preferred sensor payload. Researchers at Bristol Robotics Laboratory have developed biomimetic tactile sensors modelled on the facial whiskers (vibrissae) of animals such as rats and mice, with the latest sensors actively sweeping their tips across the surface in a back and forth motion. The current work reports on the design and performance of an aerial inspection platform and the suitability of tactile whisking sensors to aerial based surface monitoring applications.

  8. FBR/VHTR deployment scenarios in Japan

    International Nuclear Information System (INIS)

    Richards, Matt; Kunitomi, Kazuhiko

    2008-01-01

    Co-deployment of Fast Breeder Reactors (FBRs) and Very High Temperature Reactors (VHTRs) can be used as the nuclear technologies to meet a significant portion of Japan's future energy demands. The FBR provides the fissile fuel for energy security and sustainability, and can be used to provide a significant portion of the electricity demand. The VHTR can provide flexible energy outputs (electricity, hydrogen, and high-temperature heat) with high efficiency, can operate with a wide variety of fuel cycles, and can be sited at locations that have limited availability of cooling water. These features, combined with its passive safety and high degree of proliferation resistance, make the VHTR an ideal complement for co-deployment with the FBR in Japan and also a very low-risk technology of export to foreign countries. In addition to hydrogen production, the high-temperature thermal energy produced by the VHTR fleet can be used for a wide variety of process-heat applications, and the VHTR can play a key role for significantly reducing greenhouse-gas emissions. This paper describes assessments for deploying FBRs and VHTRs in Japan using a closed fuel cycle, with the FBRs supplying the fissile material to sustain the combined FBR/VHTR fleet. (author)

  9. Hybrid deployable support truss designs for LDR

    Science.gov (United States)

    Hedgepeth, J.

    1988-01-01

    Concepts for a 20-meter diameter Large Deployable Reflector (LDR) deployable truss backup structure, and analytical predictions of its structural characteristics are discussed. The concept shown is referred to as the SIXPAC; It is a combination of the PACTRUSS concept and a single-fold beam, which would make up the desired backup structure. One advantage of retaining the PACTRUSS concept is its packaging density and its capability for synchronous deployment. Various 2-meter hexagonal panel arrangements are possible for this Hybrid PACTRUSS structure depending on the panel-to-structure attachment strategies used. Static analyses of the SIXPAC using various assumptions for truss designs and panel masses of 10 kg sq meters were performed to predict the tip displacement of the structure when supported at the center. The tip displacement ranged from 0.20 to 0.44 mm without the panel mass, and from 0.9 to 3.9 mm with the panel mass (in a 1-g field). The data indicate that the structure can be adequately ground tested to validate its required performance in space, assuming the required performance in space is approximately 100 microns. The static displacement at the tip of the structure when subjected to an angular acceleration of 0.001 rad/sec squared were estimated to range from 0.8 to 7.5 microns, depending on the type of truss elements.

  10. Modular VO oriented Java EE service deployer

    Science.gov (United States)

    Molinaro, Marco; Cepparo, Francesco; De Marco, Marco; Knapic, Cristina; Apollo, Pietro; Smareglia, Riccardo

    2014-07-01

    The International Virtual Observatory Alliance (IVOA) has produced many standards and recommendations whose aim is to generate an architecture that starts from astrophysical resources, in a general sense, and ends up in deployed consumable services (that are themselves astrophysical resources). Focusing on the Data Access Layer (DAL) system architecture, that these standards define, in the last years a web based application has been developed and maintained at INAF-OATs IA2 (Italian National institute for Astrophysics - Astronomical Observatory of Trieste, Italian center of Astronomical Archives) to try to deploy and manage multiple VO (Virtual Observatory) services in a uniform way: VO-Dance. However a set of criticalities have arisen since when the VO-Dance idea has been produced, plus some major changes underwent and are undergoing at the IVOA DAL layer (and related standards): this urged IA2 to identify a new solution for its own service layer. Keeping on the basic ideas from VO-Dance (simple service configuration, service instantiation at call time and modularity) while switching to different software technologies (e.g. dismissing Java Reflection in favour of Enterprise Java Bean, EJB, based solution), the new solution has been sketched out and tested for feasibility. Here we present the results originating from this test study. The main constraints for this new project come from various fields. A better homogenized solution rising from IVOA DAL standards: for example the new DALI (Data Access Layer Interface) specification that acts as a common interface system for previous and oncoming access protocols. The need for a modular system where each component is based upon a single VO specification allowing services to rely on common capabilities instead of homogenizing them inside service components directly. The search for a scalable system that takes advantage from distributed systems. The constraints find answer in the adopted solutions hereafter sketched. The

  11. Deployment Effects of Marin Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Brian Polagye; Mirko Previsic

    2010-06-17

    Given proper care in siting, design, deployment, operation and maintenance, marine and hydrokinetic technologies could become one of the more environmentally benign sources of electricity generation. In order to accelerate the adoption of these emerging hydrokinetic and marine energy technologies, navigational and environmental concerns must be identified and addressed. All developing hydrokinetic projects involve a wide variety of stakeholders. One of the key issues that site developers face as they engage with this range of stakeholders is that many of the possible conflicts (e.g., shipping and fishing) and environmental issues are not well-understood, due to a lack of technical certainty. In September 2008, re vision consulting, LLC was selected by the Department of Energy (DoE) to apply a scenario-based approach to the emerging wave and tidal technology sectors in order to evaluate the impact of these technologies on the marine environment and potentially conflicting uses. The project’s scope of work includes the establishment of baseline scenarios for wave and tidal power conversion at potential future deployment sites. The scenarios will capture variations in technical approaches and deployment scales to properly identify and characterize environmental impacts and navigational effects. The goal of the project is to provide all stakeholders with an improved understanding of the potential effects of these emerging technologies and focus all stakeholders onto the critical issues that need to be addressed. This groundwork will also help in streamlining siting and associated permitting processes, which are considered key hurdles for the industry’s development in the U.S. today. Re vision is coordinating its efforts with two other project teams funded by DoE which are focused on regulatory and navigational issues. The results of this study are structured into three reports: 1. Wave power scenario description 2. Tidal power scenario description 3. Framework for

  12. Fundamentals of 3D Deployable Mechanisms in Space

    Data.gov (United States)

    National Aeronautics and Space Administration — Fundamentals of 3D Deployable Origami Structures in Space The primary objectives of my research are to study the application of 3D deployable origami structures in...

  13. STEP flight experiments Large Deployable Reflector (LDR) telescope

    Science.gov (United States)

    Runge, F. C.

    1984-01-01

    Flight testing plans for a large deployable infrared reflector telescope to be tested on a space platform are discussed. Subsystem parts, subassemblies, and whole assemblies are discussed. Assurance of operational deployability, rigidization, alignment, and serviceability will be sought.

  14. Elastic Deployable Composite Tubular Roll-Out Boom, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Deployable Space Systems (DSS) has developed an affordable and ultra-lightweight elastically self-deployable Roll-Out Boom technology that provides affordability and...

  15. Psychiatric Effects of Military Deployment on Children and Families

    Science.gov (United States)

    James, Trenton

    2012-01-01

    Deployments in the United States military have increased greatly in the past 10 years. Families and children are psychiatrically affected by these deployments, and recent studies are clarifying these effects. This article focuses on the psychiatric effects of deployment on children and uses a composite case example to review the use of play therapy to treat children who are having psychiatric issues related to the deployment of one or both parents. PMID:22468239

  16. Deployment-related risk factors of low back pain

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Marott, Jacob Louis; Gyntelberg, Finn

    2014-01-01

    Where much is known about the consequences of spinal and low back pain (LBP) during military deployments, there is lesser knowledge of risk factors for LBP among the deployed forces. The objective of this study was to identify deployment-related exposures associated with LBP. The study was a ques...... their subordinates and involve medical personnel, especially deployed physiotherapists, by giving advice to soldiers of different military occupational specialties on how to optimize ergonomics at work....

  17. Design aspects of a deployable tensegrity-hollow-rope footbridge

    OpenAIRE

    Rhode-Barbarigos , Landolf; Bel Hadj Ali , Nizar; Motro , René; Smith , Ian F.C.

    2012-01-01

    International audience; Tensegrity structures are composed of cables and struts in a pre-stressed self-equilibrium. Although tensegrity first appeared in the 1950s, it is seldom used in civil engineering. This paper focuses on the design aspects of a deployable tensegrity-hollow-rope footbridge. Deployment is usually not a critical design case for traditional deployable structures. However, for tensegrity systems deployment may be critical due to the actuation required. In this paper, deploym...

  18. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  19. Alignment and phasing of deployable telescopes

    Science.gov (United States)

    Woolf, N. J.; Ulich, B. L.

    1983-01-01

    The experiences in coaligning and phasing the Multi-Mirror Telescope (MMT), together with studies in setting up radio telescopes, are presented. These experiences are discussed, and on the basis they furnish, schemes are suggested for coaligning and phasing four large future telescopes with complex primary mirror systems. These telescopes are MT2, a 15-m-equivalent MMT, the University of California Ten Meter Telescope, the 10 m sub-mm wave telescope of the University of Arizona and the Max Planck Institute for Radioastronomy, and the Large Deployable Reflector, a future space telescope for far-IR and sub-mm waves.

  20. Large Deployable Reflector (LDR) feasibility study update

    Science.gov (United States)

    Alff, W. H.; Banderman, L. W.

    1983-01-01

    In 1982 a workshop was held to refine the science rationale for large deployable reflectors (LDR) and develop technology requirements that support the science rationale. At the end of the workshop, a set of LDR consensus systems requirements was established. The subject study was undertaken to update the initial LDR study using the new systems requirements. The study included mirror materials selection and configuration, thermal analysis, structural concept definition and analysis, dynamic control analysis and recommendations for further study. The primary emphasis was on the dynamic controls requirements and the sophistication of the controls system needed to meet LDR performance goals.

  1. Quality function deployment: application to rehabilitation services.

    Science.gov (United States)

    Einspruch, E M; Omachonu, V K; Einspruch, N G

    1996-01-01

    Describes how the challenge of providing rehabilitative services at reasonable costs is beginning to mount. The management of quality in rehabilitative services is therefore gaining increasing attention in the health care arena. States that if a link is implied between the above stated goal and customer satisfaction, it is imperative to evaluate quality or customer satisfaction in the context of the patient's experience. Describes the quality function deployment (QFD) system and how it leads to a better understanding of the customer's needs and wants. Explores the process of applying the concept of QFD to physical therapy.

  2. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...

  3. Development and modeling of self-deployable structures

    Science.gov (United States)

    Neogi, Depankar

    Deployable space structures are prefabricated structures which can be transformed from a closed, compact configuration to a predetermined expanded form in which they are stable and can bear loads. The present research effort investigates a new family of deployable structures, called the Self-Deployable Structures (SDS). Unlike other deployable structures, which have rigid members, the SDS members are flexible while the connecting joints are rigid. The joints store the predefined geometry of the deployed structure in the collapsed state. The SDS is stress-free in both deployed and collapsed configurations and results in a self-standing structure which acquires its structural properties after a chemical reaction. Reliability of deployment is one of the most important features of the SDS, since it does not rely on mechanisms that can lock during deployment. The unit building block of these structures is the self-deployable structural element (SDSE). Several SDSE members can be linked to generate a complex building block such as a triangular or a tetrahedral structure. Different SDSE and SDS concepts are investigated in the research work, and the performance of SDS's are experimentally and theoretically explored. Triangular and tetrahedral prototype SDS have been developed and presented. Theoretical efforts include modeling the behavior of 2-dimensional SDSs. Using this design tool, engineers can study the effects of different packing configurations and deployment sequence; and perform optimization on the collapsed state of a structure with different external constraints. The model also predicts if any lockup or entanglement occurs during deployment.

  4. The effect of military deployment on mental health

    DEFF Research Database (Denmark)

    Lyk-Jensen, Stéphanie; Weatherall, Cecilie Dohlmann; W. Jepsen, Peter

    for the non-deployed eligible men, and our results hold to various robustness checks. Our administrative records provide objective measures of mental health service use in the form of psychiatric diagnoses and purchase of mental health-related medication. The very rich data makes it possible to control......In this paper we estimate the causal effect of military deployment on soldiers’ mental health. To handle the selection bias problem, we use longitudinal data for deployed and non-deployed eligible men in a difference-in-differences setting. Using pair-wise matching, we impute deployment dates...... for important variables like intelligence tests and family background. We find significant adverse effects of military deployment on soldiers’ mental health service use. Highlights: - Causal effect of military deployment on soldiers’ use of mental health service - Using a difference-in-differences approach...

  5. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...... statistical models of deployment areas, the performance analysis is carried out in the form of operator case studies for large-scale deployment scenarios, including realistic macro network layouts and inhomogeneous spatial traffic distributions. Deployment of small cells is performed by means of proposed...... heuristic deployment algorithms, which combine network coverage and spatial user density information. As a secondary aspect, deployment solutions achieving the same coverage performance are compared in terms of Total Cost of Ownership (TCO), in order to investigate the viability of different deployment...

  6. Integrated assessment of dispersed energy resources deployment

    Energy Technology Data Exchange (ETDEWEB)

    Marnay, Chris; Blanco, Raquel; Hamachi, Kristina S.; Kawaan, Cornelia P.; Osborn, Julie G.; Rubio, F. Javier

    2000-06-01

    The goal of this work is to create an integrated framework for forecasting the adoption of distributed energy resources (DER), both by electricity customers and by the various institutions within the industry itself, and for evaluating the effect of this adoption on the power system, particularly on the overall reliability and quality of electrical service to the end user. This effort and follow on contributions are intended to anticipate and explore possible patterns of DER deployment, thereby guiding technical work on microgrids towards the key technical problems. An early example of this process addressed is the question of possible DER adopting customer disconnection. A deployment scenario in which many customers disconnect from their distribution company (disco) entirely leads to a quite different set of technical problems than a scenario in which customers self generate a significant share or all of their on-site electricity requirements and additionally buy and sell energy and ancillary services (AS) locally and/or into wider markets. The exploratory work in this study suggests that the economics under which customers disconnect entirely are unlikely.

  7. Hadoop Cluster Deployment: A Methodological Approach

    Directory of Open Access Journals (Sweden)

    Ronaldo Celso Messias Correia

    2018-05-01

    Full Text Available For a long time, data has been treated as a general problem because it just represents fractions of an event without any relevant purpose. However, the last decade has been just about information and how to get it. Seeking meaning in data and trying to solve scalability problems, many frameworks have been developed to improve data storage and its analysis. As a framework, Hadoop was presented as a powerful tool to deal with large amounts of data. However, it still causes doubts about how to deal with its deployment and if there is any reliable method to compare the performance of distinct Hadoop clusters. This paper presents a methodology based on benchmark analysis to guide the Hadoop cluster deployment. The experiments employed The Apache Hadoop and the Hadoop distributions of Cloudera, Hortonworks, and MapR, analyzing the architectures on local and on clouding—using centralized and geographically distributed servers. The results show the methodology can be dynamically applied on a reliable comparison among different architectures. Additionally, the study suggests that the knowledge acquired can be used to improve the data analysis process by understanding the Hadoop architecture.

  8. Regional Energy Deployment System (ReEDS)

    Energy Technology Data Exchange (ETDEWEB)

    Short, W.; Sullivan, P.; Mai, T.; Mowers, M.; Uriarte, C.; Blair, N.; Heimiller, D.; Martinez, A.

    2011-12-01

    The Regional Energy Deployment System (ReEDS) is a deterministic optimization model of the deployment of electric power generation technologies and transmission infrastructure throughout the contiguous United States into the future. The model, developed by the National Renewable Energy Laboratory's Strategic Energy Analysis Center, is designed to analyze the critical energy issues in the electric sector, especially with respect to potential energy policies, such as clean energy and renewable energy standards or carbon restrictions. ReEDS provides a detailed treatment of electricity-generating and electrical storage technologies and specifically addresses a variety of issues related to renewable energy technologies, including accessibility and cost of transmission, regional quality of renewable resources, seasonal and diurnal generation profiles, variability of wind and solar power, and the influence of variability on the reliability of the electrical grid. ReEDS addresses these issues through a highly discretized regional structure, explicit statistical treatment of the variability in wind and solar output over time, and consideration of ancillary services' requirements and costs.

  9. SMUD Community Renewable Energy Deployment Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Sison-Lebrilla, Elaine [Sacramento Municipal Utility District, Sacramento, CA (United States); Tiangco, Valentino [Sacramento Municipal Utility District, Sacramento, CA (United States); Lemes, Marco [Sacramento Municipal Utility District, Sacramento, CA (United States); Ave, Kathleen [Sacramento Municipal Utility District, Sacramento, CA (United States)

    2015-06-08

    This report summarizes the completion of four renewable energy installations supported by California Energy Commission (CEC) grant number CEC Grant PIR-11-005, the US Department of Energy (DOE) Assistance Agreement, DE-EE0003070, and the Sacramento Municipal Utility District (SMUD) Community Renewable Energy Deployment (CRED) program. The funding from the DOE, combined with funding from the CEC, supported the construction of a solar power system, biogas generation from waste systems, and anaerobic digestion systems at dairy facilities, all for electricity generation and delivery to SMUD’s distribution system. The deployment of CRED projects shows that solar projects and anaerobic digesters can be successfully implemented under favorable economic conditions and business models and through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region. In addition to reducing GHG emissions, the projects also demonstrate that solar projects and anaerobic digesters can be readily implemented through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region.

  10. Dynamic analysis of the large deployable reflector

    Science.gov (United States)

    Calleson, Robert E.; Scott, A. Don

    1987-01-01

    The Large Deployable Reflector (LDR) is to be an astronomical observatory orbiting above Earth's obscuring atmosphere and operating in the spectral range between 30 microns and 1000 microns wavelength. The LDR will be used to study such astronomical phenomena as stellar and galactic formation, cosmology, and planetary atmospheres. The LDR will be the first observatory to be erected and assembled in space. This distinction brings with it several major technological challenges such as the development of ultra-lightweight deployable mirrors, advanced mirror fabrication techniques, advanced structures, and control of vibrations due to various sources of excitation. The purpose of this analysis is to provide an assessment of the vibrational response due to secondary mirror chopping and LDR slewing. The dynamic response of two 20-m LDR configurations was studied. Two mirror support configurations were investigated for the Ames concept, the first employs a six-strut secondary mirror support structure, while the second uses a triple-bipod support design. All three configurations were modeled using a tetrahedral truss design for the primary mirror support structure. Response resulting from secondary mirror chopping was obtained for the two Ames configurations, and the response of the primary mirror from slewing was obtained for all three configurations.

  11. Scenario study on the FBR deployment

    International Nuclear Information System (INIS)

    Ono, Kiyoshi; Kofuji, Hirohide; Otaki, Akira; Yonezawa, Shigeaki; Shinoda, Yoshihiko; Hirao, Kazunori; Ikegami, Tetsuo

    2000-12-01

    This study on success scenarios for the Fast Breeder Reactor (FBR) deployment was performed taking account of future situation of fossil, renewable and nuclear energies in Japan as well as the world from the viewpoints of the following four items; economics, environment, energy security and restriction of natural uranium resources. In the economics scenario, if carbon tax is added to generating cost of LNG, coal and oil and the economics of FBR cycle is competitive with LWR cycle in the future, FBR cycle will be expected to introduce as the middle and base load power plant. In the environment scenario, there is also any possibility that FBR cycle which can burn and transmute minor actinide and fission product elements will be introduced in order to reduce the burden of deposit facility and the toxicity of high-level waste. In the uranium resources restriction scenario, FBR cycle needs to be deployed at the latest in the middle of 21st century from the viewpoint of the restriction of natural uranium resources. This study was carried out in a part of JNC's feasibility study on commercialized FBR cycle system. (author)

  12. The medical software quality deployment method.

    Science.gov (United States)

    Hallberg, N; Timpka, T; Eriksson, H

    1999-03-01

    The objective of this study was to develop a Quality Function Deployment (QFD) model for design of information systems in health-care environments. Consecutive blocked-subject case studies were conducted, based on action research methods. Starting with a QFD model for software development, a model for information system design, the Medical Software Quality Deployment (MSQD) model, was developed. The MSQD model was divided into the pre-study phase, in which the customer categories and their power to influence the design are determined; the data collection phase, in which the voice of customers (VoC) is identified by observations and interviews and quantified by Critical. Incident questionnaires; the need specification phase, where the VoC is specified into ranked customer needs; and the design phase where the customer needs are transformed stepwise to technical requirements and design attributes. QFD showed to be useful for integrating the values of different customer categories in software development for health-care settings. In the later design phases, other quality methods should be used for software implementation and testing.

  13. Testing the Deployment Repeatability of a Precision Deployable Boom Prototype for the Proposed SWOT Karin Instrument

    Science.gov (United States)

    Agnes, Gregory S.; Waldman, Jeff; Hughes, Richard; Peterson, Lee D.

    2015-01-01

    NASA's proposed Surface Water Ocean Topography (SWOT) mission, scheduled to launch in 2020, would provide critical information about Earth's oceans, ocean circulation, fresh water storage, and river discharge. The mission concept calls for a dual-antenna Ka-band radar interferometer instrument, known as KaRIn, that would map the height of water globally along two 50 km wide swaths. The KaRIn antennas, which would be separated by 10 meters on either side of the spacecraft, would need to be precisely deployable in order to meet demanding pointing requirements. Consequently, an effort was undertaken to design build and prototype a precision deployable Mast for the KaRIn instrument. Each mast was 4.5-m long with a required dilitation stability of 2.5 microns over 3 minutes. It required a minimum first mode of 7 Hz. Deployment repeatability was less than +/- 7 arcsec in all three rotation directions. Overall mass could not exceed 41.5 Kg including any actuators and thermal blanketing. This set of requirements meant the boom had to be three times lighter and two orders of magnitude more precise than the existing state of the art for deployable booms.

  14. Finding Their Way Back In: Family Reintegration Following Guard Deployment.

    Science.gov (United States)

    Messecar, Deborah C

    2017-03-01

    The aim of this study was to describe deployed National Guard members' and their families' perceptions of their experience with family reintegration, and the causes and conditions of challenges reintegration presents after deployment. A total of 26 National Guard members and 19 family members participated in individual (n = 22), couples (n = 6), or focus group (n = 17) interviews. In-depth interviews were used to assess needs and maximize input from military families regarding deployment-related experiences and reintegration issues. Qualitative coding and analysis of data were completed using NVivo. Finding their way back in is the key process that the military members must complete to successfully reestablish their desired social connections with the family and reclaim their place within the family. Several conditions shape the degree of challenges with reintegration that veterans and their family will encounter. These include preparation for deployment, length and type of deployment, communication during deployment, and finally, awareness of how deployment changes the military member and the family. Support resources dedicated to providing National Guard members and their families with assistance in preparing for deployments and educating them about the importance of communication during deployment should be maintained and expanded. Broader educational efforts that increase awareness of what to expect regarding how deployment changes the military member and the family are needed. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  15. QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNINGTOOL

    Directory of Open Access Journals (Sweden)

    Burcu DEVRİM İÇTENBAŞ

    2011-07-01

    Full Text Available Quality Function Deployment (QFD uses a house of quality to translate customerrequirements into engineering specifications. QFD has been widely used as a toolto develop new products. It has been adopted in thefields of education quality,service quality, software development and marketingplanning. The tool hasrecently been applied in strategic planning .In this study authors reviewed currentresearch which uses QFD as a strategic planning tool and described how QFDmethods can be used as a robust tool in strategic planning. This study provides aninsight for strategic planners to utilize a QFD- based philosophy and the methodsare useful tools for the design of a customer-driven strategy and show how itsystematically translates vision into action, targeting opportunities and creatinginnovative strategies.

  16. Stochastic Optimization for Nuclear Facility Deployment Scenarios

    Science.gov (United States)

    Hays, Ross Daniel

    Single-use, low-enriched uranium oxide fuel, consumed through several cycles in a light-water reactor (LWR) before being disposed, has become the dominant source of commercial-scale nuclear electric generation in the United States and throughout the world. However, it is not without its drawbacks and is not the only potential nuclear fuel cycle available. Numerous alternative fuel cycles have been proposed at various times which, through the use of different reactor and recycling technologies, offer to counteract many of the perceived shortcomings with regards to waste management, resource utilization, and proliferation resistance. However, due to the varying maturity levels of these technologies, the complicated material flow feedback interactions their use would require, and the large capital investments in the current technology, one should not deploy these advanced designs without first investigating the potential costs and benefits of so doing. As the interactions among these systems can be complicated, and the ways in which they may be deployed are many, the application of automated numerical optimization to the simulation of the fuel cycle could potentially be of great benefit to researchers and interested policy planners. To investigate the potential of these methods, a computational program has been developed that applies a parallel, multi-objective simulated annealing algorithm to a computational optimization problem defined by a library of relevant objective functions applied to the Ver ifiable Fuel Cycle Simulati on Model (VISION, developed at the Idaho National Laboratory). The VISION model, when given a specified fuel cycle deployment scenario, computes the numbers and types of, and construction, operation, and utilization schedules for, the nuclear facilities required to meet a predetermined electric power demand function. Additionally, it calculates the location and composition of the nuclear fuels within the fuel cycle, from initial mining through

  17. Clean energy deployment: addressing financing cost

    International Nuclear Information System (INIS)

    Ameli, Nadia; Kammen, Daniel M

    2012-01-01

    New methods are needed to accelerate clean energy policy adoption. To that end, this study proposes an innovative financing scheme for renewable and energy efficiency deployment. Financing barriers represent a notable obstacle for energy improvements and this is particularly the case for low income households. Implementing a policy such as PACE—property assessed clean energy—allows for the provision of upfront funds for residential property owners to install electric and thermal solar systems and make energy efficiency improvements to their buildings. This paper will inform the design of better policies tailored to the creation of the appropriate conditions for such investments to occur, especially in those countries where most of the population belongs to the low–middle income range facing financial constraints. (letter)

  18. Lessons learnt from WLCG service deployment

    International Nuclear Information System (INIS)

    Shiers, J D

    2008-01-01

    This paper summarises the main lessons learnt from deploying WLCG production services, with a focus on Reliability, Scalability, Accountability, which lead to both manageability and usability. Each topic is analysed in turn. Techniques for zero-user-visible downtime for the main service interventions are described, together with pathological cases that need special treatment. The requirements in terms of scalability are analysed, calling for as much robustness and automation in the service as possible. The different aspects of accountability - which covers measuring/tracking/logging/monitoring what is going on - and has gone on - is examined, with the goal of attaining a manageable service. Finally, a simple analogy is drawn with the Web in terms of usability - what do we need to achieve to cross the chasm from small-scale adoption to ubiquity?

  19. Techno-Economics of Residential Broadband Deployment

    DEFF Research Database (Denmark)

    Sigurdsson, Halldor Matthias

    2007-01-01

    on account of their existing telecom network (”the raw copper”), and typically they will prefer an xDSL-based strategy (various types of Digital Subscriber Line-technology: ADSL, VDSL, etc.), where the rate of speed of data connections are increased gradually to 10-50 Mbit/s or even more, in order to gain...... broadband deployment strategy is depending on a complexed set of parameters, and there is a demand for precise techno-economic cost models estimating financial feasibility. The existing cost models do not consider the dynamic developments in the market caused by competition. The PhD thesis has a profound...... the general principles from the Danish LRAIC-model (Long Run Average Incremental Cost) and divides Denmark in 4 geografical profiles. Considering the existing copper-infrastructure the most advantageous strategies for the players of each of these profiles are identified. The importance of the time horizon...

  20. Rapid deployable global sensing hazard alert system

    Science.gov (United States)

    Cordaro, Joseph V; Tibrea, Steven L; Shull, Davis J; Coleman, Jerry T; Shuler, James M

    2015-04-28

    A rapid deployable global sensing hazard alert system and associated methods of operation are provided. An exemplary system includes a central command, a wireless backhaul network, and a remote monitoring unit. The remote monitoring unit can include a positioning system configured to determine a position of the remote monitoring unit based on one or more signals received from one or more satellites located in Low Earth Orbit. The wireless backhaul network can provide bidirectional communication capability independent of cellular telecommunication networks and the Internet. An exemplary method includes instructing at least one of a plurality of remote monitoring units to provide an alert based at least in part on a location of a hazard and a plurality of positions respectively associated with the plurality of remote monitoring units.

  1. Scientific data management challenges, technology and deployment

    CERN Document Server

    Rotem, Doron

    2010-01-01

    Dealing with the volume, complexity, and diversity of data currently being generated by scientific experiments and simulations often causes scientists to waste productive time. Scientific Data Management: Challenges, Technology, and Deployment describes cutting-edge technologies and solutions for managing and analyzing vast amounts of data, helping scientists focus on their scientific goals. The book begins with coverage of efficient storage systems, discussing how to write and read large volumes of data without slowing the simulation, analysis, or visualization processes. It then focuses on the efficient data movement and management of storage spaces and explores emerging database systems for scientific data. The book also addresses how to best organize data for analysis purposes, how to effectively conduct searches over large datasets, how to successfully automate multistep scientific process workflows, and how to automatically collect metadata and lineage information. This book provides a comprehensive u...

  2. Clean energy deployment: addressing financing cost

    Science.gov (United States)

    Ameli, Nadia; Kammen, Daniel M.

    2012-09-01

    New methods are needed to accelerate clean energy policy adoption. To that end, this study proposes an innovative financing scheme for renewable and energy efficiency deployment. Financing barriers represent a notable obstacle for energy improvements and this is particularly the case for low income households. Implementing a policy such as PACE—property assessed clean energy—allows for the provision of upfront funds for residential property owners to install electric and thermal solar systems and make energy efficiency improvements to their buildings. This paper will inform the design of better policies tailored to the creation of the appropriate conditions for such investments to occur, especially in those countries where most of the population belongs to the low-middle income range facing financial constraints.

  3. Time Deployment Study for Annulus Pumping

    International Nuclear Information System (INIS)

    REBERGER, D.W.

    2000-01-01

    Radioactive wastes from processing irradiated uranium fuels have been stored as alkaline slurries in underground tanks at the Hanford Site. Single-shell tanks (SST) and double-shell tanks (DST) of various sizes were used for waste storage. Of the total 177 tanks, there are 28 DSTs. DSTs are located in AN, AP, AW, AY, AZ, and SY tank farms in the 200 East (200E) and 200-West (200W) Areas. The storage capacities of the DSTs vary from 980,000 to 1,140,000 gal. DSTs are designed and constructed as an integral steel structure, i.e., an inner shell within an outer shell, so that any leak from the inner shell is confined within the annulus without impacting the environment. The inner shell provides primary containment for the wastes and the outer shell provides secondary containment in the form of an annulus. The annulus of a DST is equipped with a pump pit, leak detection probes, and other accessories. The existing annulus pumps in the DSTs need to be revamped with a new system to reduce operating costs and reduce the time to deploy a pumping system. The new pumping system will minimize the likelihood of a release of waste into the environment; improve capability of waste removal to the maximum extent possible to comply with Washington Administrative Code (WAC) 173-303-640 and Code of Federal Regulations (CFR) 40 CFR 265.193. This study addresses the time required to deploy an annulus pumping system designed to fit any DST after detection of a leak in the inner shell of the DST

  4. Airbag deployment-related eye injuries.

    Science.gov (United States)

    Koisaari, Tapio; Leivo, Tiina; Sahraravand, Ahmad; Haavisto, Anna-Kaisa; Sulander, Pekka; Tervo, Timo M T

    2017-07-04

    We studied the correlation between airbag deployment and eye injuries using 2 different data sets. The registry of the Finnish Road Accident (FRA) Investigation Teams was analyzed to study severe head- and eyewear-related injuries. All fatal passenger car or van accidents that occurred during the years 2009-2012 (4 years) were included (n = 734). Cases in which the driver's front airbag was deployed were subjected to analysis (n = 409). To determine the proportion of minor, potentially airbag-related eye injuries, the results were compared to the data for all new eye injury patients (n = 1,151) recorded at the Emergency Clinic of the Helsinki University Eye Hospital (HUEH) during one year, from May 1, 2011, to April 30, 2012. In the FRA data set, the unbelted drivers showed a significantly higher risk of death (odds ratio [OR] = 5.89, 95% confidence interval [CI], 3.33-10.9, P = 2.6E-12) or of sustaining head injuries (OR = 2.50, 95% CI, 1.59-3.97, P = 3.8E-5). Only 4 of the 1,151 HUEH patients were involved in a passenger car accident. In one of the crashes, the airbag operated, and the belted driver received 2 sutured eye lid wounds and showed conjunctival sugillation. No permanent eye injuries were recorded during the follow-up. The calculated annual airbag-related eye injury incidence was less than 1/1,000,000 people, 4/100,000 accidents, and 4/10,000 injured occupants. Airbag-related eye injuries occurred very rarely in car accidents in cases where the occupant survived and the restraint system was appropriately used. Spectacle use did not appear to increase the risk of eye injury in restrained occupants.

  5. The financial impact of deployments on reserve health care providers.

    Science.gov (United States)

    Petinaux, Bruno

    2008-08-01

    This study retrospectively surveyed the financial impact of deployments on 17 U.S. Army Reserve health care providers. Due to multiple mobilizations, 29 separate deployments were reported. The deployments, mostly between 2001 and 2005, typically lasted 3 months during which 86% reported no civilian income and 76% reported no civilian benefits. Solo practice providers reported the greatest financial losses due to continuing financial responsibility related to their civilian practice despite being deployed. Overall, 2 deployments did not change, 9 increased, and 16 decreased the medical officer's income. Two were not reported. In this small retrospective convenience sample study, solo practice U.S. Army Reserve health care providers were found to be at highest risk of financial losses during military deployments. This being said, no price can be put on the privilege of serving our men and women in uniform.

  6. Early identification of posttraumatic stress following military deployment

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Statnikov, Alexander; Andersen, Søren B

    2015-01-01

    BACKGROUND: Pre-deployment identification of soldiers at risk for long-term posttraumatic stress psychopathology after home coming is important to guide decisions about deployment. Early post-deployment identification can direct early interventions to those in need and thereby prevents...... the development of chronic psychopathology. Both hold significant public health benefits given large numbers of deployed soldiers, but has so far not been achieved. Here, we aim to assess the potential for pre- and early post-deployment prediction of resilience or posttraumatic stress development in soldiers...... by application of machine learning (ML) methods. METHODS: ML feature selection and prediction algorithms were applied to a prospective cohort of 561 Danish soldiers deployed to Afghanistan in 2009 to identify unique risk indicators and forecast long-term posttraumatic stress responses. RESULTS: Robust pre...

  7. Accounting for variation in wind deployment between Canadian provinces

    International Nuclear Information System (INIS)

    Ferguson-Martin, Christopher J.; Hill, Stephen D.

    2011-01-01

    Wind energy deployment varies widely across regions and this variation cannot be explained by differences in natural wind resources alone. Evidence suggests that institutional factors beyond physical wind resources can influence the deployment of wind energy systems. Building on the work of , this study takes a historical institutionalist approach to examine the main factors influencing wind energy deployment across four Canadian provinces Canada: Alberta, Manitoba, Ontario and Nova Scotia. Our case studies suggest that wind energy deployment depends upon a combination of indirect causal factors-landscape values, political and social movements, government electricity policy, provincial electricity market structure and incumbent generation technologies and direct causal factors-grid architecture, ownership patterns, renewable incentive programs, planning and approvals processes and stakeholder support and opposition. - Research highlights: → Examines the reasons for variations in wind deployment between Canadian provinces. → Employs a historical institutional approach to the analysis. → Discusses social factors that affect wind deployment across Canadian jurisdictions.

  8. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-09-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  9. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-06-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  10. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2016-10-01

    Group, Family Advocacy, Child and Family Behavioral Health, Soldier Readiness Program (SRP), Family Life Chaplain Training Center, Fort Hood Housing ...resilience and child well-being, Soldier and non-deploying parents must successfully meet the challenges of caregiving throughout the deployment cycle ...reintegration program to reduce parenting stress and promote family resilience in Active Duty military families through all phases of the deployment cycle

  11. White Paper on Dish Stirling Technology: Path Toward Commercial Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Andraka, Charles E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Stechel, Ellen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Becker, Peter [Stirling Energy Systems, Scottsdale, AZ (United States); Messick, Brian [Stirling Energy Systems, Scottsdale, AZ (United States)

    2016-07-01

    Dish Stirling energy systems have been developed for distributed and large-scale utility deployment. This report summarizes the state of the technology in a joint project between Stirling Energy Systems, Sandia National Laboratories, and the Department of Energy in 2011. It then lays out a feasible path to large scale deployment, including development needs and anticipated cost reduction paths that will make a viable deployment product.

  12. Self managing monitoring for highly elastic large scale Cloud deployments

    OpenAIRE

    Ward, Jonathan Stuart; Barker, Adam David

    2014-01-01

    Infrastructure as a Service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications affected by elasticity is monitoring. In this paper we investigate the challenges of monitoring large cloud deployments and how these challenges differ from previous monitoring problems. In order to mee...

  13. Multiobjective Shape Optimization for Deployment and Adjustment Properties of Cable-Net of Deployable Antenna

    Directory of Open Access Journals (Sweden)

    Guoqiang You

    2015-01-01

    Full Text Available Based on structural features of cable-net of deployable antenna, a multiobjective shape optimization method is proposed to help to engineer antenna’s cable-net structure that has better deployment and adjustment properties. In this method, the multiobjective optimum mathematical model is built with lower nodes’ locations of cable-net as variables, the average stress ratio of cable elements and strain energy as objectives, and surface precision and natural frequency of cable-net as constraints. Sequential quadratic programming method is used to solve this nonlinear mathematical model in conditions with different weighting coefficients, and the results show the validity and effectiveness of the proposed method and model.

  14. Verification Test for Ultra-Light Deployment Mechanism for Sectioned Deployable Antenna Reflectors

    Science.gov (United States)

    Zajac, Kai; Schmidt, Tilo; Schiller, Marko; Seifart, Klaus; Schmalbach, Matthias; Scolamiero, Lucio

    2013-09-01

    The ultra-light deployment mechanism (UDM) is based on three carbon fibre reinforced plastics (CFRP) curved tape springs made of carbon fibre / cyanate ester prepregs.In the frame of the activity its space application suitability for the deployment of solid reflector antenna sections was investigated. A projected diameter of the full reflector of 4 m to 7 m and specific mass in the order of magnitude of 2.6kg/m2 was focused for requirement derivation.Extensive verification tests including health checks, environmental and functional tests were carried out with an engineering model to enable representative characterizing of the UDM unit.This paper presents the design and a technical description of the UDM as well as a summary of achieved development status with respect to test results and possible design improvements.

  15. Market and Policy Barriers to Energy Storage Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bhatnagar, Dhruv [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Currier, Aileen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hernandez, Jacquelynne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ma, Ookie [Dept. of Energy (DOE), Washington DC (United States) Office of Energy Efficiency and Renewable Energy; Kirby, Brendan [Consultant

    2013-09-01

    Electric energy storage technologies can provide numerous grid services; there are a number of factors that restrict their current deployment. The most significant barrier to deployment is high capital costs, though several recent deployments indicate that capital costs are decreasing and energy storage may be the preferred economic alternative in certain situations. However, a number of other market and regulatory barriers persist, limiting further deployment. These barriers can be categorized into regulatory barriers, market (economic) barriers, utility and developer business model barriers, cross-cutting barriers and technology barriers.

  16. LWR Spent Fuel Management for the Smooth Deployment of FBR

    International Nuclear Information System (INIS)

    Fukasawa, T.; Yamashita, J.; Hoshino, K.; Sasahira, A.; Inoue, T.; Minato, K.; Sato, S.

    2015-01-01

    Fast breeder reactors (FBR) and FBR fuel cycle are indispensable to prevent the global warming and to secure the long-term energy supply. Commercial FBR expects to be deployed from around 2050 until around 2110 in Japan by the replacement of light water reactors (LWR) after their 60 years life. The FBR deployment needs Pu (MOX) from the LWR-spent fuel (SF) reprocessing. As Japan can posses little excess Pu, its balance control is necessary between LWR-SF management (reprocessing) and FBR deployment. The fuel cycle systems were investigated for the smooth FBR deployment and the effectiveness of proposed flexible system was clarified in this work. (author)

  17. Human Metabolism and Interactions of Deployment-Related Chemicals

    National Research Council Canada - National Science Library

    Hodgson, Ernest

    2003-01-01

    This study examines the human-metabolism and metabolic interactions of a subset of deployment-related chemicals, including chlorpyrifos, DEET, permethrin, pyridostigmine bromide, and sulfur mustard metabolites...

  18. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2000-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective: producing innovative, useful, and interesting research results in the areas of software configuration and deployment...

  19. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2001-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective; producing innovative, useful and interesting research results in the areas of software configuration and deployment...

  20. Deployment Testing of the De-Orbit Sail Flight Hardware

    OpenAIRE

    Hillebrandt, Martin; Meyer, Sebastian; Zander, Martin; Hühne, Christian

    2015-01-01

    The paper describes the results of the deployment testing of the De-Orbit Sail flight hardware, a drag sail for de-orbiting applications, performed by DLR. It addresses in particular the deployment tests of the fullscale sail subsystem and deployment force tests performed on the boom deployment module. For the fullscale sail testing a gravity compensation device is used which is described in detail. It allows observations of the in-plane interaction of the booms with the sail membrane and the...

  1. Six policy actions for accelerated deployment of renewable energy. READy Renewable Energy Action on Deployment. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-03-15

    The READy book presents a kaleidoscope of policy options that have proven to accelerate the deployment of renewable energy technologies, based on experiences around the world at the local and national levels. Lessons learned from successful cases are distilled into six essential action points. Together these categories of policy actions compose the ACTION Star, a guide for taking action now while preparing for growth over the long term.

  2. The Deployment Life Study: Longitudinal Analysis of Military Families Across the Deployment Cycle

    Science.gov (United States)

    2016-01-01

    deployment. The 11 events, grouped by type of trauma, are as follows: • combat – engaging in hand-to-hand combat – being physically knocked over...leaving home; missing classes at school because you don’t like your school; missing after-school activities (such as school activities, sports ) because...you don’t feel like participating; missing after-school activities (such as school activi- ties, sports ) because of transportation problems/issues

  3. Swarm Deployable Boom Assembly (DBA) Development of a Deployable Magnetometer Boom for the Swarm Spacecraft

    Science.gov (United States)

    McMahon, Paul; Jung, Hans-Juergen; Edwards, Jeff

    2013-09-01

    The Swarm programme consists of 3 magnetically clean satellites flying in close formation designed to measure the Earth's magnetic field using 2 Magnetometers mounted on a 4.3m long deployable boom.Deployment is initiated by releasing 3 HDRMs, once released the boom oscillates back and forth on a pair of pivots, similar to a restaurant kitchen door hinge, for around 120 seconds before coming to rest on 3 kinematic mounts which are used to provide an accurate reference location in the deployed position. Motion of the boom is damped through a combination of friction, spring hysteresis and flexing of the 120+ cables crossing the hinge. Considerable development work and accurate numerical modelling of the hinge motion was required to predict performance across a wide temperature range and ensure that during the 1st overshoot the boom did not damage itself, the harness or the spacecraft.Due to the magnetic cleanliness requirements of the spacecraft no magnetic materials could be used in the design of the hardware.

  4. Technology Deployment Annual Report 2014 December

    Energy Technology Data Exchange (ETDEWEB)

    Arterburn, George K. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-12-01

    This report is a summary of key Technology Deployment activities and achievements for 2014, including intellectual property, granted copyrights, royalties, license agreements, CRADAs, WFOs and Technology-Based Economic Development. Idaho National Laboratory (INL) is a Department of Energy (DOE) multi-program national laboratory that conducts research and development in all DOE mission areas. Like all other federal laboratories, INL has a statutory, technology transfer mission to make its capabilities and technologies available to all federal agencies, to state and local governments, and to universities and industry. To fulfill this mission, INL encourages its scientific, engineering, and technical staff to disclose new inventions and creations to ensure the resulting intellectual property is captured, protected, and made available to others who might benefit from it. As part of the mission, intellectual property is licensed to industrial partners for commercialization, creating jobs and delivering the benefits of federally funded technology to consumers. In other cases, unique capabilities are made available to other federal agencies or to regional small businesses to solve specific technical challenges. INL employees also work cooperatively with researchers and technical staff from the university and industrial sectors to further develop emerging technologies. In our multinational global economy, INL is contributing to the development of the next generation of engineers and scientists by licensing software to educational instiutitons throughout the world. This report is a catalog of selected INL technology transfer and commercialization transactions during this past year. The size and diversity of INL technical resources, coupled with the large number of relationships with other organizations, virtually ensures that a report of this nature will fail to capture all interactions. Recognizing this limitation, this report focuses on transactions that are specifically

  5. Tunable bandgaps in a deployable metamaterial

    Science.gov (United States)

    Nanda, Aditya; Karami, M. A.

    2018-06-01

    In this manuscript, we investigate deployable structures (such as solar arrays) and origami-inspired foldable structures as metamaterials capable of tunable wave manipulation. Specifically, we present a metamaterial whose bandgaps can be modulated by changing the fold angle of adjacent panels. The repeating unit cell of the structure consists of a beam (representing a panel) and a torsional spring (representing the folding mechanism). Two important cases are considered. Firstly, the fold angle (angle between adjacent beams), Ψ, is zero and only flexural waves propagate. In the second case, the fold angle is greater than zero (Ψ > 0). This causes longitudinal and transverse vibration to be coupled. FEM models are used to validate both these analyses. Increasing the fold angle was found to inflict notable changes to the wave transmission characteristics of the structure. In general, increasing the fold angles caused the bandwidth of bandgaps to increase. For the lowest four bandgaps we found bandwidth increases of 252 %, 177 %, 230 % and 163 % respectively at Ψ = 90 deg (relative to the bandwidths at Ψ = 0). In addition, non-trivial increases in bandwidth of the odd-numbered bandgaps occurs even at small fold angles-the bandwidth for the first and third bandgaps effectively double in size (increase by 100 %) at Ψ = 20 deg relative to those at Ψ = 0. This could have ramifications in the context of tunable wave manipulation and adaptive filtering. In addition, by expanding out the characteristic equation of transfer matrix for the straight structure, we prove that the upper band edge of the nth bandgap will always equal the nth simply supported natural frequency of the constituent beam. Further, we found that the ratio (EI/kt) is a pertinent parameter affecting the bandwidth of bandgaps. For low values of the ratio, effectively, no bandgap exists. For higher values of the ratio (EI/kt), we obtain a relatively large bandgap over which no waves propagate. This can

  6. Deploying Renewables -- principles for effective policies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-29

    Renewable energy can play a fundamental role in tackling climate change, environmental degradation and energy security. As these challenges have become ever more pressing, governments and markets are seeking innovative solutions. Yet, what are the key factors that will determine the success of renewable energy policies? How can current policies be improved to encourage greater deployment of renewables? What impact can more effective policies have on renewables' share in the future global energy mix and how soon? This publication addresses these questions. Responding to the Gleneagles G8 call for a clean and secure energy future, it highlights key policy tools to fast-track renewables into the mainstream. This analysis illustrates good practices by applying the combined metrics of effectiveness and efficiency to renewable energy policies in the electricity, heating and transport sectors. It highlights significant barriers to accelerating renewables penetration, and argues that the great potential of renewables can be exploited much more rapidly and to a much larger extent if good practices are adopted. Carefully designed policy frameworks, customised to support technologies at differing stages of maturity, will deliver a strong portfolio of renewable energy technologies. The document provides recommendations on key principles for policy design as a template for decision makers.

  7. Automating NEURON Simulation Deployment in Cloud Resources.

    Science.gov (United States)

    Stockton, David B; Santamaria, Fidel

    2017-01-01

    Simulations in neuroscience are performed on local servers or High Performance Computing (HPC) facilities. Recently, cloud computing has emerged as a potential computational platform for neuroscience simulation. In this paper we compare and contrast HPC and cloud resources for scientific computation, then report how we deployed NEURON, a widely used simulator of neuronal activity, in three clouds: Chameleon Cloud, a hybrid private academic cloud for cloud technology research based on the OpenStack software; Rackspace, a public commercial cloud, also based on OpenStack; and Amazon Elastic Cloud Computing, based on Amazon's proprietary software. We describe the manual procedures and how to automate cloud operations. We describe extending our simulation automation software called NeuroManager (Stockton and Santamaria, Frontiers in Neuroinformatics, 2015), so that the user is capable of recruiting private cloud, public cloud, HPC, and local servers simultaneously with a simple common interface. We conclude by performing several studies in which we examine speedup, efficiency, total session time, and cost for sets of simulations of a published NEURON model.

  8. Deployable structures using bistable reeled composites

    Science.gov (United States)

    Daton-Lovett, Andrew J.; Compton-Bishop, Quentin M.; Curry, Richard G.

    2000-06-01

    This paper describes an innovative, patented use of composite materials developed by RolaTube Technology Ltd. to make smart deployable structures. Bi-stable reeled composites (BRCs) can alternate between two stable forms; that of a strong, rigid structure and that of a compact coil of flat-wound material. Bi-stability arises as a result of the manipulation of Poisson's ratio and isotropy in the various layers of the material. BRCs are made of fiber- reinforced composite materials, most often with a thermoplastic matrix. A range of fibers and polymer matrices can be used according to the requirements of the operating environment. Samples of a BRC structure were constructed using layers of unidirectional, fiber-reinforced thermoplastic sheet with the layers at different angles. The whole assembly was then consolidated under conditions of elevated temperature and pressure. The properties of the BRC are described and the result of a series of experiments performed on the sample to determine the tensile strength of the BRC structure are reported. A full analysis using finite element methods is being undertaken in collaboration with the University of Cambridge, England. The first commercial use has been to fabricate boom and drive mechanisms for the remote inspection of industrial plant.

  9. Development, deployment and operations of ATLAS databases

    International Nuclear Information System (INIS)

    Vaniachine, A. V.; von der Schmitt, J. G.

    2008-01-01

    In preparation for ATLAS data taking, a coordinated shift from development towards operations has occurred in ATLAS database activities. In addition to development and commissioning activities in databases, ATLAS is active in the development and deployment (in collaboration with the WLCG 3D project) of the tools that allow the worldwide distribution and installation of databases and related datasets, as well as the actual operation of this system on ATLAS multi-grid infrastructure. We describe development and commissioning of major ATLAS database applications for online and offline. We present the first scalability test results and ramp-up schedule over the initial LHC years of operations towards the nominal year of ATLAS running, when the database storage volumes are expected to reach 6.1 TB for the Tag DB and 1.0 TB for the Conditions DB. ATLAS database applications require robust operational infrastructure for data replication between online and offline at Tier-0, and for the distribution of the offline data to Tier-1 and Tier-2 computing centers. We describe ATLAS experience with Oracle Streams and other technologies for coordinated replication of databases in the framework of the WLCG 3D services

  10. New technologies deployment for advanced power plants

    International Nuclear Information System (INIS)

    Kiyoshi, Yamauchi

    2007-01-01

    Mitsubishi Heavy Industries, Ltd. (MHI) has been the total engineering and manufacturing company of pressurized water reactors (PWRs) in Japan since the commencement of commercial operations of Mihama Unit 1 of the Kansai Electric Power Company in 1970. Over these decades, MHI has endeavored to develop a broad spread of nuclear technology, from design, manufacturing, and construction, to plant maintenance services. More recently, with the ever rising need for nuclear power generation around the world to prevent global warming and to cope with surging oil prices, MHI is striving to expand its nuclear power business in the world market, such as US-APWR (Advanced Pressurized Water Reactor) in the U.S., as well as to develop technology for advanced reactors and nuclear fuel cycles to ensure energy security in the future. This paper introduces these approaches, especially focused on new technologies deployment for the global needs, and clarifies the current status and future prospects of MHI as the world's leading nuclear company. (author)

  11. Deploying the advanced U.S. EPR

    International Nuclear Information System (INIS)

    Hagan, C.

    2007-01-01

    As electricity demand, clean air concerns and energy prices increase in the U.S., interest in new nuclear reactors is also on the rise. These factors - along with decades of outstanding performance of the nation's existing nuclear fleet - have contributed to a favorable market for new nuclear power in the U.S. Although no U.S. company has declared it actually will buy and build new reactors, many have actively expressed their interest through investment and regulatory interaction. The timing is also right for new reactors in terms of public perception, government policy and acceptance of the investment community. Amid this environment, the U.S. commercial power industry recently has begun pursuing new nuclear generation in earnest. AREVA, whose ongoing global market analyses indicated the need for additional baseload nuclear generation in the U.S., chose to license its EPR design to meet that need. This article will discuss the American market landscape for new nuclear and how AREVA is approaching it, present an overview of the company's U.S. EPR technology, and provide an update on the regulatory status of the design and deployment schedule. (orig.)

  12. Quality function deployment in launch operations

    Science.gov (United States)

    Portanova, P. L.; Tomei, E. J., Jr.

    1990-11-01

    The goal of the Advanced Launch System (ALS) is a more efficient launch capability that provides a highly reliable and operable system at substantially lower cost than current launch systems. Total Quality Management (TQM) principles are being emphasized throughout the ALS program. A continuous improvement philosophy is directed toward satisfying users' and customer's requirements in terms of quality, performance, schedule, and cost. Quality Function Deployment (QFD) is interpreted as the voice of the customer (or user), and it is an important planning tool in translating these requirements throughout the whole process of design, development, manufacture, and operations. This report explores the application of QFD methodology to launch operations, including the modification and addition of events (operations planning) in the engineering development cycle, and presents an informal status of study results to date. QFD is a technique for systematically analyzing the customer's (Space Command) perceptions of what constitutes a highly reliable and operable system and functionally breaking down those attributes to identify the critical characteristics that determine an efficient launch system capability. In applying the principle of QFD, a series of matrices or charts are developed with emphasis on the one commonly known as the House of Quality (because of its roof-like format), which identifies and translates the most critical information.

  13. Daddy's Days Away. A Deployment Activity Book for Parents & Children.

    Science.gov (United States)

    Marine Corps, Washington, DC.

    This booklet grew from an idea that the children of Marines might appreciate some special discussion of their family's separation during deployment. Information is provided for parents to help them express their feelings with their children about the deployment. Outlines of activities to do before leaving are included. Suggestions are given for…

  14. Hitting the ground running: Healthgrid deployment and adoption

    NARCIS (Netherlands)

    Gwadry-Sridhar, Femida; Olabarriaga, Silvia D.; van Kampen, Antoine; Bauer, Michael; Solomonides, Tony

    2010-01-01

    We consider the issues of healthgrid development, deployment and adoption in health care and research environments. While healthgrid technology could be deployed to support advanced medical research, we are not seeing its wide adoption. Understanding why this technology is not being exploited is one

  15. Accommodating Thickness in Origami-Based Deployable Arrays

    Science.gov (United States)

    Zirbel, Shannon A.; Magleby, Spencer P.; Howell, Larry L.; Lang, Robert J.; Thomson, Mark W.; Sigel, Deborah A.; Walkemeyer, Phillip E.; Trease, Brian P.

    2013-01-01

    The purpose of this work is to create deployment systems with a large ratio of stowed-to-deployed diameter. Deployment from a compact form to a final flat state can be achieved through origami-inspired folding of panels. There are many models capable of this motion when folded in a material with negligible thickness; however, when the application requires the folding of thick, rigid panels, attention must be paid to the effect of material thickness not only on the final folded state, but also during the folding motion (i.e., the panels must not be required to flex to attain the final folded form). The objective is to develop new methods for deployment from a compact folded form to a large circular array (or other final form). This paper describes a mathematical model for modifying the pattern to accommodate material thickness in the context of the design, modeling, and testing of a deployable system inspired by an origami six-sided flasher model. The model is demonstrated in hardware as a 1/20th scale prototype of a deployable solar array for space applications. The resulting prototype has a ratio of stowed-to-deployed diameter of 9.2 (or 1.25 m deployed outer diameter to 0.136 m stowed outer diameter).

  16. Post-deployment usability evaluation of a radiology workstation

    NARCIS (Netherlands)

    Jorritsma, Wiard; Cnossen, Fokie; Dierckx, Rudi; Oudkerk, Matthijs; van Ooijen, Peter

    2015-01-01

    Objective To evaluate the usability of a radiology workstation after deployment in a hospital. Significance In radiology, it is difficult to perform valid pre-deployment usability evaluations due to the heterogeneity of the user group, the complexity of the radiological workflow, and the complexity

  17. How Have Deployments During the War on Terrorism Affected Reenlistment?

    Science.gov (United States)

    2009-01-01

    Ethiopia, certain areas of Greece, Haiti, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Kosovo, Kuwait, Kyrgyzstan, Lebanon, Liberia, Malaysia ...deployment is a direct source of utility, as modeled in Chapter Three. Deployment is not simply another form of “work” that takes time away from “ leisure

  18. 50 CFR 635.21 - Gear operation and deployment restrictions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Gear operation and deployment restrictions....21 Gear operation and deployment restrictions. Link to an amendment published at 75 FR 57701, Sept. 22, 2010. The green-stick gear authorization requirements under paragraphs (c)(2)(v)(A), (c)(2)(v)(B...

  19. Review of deployment technology for tethered satellite systems

    Science.gov (United States)

    Yu, B. S.; Wen, H.; Jin, D. P.

    2018-03-01

    Tethered satellite systems (TSSs) have attracted significant attention due to their potential and valuable applications for scientific research. With the development of various launched on-orbit missions, the deployment of tethers is considered a crucial technology for operation of a TSS. Both past orbiting experiments and numerical results have shown that oscillations of the deployed tether due to the Coriolis force and environmental perturbations are inevitable and that the impact between the space tether and end-body at the end of the deployment process leads to complicated nonlinear phenomena. Hence, a set of suitable control methods plays a fundamental role in tether deployment. This review article summarizes previous work on aspects of the dynamics, control, and ground-based experiments of tether deployment. The relevant basic principles, analytical expressions, simulation cases, and experimental results are presented as well.

  20. Deploying HEP applications using Xen and Globus Virtual Workspaces

    International Nuclear Information System (INIS)

    Agarwal, A; Desmarais, R; Gable, I; Grundy, D; P-Brown, D; Seuster, R; Vanderster, D C; Sobie, R; Charbonneau, A; Enge, R

    2008-01-01

    The deployment of HEP applications in heterogeneous grid environments can be challenging because many of the applications are dependent on specific OS versions and have a large number of complex software dependencies. Virtual machine monitors such as Xen could be used to package HEP applications, complete with their execution environments, to run on resources that do not meet their operating system requirements. Our previous work has shown HEP applications running within Xen suffer little or no performance penalty as a result of virtualization. However, a practical strategy is required for remotely deploying, booting, and controlling virtual machines on a remote cluster. One tool that promises to overcome the deployment hurdles using standard grid technology is the Globus Virtual Workspaces project. We describe strategies for the deployment of Xen virtual machines using Globus Virtual Workspace middleware that simplify the deployment of HEP applications

  1. Clinical Predictive Modeling Development and Deployment through FHIR Web Services.

    Science.gov (United States)

    Khalilia, Mohammed; Choi, Myung; Henderson, Amelia; Iyengar, Sneha; Braunstein, Mark; Sun, Jimeng

    2015-01-01

    Clinical predictive modeling involves two challenging tasks: model development and model deployment. In this paper we demonstrate a software architecture for developing and deploying clinical predictive models using web services via the Health Level 7 (HL7) Fast Healthcare Interoperability Resources (FHIR) standard. The services enable model development using electronic health records (EHRs) stored in OMOP CDM databases and model deployment for scoring individual patients through FHIR resources. The MIMIC2 ICU dataset and a synthetic outpatient dataset were transformed into OMOP CDM databases for predictive model development. The resulting predictive models are deployed as FHIR resources, which receive requests of patient information, perform prediction against the deployed predictive model and respond with prediction scores. To assess the practicality of this approach we evaluated the response and prediction time of the FHIR modeling web services. We found the system to be reasonably fast with one second total response time per patient prediction.

  2. Military deployment and reintegration: a systematic review of child coping.

    Science.gov (United States)

    Bello-Utu, Cindy F; DeSocio, Janiece E

    2015-02-01

    Child coping with parent military deployment and family reintegration. A systematic review of research literature was conducted to examine the effects of deployment and family reintegration on children in military families. A search of CINAHL, PubMed, Psyc-INFO, and SocINDEX databases was performed using the terms "military family," "military child," "child coping," "deployment," and "reintegration." The search was limited to publications between 2001 and 2014 to focus on the effects of Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF), and Operation New Dawn (OND). Twenty-seven research reports met inclusion criteria. Three themes were extracted: A child's coping is influenced by (a) the child's age and development, (b) the mental health and coping of the non-deployed parent during deployment, and the mental health of both parents during family reintegration, and (c) the pre-existing resilience/vulnerability, cumulative risks, and resources of the child and family. © 2015 Wiley Periodicals, Inc.

  3. Shape memory alloy fracture as a deployment actuator

    International Nuclear Information System (INIS)

    Buban, Darrick M; Frantziskonis, George N

    2013-01-01

    The paper reports an experimental investigation into using shape memory alloy (SMA) as a deployment actuator. SMA specimens were heated and pulled to failure or pulled and heated to failure, thus developing an environmental and structural operating envelope for application as deployment mechanisms. The experimental results strongly suggest that SMAs can be implemented as deployment actuators. Recorded data shows that SMA fracture is possible over a wide range of temperatures and strains, filling a material performance gap not found in the literature. The obtained information allows design engineers to appropriately size SMAs given the design requirements for achieving the desired deployment effects. The major conclusion of the reported work is that SMAs as actuators are strong competitors to typical existing deployment efforts that use explosive or non-explosive actuators having implementation drawbacks such as the expense associated with special handling and the volume encountered in mounting the devices. (paper)

  4. Design of the De-Orbit Sail Boom Deployment Unit

    Science.gov (United States)

    Meyer, Sebastian; Hillebrandt, Martin; Straubel, Marco; Huhne, Christian

    2014-06-01

    The design of the De-Orbit Sail boom deployment unit is strongly driven by volume constraints, which are given by the cubesat container. Four CFRP (carbon fiber reinforced polymer) booms [4] with a cross-sectional shape of a double-omega and a length of 3.6 m are reeled on one spool in the center of the unit. The deployment of the four booms are controlled by an electric motor, which acts on the boom spool. Due to the volume limitation caused by the dimensions of the cubesat deployer the deployment unit has little room for the mechanisms components. With the aim to achieve a robust design, the deployment concept of the unit has greatly changed during the development process. The history of the design as well as the mechanisms are described. Additionally the results of the flight model testing are presented.

  5. An innovative deployable solar panel system for Cubesats

    Science.gov (United States)

    Santoni, Fabio; Piergentili, Fabrizio; Donati, Serena; Perelli, Massimo; Negri, Andrea; Marino, Michele

    2014-02-01

    One of the main Cubesat bus limitations is the available on-board power. The maximum power obtained using body mounted solar panels and advanced triple junction solar cells on a triple unit Cubesat is typically less than 10 W. The Cubesat performance and the mission scenario opened to these small satellite systems could be greatly enhanced by an increase of the available power. This paper describes the design and realization of a modular deployable solar panel system for Cubesats, consisting of a modular hinge and spring system that can be potentially used on-board single (1U), double(2U), triple (3U) and six units (6U) Cubesats. The size of each solar panels is the size of a lateral Cubesat surface. The system developed is the basis for a SADA (Solar Array Drive Assembly), in which a maneuvering capability is added to the deployed solar array in order to follow the apparent motion of the sun. The system design trade-off is discussed, comparing different deployment concepts and architectures, leading to the final selection for the modular design. A prototype of the system has been realized for a 3U Cubesat, consisting of two deployable solar panel systems, made of three solar panels each, for a total of six deployed solar panels. The deployment system is based on a plastic fiber wire and thermal cutters, guaranteeing a suitable level of reliability. A test-bed for the solar panel deployment testing has been developed, supporting the solar array during deployment reproducing the dynamical situation in orbit. The results of the deployment system testing are discussed, including the design and realization of the test-bed, the mechanical stress given to the solar cells by the deployment accelerations and the overall system performance. The maximum power delivered by the system is about 50.4 W BOL, greatly enhancing the present Cubesat solar array performance.

  6. Perceived effect of deployment on families of UK military personnel.

    Science.gov (United States)

    Thandi, G; Greenberg, N; Fear, N T; Jones, N

    2017-10-01

    In the UK, little is known about the perceived effects of deployment, on military families, from military personnel in theatre. To investigate military personnel's perceptions of the impact of deployment on intimate relationships and children. Deployed service personnel who were in a relationship, and who had children, completed a survey while deployed on combat operations. Data were taken from four mental health surveys carried out in Iraq in 2009 and Afghanistan in 2010, 2011 and 2014. Among 4265 participants, after adjusting for military and social-demographic covariates, perceiving that deployment had a negative impact on intimate relationships and children was associated with psychological distress, and traumatic stress symptoms. Military personnel who reported being in danger of being injured or killed during deployment, were more likely to report a perceived negative effect of deployment on their intimate relationships. Reservists were less likely to report a perceived negative impact of deployment on their children compared with regulars. Military personnel who themselves planned to separate from their partner were more likely to report psychological distress, and stressors at home. Perceived insufficient support from the Ministry of Defence was associated with poor mental health, and holding a junior rank. Deployed UK military personnel with symptoms of psychological distress, who experienced stressors at home, were especially likely to perceive that their family were inadequately supported by the military. Those planning to separate from their partner were at increased risk of suffering with mental health problems while deployed. © The Author 2017. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  7. Technology Deployment Annual Report 2013 December

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2014-01-01

    available to the INL’s Office of Technology Deployment. However, the accomplishments cataloged in the report reflect the achievements and creativity of the researchers, technicians, support staff, and operators of the INL workforce.

  8. Home front: post-deployment mental health and divorces.

    Science.gov (United States)

    Negrusa, Brighita; Negrusa, Sebastian

    2014-06-01

    Since 2003, about 14 % of U.S. Army soldiers have reported symptoms of posttraumatic stress disorder (PTSD) following deployments. In this article, we examine how post-deployment symptoms of PTSD and of other mental health conditions are related to the probability of divorce among married active-duty U.S. Army soldiers. For this purpose, we combine Army administrative individual-level longitudinal data on soldiers' deployments, marital history, and sociodemographic characteristics with their self-reported post-deployment health information. Our estimates indicate that time spent in deployment increases the divorce risk among Army enlisted personnel and that PTSD symptoms are associated with further increases in the odds of divorce. Although officers are generally less likely to screen positive for PTSD than enlisted personnel, we find a stronger relationship between PTSD symptoms and divorces among Army officers who are PTSD-symptomatic than among enlisted personnel. We estimate a larger impact of deployments on the divorce risk among female soldiers, but we do not find a differential impact of PTSD symptoms by gender. Also, we find that most of the effect of PTSD symptoms occurs early in the career of soldiers who deploy multiple times.

  9. Pneumothorax, without chest wall fracture, following airbag deployment

    Directory of Open Access Journals (Sweden)

    Samuel Parsons

    2010-12-01

    Full Text Available Air bags are an automatic crash protection system. They have been shown to reduce mortality from motor vehicle accidents by 31% following direct head-on impacts, by 19% following any frontal impact and by 11% overall. Despite obvious benefits there has been a corresponding increase in the number of injuries resulting from their deployment. We describe a case of a pneumothorax in the absence of chest wall pathology associated with airbag deployment, in a belted driver. There has been one previous description of pneumothorax associated with airbag deployment, in an unbelted driver.

  10. Strategic Studies Quarterly. Volume 6, Number 3. Fall 2012

    Science.gov (United States)

    2012-01-01

    in use, down to the level of specific version, the build number in use, and the history of security patches applied to it; • IP addresses of...IP addresses from 4,294,967,296 in IPv4 to 2128 in IPv6. It is recognized today that “deploying IPv6 is the only perennial way to ease pressure on...the public IPv4 address pool.”41 As the world begins a transition from using IPv4 to IPv6 as the dominant communications protocol for the global

  11. Water Quality Vocabulary Development and Deployment

    Science.gov (United States)

    Simons, B. A.; Yu, J.; Cox, S. J.

    2013-12-01

    Semantic descriptions of observed properties and associated units of measure are fundamental to understanding of environmental observations, including groundwater, surface water and marine water quality. Semantic descriptions can be captured in machine-readable ontologies and vocabularies, thus providing support for the annotation of observation values from the disparate data sources with appropriate and accurate metadata, which is critical for achieving semantic interoperability. However, current stand-alone water quality vocabularies provide limited support for cross-system comparisons or data fusion. To enhance semantic interoperability, the alignment of water-quality properties with definitions of chemical entities and units of measure in existing widely-used vocabularies is required. Modern ontologies and vocabularies are expressed, organized and deployed using Semantic Web technologies. We developed an ontology for observed properties (i.e. a model for expressing appropriate controlled vocabularies) which extends the NASA/TopQuadrant QUDT ontology for Unit and QuantityKind with two additional classes and two properties (see accompanying paper by Cox, Simons and Yu). We use our ontology to populate the Water Quality vocabulary with a set of individuals of each of the four key classes (and their subclasses), and add appropriate relationships between these individuals. This ontology is aligned with other relevant stand-alone Water Quality vocabularies and domain ontologies. Developing the Water Quality vocabulary involved two main steps. First, the Water Quality vocabulary was populated with individuals of the ObservedProperty class, which was determined from a census of existing datasets and services. Each ObservedProperty individual relates to other individuals of Unit and QuantityKind (taken from QUDT where possible), and to IdentifiedObject individuals. As a large fraction of observed water quality data are classified by the chemical substance involved, the

  12. Patriot PAC-2 Development and Deployment in The Gulf War

    National Research Council Canada - National Science Library

    Sherman, J

    2003-01-01

    .... Patriot PAC-2 is a case study in effective project management that resulted in the extraordinary acceleration in the final stages of development production and deployment in time to play a historic role in the Gulf War...

  13. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  14. New Analysis and Theory of Deployable Folded Structures, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical theory has great value for deployable space structures and in situ manufacture of large beams, panels, cylinders and other...

  15. New Analysis and Theory of Deployable Folded Structures, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical folding theory has great value for deployable space structures and in situ manufacture of large beams, panels and cylinders. The...

  16. Costs and benefits of MDOT intelligent transportation system deployments.

    Science.gov (United States)

    2015-07-01

    This report analyses costs and benefits of Intelligent Transportation Systems (ITS) deployed by : the Michigan Department of Transportation (MDOT). MDOT ITS focuses on traffic incident : management and also provide Freeway Courtesy Patrol services. A...

  17. Design and Deployment of Mobile FSO Communication System

    KAUST Repository

    Alheadary, Wael Ghazy

    2017-05-08

    As a potential solution to many applications, we developed a mobile free-space optical (FSO) system that achieves 1Gbps with transmission distance of 70 m. This system needs minimal preparation to be deployed within an hour.

  18. Effects of Deployments on Homestation Job Stress and Burnout

    National Research Council Canada - National Science Library

    Johnson, S. R

    2005-01-01

    .... The increased rate of deployments, coupled with the reduction in resources, has military leaders concerned that these changing demands will cause undue strain, adversely affecting the military member's quality of life...

  19. Morphing structures using soft polymers for active deployment

    International Nuclear Information System (INIS)

    Daynes, Stephen; Grisdale, Amy; Trask, Richard; Seddon, Annela

    2014-01-01

    In this study, we take inspiration from morphing strategies observed in nature, origami design and stiffness tailoring principles in engineering, to develop a thin walled, low cost, bistable cell geometry capable of reversibly unfolding from a flat configuration to a highly textured configuration. Finite element analysis was used to model the cell deployment and capture the experimentally observed bistability of the reinforced silicone elastomer. Through the combination of flexible elastomers with locally reinforced regions enables a highly tailorable and controllable deployment response. These cells are bistable allowing them to maintain their shape when either deployed or retracted without sustained actuation. It is proposed that such deployable cells with reversible surfaces and texture change can be used as a means of adaptive camouflage. (fast track communication)

  20. EOP CRITTERCAM Deployments on French Frigate Shoals monk seals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRITTERCAMs, were deployed on a 42 monk seals at French Frigate Shoals Hawaii. Sixty nine hours of video comprised of 3192 recording segments collected at...

  1. Creating a Comprehensive Solar Water Heating Deployment Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Focus Marketing Services

    1999-08-18

    This report details the results of a research conducted in 1998 and 1999 and outlines a marketing deployment plan designed for businesses interested in marketing solar water heaters in the new home industry.

  2. Creating a Comprehensive Solar Water Heating Deployment Strategy

    International Nuclear Information System (INIS)

    Focus Marketing Services

    1999-01-01

    This report details the results of a research conducted in 1998 and 1999 and outlines a marketing deployment plan designed for businesses interested in marketing solar water heaters in the new home industry

  3. Flexible, Phase Change Fabric for Deployable Decelerators, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — SDMA proposes to develop a flexible fabric containing Phase Change Materials that is suitable for use on Deployable Decelerators. This technology will make...

  4. The feasibility of Quality Function Deployment (QFD) as an ...

    African Journals Online (AJOL)

    The feasibility of Quality Function Deployment (QFD) as an assessment and quality ... and facilities that had the most pertinent information on the research focus. ... Keywords: Customer Satisfaction Performance; Graduate School; Quality ...

  5. The American Satellite Company (ASC) satellite deployed from payload bay

    Science.gov (United States)

    1985-01-01

    The American Satellite Company (ASC) communications satellite is deployed from the payload bay of the Shuttle Discovery. A portion of the cloudy surface of the earth can be seen to the left of the frame.

  6. Accelerating the deployment of offshore renewable energy technologies. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    MacDonald, Mott

    2011-02-15

    Offshore wind energy and ocean energy (i.e. wave and tidal) are at different stages of technology development and deployment, and, as such, they require different approaches for successful deployment. However, regardless of their deployment stage, these technologies may face common hurdles in their way to market competitiveness. IEA-RETD has completed a study with the overall objective to assist policy makers and project developers in a better understanding of these barriers and the specifics of offshore renewable energy and to give them practical guidelines. These include an offshore energy deployment framework, substantiated by evidence-based analyses, and recommendations for future policies design, including best practices for allocation of seafloor rights.

  7. Design and Deployment of Mobile FSO Communication System

    KAUST Repository

    Alheadary, Wael Ghazy; Guo, Yong; Stegenburgs, Edgars; Park, Kihong; Ng, Tien Khee; Ooi, Boon S.; Alouini, Mohamed-Slim

    2017-01-01

    As a potential solution to many applications, we developed a mobile free-space optical (FSO) system that achieves 1Gbps with transmission distance of 70 m. This system needs minimal preparation to be deployed within an hour.

  8. View of the deployed INSAT/PAM-D

    Science.gov (United States)

    1983-01-01

    View of the deployed Indian National Satellite (INSAT) attached to Payload Assist Module (PAM) D drifts above the earth's surface. A faint shadow of the open payload bay can be seen in the top left of the frame.

  9. Connected Vehicle Pilot Deployment Program Phase 2, Data Management Plan

    Science.gov (United States)

    2017-10-17

    This document represents a data management plan that delineates all of the data types and data treatment throughout the New York City Connected Vehicle Pilot Deployment (NYC CVPD). This plan includes an identification of the New York City connected v...

  10. Precision Deployable Mast for the SWOT KaRIn Instrument

    Data.gov (United States)

    National Aeronautics and Space Administration — Design and prototype a lightweight, precision-deployable mast for the Ka-band Radar Interferometer (KaRIn) antennas in the Surface Water and Ocean Topography (SWOT)...

  11. Surface Optimization Techniques for Deployable Reflectors, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Under this and several other programs, CTD has developed TEMBOREG deployable solid-surface reflectors (TEMBOREG Reflectors) to provide future NASA and Air Force...

  12. Extreme Environment Sampling System Deployment Mechanism, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Future Venus or Comet mission architectures may feature robotic sampling systems comprised of a Sampling Tool and Deployment Mechanism. Since 2005, Honeybee has been...

  13. The Deployment Experience: Organizational Climate and Work Life

    National Research Council Canada - National Science Library

    Wilcove, Gerry L

    2006-01-01

    ...) and shore personnel (n = 5,032). Results for 2005 showed that deployed personnel had significantly more negative attitudes than shore personnel on several indices, including job satisfaction, quality of command leadership, available...

  14. Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime ...

    African Journals Online (AJOL)

    Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime Menace ... Again he innovates, introducing new products & technologies by the ... Keywords: Cyber-crimes, entrepreneurs, compupreneur, firewalls, computer forensics, ICT, ...

  15. Link Between Deployment Factors and Parenting Stress in Navy Families

    Science.gov (United States)

    2016-04-11

    5a. CONTRACT NUMBER N/A Families 5b. GRANT NUMBER HT9404-13-1-TS05 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHOR(S) 5d...Purpose: Many service members today are married, and many also have children; deployments affect all members of the military family . The purpose of this...conducted. Findings: As deployment factors increased, parenting stress increased for fathers in the reintegration period, with a potential mediation

  16. Is Military Deployment a Risk Factor for Maternal Depression?

    Science.gov (United States)

    2013-01-01

    679–684. 39. Quevedo LA, Silva RA, Godoy R, et al. The impact of ma- ternal post - partum depression on the language development of children at 12 months...Naval Health Research Center Is Military Deployment A Risk Factor for Maternal Depression ? Stacie Nguyen Cynthia A. LeardMann Besa Smith...Sylvester Road San Diego, California 92106-3521 Original Articles Is Military Deployment a Risk Factor for Maternal Depression ? Stacie Nguyen, MPH

  17. Deployment Models: Towards Eliminating Security Concerns From Cloud Computing

    OpenAIRE

    Zhao, Gansen; Chunming, Rong; Jaatun, Martin Gilje; Sandnes, Frode Eika

    2010-01-01

    Cloud computing has become a popular choice as an alternative to investing new IT systems. When making decisions on adopting cloud computing related solutions, security has always been a major concern. This article summarizes security concerns in cloud computing and proposes five service deployment models to ease these concerns. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment. D...

  18. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2017-10-01

    Traumatic Stress Studies (ISTSS) Conference. Chicago, IL. 2. Kritikos*, T.K. & DeVoe, E.R. Relationship quality of recently deployed military...prevention and family orientation of the study . We continue to have impact on multiple disciplinary areas, including social work, psychology , and public...resilience in Active Duty military families through all phases of the deployment cycle. The study will be conducted in three phases. In phase 1

  19. The effect of deployment frequencies on the military divorce rate

    OpenAIRE

    Arenstein, Stacy J.

    2011-01-01

    Approved for public release; distribution is unlimited. The primary goal of this research is to investigate whether the length and frequency of deployments affect the likelihood of divorce. The study uses data from the Contingency Tracking System (CTS) and the Active Duty Military Personnel file. The sample includes all active duty Navy and Marine Corps members from 2000 to 2009. Three models of divorce are estimated, each with a different control for the stress of deployment on the f...

  20. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  1. Sensor Deployment for Air Pollution Monitoring Using Public Transportation System

    OpenAIRE

    Yu, James J. Q.; Li, Victor O. K.; Lam, Albert Y. S.

    2015-01-01

    Air pollution monitoring is a very popular research topic and many monitoring systems have been developed. In this paper, we formulate the Bus Sensor Deployment Problem (BSDP) to select the bus routes on which sensors are deployed, and we use Chemical Reaction Optimization (CRO) to solve BSDP. CRO is a recently proposed metaheuristic designed to solve a wide range of optimization problems. Using the real world data, namely Hong Kong Island bus route data, we perform a series of simulations an...

  2. Deployment of a pentagonal hollow-rope tensegrity module

    OpenAIRE

    Rhode-Barbarigos , Landolf; Bel Hadj Ali , Nizar; Motro , René; Smith , Ian F.C.

    2011-01-01

    International audience; Tensegrity structures are spatial reticulated structures composed of cables and struts. Tensegrity systems are good candidates for adaptive and deployable structures and thus have applications in various engineering fields. A "hollow-rope" tensegrity system composed of tensegrity-ring modules has been demonstrated by the authors to be a viable system for a pedestrian bridge. This paper focuses on the deployment of pentagonal ring modules. A geometric study is performed...

  3. Kundenorientierte Produktentwicklung mit Hilfe von Quality Function Deployment (QFD)

    OpenAIRE

    Schloske, Alexander

    2011-01-01

    Die Produktentwicklung von heute muss in immer kürzeren Zeiträumen kunden- und kostenorientierte Produkte entwickeln. Zur systematischen Unterstützung dieser Aufgabe im Rahmen der Produktentwicklung wird die Methode Quality Function Deployment (QFD) eingesetzt. Die konsequente Umsetzung der Stimme des Kunden in die Sprache des Unternehmens gelingt mit Quality Function Deployment (QFD). Die Methode wertet systematisch Kundenanforderungen an Produkte aus und führt zu innovativen Lösungen, die s...

  4. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  5. Using Deduplicating Storage for Efficient Disk Image Deployment

    Directory of Open Access Journals (Sweden)

    Xing Lin

    2015-08-01

    Full Text Available Many clouds and network testbeds use disk images to initialize local storage on their compute devices. Large facilities must manage thousands or more images, requiring significant amounts of storage. At the same time, to provide a good user experience, they must be able to deploy those images quickly. Driven by our experience in operating the Emulab site at the University of Utah---a long-lived and heavily-used testbed---we have created a new service for efficiently storing and deploying disk images. This service exploits the redundant data found in similar images, using deduplication to greatly reduce the amount of physical storage required. In addition to space savings, our system is also designed for highly efficient image deployment---it integrates with an existing highly-optimized disk image deployment system, Frisbee, without significantly increasing the time required to distribute and install images. In this paper, we explain the design of our system and discuss the trade-offs we made to strike a balance between efficient storage and fast disk image deployment. We also propose a new chunking algorithm, called AFC, which enables fixed-size chunking for deduplicating allocated disk sectors. Experimental results show that our system reduces storage requirements by up to 3x while imposing only a negligible runtime overhead on the end-to-end disk-deployment process.

  6. Applications of Dynamic Deployment of Services in Industrial Automation

    Science.gov (United States)

    Candido, Gonçalo; Barata, José; Jammes, François; Colombo, Armando W.

    Service-oriented Architecture (SOA) is becoming a de facto paradigm for business and enterprise integration. SOA is expanding into several domains of application envisioning a unified solution suitable across all different layers of an enterprise infrastructure. The application of SOA based on open web standards can significantly enhance the interoperability and openness of those devices. By embedding a dynamical deployment service even into small field de- vices, it would be either possible to allow machine builders to place built- in services and still allow the integrator to deploy on-the-run the services that best fit his current application. This approach allows the developer to keep his own preferred development language, but still deliver a SOA- compliant application. A dynamic deployment service is envisaged as a fundamental framework to support more complex applications, reducing deployment delays, while increasing overall system agility. As use-case scenario, a dynamic deployment service was implemented over DPWS and WS-Management specifications allowing designing and programming an automation application using IEC61131 languages, and deploying these components as web services into devices.

  7. Deployment Experiences of British Army Wives Before, During and After Deployment: Satisfaction with Military Life and Use of Support Networks

    National Research Council Canada - National Science Library

    Dandeker, Christopher; French, Claire; Birtles, Catherine; Wessely, S

    2006-01-01

    Introduction and Aims: During deployments, Service wives have to adapt to being alone and taking sole responsibility for their families and house-holds whilst dealing with the additional stress about whether their loved ones will return...

  8. IEA Wind Task 23 Offshore Wind Technology and Deployment. Subtask 1 Experience with Critical Deployment Issues. Final Technical Report

    OpenAIRE

    Lemming, Jørgen Kjærgaard

    2010-01-01

    The final report for IEA Wind Task 23, Offshore Wind Energy Technology and Deployment, is made up of two separate reports: Subtask 1: Experience with Critical Deployment Issues and Subtask 2: Offshore Code Comparison Collaborative (OC3). The Subtask 1 report included here provides background information and objectives of Task 23. It specifically discusses ecological issues and regulation, electrical system integration and offshore wind, external conditions, and key conclusions for Subtask 1. ...

  9. Gender differences in the effects of deployment-related stressors and pre-deployment risk factors on the development of PTSD symptoms in National Guard Soldiers deployed to Iraq and Afghanistan.

    Science.gov (United States)

    Polusny, Melissa A; Kumpula, Mandy J; Meis, Laura A; Erbes, Christopher R; Arbisi, Paul A; Murdoch, Maureen; Thuras, Paul; Kehle-Forbes, Shannon M; Johnson, Alexandria K

    2014-02-01

    Although women in the military are exposed to combat and its aftermath, little is known about whether combat as well as pre-deployment risk/protective factors differentially predict post-deployment PTSD symptoms among women compared to men. The current study assesses the influence of combat-related stressors and pre-deployment risk/protective factors on women's risk of developing PTSD symptoms following deployment relative to men's risk. Participants were 801 US National Guard Soldiers (712 men, 89 women) deployed to Iraq or Afghanistan who completed measures of potential risk/protective factors and PTSD symptoms one month before deployment (Time 1) and measures of deployment-related stressors and PTSD symptoms about 2-3 months after returning from deployment (Time 2). Men reported greater exposure to combat situations than women, while women reported greater sexual stressors during deployment than men. Exposure to the aftermath of combat (e.g., witnessing injured/dying people) did not differ by gender. At Time 2, women reported more severe PTSD symptoms and higher rates of probable PTSD than did men. Gender remained a predictor of higher PTSD symptoms after accounting for pre-deployment symptoms, prior interpersonal victimization, and combat related stressors. Gender moderated the association between several risk factors (combat-related stressors, prior interpersonal victimization, lack of unit support and pre-deployment concerns about life/family disruptions) and post-deployment PTSD symptoms. Elevated PTSD symptoms among female service members were not explained simply by gender differences in pre-deployment or deployment-related risk factors. Combat related stressors, prior interpersonal victimization, and pre-deployment concerns about life and family disruptions during deployment were differentially associated with greater post-deployment PTSD symptoms for women than men. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.

  10. An ARM Mobile Facility Designed for Marine Deployments

    Science.gov (United States)

    Wiscombe, W. J.

    2007-05-01

    The U.S. Dept. of Energy's ARM (Atmospheric Radiation Measurements) Program is designing a Mobile Facility exclusively for marine deployments. This marine facility is patterned after ARM's land Mobile Facility, which had its inaugural deployment at Point Reyes, California, in 2005, followed by deployments to Niger in 2006 and Germany in 2007 (ongoing), and a planned deployment to China in 2008. These facilities are primarily intended for the study of clouds, radiation, aerosols, and surface processes with a goal to include these processes accurately in climate models. They are preferably embedded within larger field campaigns which provide context. They carry extensive instrumentation (in several large containers) including: cloud radar, lidar, microwave radiometers, infrared spectrometers, broadband and narrowband radiometers, sonde-launching facilities, extensive surface aerosol measurements, sky imagers, and surface latent and sensible heat flux devices. ARM's Mobile Facilities are designed for 6-10 month deployments in order to capture climatically-relevant datasets. They are available to any scientist, U.S. or international, who wishes to submit a proposal during the annual Spring call. The marine facility will be adapted to, and ruggedized for, the harsh marine environment and will add a scanning two-frequency radar, a boundary-layer wind profiler, a shortwave spectrometer, and aerosol instrumentation adapted to typical marine aerosols like sea salt. Plans also include the use of roving small UAVs, automated small boats, and undersea autonomous vehicles in order to address the point-to-area-average problem which is so crucial for informing climate models. Initial deployments are planned for small islands in climatically- interesting cloud regimes, followed by deployments on oceanic platforms (like decommissioned oil rigs and the quasi-permanent platform of this session's title) and eventually on large ships like car carriers plying routine routes.

  11. The impact of antecedent trauma exposure and mental health symptoms on the post-deployment mental health of Afghanistan-deployed Australian troops.

    Science.gov (United States)

    Searle, Amelia K; Van Hooff, Miranda; Lawrence-Wood, Ellie R; Grace, Blair S; Saccone, Elizabeth J; Davy, Carol P; Lorimer, Michelle; McFarlane, Alexander C

    2017-10-01

    Both traumatic deployment experiences and antecedent traumas increase personnel's risk of developing PTSD and depression. However, only cross-sectional studies have assessed whether antecedent trauma moderates stress reactions to deployment experiences. This study prospectively examines whether antecedent trauma moderates the association between deployment trauma and post-deployment PTSD and depressive symptoms after accounting for antecedent mental health problems, in a large Australian Defence Force (ADF) sample. In the ADF Middle East Area of Operations Prospective Study, currently-serving military personnel deployed to Afghanistan across 2010-2012 (n = 1122) completed self-reported measures at pre-deployment and post-deployment. Within multivariable regressions, associations between deployment trauma and PTSD and depressive symptoms at post-deployment were stronger for personnel with greater antecedent trauma. However, once adjusting for antecedent mental health problems, these significant interaction effects disappeared. Instead, deployment-related trauma and antecedent mental health problems showed direct associations with post-deployment mental health problems. Antecedent trauma was also indirectly associated with post-deployment mental health problems through antecedent mental health problems. Similar associations were seen with prior combat exposure as a moderator. Antecedent and deployment trauma were reported retrospectively. Self-reports may also suffer from social desirability bias, especially at pre-deployment. Our main effects results support the pervasive and cumulative negative effect of trauma on military personnel, regardless of its source. While antecedent trauma does not amplify personnel's psychological response to deployment trauma, it is indirectly associated with increased post-deployment mental health problems. Antecedent mental health should be considered within pre-deployment prevention programs, and deployment-trauma within post

  12. Standardization of transportation classes for object-oriented deployment simulations.

    Energy Technology Data Exchange (ETDEWEB)

    Burke, J. F., Jr.; Howard, D. L.; Jackson, J.; Macal, C. M.; Nevins, M. R.; Van Groningen, C. N.

    1999-07-30

    Many recent efforts to integrate transportation and deployment simulations, although beneficial, have lacked a feature vital for seamless integration: a common data class representation. It is an objective of the Department of Defense (DoD) to standardize all classes used in object-oriented deployment simulations by developing a standard class attribute representation and behavior for all deployment simulations that rely on an underlying class representation. The Extensive Hierarchy and Object Representation for Transportation Simulations (EXHORT) is a collection of three hierarchies that together will constitute a standard and consistent class attribute representation and behavior that could be used directly by a large set of deployment simulations. The first hierarchy is the Transportation Class Hierarchy (TCH), which describes a significant portion of the defense transportation system; the other two deal with infrastructure and resource classes. EXHORT will allow deployment simulations to use the same set of underlying class data, ensure transparent exchanges, reduce the effort needed to integrate simulations, and permit a detailed analysis of the defense transportation system. This paper describes EXHORT's first hierarchy, the TCH, and provides a rationale for why it is a helpful tool for modeling major portions of the defense transportation system.

  13. Post-deployment family violence among UK military personnel.

    Science.gov (United States)

    Kwan, Jamie; Jones, Margaret; Somaini, Greta; Hull, Lisa; Wessely, Simon; Fear, Nicola T; MacManus, Deirdre

    2017-12-19

    Research into violence among military personnel has not differentiated between stranger- and family-directed violence. While military factors (combat exposure and post-deployment mental health problems) are risk factors for general violence, there has been limited research on their impact on violence within the family environment. This study aims to compare the prevalence of family-directed and stranger-directed violence among a deployed sample of UK military personnel and to explore risk factors associated with both family- and stranger-directed violence. This study utilised data from a large cohort study which collected information by questionnaire from a representative sample of randomly selected deployed UK military personnel (n = 6711). The prevalence of family violence immediately following return from deployment was 3.6% and 7.8% for stranger violence. Family violence was significantly associated with having left service, while stranger violence was associated with younger age, male gender, being single, having a history of antisocial behaviour as well as having left service. Deployment in a combat role was significantly associated with both family and stranger violence after adjustment for confounders [adjusted odds ratio (aOR) = 1.92 (1.25-2.94), p = 0.003 and aOR = 1.77 (1.31-2.40), p violence both inside and outside the family environment and should be considered in violence reduction programmes for military personnel. Further research using a validated measurement tool for family violence would improve comparability with other research.

  14. Automated Deployment of Advanced Controls and Analytics in Buildings

    Science.gov (United States)

    Pritoni, Marco

    Buildings use 40% of primary energy in the US. Recent studies show that developing energy analytics and enhancing control strategies can significantly improve their energy performance. However, the deployment of advanced control software applications has been mostly limited to academic studies. Larger-scale implementations are prevented by the significant engineering time and customization required, due to significant differences among buildings. This study demonstrates how physics-inspired data-driven models can be used to develop portable analytics and control applications for buildings. Specifically, I demonstrate application of these models in all phases of the deployment of advanced controls and analytics in buildings: in the first phase, "Site Preparation and Interface with Legacy Systems" I used models to discover or map relationships among building components, automatically gathering metadata (information about data points) necessary to run the applications. During the second phase: "Application Deployment and Commissioning", models automatically learn system parameters, used for advanced controls and analytics. In the third phase: "Continuous Monitoring and Verification" I utilized models to automatically measure the energy performance of a building that has implemented advanced control strategies. In the conclusions, I discuss future challenges and suggest potential strategies for these innovative control systems to be widely deployed in the market. This dissertation provides useful new tools in terms of procedures, algorithms, and models to facilitate the automation of deployment of advanced controls and analytics and accelerate their wide adoption in buildings.

  15. Biomarkers of post-deployment resilience among military service members

    Directory of Open Access Journals (Sweden)

    Krista B. Highland

    2015-01-01

    Full Text Available The development of PTSD after military deployment is influenced by a combination of biopsychosocial risk and resilience factors. In particular, physiological factors may mark risk for symptom progression or resiliency. Research in civilian populations suggests elevated catecholamines after trauma are associated with PTSD months following the trauma. However, less is known regarding physiological markers of PTSD resilience among post-deployment service members (SM. We therefore assessed whether catecholamines obtained shortly after deployment were associated with combat-related PTSD symptoms three months later. Eighty-seven SMs completed the Clinician-Administered PTSD Scale for DSM-IV and blood draws within two months after return from deployment to Iraq or Afghanistan (“Time 1” or “T1” and three months later (“Time 2” or “T2”. Linear regression analyses demonstrated that lower norepinephrine at T1 was associated with lower PTSD symptoms at T2. In particular, T1 norepinephrine was positively associated with T2 symptom intensity and avoidance symptoms. The present findings represent a biologically-informed method of assessing PTSD resilience after deployment, which may aid clinicians in providing tailored treatments for those in the greatest need. Further research is needed to validate these findings and incorporate physiological measures within an assessment battery.

  16. Supporting deployed operations: are military nurses gaining the relevant experience from MDHUs to be competent in deployed operations?

    Science.gov (United States)

    Beaumont, Steven P; Allan, Helen T

    2014-01-01

    To explore how peacetime employment of military nurses in the UK National Health Service Medical Defence Hospital Units prepares them to be competent to practise in their role on deployment. Military secondary care nurses are employed within UK National Health Service Trusts to gain clinical experience that will be relevant to their military nursing role. A two-stage grounded theory study using mixed methods: postal questionnaire survey and in-depth interviews. In stage one a postal questionnaire was distributed to all serving military nurses. Stage two involved 12 semi-structured interviews. The data from both parts of the study were analysed using grounded theory. Four categories and one core category were identified, which suggested that participants did not feel fully prepared for deployment. Their feelings of preparedness increased with deployment experience and decreased when the nature of injuries seen on deployment changed. Respondents argued that even when unprepared, they did not feel incompetent. The findings suggest that the peacetime clinical experience gained in the National Health Service did not always develop the necessary competencies to carry out roles as military nurses on deployment. This study highlights the unique role of military nurses. We discuss these findings in the light of the literature on competency and expertise. The military nurses in this study did not feel fully prepared for deployed operations. We propose a new model for how military nurses could gain relevant experience from their National Health Service placements. National Health Service clinical placements need to be reassessed regularly to ensure that they are meeting military nurses' clinical requirements. Experiences of nurses returning from deployment could be shared and used as a basis for reflection and learning within National Health Service Trusts and also inform decisions regarding the appropriateness of clinical placements for qualified military nurses. © 2012

  17. Deployment of SIP in MANET: challenges and circumvention

    Directory of Open Access Journals (Sweden)

    Abdelhamid Salma R.

    2017-01-01

    Full Text Available The immense growth in wireless network applications has encouraged the researchers to enhance and propose new approaches that facilitate the deployment of the widely used services, protocols, and applications of the wired networking area in the wireless networks. Among which, the Session Initiation Protocol (SIP is a signaling protocol that allows the establishment of multimedia sessions and calls between different parties. SIP functionality totally depends on a centralized infrastructure, and complexity arises when deploying such a protocol in a special type of wireless networks, namely Mobile Ad-hoc Networks (MANET, due to the absence of a centralized infrastructure, and the dynamic topology of the later. This paper highlights the the challenges arising when deploying SIP in MANETs and presents an overview of different proposed approaches to overcome these challenges.

  18. Optimal and Approximate Approaches for Deployment of Heterogeneous Sensing Devices

    Directory of Open Access Journals (Sweden)

    Rabie Ramadan

    2007-04-01

    Full Text Available A modeling framework for the problem of deploying a set of heterogeneous sensors in a field with time-varying differential surveillance requirements is presented. The problem is formulated as mixed integer mathematical program with the objective to maximize coverage of a given field. Two metaheuristics are used to solve this problem. The first heuristic adopts a genetic algorithm (GA approach while the second heuristic implements a simulated annealing (SA algorithm. A set of experiments is used to illustrate the capabilities of the developed models and to compare their performance. The experiments investigate the effect of parameters related to the size of the sensor deployment problem including number of deployed sensors, size of the monitored field, and length of the monitoring horizon. They also examine several endogenous parameters related to the developed GA and SA algorithms.

  19. Vibration characteristics of a deployable controllable-geometry truss boom

    Science.gov (United States)

    Dorsey, J. T.

    1983-01-01

    An analytical study was made to evaluate changes in the fundamental frequency of a two dimensional cantilevered truss boom at various stages of deployment. The truss could be axially deployed or retracted and undergo a variety of controlled geometry changes by shortening or lengthening the telescoping diagonal members in each bay. Both untapered and tapered versions of the truss boom were modeled and analyzed by using the finite element method. Large reductions in fundamental frequency occurred for both the untapered and tapered trusses when they were uniformly retracted or maneuvered laterally from their fully deployed position. These frequency reductions can be minimized, however, if truss geometries are selected which maintain cantilever root stiffness during truss maneuvers.

  20. Novel large deployable antenna backing structure concepts for foldable reflectors

    Science.gov (United States)

    Fraux, V.; Lawton, M.; Reveles, J. R.; You, Z.

    2013-12-01

    This paper describes a number of large deployable antenna (LDA) reflector structure concepts developed at EnerSys-ABSL. Furthermore, EnerSys-ABSL has confirmed the desire to build a breadboard demonstrator of a backing deployable structure for a foldable reflector in the diameter range of 4-9 m. As part of this project EnerSys-ABSL has explored five novel deployable structure concepts. This paper presents the top level definition of these concepts together with the requirements considered in the design and selection of the preferred candidate. These new concepts are described and then compared through a trade-off analysis to identify the most suitable concept that EnerSys-ABSL would like to consider for the breadboard demonstrator. Finally, the kinematics of the chosen concept is described in more detail and future steps in the development process are highlighted.

  1. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  2. Deployment of a Grid-based Medical Imaging Application

    CERN Document Server

    Amendolia, S R; Frate, C; Gálvez, J; Hassan, W; Hauer, T; Manset, D; McClatchey, R; Odeh, M; Rogulin, D; Solomonides, T; Warren, R

    2005-01-01

    The MammoGrid project has deployed its Service-Oriented Architecture (SOA)-based Grid application in a real environment comprising actual participating hospitals. The resultant setup is currently being exploited to conduct rigorous in-house tests in the first phase before handing over the setup to the actual clinicians to get their feedback. This paper elaborates the deployment details and the experiences acquired during this phase of the project. Finally the strategy regarding migration to an upcoming middleware from EGEE project will be described. This paper concludes by highlighting some of the potential areas of future work.

  3. Improvements for rotary viscous dampers used in spacecraft deployment mechanisms

    Science.gov (United States)

    Stewart, Alphonso; Powers, Charles; Lyons, Ron

    1998-01-01

    During component level thermal-vacuum deployment testing of eight rotary viscous dampers for the Tropical Rainfall Measuring Mission (TRMM) satellite, all the dampers failed to provide damping during a region of the deployment. Radiographic examination showed that air in the damping fluid caused the undamped motion when the dampers were operated in a vacuum environment. Improvements in the procedure used to fill the dampers with damping fluid, the installation of a Viton vacuum seal in the damper cover, and improved screening techniques eliminated the problem.

  4. Hezbollah Rockets and Missiles: Deployment and Defence Programme

    Directory of Open Access Journals (Sweden)

    Ladislav Kulhánek

    2018-01-01

    Full Text Available The paper addresses the issue of the proliferation of the rocket technology deployed in guerrilla warfare throughout the Near East. It evaluates assumptions and identifies potential regressions with respect to the most recent hot phase in the violent conflict between Hezbollah and Israel, with a focus on primary methods based on rocket shelling and resistance efforts. In comparing the two military forces, Israel emerges as the stronger, even if artillery and tactical ballistic missiles with warheads containing substances defined as weapons of mass destruction were to be deployed as an extreme first measure by Hezbollah, in which case an Israeli or American response would destroy at least parts of Lebanon.

  5. Software, component, and service deployment in computational Grids

    International Nuclear Information System (INIS)

    von Laszewski, G.; Blau, E.; Bletzinger, M.; Gawor, J.; Lane, P.; Martin, S.; Russell, M.

    2002-01-01

    Grids comprise an infrastructure that enables scientists to use a diverse set of distributed remote services and resources as part of complex scientific problem-solving processes. We analyze some of the challenges involved in deploying software and components transparently in Grids. We report on three practical solutions used by the Globus Project. Lessons learned from this experience lead us to believe that it is necessary to support a variety of software and component deployment strategies. These strategies are based on the hosting environment

  6. Base Station Antenna Pattern Distortion in Practical Urban Deployment Scenarios

    DEFF Research Database (Denmark)

    Rodriguez Larrad, Ignacio; Nguyen, Huan Cong; Sørensen, Troels Bundgaard

    2014-01-01

    In real urban deployments, base station antennas are typically not placed in free space conditions. Therefore, the radiation pattern can be affected by mounting structures and nearby obstacles located in the proximity of the antenna (near-field), which are often not taken into consideration. Also...... presents a combination of near-field and far-field simulations aimed to provide an overview of the distortion experienced by the base station antenna pattern in two different urban deployment scenarios: rooftop and telecommunications tower. The study illustrates how, in comparison with the near...

  7. Deployment and Implementation Strategies for Massive MIMO in 5G

    DEFF Research Database (Denmark)

    Panzner, Berthold; Zirwas, Wolfgang; Dierks, Stefan

    2015-01-01

    for 5G is a successful and cost-efficient integration in the overall network concept. This work highlights deployment and implementation strategies for massive MIMO in the context of 5G indoor small cell scenarios. Different massive MIMO deployment scenarios are analyzed for a standard 3GPP indoor...... to spatial streams is varied stepwise from equality to a factor of ten. For implementation of massive MIMO in 5G networks trends in beamforming techniques, mutually coupled subarrays, over the calibration procedure and estimated ADC performance in 2020 time-frame are discussed. Based on the debate the paper...

  8. Market deployment strategies for photovoltaics: an international review

    International Nuclear Information System (INIS)

    Haas, R.

    2003-01-01

    In the last decade of the 20th century a wide variety of deployment strategies and dissemination programmes for grid-connected PV systems in the built environment has been launched by quite different organizations and institutions. Governmental bodies on national and local levels have launched strategies, as have electric utilities and NGOs. The core objective of this paper is to document and evaluate the most important past and current market deployment strategies for the broader dissemination of grid-connected PV systems in the built environment. (author)

  9. Intelligent quality function deployment system in concurrent engineering environment

    Science.gov (United States)

    Lin, Zhihang; Che, Ada

    1998-10-01

    This paper describes work being undertaken in the development of an intelligent distributed quality function deployment (IDQFD) system, which supports product design team to transfer and deployment the `Voice of Customer' through `House of Quality' into the various stages of product planning, engineering and manufacturing. The requirement modeling of products, the optimization in QFD are indicated. The framework of the system, including QFD tools and platform for distributed collaborative work in QFD, is described. The strategy and methods for the collaboration processing in QFD process are presented. It shows promise for application in practice.

  10. Cognitive ability and risk of post-traumatic stress disorder after military deployment

    DEFF Research Database (Denmark)

    Nissen, Lars R.; Karstoft, Karen-Inge; Vedtofte, Mia S.

    2017-01-01

    Background: Studies of the association between pre-deployment cognitive ability and post-deployment post-traumatic stress disorder (PTSD) have shown mixed results. Aims: To study the influence of pre-deployment cognitive ability on PTSD symptoms 6-8 months post-deployment in a large population...

  11. 49 CFR 268.3 - Different phases of the Maglev Deployment Program.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Different phases of the Maglev Deployment Program... DEPLOYMENT PROGRAM Overview § 268.3 Different phases of the Maglev Deployment Program. (a) The Maglev... deadlines—based on the progress of the Maglev Deployment Program; grantees will be notified accordingly. (b...

  12. 49 CFR 268.5 - Federal funding sources for the Maglev Deployment Program.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Federal funding sources for the Maglev Deployment... TECHNOLOGY DEPLOYMENT PROGRAM Overview § 268.5 Federal funding sources for the Maglev Deployment Program. (a) Federal Maglev Funds. Section 322 of Title 23 provides for the following funds for the Maglev Deployment...

  13. Deployment of Mobile Learning Course Materials to Android Powered Mobile Devices

    Science.gov (United States)

    Chao, Lee

    2012-01-01

    The objective of this article is to facilitate mobile teaching and learning by providing an alternative course material deployment method. This article suggests a course material deployment platform for small universities or individual instructors. Different from traditional course material deployment methods, the method discussed deploys course…

  14. 15 CFR 270.102 - Conditions for establishment and deployment of a Team.

    Science.gov (United States)

    2010-01-01

    ... deployment of a Team. 270.102 Section 270.102 Commerce and Foreign Trade Regulations Relating to Commerce and... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Establishment and Deployment of Teams § 270.102 Conditions for establishment and deployment of a Team. (a) The Director may establish a Team for deployment...

  15. Connected Vehicle Pilot Deployment Program phase 1 : comprehensive deployment plan : New York City : volume 1 : technical application : part I : technical and management approach.

    Science.gov (United States)

    2016-08-01

    This document describes the Deployment Plan for the New York City Department of Transportation (NYC) Connected Vehicle Pilot Deployment (CVPD) Project. This plan describes the approach to complete Phase 2 Design/Build/Test, and Phase 3 Operate and Ma...

  16. Optimization of Hydroacoustic Equipment Deployment at Foster Dam, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, James S.; Johnson, Gary E.; Ploskey, Gene R.; Hennen, Matthew J.; Fischer, Eric S.; Zimmerman, Shon A.

    2013-03-01

    The goal of the study was to optimize performance of the fixed-location hydroacoustic systems at Foster Dam (FOS) by determining deployment and data acquisition methods that minimized structural, electrical, and acoustic interference. Optimization of the hydroacoustic systems will establish methodology for sampling by active acoustic methods during this year-long evaluation of juvenile salmonid passage at FOS.

  17. Financial Services and the Deployment of Agricultural Innovations in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As partners of farmers' associations and small agri-businesses, financial cooperatives can play an important role in the adoption of agricultural innovations by providing relevant financial services. This project will test the ability of financial services to support the deployment and large-scale adoption of innovations ...

  18. Cloud Environment Automation: from infrastructure deployment to application monitoring

    Science.gov (United States)

    Aiftimiei, C.; Costantini, A.; Bucchi, R.; Italiano, A.; Michelotto, D.; Panella, M.; Pergolesi, M.; Saletta, M.; Traldi, S.; Vistoli, C.; Zizzi, G.; Salomoni, D.

    2017-10-01

    The potential offered by the cloud paradigm is often limited by technical issues, rules and regulations. In particular, the activities related to the design and deployment of the Infrastructure as a Service (IaaS) cloud layer can be difficult to apply and time-consuming for the infrastructure maintainers. In this paper the research activity, carried out during the Open City Platform (OCP) research project [1], aimed at designing and developing an automatic tool for cloud-based IaaS deployment is presented. Open City Platform is an industrial research project funded by the Italian Ministry of University and Research (MIUR), started in 2014. It intends to research, develop and test new technological solutions open, interoperable and usable on-demand in the field of Cloud Computing, along with new sustainable organizational models that can be deployed for and adopted by the Public Administrations (PA). The presented work and the related outcomes are aimed at simplifying the deployment and maintenance of a complete IaaS cloud-based infrastructure.

  19. Supporting Children Facing the Deployment of a Parent

    Science.gov (United States)

    Rahill, Stephanie

    2013-01-01

    As the cycle of deployments to war zones by military service members and other federal government employees continue, school psychologists likely have encountered or will encounter children in their schools who have been dealing with an absence of a parent for extended periods of time. While some school psychologists who live and work near major…

  20. Real-life C-RAN deployment considerations

    DEFF Research Database (Denmark)

    Hansen, Line Maria Pyndt; Ruepp, Sarah Renée; Christiansen, Henrik Lehrmann

    2017-01-01

    procedures and best practices for roll out are yet to be established. This work provides a case study, where a small but densely populated part of the network owned by the Danish mobile network operator, TDC, is evaluated for C-RAN deployment. A roadmap is provided which uses traffic data as input...