WorldWideScience

Sample records for fy06 ipv6 deployment

  1. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  2. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  3. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  4. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  5. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  6. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Science.gov (United States)

    2010-09-17

    ... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6 Addresses for Industry, the U.S. Government, and the Internet Economy AGENCY: National Telecommunications and Information...

  7. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  8. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  9. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  10. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    Abstract. The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it ...

  11. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  12. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  13. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  14. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  15. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  16. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  17. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  18. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  19. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  20. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  1. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  2. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  3. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  4. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  5. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  6. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    Development Environment RFC Request for Comment RIR Regional Internet Registries xiii RSI Recursive Subnet Inference RTT Round Trip Time SCP Subnet...and defined in Request for Comment ( RFC ) 2460. While IPv6 has been standardized for the past 15 years, it has not seen appreciable deployment until the...Internet protocol, version 6 (ipv6) specification,” In- ternet Requests for Comments , RFC Editor, RFC 2460, December 1998, [Online]. Available: http

  7. IPv6 Tactical Network Management

    Science.gov (United States)

    2009-09-01

    the video and audio during this phase of the benchtest. After a series of codec (coder decoder) tests, MPEG-2 was selected since it provided the best...that needs to relay its video feed of the ensuing gunfight through the same gateway. In addition to these concerns, mission-critical video, audio ...casualty health status. The video camera at the casualty 60 site continued to stream UDP over IPv6 video and audio recordings of the casualty’s

  8. IPv6 socket API extensions programmer's guide

    CERN Document Server

    Li, Qing; Shima, Keiichi

    2009-01-01

    Mobile IPv6: Protocols and Implementation covers the key enabling technology for mobile data and multimedia services and devices worldwide known as "mobile IPv6". A basic description of mobile IPv6 is introduced, then details on protocol specifications and data structures are examined. Finally instruction on Mobile IPv6 operation complete with sample configuration files using the KAME Mobile IPv6 implementation.  The in-depth code description examines all data structures and functions in meticulous detail. This book offers the most useful coverage of mobile IPv6 and line-by-line code list

  9. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  10. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  11. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  12. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  13. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  14. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...

  15. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  16. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  17. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  18. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  19. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  20. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  1. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    behavior has been largely theoretical and lacked any true measurement of IPv6 spamming behavior observed “in the wild .” Thus, we attempt to 3 observe...few forensic details from the spam traffic can allow us to correlate an IPv6 address to the likely IPv4 address for spam attribution. The time between...Episodes Lasting Under 25 Hours We observed some 465 instances of BGP announce and withdrawal updates, with a life - time of less than 25 hrs, that

  2. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  3. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses....

  4. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available for identifying fragments of the original datagram. square4 Flags: The Flags is a 3-bit field used to control and count fragments of the datagram. square4 Offset: The Offset is a 13-bit field that specifies the offset of a particular fragment relative... as an intermediary between the IPv4 and IPv6 worlds. A list of vulnerabilities of running dual-stack: square4 Protected against IPv4 attacks but not IPv6 attacks. A lot of users are not aware that their operating system is running both version of the protocol...

  5. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    GENERAL I ARTICLE. IPv6: The Next Generation Internet Protocol. 1. IPv4 and its Shortcomings. Harsha Srinath is currently pursuing his MS degree in Computer. Science at the Center for. Advanced Computer. Studies (CACS) in. University of Louisiana at. Lafayette, USA. His research interests include networking with an.

  6. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    As with the security issues ofIP, in the present discus- sion, the addressing features have been dealt only in an abstract level bearing in mind an audience of varied backgrounds. The. Suggested Reading will be useful to those who want to explore this further. The IPv6 addresses are assigned to individual interfaces on.

  7. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  8. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... designers of this Internet Protocol (lPv4) never envisioned the scale of the ..... using multiple access providers across the same interface to have separate ...

  9. Wind Powering America FY06 Activities Summary

    Energy Technology Data Exchange (ETDEWEB)

    2007-02-01

    The Wind Powering America FY06 Activities Summary reflects the accomplishments of our state wind working groups, our programs at the National Renewable Energy Laboratory, and our partner organizations. The national WPA team remains a leading force for moving wind energy forward in the United States. WPA continues to work with its national, regional, and state partners to communicate the opportunities and benefits of wind energy to a diverse set of stakeholders. WPA now has 29 state wind working groups (welcoming New Jersey, Indiana, Illinois, and Missouri in 2006) that form strategic alliances to communicate wind's benefits to the state stakeholders. More than 120 members of national and state public and private sector organizations from 34 states attended the 5th Annual WPA All-States Summit in Pittsburgh in June.

  10. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  11. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  12. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  13. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  14. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  15. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  16. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  17. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  18. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  19. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  20. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  1. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  2. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  3. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  4. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  5. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  6. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  7. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  8. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    combat cyber threats, just as we have done to combat terrorism . [3] In IPv4, that intelligence included a fundamental understanding of how networks...countries abroad. Peru , Norway, Germany, China, Japan, Belgium, and Malaysia all show significant increases in IPv6 adoption, while several match or...accurate. 5.3 Concluding Remarks With the imminent exhaustion of the IPv4 address space, adoption of IPv6 is occurring at a rapid pace. As systems migrate

  9. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  10. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  11. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  12. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  13. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  14. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  15. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  16. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  17. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  18. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  19. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  20. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  1. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  2. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  3. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  4. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  5. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  6. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  7. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  8. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  9. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  10. High-Frequency Mapping of the IPV6 Internet Using YARRP

    Science.gov (United States)

    2017-03-01

    Facebook permanently enabled IPv6 in what was called the “World IPv6 Launch.” Since this event, there has been a 500% increase in the volume of Global...of IPv6 prefixes being globally advertised , and the number of IPv6 enabled clients and servers, while still relatively small compared to IPv4, have...study, probing was performed to one address in each /48 in all /32s advertised in the global IPv6 BGP tables [10]. The design of their experiment is

  11. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  12. HyPEP FY06 Report: Models and Methods

    Energy Technology Data Exchange (ETDEWEB)

    DOE report

    2006-09-01

    The Department of Energy envisions the next generation very high-temperature gas-cooled reactor (VHTR) as a single-purpose or dual-purpose facility that produces hydrogen and electricity. The Ministry of Science and Technology (MOST) of the Republic of Korea also selected VHTR for the Nuclear Hydrogen Development and Demonstration (NHDD) Project. This research project aims at developing a user-friendly program for evaluating and optimizing cycle efficiencies of producing hydrogen and electricity in a Very-High-Temperature Reactor (VHTR). Systems for producing electricity and hydrogen are complex and the calculations associated with optimizing these systems are intensive, involving a large number of operating parameter variations and many different system configurations. This research project will produce the HyPEP computer model, which is specifically designed to be an easy-to-use and fast running tool for evaluating nuclear hydrogen and electricity production facilities. The model accommodates flexible system layouts and its cost models will enable HyPEP to be well-suited for system optimization. Specific activities of this research are designed to develop the HyPEP model into a working tool, including (a) identifying major systems and components for modeling, (b) establishing system operating parameters and calculation scope, (c) establishing the overall calculation scheme, (d) developing component models, (e) developing cost and optimization models, and (f) verifying and validating the program. Once the HyPEP model is fully developed and validated, it will be used to execute calculations on candidate system configurations. FY-06 report includes a description of reference designs, methods used in this study, models and computational strategies developed for the first year effort. Results from computer codes such as HYSYS and GASS/PASS-H used by Idaho National Laboratory and Argonne National Laboratory, respectively will be benchmarked with HyPEP results in the

  13. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  14. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  15. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  16. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  17. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  18. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  19. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  20. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  1. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  2. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  3. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  4. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  5. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  6. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  7. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  8. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  9. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  10. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    using a “ zombie ” host . . . . . . . . . . 19 12 IPv6 vulnerabilities reported per product . . . . . . . . . . . . . . . . . . . . . . . 22 13 IPv6...followed by a spoofed TCP SYN packet from the zombie (step 2 ). The target node replies to the zombie with either a TCP SYN/ACK or RST packet if the...port is open or closed respectively (step 3 ). The attacker can then query the zombie again to see how much the fragment identification field has

  11. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  12. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  13. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  14. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  15. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  16. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  17. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  18. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  19. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  20. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  1. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  2. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    www.c4isrnet.com/article/20141205/C4ISRNET/312050009/. 4. Voice over Internet protocol ( VOIP ) applications, for example, running on IPv4 some- times drop...packets, causing communications to sound garbled. With the quality-of-service feature in IPv6, this problem would go away because each VOIP data packet

  3. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  4. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  5. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  6. Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Science.gov (United States)

    Lee, Jihoon; Jeon, Seungwoo; Kim, Jaehoon

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  7. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  8. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  9. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  10. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    Science.gov (United States)

    2016-03-01

    RFC Request for Comments RIB Routing Information Base TBT Too-Big-Trick TCP Transmission Control Protocol UDP User Datagram Protocol USG United States...string of zero-valued nibbles. A more complete discussion of the IPv6 address format and representation can found in Request for Comments ( RFC ) 5952...needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of

  11. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  12. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  13. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  14. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  15. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  16. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  17. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  18. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  19. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  20. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  1. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  2. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  3. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  4. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  5. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  6. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  7. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  8. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  9. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  10. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  11. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  12. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  13. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  14. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  15. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  16. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  17. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  18. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  19. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  20. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  1. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  2. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  3. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  4. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  5. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  6. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  7. A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)

    OpenAIRE

    Babatunde, Olabenjo; Al-Debagy, Omar

    2014-01-01

    Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large scale. In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet Protocol version 6 (IPv6) tends to solve some of these issues including the differences and transition between these two protocols.

  8. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  9. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    Science.gov (United States)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  10. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  11. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  12. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  13. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  14. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  15. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  16. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  17. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  18. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  19. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  20. IPV6 Host Fingerprint

    Science.gov (United States)

    2006-09-01

    by Nmap , UDP packet with data to a closed port .........................39 Table 13. Test case 1 by Queso, SYN packet without options to an open port...from Nmap , UDP packet with data to a closed port. .....66 Table 28. Test case 1 modified from Queso, SYN packet without options to an open port...detection in the test network. Nmap seems to use the most efficient and complete methods for OS fingerprinting . The results of using those tools with the

  1. IPV6 Host Fingerprint

    National Research Council Canada - National Science Library

    Nerakis, Eleftherios

    2006-01-01

    .... Such a probing technique can be effective because developers of different OSes often interpret the guidance provided by the RFCs slightly differently, and consequently their network protocol stack...

  2. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  3. Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti směrování

    OpenAIRE

    Filip, Tomáš

    2015-01-01

    This master thesis deals with integration of IPv6 network protocol into production computer network of Mendel University in Brno in the routing field. The integration includes the Dual Stack transition mechanism, IPv6 address plan, static routing at the perimeter of the university network, and OSPFv3 and MP-BGP routing protocols. Proposed integration plan was verified in the Laboratory of computer networking at the Department of Informatics at FBE MENDELU, and it serves as a template for a fi...

  4. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  5. Mobile IPv6における分散ホームエージェントの実現

    OpenAIRE

    福田, 浩章

    2005-01-01

    電子機器端末の小型化技術や通信技術の発達により、身の周りのあらゆる電子機器がなんらかのかたちでインターネットに接続されるようになってきた。こうしたときにさらなる利便性として求められるものが、移動通信のサポートである。Mobile IPv6 技術は、移動中の継続的な通信を支援する技術の一つである。MobileIPv6 では移動中でも同じIP アドレスを使い続けることができる。これはホームエージェントと呼ばれるノードが移動端末の所在を把握し、他の端末との通信を仲介することにより実現される。このホームエージェントは、基本的には1 台の設置を前提として仕様が決められている。本研究では複数のホームエージェントをネットワーク上に分散して配置する仕組みを提案し、実現する。それにより、Mobile IPv6 の運用における全体的なネットワークの効率化と負荷分散を目指す。...

  6. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    OpenAIRE

    Nelson Enrique Vera Parra; Danilo Alfonso López; Héctor Cristyan Manta Caro

    2014-01-01

    En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN), redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M), al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro....

  7. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  8. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  9. PROTOTIPO PARA EL ANÁLISIS DEL RENDIMIENTO EN EL TRÁFICO DE UN SERVICIO BROADCAST UTILIZANDO LOS PROTOCOLOS HTTP Y RTP SOBRE IPV6 EN UNA RED ACADÉMICA DE TECNOLOGÍA AVANZADA

    Directory of Open Access Journals (Sweden)

    Roberto Ferro

    2011-08-01

    Full Text Available En el presente artículo se condensan los resultados obtenidos de la implementación y modelado de un Prototipo de Servicio Streaming sobre el Sistema Operativo Fedora 13 con el Programa VLC en la Red de Investigación y  Tecnología Avanzada de la Universidad Distrital RITA-UD sobre IPV6 utilizando como cliente la Universidad Minuto de Dios vía RUMBO mediante un Tunel 6a4.

  10. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  11. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    Directory of Open Access Journals (Sweden)

    Nelson Enrique Vera Parra

    2014-04-01

    Full Text Available En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN, redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M, al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro. Estas redes de nueva generación imponen restricciones en cuanto al poder de procesamiento, ancho de banda y recursos de energía, lo que re¬presenta una gran limitante en la implementación de mecanismos de seguridad. En este sentido, en lo últimos años han surgido diversas propuestas para la administración de claves, procedimientos de firma digital y cifrado de datos basados en curvas elípticas e híper-elípticas, que logran niveles de seguridad equivalentes a los algoritmos convencionales basados en algoritmos Diffie-Hellman y Rivest-Shamir-Adleman (RSA, pero que reducen la longitud de clave y, por ende, los recursos computacionales y de red asociados. Este artículo examina los algoritmos basados en criptografía de curvas elípticas (ECC y su aplicación a redes móviles e inalámbricas de nueva generación habilitadas para IPv6. Así mismo, describe un modelo de simulación para la evaluación de ECC, donde se comparan los recursos computacionales necesarios y las limitaciones en mecanismos ligeros de seguridad.

  12. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  13. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available . ? Offset: The Offset is a 13-bit field that specifies the offset of a particular fragment relative to the beginning of the original unfragmenteddatagram. The first fragment has an offset of zero. ? TTL: The TTL (Time to Live) reflects historical intention... while staying connected is growing fast. Here again the implementation of IPsec is especially important. Take note of the new Mobile Internet Protocol(MIP)implementation. 3.8 Conscientious Security This concern is with the users and more...

  14. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    Costa Rica Puerto Rico Philippines Malaysia Croatia Ecuador United States Singapore Cyprus Honduras South Korea Czech Republic Mexico Sri Lanka...headquarters. 6 This effectively maps large address blocks to a single location. Of course, not all end hosts are located at or near the organization’s...cn Hong Kong, China Tinet APNIC iad-us Chantilly, VA, U.S. ARIN ARIN jfk-us New York, NY, U.S. Hurricane Electric ARIN ktm-np Kathmandu, Nepal Nepal

  15. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    fund its research. The ARPA (Advanced Research Projects. Agency) played a lead role in the development of the internet technology. ARPA, with experience gained from its own net- work called ... Their work caught the attention of many researchers and a board .... This limits the lifetime of the datagram and aids the cong-.

  16. Domain Name Server Security (DNSSEC) Protocol Deployment

    Science.gov (United States)

    2014-10-01

    Platform How IPv6 and DNSSEC Change the Intranets OARC Workshop San Francisco, March 2011 Materials available at: https://indico.dns-oarc.net...DNSSEC In Operation NIC .sn The Mensa project - Measuring DNS Health and Security How IPv6 and DNSSEC change the Intranets DNSSEC Update for DE...Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill Global IPv6 Summit, Taipei, Taiwan, November 2011 TWCERT/CC

  17. Deployment Repeatability

    Science.gov (United States)

    2016-08-31

    Deployment repeatability Olive Stohlman (NASA Langley), Mark Silver (Lincoln Labs), and Dave Waller (Ball Aerospace) Abstract Every time a...of motors or deployment drivers  Loss or redistribution of lubrication Hysteresis errors  Material creep due to time in storage and time in the...controlled or where friction changes unreliably in vacuum or thermal conditions (where these affect the deployment, and not only postdeployment stability

  18. Deployment psychology

    African Journals Online (AJOL)

    abel

    there is a very real and palpable sense that psychologists working with deployed service personnel have an imperative to assist those who give of themselves to defend their countries. Deployment psychology's introduction begins and ends with testimonial accounts from US soldiers' experiences in theatres of war and ...

  19. IPV6 Alias Resolution Via Induced Router Fragmentation

    Science.gov (United States)

    2013-06-01

    complications caused by the pigeon hole principle, birthday paradox , and low entropy of IPID velocity, false alias positives can exist for any chosen...during large scale alias reso- lution [41]. Another complication of using the IPv4 IPID counter to infer aliases is raised from the birth- day paradox

  20. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    Science.gov (United States)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  1. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  2. Message Oriented Communication For Ipv6 Enabled Pervasive Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Szydlo

    2013-01-01

    Full Text Available An increasing number of electronic devices in our environment is equipped with radio interfaces used for exposing and using their functionality by other devices and applications. Wireless communication in this class of devices is exposed to a number of situations that may occur including limited energy resources, equipment failures, nodes mobility and loss of communication between nodes. It causes that commonly used standards and protocols for sharing services are not practical and do not take into account the occurrence of these problems. The paper presents the concept of communication that relies on the exchange of messages between wireless pervasive devices available in the environment.

  3. Experimentation and Evaluation of IPV6 Secure Neighbor Discovery Protocol

    Science.gov (United States)

    2007-09-01

    exhaustion. A TCP SYN flood attack is a conceptual cousin to this experiment. Our attack is similar by starting a handshake, making the Victim...Cache), CPU (CGA and RSA checks in SeND) or kernel resources (TCB’s in the case of a SYN flood ). Until proofs of identity and intentions are considered...official part of the TCP /IP suite, has become a de facto standard, and is enabled by default in just about all modern operating systems. The initial

  4. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    to detect a wide range of attacks, including network mapping, port scans, TCP stack scans, DoS bandwidth- flooding attacks, worms, viruses, OS...or too many TCP SYN packets sent in a short period of time (port scan). [The Preprocessor’s function is to take packets potentially dan- gerous for the...Spoofing Layer 3 (Ip Addr) Spoof6 Layer 4 ( SYN flood ) Syn6 ARP & DHCP DHCP MITM DHCP6 SLAAC ICMP6 (RA, Discovery) ARP ICMP6 Nieghbor Discovery (NDP

  5. Inferring Internet Server IPV4 and IPV6 Address Relationships

    Science.gov (United States)

    2013-06-21

    AS 3320, Deutsche Telekom , is in a 1-1 eq. class with a different AS, the most popular other AS is 8422 NetColonge, which suggest business relations...5c0:1400:a:8000/64, and where the paired IPv4’s are in ISP’s from all over, to mention a few: Telecom Italia, Deutsche Telekom , France Telecom, ASTRAL

  6. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  7. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  8. RSOI: Force Deployment Bottleneck

    National Research Council Canada - National Science Library

    D'Amato, Mark

    1998-01-01

    This study uses The Theory Of Constraints (TOC) management methodology and recent military missions to show that RSOI operations are generally the limiting constraint to force deployment operations...

  9. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  10. Deployable Soft Composite Structures

    Science.gov (United States)

    Wang, Wei; Rodrigue, Hugo; Ahn, Sung-Hoon

    2016-02-01

    Deployable structure composed of smart materials based actuators can reconcile its inherently conflicting requirements of low mass, good shape adaptability, and high load-bearing capability. This work describes the fabrication of deployable structures using smart soft composite actuators combining a soft matrix with variable stiffness properties and hinge-like movement through a rigid skeleton. The hinge actuator has the advantage of being simple to fabricate, inexpensive, lightweight and simple to actuate. This basic actuator can then be used to form modules capable of different types of deformations, which can then be assembled into deployable structures. The design of deployable structures is based on three principles: design of basic hinge actuators, assembly of modules and assembly of modules into large-scale deployable structures. Various deployable structures such as a segmented triangular mast, a planar structure comprised of single-loop hexagonal modules and a ring structure comprised of single-loop quadrilateral modules were designed and fabricated to verify this approach. Finally, a prototype for a deployable mirror was developed by attaching a foldable reflective membrane to the designed ring structure and its functionality was tested by using it to reflect sunlight onto to a small-scale solar panel.

  11. Part 8. Deployment considerations

    International Nuclear Information System (INIS)

    Dance, K.D.; Chang, Y.I.; Daly, T.A.

    1980-01-01

    This report addresses considerations of fast breeder reactor development and deployment from a national perspective. Nations vary greatly in their expertise and interest relative to nuclear power, and hence a single set of steps to be taken by a nation in decision-making on breeder development and deployment cannot be presented. The approach taken in this report is to present discussions on key factors influencing the breeder development and deployment decisions, especially in non-breeder nations, by drawing upon historical perspectives of the Light Water Reactor for comparison

  12. Modeling EERE deployment programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge for future research.

  13. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, Katherine A.; Hostick, Donna J.; Belzer, David B.; Livingston, Olga V.

    2007-11-08

    The purpose of this report is to compile information and conclusions gathered as part of three separate tasks undertaken as part of the overall project, “Modeling EERE Deployment Programs,” sponsored by the Planning, Analysis, and Evaluation office within the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE). The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address improvements to modeling in the near term, and note gaps in knowledge where future research is needed.

  14. Deploying OpenStack

    CERN Document Server

    Pepple, Ken

    2011-01-01

    OpenStack was created with the audacious goal of being the ubiquitous software choice for building public and private cloud infrastructures. In just over a year, it's become the most talked-about project in open source. This concise book introduces OpenStack's general design and primary software components in detail, and shows you how to start using it to build cloud infrastructures. If you're a developer, technologist, or system administrator familiar with cloud offerings such as Rackspace Cloud or Amazon Web Services, Deploying OpenStack shows you how to obtain and deploy OpenStack softwar

  15. Remote Systems Design & Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  16. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  17. Deployment & Market Transformation (Brochure)

    Energy Technology Data Exchange (ETDEWEB)

    2012-04-01

    NREL's deployment and market transformation (D and MT) activities encompass the laboratory's full range of technologies, which span the energy efficiency and renewable energy spectrum. NREL staff educates partners on how they can advance sustainable energy applications and also provides clients with best practices for reducing barriers to innovation and market transformation.

  18. Treatment Deployment Evaluation Tool

    International Nuclear Information System (INIS)

    M. A. Rynearson; M. M. Plum

    1999-01-01

    The U.S. Department of Energy (DOE) is responsible for the final disposition of legacy spent nuclear fuel (SNF). As a response, DOE's National Spent Nuclear Fuel Program (NSNFP) has been given the responsibility for the disposition of DOE-owned SNF. Many treatment technologies have been identified to treat some forms of SNF so that the resulting treated product is acceptable by the disposition site. One of these promising treatment processes is the electrometallurgical treatment (EMT) currently in development; a second is an Acid Wash Decladding process. The NSNFP has been tasked with identifying possible strategies for the deployment of these treatment processes in the event that a treatment path is deemed necessary. To support the siting studies of these strategies, economic evaluations are being performed to identify the least-cost deployment path. This model (tool) was developed to consider the full scope of costs, technical feasibility, process material disposition, and schedule attributes over the life of each deployment alternative. Using standard personal computer (PC) software, the model was developed as a comprehensive technology economic assessment tool using a Life-Cycle Cost (LCC) analysis methodology. Model development was planned as a systematic, iterative process of identifying and bounding the required activities to dispose of SNF. To support the evaluation process, activities are decomposed into lower level, easier to estimate activities. Sensitivity studies can then be performed on these activities, defining cost issues and testing results against the originally stated problem

  19. Windows Deployment Services : Esiasennuspalvelin

    OpenAIRE

    Ahonen, Arto

    2010-01-01

    Opinnäytetyöni aiheena on Windows Deployment Services, jonka tarkoituksena on toimia esiasennus-palvelimena Windows-käyttöjärjestelmien levykuvien jakamiseen sekä asentamiseen. Opinnäytetyö to-teutettiin yhteistyössä Concept.10 IT:n ja tuotannon kanssa. Concept.10:n tuotannon lähtökohtana on valmistaa ja asentaa Suomen markkinoille tietokonelaitteistoja ohjelmistoineen ja tukipalveluineen. Tuo-tantoon olennaisena osana kuuluu esiasennuspalvelin, jolla voidaan asentaa useita tietokoneita samaa...

  20. Economics of ALMR deployment

    International Nuclear Information System (INIS)

    Delene, J.G.; Fuller, L.C.; Hudson, C.R.

    1994-01-01

    The Advanced Liquid Metal Reactor (ALMR) has the potential to extend the economic life of the nuclear option and of reducing the number of high level waste repositories which will eventually be needed in an expanding nuclear economy. This paper reports on an analysis which models and evaluates the economics of the use of ALMRs as a component of this country's future electricity generation mix. The ALMR concept has the ability to utilize as fuel the fissile material contained in previously irradiated nuclear fuel (i.e., spent fuel) or from surplus weapons grade material. While not a requirement for the successful deployment of ALMR power plant technology, the reprocessing of spent fuel from light water reactors (LWR) is necessary for any rapid introduction of ALMR power plants. In addition, the reprocessing of LWR spent fuel may reduce the number of high level waste repositories needed in the future by burning the long-lived actinides produced in the fission process. With this study, the relative economics of a number of potential scenarios related to these issues are evaluated. While not encompassing the full range of all possibilities, the cases reported here provide an indication of the potential costs, timings, and relative economic attractiveness of ALMR deployment

  1. 76 FR 34658 - The Internet Assigned Numbers Authority (IANA) Functions

    Science.gov (United States)

    2011-06-14

    ... IPv6 and DNSSEC.\\38\\ Some commenters noted the absence of Service Level Agreements (SLAs), especially... contractor be required to gather and report on statistics regarding global IPv6 and DNSSEC deployment. NTIA...

  2. Deployable Wireless Camera Penetrators

    Science.gov (United States)

    Badescu, Mircea; Jones, Jack; Sherrit, Stewart; Wu, Jiunn Jeng

    2008-01-01

    A lightweight, low-power camera dart has been designed and tested for context imaging of sampling sites and ground surveys from an aerobot or an orbiting spacecraft in a microgravity environment. The camera penetrators also can be used to image any line-of-sight surface, such as cliff walls, that is difficult to access. Tethered cameras to inspect the surfaces of planetary bodies use both power and signal transmission lines to operate. A tether adds the possibility of inadvertently anchoring the aerobot, and requires some form of station-keeping capability of the aerobot if extended examination time is required. The new camera penetrators are deployed without a tether, weigh less than 30 grams, and are disposable. They are designed to drop from any altitude with the boost in transmitting power currently demonstrated at approximately 100-m line-of-sight. The penetrators also can be deployed to monitor lander or rover operations from a distance, and can be used for surface surveys or for context information gathering from a touch-and-go sampling site. Thanks to wireless operation, the complexity of the sampling or survey mechanisms may be reduced. The penetrators may be battery powered for short-duration missions, or have solar panels for longer or intermittent duration missions. The imaging device is embedded in the penetrator, which is dropped or projected at the surface of a study site at 90 to the surface. Mirrors can be used in the design to image the ground or the horizon. Some of the camera features were tested using commercial "nanny" or "spy" camera components with the charge-coupled device (CCD) looking at a direction parallel to the ground. Figure 1 shows components of one camera that weighs less than 8 g and occupies a volume of 11 cm3. This camera could transmit a standard television signal, including sound, up to 100 m. Figure 2 shows the CAD models of a version of the penetrator. A low-volume array of such penetrator cameras could be deployed from an

  3. CCT deployment considerations

    International Nuclear Information System (INIS)

    Yamagata, B.

    1993-01-01

    The deployment of Clean Coal Technologies (CCT) is discussed by asserting that in the case of commercializing CCT, the government's involvement should not stop at the demonstration gate. Two areas in this regard are described. First, the need for the domestic DOE CCT Program to focus on the domestic deployment of demonstrated technologies, and second, the need to recognize that to participate in the phenomenal growth of international power markets through use of clean coal or advanced coal technologies an aggressive partnering between the government and industry to demonstrate technologies abroad will be required. The Clean Coal Technology Coalition's (CCT) primary mission has been to promote the development and use of CCTs. The CCT is a strong advocate for the DOE CCT Program and applauds the Department's and industry's success at developing many coal-based technologies. By current design, the DOE program is said to go no further than the initial demonstration of a technology. Since the inception of CCT in 1986, the Coalition has advocated the need to pursue a partnership with government in which more than one demonstration of the same or similar technology is supported by the clean coal program. Only in this way can one be assured of widespread acceptance of any given technology. There exists a gap (call it a open-quotes risk gapclose quotes) between CCTs that have been successfully demonstrated (and presumably available for commercial use) and their widespread commercial use. A technology matrix has been developed in which the developmental status of a variety of clean coal technologies is demonstrated. While still too early to pass judgment, it appears that while success is being achieved in demonstrating advanced coal technologies, the market place - for several reasons - is not, indeed may have no plans, to adopt these technologies

  4. Design optimization of deployable wings

    Science.gov (United States)

    Gaddam, Pradeep

    Morphing technology is an important aspect of UAV design, particularly in regards to deployable systems. The design of such system has an important impact on the vehicle's performance. The primary focus of the present research work was to determine the most optimum deployable wing design from 3 competing designs and develop one of the deployable wing designs to test in the research facility. A Matlab code was developed to optimize 3 deployable wing concepts inflatable, inflatable telescopic and rigid-folding wings based on a sequential optimization strategy. The constraints that were part of the code include the packaging constraints during its stowed state, fixed length of the deployed section and the minimum L/D constraint. This code resulted in determining the optimum weight of all the 3 designs, the most optimum weight design is the inflatable wing design. This is a result of the flexible skin material and also due to no rigid parts in the deployed wing section. Another goal of the research involved developing an inflatable telescopic wing. The prototype was tested in a wind tunnel, while the actual wing was tested in the altitude chamber to determine the deployment speed, input pressure, analyze and predict the deployment sequence and behavior of the wing at such high wind speeds and altitudes ranging from 60,000 ft to 90,000 ft. Results from these tests allowed us to conclude the deployment sequence of the telescopic wing followed from the root to the tip section. The results were used to analyze the deployment time of the wing. As expected the deployment time decreased with an increase in input pressure. The results also show us that as the altitude increases, the deployment speed of the wing also increased. This was demonstrated when the wing was tested at a maximum altitude pressure of 90,000ft, well above the design altitude of 60,000ft.

  5. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  6. Infrastructure Engineering and Deployment Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Infrastructure Engineering and Deployment Division advances transportation innovation by being leaders in infrastructure technology, including vehicles and...

  7. Urban Code/ Urban Code Deploy

    Data.gov (United States)

    Social Security Administration — COTS databases to support the automation of application deployments through different environments. It keeps track of software deliverables at various stages of SDLC...

  8. Shallow Water Acoustic Experiments and Preliminary Planning for FY06 Fieldwork

    Science.gov (United States)

    2011-03-21

    Swift, C.S. Duncan, L.A. Mayer, and J. Hughes-Clarke. 1999. High-resolution swath sonar investigation of sand ridge, dune and ribbon mor- phology in...ramping on and off. A standard matched filter can compress the sweep to 33 ms, but with significant side-lobe ripples that could mask the multi...Oceariojrapfiy I December 2007 161 Strike Line Sand Sand & Gravel Clay Consolidated Sand Figure 4. Schematic representation of stratigraphic

  9. FY06 Annual Report: Amorphous Semiconductors for Gamma Radiation Detection (ASGRAD)

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Bradley R.; Riley, Brian J.; Crum, Jarrod V.; Sundaram, S. K.; Henager, Charles H.; Zhang, Yanwen; Shutthanandan, V.

    2007-01-01

    We describe progress in the development of new materials for portable, room-temperature, gamma-radiation detection at Pacific Northwest National Laboratory at the Hanford Site in Washington State. High Z, high resistivity, amorphous semiconductors are being designed for use as solid-state detectors at near ambient temperatures; principles of operation are analogous to single-crystal semiconducting detectors. Amorphous semiconductors have both advantages and disadvantages compared to single crystals, and this project is developing methods to mitigate technical problems and design optimized material for gamma detection. Several issues involved in the fabrication of amorphous semiconductors are described, including reaction thermodynamics and kinetics, the development of pyrolytic coating, and the synthesis of ingots. The characterization of amorphous semiconductors is described, including sectioning and polishing protocols, optical microscopy, X-ray diffraction, scanning electron microscopy, optical spectroscopy, particle-induced X-ram emission, Rutherford backscattering, and electrical testing. Then collaboration with the University of Illinois at Urbana-Champaign is discussed in the areas of Hall-effect measurements and current voltage data. Finally, we discuss the strategy for continuing the program.

  10. FY06 L2C2 HE program report Zaug et al.

    Energy Technology Data Exchange (ETDEWEB)

    Zaug, J M; Crowhurst, J C; Howard, W M; Fried, L E; Glaesemann, K R; Bastea, S

    2008-08-01

    The purpose of this project is to advance the improvement of LLNL thermochemical computational models that form the underlying basis or input for laboratory hydrodynamic simulations. Our general work approach utilizes, by design, tight experimental-theoretical research interactions that allow us to not empirically, but rather more scientifically improve LLNL computational results. The ultimate goal here is to confidently predict through computer models, the performance and safety parameters of currently maintained, modified, and newly designed stockpile systems. To attain our goal we make relevant experimental measurements on candidate detonation products constrained under static high-pressure and temperature conditions. The reduced information from these measurements is then used to construct analytical forms that describe the potential surface (repulsive energy as a function of interatomic separation distance) of single and mixed fluid or detonation product species. These potential surface shapes are also constructed using input from well-trusted shock wave physics and assorted thermodynamic data available in the open literature. Our potential surfaces permit one to determine the equations of state (P,V,T), the equilibrium chemistry, phase, and chemical interactions of detonation products under a very wide range of extreme pressure temperature conditions. Using our foundation of experimentally refined potential surfaces we are in a position to calculate, with confidence, the energetic output and chemical speciation occurring from a specific combustion and/or detonation reaction. The thermochemical model we developed and use for calculating the equilibrium chemistry, kinetics, and energy from ultrafast processes is named 'Cheetah'. Computational results from our Cheetah code are coupled to laboratory ALE3D hydrodynamic simulation codes where the complete response behavior of an existing or proposed system is ultimately predicted. The Cheetah thermochemical code is also used by well over 500 U.S. government DoD and DOE community users who calculate the chemical properties of detonated high explosives, propellants, and pyrotechnics. To satisfy the growing needs of LLNL and the general user community we continue to improve the robustness of our Cheetah code. The P-T range of current speed of sound experiments will soon be extended by a factor of four and our recently developed technological advancements permit us to, for the first time, study any chemical specie or fluid mixture. New experiments will focus on determining the miscibility or coexistence curves of detonation product mixtures. Our newly constructed ultrafast laser diagnostics will permit us to determine what chemical species exist under conditions approaching Chapman-Jouguet (CJ) detonation states. Furthermore we will measure the time evolution of candidate species and use our chemical kinetics data to develop new and validate existing rate laws employed in future versions of our Cheetah thermochemical code.

  11. Fabrication Equipment for Periodic Material Assemblies and Ph Assemblies and Photonic Crystals (DURIP FY06)

    Science.gov (United States)

    2008-04-29

    sequential printing, drying, and firing of each layer is conducted, LTCC technology processes all layers within a multilayer structure in parallel...motion of the mechanical stage. The ultra 2400 controller regulates dispensing pressure and hence extrusion speed of the ceramic gel for a

  12. Veterans Affairs Geographic Distribution of Expenditures FY06 by Congressional District

    Data.gov (United States)

    Department of Veterans Affairs — The Geographic Distribution of VA Expenditures (GDX) is an annual report that shows estimated VA expenditures for major programmatic areas by geographic area (state,...

  13. Veterans Affairs Geographic Distribution of Expenditures FY06 by State and County

    Data.gov (United States)

    Department of Veterans Affairs — The Geographic Distribution of VA Expenditures (GDX) is an annual report that shows estimated VA expenditures for major programmatic areas by geographic area (state,...

  14. 300 Area D4 Project 2nd Quarter FY06 Building Completion Report

    International Nuclear Information System (INIS)

    Smith, David S.

    2006-01-01

    This report documents the deactivation, decontamination, decommissioning, and demolition of 16 buildings in the 300 Area of the Hanford Site. The D4 of these facilities included characterization, engineering, removal of hazardous and radiologically contaminated materials, equipment removal, utility disconnection, deactivation, decontamination, demolition of the structure, and stabilization or removal of the remaining slab and foundation as appropriate.

  15. Annual report of the international nuclear energy research initiative OSMOSE project (FY06).

    Energy Technology Data Exchange (ETDEWEB)

    Klann, R. T.; Hudelot, J. P.; Drin, N.; Zhong, Z.; Nuclear Engineering Division; Commissariat a l Energie Atomique

    2007-08-29

    The goal of the OSMOSE program is to measure the reactivity effect of minor actinides in known neutron spectra of interest to the Generation-IV reactor program and other programs and to create a database of these results for use as an international benchmark for the minor actinides. The results are then compared to calculation models to verify and validate integral absorption cross-sections for the minor actinides. The OSMOSE program includes all aspects of the experimental program--including the fabrication of fuel pellets and samples, the oscillation of the samples in the MINERVE reactor for the measurement of the reactivity effect, reactor physics modeling of the MINERVE reactor, and the data analysis and interpretation of the experimental results.

  16. FY06 NRL DoD High Performance Computing Modernization Program Annual Reports

    Science.gov (United States)

    2007-10-31

    and Systems ( ENS ) Numerical Studies of Semiconductor Nanostructures................................................104 T. L. Reinecke, S. Badescu, L...It assimilates 3-D T\\&S fields derived via MODAS synthetics from NLOM 1/16 or 1/32 SSH and MODAS2D 1/8 SST. See: http://www.ocean.nrlssc.navy.mil...the Gulf of Mexico , and initial testing is underway in 1/12 global HYCOM under DoD Challenge. CONESTS: Configured a 1/25 Gulf of Mexico HYCOM

  17. Comprehensive Maritime Awareness (CMA) - Joint Capabilities Technology Demonstration (JCTD), FY 06-09

    National Research Council Canada - National Science Library

    Dwyer, Chris

    2006-01-01

    ...) vision is to share maritime shipping information and tracks throughout the world to deter use of commercial maritime shipping for terrorism, WMD proliferation, drugs, piracy, and human trafficking...

  18. Application Scenarios and Deployment Domains

    NARCIS (Netherlands)

    Niamut, O.A.; Engström, A.; Kochale, A.; Macq, J.; Thomas, G.; Zorić, G.

    2014-01-01

    This chapter describes the impact of deploying the format-agnostic media approach, along the lines of three deployment domains and the end user perspective. The chapter elaborates on a series of potential application scenarios. These application scenarios describe features of a potential

  19. Rapidly Deployed Modular Telemetry System

    Science.gov (United States)

    Varnavas, Kosta A. (Inventor); Sims, William Herbert, III (Inventor)

    2013-01-01

    The present invention is a telemetry system, and more specifically is a rapidly deployed modular telemetry apparatus which utilizes of SDR technology and the FPGA programming capability to reduce the number of hardware components and programming required to deploy a telemetry system.

  20. Implementation and Evaluation of DSMIPv6 for MIPL

    Science.gov (United States)

    Wang, Mingli; Hu, Bo; Chen, Shanzhi; Sun, Qinxue

    Mobile IPv6 performs mobility management to mobile node within IPv6 networks. Since IPv6 is not widely deployed yet, it’s an important feature to let Mobile IPv6 support mobile node moving to IPv4 network and maintaining the established communications. DSMIPv6 specification extends Mobile IPv6 capabilities to allow dual stack mobile nodes to move within IPv4 and IPv6 networks. This paper describes the implementation of this feature based on open source MIPL under Linux. By performing experiments on testbed using the implementation, it is confirmed that the DSMIPv6 works as expected.

  1. Deployable Structural Booms for Large Deployable Solar Arrays, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The development of a new generation of large, high power deployable solar arrays has been identified as the most significant challenge facing the development of...

  2. Self deployable deorbiting space structure

    DEFF Research Database (Denmark)

    2012-01-01

    -active or heavy device has to be brought on board the spacecraft for deploying the space structure. Allows the deployed flexible sheet surface higher than the case when SDSS is rigidly linked at the short distance from carrier structure. Ensures a reliable unfolding of deorbiting structures in zero gravity....... Provides the strain energy provoking the deployment without the need of addition of energy to the system. Eliminates the issues around successful unfolding known from other technical solutions as the frame unfolds automatically without using external energy for unfolding by using the accumulated strain...... energy in stressed configuration. Ensures that deorbiting space structure can be efficiently folded without intervention of active unfolding device....

  3. Deployable Entry-system Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Deployable Entry-system ProjecT (ADEPT) will develop requirements for the ADEPT flight test.  Prior entry systems used high mass thermal protection...

  4. High Efficiency, Deployable Solar Cells

    Data.gov (United States)

    National Aeronautics and Space Administration — Ultrathin, lightweight, flexible, and easily deployable solar cell (SC) capable of specific power greater than 1kW/kg is the target of this development and are at an...

  5. Deployable Wastewater Treatment Technology Evaluation

    National Research Council Canada - National Science Library

    Coppola, Edward

    2002-01-01

    .... The goal of AFRL/MLQD is for the deployable wastewater treatment system to be integrated into a waste treatment system that will treat both solid and aqueous waste. The US Army (TARDEC) and the Air Force (AAC/WMO...

  6. Rapid Deployment Logistics: Lebanon, 1958

    Science.gov (United States)

    1984-10-01

    Operation Grandios ............... 22 6. Support Force ..................................... 23 7. Command Organization of Operation Grandios ....... 24...division’s load-out, arid marshaling plan called Grandios .* Ba ed on these plans, Brig. Gen. David W. Gray, assist nt division commander of the 24th Infaintry...Division, a unit designated for Bluebat, was no stranger to deployments and, since March 1956, had been using Grandios , an unclassified deployment plan

  7. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    On the basis of these, this paper discusses and addresses the issues of packet monitoring of IoT device simulations in Cooja framework. Addressing this issue is tantamount to addressing the security and packet loss issue in Cooja framework; a simulator provided by Contiki operating system to test, develop and run IoT ...

  8. Mapping Autonomous System’s Router Level Topology in IPv6

    Science.gov (United States)

    2007-06-01

    methods will be left as future work. For example, in Figure 7 we could assign known node 2 to X and known node 5 to Y in a threesome X-A-Y with A...being anonymous. Then we could match this threesome against all threesomes where X and Y match and the A node is anonymous and replace all matches with...a single threesome as in Figure 12 and call the anonymous node 4. Using this method of bisimilarity we would reduce the all the anonymous nodes in

  9. Migración de redes de voz IPv4 a IPv6

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-03-01

    Full Text Available This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from measuring and evaluating outstanding parametersdelay, jitter and packet loss.

  10. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  11. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  12. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  13. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  14. Internet Protocol Version 6 (IPv6) An Overview: What is it and Where is it Going

    Science.gov (United States)

    2006-05-04

    in place to operate: - Autoconfiguration, auto-reconfiguration - IPsec “ VPN Suite B” (Enhanced cryptography and key exchange) - Network Mobility...Use Tunneling (configured and brokered) to provide service through v4-only infrastructure • Use edge-translation for legacy devices with no upgrade

  15. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks

    Science.gov (United States)

    2008-08-27

    establishment of VPN tunnels with other networks. Due to time constraints, we did not modify OpenSwan or attempt any further application of IPSec ... VPNs Illustrated: Tunnels , VPNs , and IPsec , Addison-Wesley, 2006. [5] D. Maughan, Internet Security Association and Key Management Protocol...setups. We were not able to test on the Linux machine due to the nature of the implementation of IPSec , namely that of VPNs solely. From the testing

  16. Advanced Electric Field Deployment Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Advanced Electric Field Deployment Systems provide prototype design, analysis, fabrication, and testing of advance electric field deployers (or booms) that are...

  17. SATWG networked quality function deployment

    Science.gov (United States)

    Brown, Don

    1992-01-01

    The initiative of this work is to develop a cooperative process for continual evolution of an integrated, time phased avionics technology plan that involves customers, technologists, developers, and managers. This will be accomplished by demonstrating a computer network technology to augment the Quality Function Deployment (QFD). All results are presented in viewgraph format.

  18. Non-traditional Infrasound Deployment

    Science.gov (United States)

    McKenna, M. H.; McComas, S.; Simpson, C. P.; Diaz-Alvarez, H.; Costley, R. D.; Hayward, C.; Golden, P.; Endress, A.

    2017-12-01

    Historically, infrasound arrays have been deployed in rural environments where anthropological noise sources are limited. As interest in monitoring low energy sources at local distances grows in the infrasound community, it will be vital to understand how to monitor infrasound sources in an urban environment. Arrays deployed in urban centers have to overcome the decreased signal-to-noise ratio and reduced amount of real estate available to deploy an array. To advance the understanding of monitoring infrasound sources in urban environments, local and regional infrasound arrays were deployed on building rooftops on the campus at Southern Methodist University (SMU), and data were collected for one seasonal cycle. The data were evaluated for structural source signals (continuous-wave packets), and when a signal was identified, the back azimuth to the source was determined through frequency-wavenumber analysis. This information was used to identify hypothesized structural sources; these sources were verified through direct measurement and dynamic structural analysis modeling. In addition to the rooftop arrays, a camouflaged infrasound sensor was installed on the SMU campus and evaluated to determine its effectiveness for wind noise reduction. Permission to publish was granted by Director, Geotechnical and Structures Laboratory.

  19. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  20. Supply strategy for SMR deployment

    International Nuclear Information System (INIS)

    Coccagna, A.F.

    2013-01-01

    This document provides a description of Babcock and Wilcox's deployment strategy for the mPower™ Small Modular Reactor from the perspective of Supply Chain and Manufacturing. A desirable future state of readiness is described as one which leverages and revitalizes an existing supply chain and manufacturing infrastructure, as well as leveraging an existing workforce of engineering, construction, and project management employees. B and W's mPower™ SMR value proposition offers many desired design and operating advantages to the SMR market. (author)

  1. RSG Deployment Case Testing Results

    Energy Technology Data Exchange (ETDEWEB)

    Owsley, Stanley L.; Dodson, Michael G.; Hatchell, Brian K.; Seim, Thomas A.; Alexander, David L.; Hawthorne, Woodrow T.

    2005-09-01

    The RSG deployment case design is centered on taking the RSG system and producing a transport case that houses the RSG in a safe and controlled manner for transport. The transport case was driven by two conflicting constraints, first that the case be as light as possible, and second that it meet a stringent list of Military Specified requirements. The design team worked to extract every bit of weight from the design while striving to meet the rigorous Mil-Spec constraints. In the end compromises were made primarily on the specification side to control the overall weight of the transport case. This report outlines the case testing results.

  2. Pediatric diseases and operational deployments.

    Science.gov (United States)

    Pearn, J

    2000-04-01

    Many nations now export military health as a proactive arm of the nation's contribution to the maintenance of international peace in trouble regions of the world; and all nations are called upon from time to time in emergency and disaster situations to help out in their regions of interest. Children and young teenagers constitute some 50% of war-stricken populations. This paper explores this increasingly important role of military medicine from the point of view of a practicing pediatrician and career doctor-soldier. Many international operational deployments undertaken in the last 5 years have required the insertion of pediatric clinical and preventive health resources. Deployments to Rwanda, the countries of the former Yugoslavia, Somalia, Bougainville (in Papua New Guinea), Irian Jaya (in Indonesia), and the Aitape tsunami disaster response (the Sepik region of Papua New Guinea) have all necessitated major pediatric interventions. In some operational deployments, in excess of one-third of patient and clinical contacts have involved the care of children, including clinical treatments ranging from life-saving resuscitation to the care of children with both tropical and subtropical illnesses. They have also involved mass immunization campaigns (e.g., in Rwanda) to prevent measles and meningococcal septicemia. In developing countries, at any time approximately 1 to 4 teenage and adult women is pregnant; and of these, 1 in 15 is suffering a miscarriage during any 2-week period. The implications of this audit are that service members must be multi-skilled not only in the traditional aspects of military medicine and nursing but also in (a) the developmental aspects of childhood; (b) the prevention of infectious childhood diseases by immunization and other means; (c) the recognition and management of diseases of childhood; and (d) the management of the normal neonate and infant, especially those orphaned in refugee disaster and other emergency situations. Doctor

  3. Pre-deployment Year Mental Health Diagnoses and Treatment in Deployed Army Women.

    Science.gov (United States)

    Wooten, Nikki R; Adams, Rachel Sayko; Mohr, Beth A; Jeffery, Diana D; Funk, Wendy; Williams, Thomas V; Larson, Mary Jo

    2017-07-01

    We estimated the prevalence of select mental health diagnoses (MHDX) and mental health treatment (MHT), and identified characteristics associated with MHT during the pre-deployment year (365 days before deployment) in active duty Army women (N = 14,633) who returned from Iraq or Afghanistan deployments in FY2010. Pre-deployment year prevalence estimates were: 26.2 % for any select MHDX and 18.1 % for any MHT. Army women who had physical injuries since FY2002 or any behavioral health treatment between FY2002 and the pre-deployment year had increased odds of pre-deployment year MHT. During the pre-deployment year, a substantial percentage of Army women had MHDX and at least one MHT encounter or stay. Future research should determine if pre-deployment MHDX among Army women reflect vulnerability to future MHDX, or if pre-deployment MHT results in protection from chronic symptoms.

  4. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the C...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections.......Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...

  5. Architecture selection for deployable Local Area Networks

    OpenAIRE

    Hunninghake, David Patrick; Ashley, Bradley Keith

    1990-01-01

    Approved for public release, distribution is unlimited The United States Air Force's Headquarters Tactical Air Command (TAC) Communications-Computers staff provides guidance to TAC functional users on the procurement and use of Local Area Networks (LANs) in a deployed environment. Deployable systems may be defined as those systems designed to be transported away from their normal base for semi-fixed or mobile tactical missions. Major deployed LAN concerns include issues related to transmis...

  6. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2016-07-01

    and wonder who is supporting their partner. During the sus- tainment stage, the model notes rumors about infidelity , injuries, and difficul- ty coping...Guard husband, 27 years old), (b) “Specific finances (what did you buy, what did I buy, etc.).” (deployed Army husband, 50 years old), and (c... Finances .” (deployed National Guard wife, 25 years old). Reunion. An eighth and final category contained responses about homecoming following deployment (n

  7. Low Mass Aeroshell Deployment Mechanism Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protective systems (TPS) panels to...

  8. Low Mass Aeroshell Deployment Mechanism, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protection system (TPS) panels to...

  9. Low Mass Aeroshell Deployment Mechanism, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protective systems (TPS) panels to...

  10. Rigidizing Inflatable Deployable Dwelling (RIDD), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — By combining thin thermoplastic films, woven Vectran reinforcements, and heat a reliable, deployable, rigidizing space habitat can be created. Although much research...

  11. Weight issues during submarine deployments

    Directory of Open Access Journals (Sweden)

    Sourabh Bhutani

    2015-01-01

    Full Text Available Physical activity onboard the diesel-electric submarines is as it is restricted due to lack of space onboard. In the absence of physical activity, one would expect the weight of the submarine crew to increase during the period of deployment at sea. Submarine crew were seen to be consuming 3168±282 kCal/day while doing hard physical work but DIPAS, New Delhi designed ration scales for the submarine crew which were to provide 3640 kCal/day. In such a scenario, a high calorie intake with low physical activity at sea would be of grave concern for long term health status of the crew. Data from an Indian submarines during a 26 day sortie involving 42 crew members revealed that weight gain occurred in 29 crew members. When food remains an important motivator at sea to break the monotony, restriction of intake is important and that can be brought about only by motivation and individual awareness. Data from a US Navy study have shown that this is possible and implementable and the solution seems quite simple.

  12. Concurrent engineering: effective deployment strategies

    Directory of Open Access Journals (Sweden)

    Unny Menon

    1996-12-01

    Full Text Available This paper provides a comprehensive insight into current trends and developments in Concurrent Engineering for integrated development of products and processes with the goal of completing the entire cycle in a shorter time, at lower overall cost and with fewer engineering design changes after product release. The evolution and definition of Concurrent Engineering are addressed first, followed by a concise review of the following elements of the concurrent engineering approach to product development: Concept Development: The Front-End Process, identifying Customer Needs and Quality Function Deployment, Establishing Product Specifications, Concept Selection, Product Architecture, Design for Manufacturing, Effective Rapid Prototyping, and The Economics of Product Development. An outline of a computer-based tutorial developed by the authors and other graduate students funded by NASA ( accessible via the world-wide-web . is provided in this paper. A brief discussion of teamwork for successful concurrent engineering is included, t'ase histories of concurrent engineering implementation at North American and European companies are outlined with references to textbooks authored by Professor Menon and other writers. A comprehensive bibliography on concurrent engineering is included in the paper.

  13. Deployment of Military Mothers during Wartime

    Science.gov (United States)

    2012-11-12

    project, a proposal was submitted recently to explore the deployment experience using an art -based interview with children and their parents. The next...Godwin, SA (1996). An ethnography of women’s experience with military deployment. (Doctoral dissertation, United States International University

  14. Deployable System for Crash-Load Attenuation

    Science.gov (United States)

    Kellas, Sotiris; Jackson, Karen E.

    2007-01-01

    An externally deployable honeycomb structure is investigated with respect to crash energy management for light aircraft. The new concept utilizes an expandable honeycomb-like structure to absorb impact energy by crushing. Distinguished by flexible hinges between cell wall junctions that enable effortless deployment, the new energy absorber offers most of the desirable features of an external airbag system without the limitations of poor shear stability, system complexity, and timing sensitivity. Like conventional honeycomb, once expanded, the energy absorber is transformed into a crush efficient and stable cellular structure. Other advantages, afforded by the flexible hinge feature, include a variety of deployment options such as linear, radial, and/or hybrid deployment methods. Radial deployment is utilized when omnidirectional cushioning is required. Linear deployment offers better efficiency, which is preferred when the impact orientation is known in advance. Several energy absorbers utilizing different deployment modes could also be combined to optimize overall performance and/or improve system reliability as outlined in the paper. Results from a series of component and full scale demonstration tests are presented as well as typical deployment techniques and mechanisms. LS-DYNA analytical simulations of selected tests are also presented.

  15. Renewable Energy: Policy Considerations for Deploying Renewables

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This information paper accompanies the IEA publication Deploying Renewables 2011: Best and Future Policy Practice (IEA, 2011a). It provides more detailed data and analysis on policies for Deploying Renewables, and is intended to complement the main publication. It provides an account of the strategic drivers underpinning renewable energy (RE) technology deployment (energy security, economic development and environment protection) and assesses RE technologies with respect to these drivers, including an estimate of GHG emissions reductions due to RE technologies. The paper also explores the different barriers to deploying renewables at a given stage of market maturity and discusses what tools policy makers can avail of to succeed in removing deployment barriers. An additional topical highlight explores the challenges associated with accelerating the diffusion of RE technologies in developing countries.

  16. Deployable wing model considering structural flexibility and aerodynamic unsteadiness for deployment system design

    Science.gov (United States)

    Otsuka, Keisuke; Wang, Yinan; Makihara, Kanjuro

    2017-11-01

    In future, wings will be deployed in the span direction during flight. The deployment system improves flight ability and saves storage space in the airplane. For the safe design of the wing, the deployment motion needs to be simulated. In the simulation, the structural flexibility and aerodynamic unsteadiness should be considered because they may lead to undesirable phenomena such as a residual vibration after the deployment or a flutter during the deployment. In this study, the deployment motion is simulated in the time domain by using a nonlinear folding wing model based on multibody dynamics, absolute nodal coordinate formulation, and two-dimensional aerodynamics with strip theory. We investigate the effect of the structural flexibility and aerodynamic unsteadiness on the time-domain deployment simulation.

  17. Miniature field deployable terahertz source

    Science.gov (United States)

    Mayes, Mark G.

    2006-05-01

    Developments in terahertz sources include compacted electron beam systems, optical mixing techniques, and multiplication of microwave frequencies. Although significant advances in THz science have been achieved, efforts continue to obtain source technologies that are more mobile and suitable for field deployment. Strategies in source development have approached generation from either end of the THz spectrum, from up-conversion of high-frequency microwave to down-conversion of optical frequencies. In this paper, we present the design of a THz source which employs an up-conversion method in an assembly that integrates power supply, electronics, and radiative component into a man-portable unit for situations in which a lab system is not feasible. This unit will ultimately evolve into a ruggedized package suitable for use in extreme conditions, e.g. temporary security check points or emergency response teams, in conditions where THz diagnostics are needed with minimal planning or logistical support. In order to meet design goals of reduced size and complexity, the inner workings of the unit ideally would be condensed into a monolithic active element, with ancillary systems, e.g. user interface and power, coupled to the element. To attain these goals, the fundamental component of our design is a THz source and lens array that may be fabricated with either printed circuit board or wafer substrate. To reduce the volume occupied by the source array, the design employs a metamaterial composed of a periodic lattice of resonant elements. Each resonant element is an LC oscillator, or tank circuit, with inductance, capacitance, and center frequency determined by dimensioning and material parameters. The source array and supporting electronics are designed so that the radiative elements are driven in-phase to yield THz radiation with a high degree of partial coherence. Simulation indicates that the spectral width of operation may be controlled by detuning of critical dimensions

  18. RadNet Air Quality (Deployable) Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — RadNet Deployable Monitoring is designed to collect radiological and meteorological information and data asset needed to establish the impact of radiation levels on...

  19. Demonstration and Deployment Strategy Workshop: Summary

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2014-05-01

    This report is based on the proceedings of the U.S. Department of Energy Bioenergy Technologies Office Demonstration and Deployment Strategy Workshop, held on March 12–13, 2014, at Argonne National Laboratory.

  20. Concept of Deployable Network Operations Center (DNOC)

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Thiry, Jeff; Johnson, Shawn

    2005-01-01

    .... The increasing use of expeditionary and special operations forces in ad hoc, dynamic, and tactical environments poses a need for an adaptable, flexible, and responsive deployable network operations center (DNOC...

  1. Self-Deploying Tent Array, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The Self-Deploying Tent Array (SDTA) is a modular power system that can be scaled to very large power levels for use on the Martian surface. The tent shape is...

  2. Deployable structures for a human lunar base

    Science.gov (United States)

    Gruber, Petra; Häuplik, Sandra; Imhof, Barbara; Özdemir, Kürsad; Waclavicek, Rene; Perino, Maria Antoinetta

    2007-06-01

    The study Lunar exploration architecture—deployable structures for a lunar base was performed within the Alcatel Alenia Space “Lunar Exploration Architecture” study for the European Space Agency. The purpose of the study was to investigate bionic concepts applicable to deployable structures and to interpret the findings for possible implementation concepts. The study aimed at finding innovative solutions for deployment possibilities. Translating folding/unfolding principles from nature, candidate geometries were developed and researched using models, drawings and visualisations. The use of materials, joints between structural elements and construction details were investigated for these conceptual approaches. Reference scenarios were used to identify the technical and environmental conditions, which served as design drivers. Mechanical issues and the investigation of deployment processes narrowed the selection down to six chosen concepts. Their applicability was evaluated at a conceptual stage in relation to the timescale of the mission.

  3. Maintenance decision support system deployment guide

    Science.gov (United States)

    2008-07-01

    This is a guide for transportation professionals on why and how to deploy winter Maintenance Decision Support Systems (MDSS). Adverse winter weather can cause traffic delays and crashes. Treating the effects of winter weather can also have impacts on...

  4. Self-Deploying, Composite Habitats, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's Veritex(TM) materials. These...

  5. Deployment strategies of managed lanes on arterials.

    Science.gov (United States)

    2015-02-01

    This report investigates issues related to planning, financing, deployment, and operation of managed : lanes on arterials. In this report, a strategy for managed lanes refers to a combination of the managed : lane type, the design and implementation,...

  6. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  7. Office of Civilian Response Deployment Tracking System

    Data.gov (United States)

    US Agency for International Development — The purpose of OCR DTS is to establish, manage and track relevant Civilian Response Corps teams for deployment by sector experience, training, education etc.

  8. Self-Deploying, Composite Habitats, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's VeritexTM materials. These...

  9. Protecting Contractors Deploying with the Force

    National Research Council Canada - National Science Library

    Noble, Earl

    2006-01-01

    .... At any given time, nearly 100,000 contract personnel deployed to perform a wide variety of activities from repairing vehicles to washing dishes to providing additional security for high-ranking personnel...

  10. CubeSat Modular Deployable Solar Arrays

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced CubeSat missions have demanding power requirements relative to their limited available surface area that drive the need for deployable solar arrays. Vendors...

  11. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  12. A Novel Methodology for Charging Station Deployment

    Science.gov (United States)

    Sun, Zhonghao; Zhao, Yunwei; He, Yueying; Li, Mingzhe

    2018-02-01

    Lack of charging stations has been a main obstacle to the promotion of electric vehicles. This paper studies deploying charging stations in traffic networks considering grid constraints to balance the charging demand and grid stability. First, we propose a statistical model for charging demand. Then we combine the charging demand model with power grid constraints and give the formulation of the charging station deployment problem. Finally, we propose a theoretical solution for the problem by transforming it to a Markov Decision Process.

  13. Deploying Renewables - Best and Future Policy Practice

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-11-23

    The global energy system faces urgent challenges. Concerns about energy security are growing, as highlighted by the recent political turmoil in Northern Africa and the nuclear incident in Fukushima. At the same time, the need to respond to climate change is more critical than ever. Against this background, many governments have increased efforts to promote deployment of renewable energy -- low-carbon sources that can strengthen energy security. This has stimulated unprecedented rise in deployment, and renewables are now the fastest growing sector of the energy mix. This 'coming of age' of renewable energy also brings challenges. Growth is focused on a few of the available technologies, and rapid deployment is confined to a relatively small number of countries. In more advanced markets, managing support costs and system integration of large shares of renewable energy in a time of economic weakness and budget austerity has sparked vigorous political debate. The IEA's new report, Deploying Renewables 2011: Best and Future Policy Practice: - Provides a comprehensive review and analysis of renewable energy policy and market trends; - Analyses in detail the dynamics of deployment and provides best-practice policy principles for different stages of market maturity; - Assesses the impact and cost-effectiveness of support policies using new methodological tools and indicators; - Investigates the strategic reasons underpinning the pursuit of RE deployment by different countries and the prospects for globalisation of RE. This new book builds on and extends a 2008 IEA publication, drawing on recent policy and deployment experience world-wide. It provides guidance for policy makers and other stakeholders to avoid past mistakes, overcome new challenges and reap the benefits of deploying renewables -- today and tomorrow.

  14. Metodología de Implementación de Ipv6 en La Red de La Universidad de Oriente

    Directory of Open Access Journals (Sweden)

    Luis Armando Gurris Aragón

    2010-07-01

    Full Text Available Este trabajo presenta una estrategia para adoptar el Protocolo de Internet versión 6 en la red de la Universidad de Oriente (UOnet. El nuevo protocolo ha surgido para sustituir a la versión 4 actualmente en uso de manera global, debido al florecimiento de un conjunto de deficiencias en este último, provocado principalmente por el crecimiento exponencial de Internet y el desarrollo de nuevas tecnologías y servicios, que demandan mayor calidad en el desempeño del Protocolo de Internet. Además de los principales aspectos a tener en cuenta para emprender una transición hacia esta nueva tecnología, tales como: mecanismos de transición y otros elementos fundamentales a considerar como el Sistema de Nombres de Dominio, métodos de configuración de direcciones, sistemas operativos y aplicaciones. Este análisis constituye una guía para la implementación del protocolo en el escenario existente en la UOnet, y a su vez es aplicable en otras redes locales del país.

  15. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  16. Reducing handover latency in future IP-based wireless networks: Proxy Mobile IPv6 with simultaneous bindings

    NARCIS (Netherlands)

    Bargh, Mortaza S.; Hulsebosch, Bob; Eertink, Henk; Eertink, E.H.; Heijenk, Geert; Idserda, Jeroen; Laganier, Julien; Prasad, Anand R.; Zugenmaier, Alf

    2008-01-01

    Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well

  17. Building the Internet of Things with IPv6 and MIPv6 the evolving world of m2m communications

    CERN Document Server

    Minoli, Daniel

    2013-01-01

    ""If we had computers that knew everything there was to know about things-using data they gathered without any help from us-we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.""-Kevin Ashton, originator of the term, Internet of Things An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with

  18. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  19. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers....... The duration of such interruptions is called disruption time or handover delay and can heavily affect user satisfaction. Therefore, this delay needs to be minimized to provide good-quality VoIP services. In this paper, the focus is on the network layer mobility, specifically on dates for providing mobility...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  20. Simulating CubeSat Structure Deployment Dynamics, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — There is high value in simulating the nonlinear dynamics of stowing, deploying, and performance of deployable space structures, especially given the profound...

  1. A Remotely Deployable Wind Sonic Anemometer

    Directory of Open Access Journals (Sweden)

    Muhammad Awais

    2017-12-01

    Full Text Available Communication and computing shape up base for explosion of Internet of Things (IoT era. Humans can efficiently control the devices around their environment as per requirements because of IoT, the communication between different devices brings more flexibility in surrounding. Useful data is also gathered from some of these devices to create Big Data; where, further analysis assist in making life easier by developing good business models corresponding to user needs, enhance scientific research, formulating weather prediction or monitoring systems and contributing in other relative fields as well. Thus, in this research a remotely deployable IoT enabled Wind Sonic Anemometer has been designed and deployed to calculate average wind speed, direction, and gust. The proposed design is remotely deployable, user-friendly, power efficient and cost-effective because of opted modules i.e., ultrasonic sensors, GSM module, and solar panel. The testbed was also deployed at the roof of Computer & Information Systems Engineering (CIS department, NED UET. Further, its calibration has been carried out by using long short-term memory (LSTM, a deep learning technique; where ground truth data has been gathered from mechanical wind speed sensor (NRG-40 H deployed at top of Industrial & Manufacturing (IM department of NED UET. The obtained results are satisfactory and the performance of designed sensor is also good under various weather conditions.

  2. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  3. Deploying Embodied AI into Virtual Worlds

    Science.gov (United States)

    Burden, David J. H.

    The last two years have seen the start of commercial activity within virtual worlds. Unlike computer games where Non-Player-Character avatars are common, in most virtual worlds they are the exception — and until recently in Second Life they were non-existent. However there is real commercial scope for Als in these worlds — in roles from virtual sales staff and tutors to personal assistants. Deploying an embodied AI into a virtual world offers a unique opportunity to evaluate embodied Als, and to develop them within an environment where human and computer are on almost equal terms. This paper presents an architecture being used for the deployment of chatbot driven avatars within the Second Life virtual world, looks at the challenges of deploying an AI within such a virtual world, the possible implications for the Turing Test, and identifies research directions for the future.

  4. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current......This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  5. Deployment Instabilities of Lobed-Pumpkin Balloon

    Science.gov (United States)

    Nakashino, Kyoichi

    A lobed-pumpkin balloon, currently being developed in ISAS/JAXA as well as in NASA, is a promising vehicle for long duration scientific observations in the stratosphere. Recent ground and flight experiments, however, have revealed that the balloon has deployment instabilities under certain conditions. In order to overcome the instability problems, a next generation SPB called 'tawara' type balloon has been proposed, in which an additional cylindrical part is appended to the standard lobed-pumpkin balloon. The present study investigates the deployment stability of tawara type SPB in comparison to that of standard lobed-pumpkin SPB through eigenvalue analysis on the basis of finite element methods. Our numerical results show that tawara type SPB enjoys excellent deployment performance over the standard lobed-pumpkin SPBs.

  6. Industrial deployment of system engineering methods

    CERN Document Server

    Romanovsky, Alexander

    2013-01-01

    A formal method is not the main engine of a development process, its contribution is to improve system dependability by motivating formalisation where useful. This book summarizes the results of the DEPLOY research project on engineering methods for dependable systems through the industrial deployment of formal methods in software development. The applications considered were in automotive, aerospace, railway, and enterprise information systems, and microprocessor design.  The project introduced a formal method, Event-B, into several industrial organisations and built on the lessons learned to

  7. Future wind deployment scenarios for South Africa

    CSIR Research Space (South Africa)

    Wright, Jarrad G

    2017-11-01

    Full Text Available expansion planning exercise is undertaken. The results of this show that a considerable deployment of wind into the future should be expected where in least-cost scenarios ˜15-25 GW of installed wind capacity by 2030 (˜10-20% of the energy mix), ˜40-60 GW...

  8. 77 FR 36903 - Accelerating Broadband Infrastructure Deployment

    Science.gov (United States)

    2012-06-20

    ... the Nation's global competitiveness in the 21st century, driving job creation, promoting innovation, and expanding markets for American businesses. Broadband access also affords public safety agencies... infrastructure has been deployed in a vast majority of communities across the country, today too many areas still...

  9. [Deployment of telemedicine, context and challenges].

    Science.gov (United States)

    Espinoza, Pierre; Jean, Camille; Anh Duong, Tu

    2017-11-01

    The last decade has contributed to the emergence of telemedicine. Legislation and regulations, new tools, efficient networks and regional deployments have all played their part in its growth. There are several regional solutions, often experimental. The implementation of telemedicine services nevertheless comes up against obstacles which concern all specialities, including cardiology. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  10. Changing Family Roles - Across the Deployment Cycle

    Science.gov (United States)

    2017-09-01

    on the impact of technology-based communication during deployment on later psychological distress and role functioning. PROGRESS TO DATE...later psychological distress and role functioning. It builds on a multi-informant, longitudinal investigation of Army National Guard families...E.C. (2016, November). Trajectories of psychological functioning in military couples. Poster presented at the National Council on Family Relations

  11. Deploying Electronic Roadside Vehicle Identification Technology to ...

    African Journals Online (AJOL)

    challenges to handle in order to liberate her citizens from the bondage of insecurity of lives and property ... light armour and helicopters”. Though .... These problems and more can be avoided if automated road side vehicle identification system is deployed at the road sides. This will track down any arms or ammunition being.

  12. Supporting Children and Families throughout Military Deployment

    Science.gov (United States)

    Robertson, Rachel

    2007-01-01

    A military deployment is a challenging time for all family members. Young children are especially vulnerable, because they often do not have skills to handle all of the change and uncertainty and are still learning to manage their emotions and behaviors. They do not have a wealth of past experiences to rely on as adults do. They also do not have…

  13. Microsoft System Center Configuration Manager advanced deployment

    CERN Document Server

    Coupland, Martyn

    2014-01-01

    If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this book.

  14. Deploying Indigenous Knowledge for Sustainable Development ...

    African Journals Online (AJOL)

    Development efforts that ignore IK would end up wasting enormous amounts of resources and might not achieve expected results. The need to deploy IK for sustainable development can be conceptualised when one observes the dynamics and total shift of Africans away from their culture towards western knowledge.

  15. Los Alamos National Laboratory Tritium Technology Deployments Large Scale Demonstration and Deployment Project

    International Nuclear Information System (INIS)

    McFee, J.; Blauvelt, D.; Stallings, E.; Willms, S.

    2002-01-01

    This paper describes the organization, planning and initial implementation of a DOE OST program to deploy proven, cost effective technologies into D and D programs throughout the complex. The primary intent is to accelerate closure of the projects thereby saving considerable funds and at the same time being protective of worker health and the environment. Most of the technologies in the ''toolkit'' for this program have been demonstrated at a DOE site as part of a Large Scale Demonstration and Deployment Project (LSDDP). The Mound Tritium D and D LSDDP served as the base program for the technologies being deployed in this project but other LSDDP demonstrated technologies or ready-for-use commercial technologies will also be considered. The project team will evaluate needs provided by site D and D project managers, match technologies against those needs and rank deployments using a criteria listing. After selecting deployments the project will purchase the equipment and provide a deployment engineer to facilitate the technology implementation. Other cost associated with the use of the technology will be borne by the site including operating staff, safety and health reviews etc. A cost and performance report will be prepared following the deployment to document the results

  16. Very Low Head Turbine Deployment in Canada

    Science.gov (United States)

    Kemp, P.; Williams, C.; Sasseville, Remi; Anderson, N.

    2014-03-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  17. Abstracting application deployment on Cloud infrastructures

    Science.gov (United States)

    Aiftimiei, D. C.; Fattibene, E.; Gargana, R.; Panella, M.; Salomoni, D.

    2017-10-01

    Deploying a complex application on a Cloud-based infrastructure can be a challenging task. In this contribution we present an approach for Cloud-based deployment of applications and its present or future implementation in the framework of several projects, such as “!CHAOS: a cloud of controls” [1], a project funded by MIUR (Italian Ministry of Research and Education) to create a Cloud-based deployment of a control system and data acquisition framework, “INDIGO-DataCloud” [2], an EC H2020 project targeting among other things high-level deployment of applications on hybrid Clouds, and “Open City Platform”[3], an Italian project aiming to provide open Cloud solutions for Italian Public Administrations. We considered to use an orchestration service to hide the complex deployment of the application components, and to build an abstraction layer on top of the orchestration one. Through Heat [4] orchestration service, we prototyped a dynamic, on-demand, scalable platform of software components, based on OpenStack infrastructures. On top of the orchestration service we developed a prototype of a web interface exploiting the Heat APIs. The user can start an instance of the application without having knowledge about the underlying Cloud infrastructure and services. Moreover, the platform instance can be customized by choosing parameters related to the application such as the size of a File System or the number of instances of a NoSQL DB cluster. As soon as the desired platform is running, the web interface offers the possibility to scale some infrastructure components. In this contribution we describe the solution design and implementation, based on the application requirements, the details of the development of both the Heat templates and of the web interface, together with possible exploitation strategies of this work in Cloud data centers.

  18. Security: a Killer App for SDN?

    Science.gov (United States)

    2014-10-01

    traverse through a traditional network. How should this communication channel be handled? IPv6 in a primarily IPv4 world has faced with the same problem...perhaps lessons can be learned from IPv6 deployments. There are also issues of mating authentication in SDN with that of DNSSEC, and BGPSEC once it is

  19. Connected Vehicle Pilot Deployment Program phase 1 : deployment readiness summary : ICF/Wyoming : final report.

    Science.gov (United States)

    2016-09-13

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  20. Connected Vehicle Pilot Deployment Concept phase 1 : comprehensive Pilot Deployment Plan : ICF Wyoming : draft final report.

    Science.gov (United States)

    2016-08-11

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  1. Garden State Parkway Corridor : ITS early deployment planning study : strategic deployment plan

    Science.gov (United States)

    1997-12-01

    This Strategic Deployment Plan describes ways of improving travel within the Garden : State Parkway Corridor using intelligent transportation systems (ITS) and without : constructing additional roadway lanes. Travel improvements will be possible with...

  2. NOC Liverpool Unit 117 Glider deployment report for the DEFRA MAREMAP Project, April - May 2012 deployment

    OpenAIRE

    Balfour, C.; Knight, P.

    2012-01-01

    This document summarises the extended deployment of a 200 metre depth rated Slocum Electric glider by the National Oceanography Centre, Liverpool, UK from the 2nd April to 17th May 2012. The deployment was aimed as a pilot study for the use of gliders by environment agencies to monitor marine conservation zones. Lithium expendable batteries were used inside the glider to provide an extended endurance. The glider had a series of science sensors installed to measure physical oceanographic and b...

  3. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...... experiences, although a causal link cannot be concluded from the findings. Finally, pre-deployment dissociation, pre-deployment neuroticism and a history of traumatic events, as independent factors, were significant predictors of post-deployment PTSD (p 

  4. Post-deployment Mental Health in Reserve and National Guard Service Members: Deploying With or Without One's Unit and Deployment Preparedness.

    Science.gov (United States)

    Ursano, Robert J; Wang, Jing; Fullerton, Carol S; Ramsawh, Holly; Gifford, Robert K; Russell, Dale; Cohen, Gregory H; Sampson, Laura; Galea, Sandro

    2018-01-01

    Given the greater prevalence of post-deployment mental health concerns among reservists, the higher likelihood of deploying without their regular unit, and potentially lower rates of deployment preparedness, we examined associations between deploying with or without one's regular unit (individual augmentee status, IAS), deployment preparedness, and mental health problems including post-traumatic stress disorder (PTSD), depression (MDD), and binge drinking in a nationally representative sample of Reserve Component (RC) Army and Marine-enlisted males (n = 705). A series of multivariate regressions examined the association of mental health with IAS and deployment preparedness, adjusting for demographics. To examine whether deployment preparedness varied by IAS, an IAS × deployment preparedness interaction was included. In an adjusted model, being an individual augmentee and low deployment preparedness were associated with any mental health problem (screening positive for PTSD, MDD, binge drinking, or any combination of the three). There was a significant IAS × deployment preparedness interaction. Mental health problems did not vary by preparedness among individual augmentees. Participants deploying with regular units with low-medium preparedness had greater risk for mental health problems (odds ratio [OR] = 3.69, 95% confidence interval [CI] = 1.78-7.62 and OR = 2.29, 95% CI = 1.12-4.71), than those with high preparedness. RC-enlisted male personnel who deployed without their regular unit were five times more likely to have a mental health problem, and were 61% more likely to report binge drinking. Additionally, those with lower levels of deployment preparedness were up to three times more likely to have a mental health problem and up to six times more likely to report PTSD. The current investigation found that both IAS and deployment preparedness were associated with negative mental health outcomes in a large representative sample of previously deployed RC

  5. Techno-Economics of Residential Broadband Deployment

    DEFF Research Database (Denmark)

    Sigurdsson, Halldor Matthias

    2007-01-01

    as much profit as possible from their previous investments. However, the operators are not restricted by these considerations, and they will often choose a fiber-to-the home solution (FTTH, Fiber-to-the-Home), which will offer a far more substantial data capacity in the long run. The choice of the proper...... broadband deployment strategy is depending on a complexed set of parameters, and there is a demand for precise techno-economic cost models estimating financial feasibility. The existing cost models do not consider the dynamic developments in the market caused by competition. The PhD thesis has a profound...... analysis of the transmission requirements of future broadband services and the technical parameters with importance for the deployment strategy. The framework of the project is interdisciplinary and combines a solid technological knowledge about telecom networks and services with economic and telecom...

  6. Planning and Management of Technology Deployment Center

    International Nuclear Information System (INIS)

    Park, Jae Won; Joo, Po Kook; Kim, Jun Yeon and others

    2005-08-01

    The R and D contents are summarized as follows ; Models were set-up for transferring the developed technologies to the industry and managing technology deployment center to vitalize the commercialization and then the set-up model was tried to apply for transferring technologies for commercialization and to define interfaces between the R and D and industrial applications In this project, new products and processes were developed for promoting the commercialization. Infra-structures were firmly set-up for the venture company promotion and technology deployment developed during executing the proton Engineering frontier Project. Commercialization methodology connection with industrial companies were studied by outside specializing institute. Development of gem-stone coloring and new photo catalyst producing techniques are very high value-adding technologies, therefore, experimental and theoretical R and D were transacted simultaneously to obtain the originality of the technology. The theoretical R and D was committed to a specialist outside

  7. IRIS. Progress in licensing and toward deployment

    International Nuclear Information System (INIS)

    Petrovic, B.; Carelli, M.D.; Kling, C.L.; Cavlina, N.; Grgic, D.

    2006-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light water cooled, pressurized reactor of smaller generating capacity (1000 MWt, or 335 MWe). It is being developed through a strong international partnership by a team lead by Westinghouse and including organizations from 10 countries. The main objective of the project is to offer a simple nuclear power plant with outstanding safety, attractive economics and enhanced proliferation resistance characteristics ready for deployment within the next decade. IRIS embodies the requirements set forth by the recently announced US DOE Global Nuclear Energy Partnership (GNEP) program for worldwide deployment of a smaller-scale reactors and provides a viable bridge to Generation IV reactors. IRIS is designed to address the needs of both developed and emerging markets. Its smaller power level provides deployment flexibility in larger developed markets, and makes it in particular well suited for markets with limited grids or where the annual energy demand growth is moderate. Due to its short construction time and the staggered build option, IRIS significantly reduces the required financing, improves cash flow, and provides a viable solution for economies with limited resources. While based on proven and worldwide accepted LWR technology, IRIS introduces a number of innovative solutions to simplify its design and improve safety and operational characteristics, including the integral primary system and its components, as well as the safety-by-design approach. These features will be tested and demonstrated in a testing program that has been initiated. As its centerpiece, the program will include the integral test facility. Results of this program will support licensing with the US NRC. A multinational licensing is considered to facilitate worldwide deployment. (author)

  8. Quality Function Deployment for Large Systems

    Science.gov (United States)

    Dean, Edwin B.

    1992-01-01

    Quality Function Deployment (QFD) is typically applied to small subsystems. This paper describes efforts to extend QFD to large scale systems. It links QFD to the system engineering process, the concurrent engineering process, the robust design process, and the costing process. The effect is to generate a tightly linked project management process of high dimensionality which flushes out issues early to provide a high quality, low cost, and, hence, competitive product. A pre-QFD matrix linking customers to customer desires is described.

  9. Artist's Concept of X-37 Deployment

    Science.gov (United States)

    1999-01-01

    Pictured is an artist's concept of the experimental Reusable Launch Vehicle (RLV), the X-37 located in the cargo bay of a space shuttle with Earth in the background. The X-37 was designed to launch from the space shuttle's cargo bay as a secondary payload. Once deployed, the X-37 would remain on-orbit up to 21 days performing a variety of experiments before re-entering the Earth's atmosphere and landing. The X-37 program was discontinued in 2003.

  10. Safety-oriented Modular Function Deployment

    OpenAIRE

    Kohl, Markus; Roth, Michael; Lindemann, Udo

    2016-01-01

    While markets demand for individual products, the importance of safety also continuously increases. Modularization methods are a common approach, but they mainly focus on technical dependencies or other module drivers. From a safety perspective, this leads to non-optimal module concepts, which further increase the efforts connected to safety. To avoid this, safety aspects should be better considered. Thus, this paper presents the safety-oriented Modular Function Deployment (sMFD), which integ...

  11. Intelligent transportation infrastructure deployment analysis system

    Energy Technology Data Exchange (ETDEWEB)

    Rathi, A.K. [Oak Ridge National Lab., TN (United States); Harding, J.A. [Federal Highway Administration, McLean, VA (United States)

    1997-02-01

    Much of the work on Intelligent Transportation Systems (ITS) to date has emphasized technologies, standards/protocols, architecture, user services, core infrastructure requirements, and various other technical and institutional issues. ITS implementations in the United States and elsewhere in the world have demonstrated benefits in the areas of safety, productivity, efficiency, and environmental impact. However, quantitative benefits and satisfactory cost estimates are not available or cannot be derived for many components of the ITS, whether deployed individually or in some integrated fashion. The limitations of existing analysis and evaluation capabilities coupled with the lack of strong empirical evidence presents a major knowledge and data gap for infrastructure investment decisions involving ITS alternatives. This paper describes the over-arching issues and requirements associated with the analysis capabilities required for a systematic, faithful, and rigorous evaluation of the impacts of deploying ITS in a metropolitan area. It then describes the conceptual framework of a modeling system that will provide a preliminary analysis capability to support ITS deployment analysis and evaluation.

  12. Ultralightweight Space Deployable Primary Reflector Demonstrator

    Science.gov (United States)

    Montgomery, Edward E., IV; Zeiders, Glenn W.; Smith, W. Scott (Technical Monitor)

    2002-01-01

    A concept has been developed and analyzed and several generational prototypes built for a gossamer-class deployable truss for a mirror or reflector with many smaller precisely-figured solid elements attached will, for at least the next several decades, minimize the mass of a large primary mirror assembly while still providing the high image quality essential for planet-finding and cosmological astronomical missions. Primary mirror segments are mounted in turn on ultralightweight thermally-formed plastic panels that hold clusters of mirror segments in rigid arrays whose tip/tilt and piston would be corrected over the scale of the plastic panels by the control segments. Prototype panels developed under this program are 45 cm wide and fabricated from commercially available Kaplan sheets. A three-strut octahedral tensegrity is the basis for the overall support structure. Each fundamental is composed of two such octahedrons, rotated oppositely about a common triangular face. Adjacent modules are joined at the nodes of the upper and lower triangles to form a deployable structure that could be made arbitrarily large. A seven-module dowel-and-wire prototype has been constructed. Deployment techniques based on the use of collapsing toggled struts with diagonal tensional elements allows an assembly of tensegrities to be fully collapsed and redeployed. The prototype designs will be described and results of a test program for measuring strength and deformation will be presented.

  13. Regional Effort to Deploy Clean Coal Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Gerald Hill; Kenneth Nemeth; Gary Garrett; Kimberly Sams

    2009-01-31

    The Southern States Energy Board's (SSEB) 'Regional Effort to Deploy Clean Coal Technologies' program began on June 1, 2003, and was completed on January 31, 2009. The project proved beneficial in providing state decision-makers with information that assisted them in removing barriers or implementing incentives to deploy clean coal technologies. This was accomplished through two specific tasks: (1) domestic energy security and diversity; and (2) the energy-water interface. Milestones accomplished during the project period are: (1) Presentations to Annual Meetings of SSEB Members, Associate Member Meetings, and the Gasification Technologies Council. (2) Energy: Water reports - (A) Regional Efforts to Deploy Clean Coal Technologies: Impacts and Implications for Water Supply and Quality. June 2004. (B) Energy-Water Interface Challenges: Coal Bed Methane and Mine Pool Water Characterization in the Southern States Region. 2004. (C) Freshwater Availability and Constraints on Thermoelectric Power Generation in the Southeast U.S. June 2008. (3) Blackwater Interactive Tabletop Exercise - Decatur, Georgia April 2007. (4) Blackwater Report: Blackwater: Energy and Water Interdependency Issues: Best Practices and Lessons Learned. August 2007. (5) Blackwater Report: BLACKWATER: Energy Water Interdependency Issues REPORT SUMMARY. April 2008.

  14. Reactor power system deployment and startup

    Science.gov (United States)

    Wetch, J. R.; Nelin, C. J.; Britt, E. J.; Klein, G.

    1985-01-01

    This paper addresses issues that should receive further examination in the near-term as concept selection for development of a U.S. space reactor power system is approached. The issues include: the economics, practicality and system reliability associated with transfer of nuclear spacecraft from low earth shuttle orbits to operational orbits, via chemical propulsion versus nuclear electric propulsion; possible astronaut supervised reactor and nuclear electric propulsion startup in low altitude Shuttle orbit; potential deployment methods for nuclear powered spacecraft from Shuttle; the general public safety of low altitude startup and nuclear safe and disposal orbits; the question of preferred reactor power level; and the question of frozen versus molten alkali metal coolant during launch and deployment. These issues must be considered now because they impact the SP-100 concept selection, power level selection, weight and size limits, use of deployable radiators, reliability requirements, and economics, as well as the degree of need for and the urgency of developing space reactor power systems.

  15. FBR/VHTR deployment scenarios in Japan

    International Nuclear Information System (INIS)

    Richards, Matt; Kunitomi, Kazuhiko

    2008-01-01

    Co-deployment of Fast Breeder Reactors (FBRs) and Very High Temperature Reactors (VHTRs) can be used as the nuclear technologies to meet a significant portion of Japan's future energy demands. The FBR provides the fissile fuel for energy security and sustainability, and can be used to provide a significant portion of the electricity demand. The VHTR can provide flexible energy outputs (electricity, hydrogen, and high-temperature heat) with high efficiency, can operate with a wide variety of fuel cycles, and can be sited at locations that have limited availability of cooling water. These features, combined with its passive safety and high degree of proliferation resistance, make the VHTR an ideal complement for co-deployment with the FBR in Japan and also a very low-risk technology of export to foreign countries. In addition to hydrogen production, the high-temperature thermal energy produced by the VHTR fleet can be used for a wide variety of process-heat applications, and the VHTR can play a key role for significantly reducing greenhouse-gas emissions. This paper describes assessments for deploying FBRs and VHTRs in Japan using a closed fuel cycle, with the FBRs supplying the fissile material to sustain the combined FBR/VHTR fleet. (author)

  16. Remotely deployable aerial inspection using tactile sensors

    Science.gov (United States)

    MacLeod, C. N.; Cao, J.; Pierce, S. G.; Sullivan, J. C.; Pipe, A. G.; Dobie, G.; Summan, R.

    2014-02-01

    For structural monitoring applications, the use of remotely deployable Non-Destructive Evaluation (NDE) inspection platforms offer many advantages, including improved accessibility, greater safety and reduced cost, when compared to traditional manual inspection techniques. The use of such platforms, previously reported by researchers at the University Strathclyde facilitates the potential for rapid scanning of large areas and volumes in hazardous locations. A common problem for both manual and remote deployment approaches lies in the intrinsic stand-off and surface coupling issues of typical NDE probes. The associated complications of these requirements are obviously significantly exacerbated when considering aerial based remote inspection and deployment, resulting in simple visual techniques being the preferred sensor payload. Researchers at Bristol Robotics Laboratory have developed biomimetic tactile sensors modelled on the facial whiskers (vibrissae) of animals such as rats and mice, with the latest sensors actively sweeping their tips across the surface in a back and forth motion. The current work reports on the design and performance of an aerial inspection platform and the suitability of tactile whisking sensors to aerial based surface monitoring applications.

  17. Modular VO oriented Java EE service deployer

    Science.gov (United States)

    Molinaro, Marco; Cepparo, Francesco; De Marco, Marco; Knapic, Cristina; Apollo, Pietro; Smareglia, Riccardo

    2014-07-01

    The International Virtual Observatory Alliance (IVOA) has produced many standards and recommendations whose aim is to generate an architecture that starts from astrophysical resources, in a general sense, and ends up in deployed consumable services (that are themselves astrophysical resources). Focusing on the Data Access Layer (DAL) system architecture, that these standards define, in the last years a web based application has been developed and maintained at INAF-OATs IA2 (Italian National institute for Astrophysics - Astronomical Observatory of Trieste, Italian center of Astronomical Archives) to try to deploy and manage multiple VO (Virtual Observatory) services in a uniform way: VO-Dance. However a set of criticalities have arisen since when the VO-Dance idea has been produced, plus some major changes underwent and are undergoing at the IVOA DAL layer (and related standards): this urged IA2 to identify a new solution for its own service layer. Keeping on the basic ideas from VO-Dance (simple service configuration, service instantiation at call time and modularity) while switching to different software technologies (e.g. dismissing Java Reflection in favour of Enterprise Java Bean, EJB, based solution), the new solution has been sketched out and tested for feasibility. Here we present the results originating from this test study. The main constraints for this new project come from various fields. A better homogenized solution rising from IVOA DAL standards: for example the new DALI (Data Access Layer Interface) specification that acts as a common interface system for previous and oncoming access protocols. The need for a modular system where each component is based upon a single VO specification allowing services to rely on common capabilities instead of homogenizing them inside service components directly. The search for a scalable system that takes advantage from distributed systems. The constraints find answer in the adopted solutions hereafter sketched. The

  18. Deployment Effects of Marin Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Brian Polagye; Mirko Previsic

    2010-06-17

    Given proper care in siting, design, deployment, operation and maintenance, marine and hydrokinetic technologies could become one of the more environmentally benign sources of electricity generation. In order to accelerate the adoption of these emerging hydrokinetic and marine energy technologies, navigational and environmental concerns must be identified and addressed. All developing hydrokinetic projects involve a wide variety of stakeholders. One of the key issues that site developers face as they engage with this range of stakeholders is that many of the possible conflicts (e.g., shipping and fishing) and environmental issues are not well-understood, due to a lack of technical certainty. In September 2008, re vision consulting, LLC was selected by the Department of Energy (DoE) to apply a scenario-based approach to the emerging wave and tidal technology sectors in order to evaluate the impact of these technologies on the marine environment and potentially conflicting uses. The project’s scope of work includes the establishment of baseline scenarios for wave and tidal power conversion at potential future deployment sites. The scenarios will capture variations in technical approaches and deployment scales to properly identify and characterize environmental impacts and navigational effects. The goal of the project is to provide all stakeholders with an improved understanding of the potential effects of these emerging technologies and focus all stakeholders onto the critical issues that need to be addressed. This groundwork will also help in streamlining siting and associated permitting processes, which are considered key hurdles for the industry’s development in the U.S. today. Re vision is coordinating its efforts with two other project teams funded by DoE which are focused on regulatory and navigational issues. The results of this study are structured into three reports: 1. Wave power scenario description 2. Tidal power scenario description 3. Framework for

  19. iFlorida model deployment final evaluation report

    Science.gov (United States)

    2009-01-01

    This document is the final report for the evaluation of the USDOT-sponsored Surface Transportation Security and Reliability Information System Model Deployment, or iFlorida Model Deployment. This report discusses findings in the following areas: ITS ...

  20. Hierarchical Orbital Observatory Deployable Shroud (HOODS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Large deployable telescopes such as NASA's 9.2m and 16.8m segmented ATLAST systems require commensurately large deployable sunshades for thermal control and to...

  1. Fundamentals of 3D Deployable Mechanisms in Space

    Data.gov (United States)

    National Aeronautics and Space Administration — Fundamentals of 3D Deployable Origami Structures in Space The primary objectives of my research are to study the application of 3D deployable origami structures in...

  2. Elastic Deployable Composite Tubular Roll-Out Boom, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Deployable Space Systems (DSS) has developed an affordable and ultra-lightweight elastically self-deployable Roll-Out Boom technology that provides affordability and...

  3. Navy Ship Deployments: New Approaches - Background and Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    The Navy is implementing or experimenting with new kinds of naval formations, more flexible forward-deployment schedules, forward-homeporting additional Navy ships, and long-duration deployments with crew rotation...

  4. NYC CV Pilot Deployment : Safety Management Plan : New York City.

    Science.gov (United States)

    2016-04-22

    This safety management plan identifies preliminary safety hazards associated with the New York City Connected Vehicle Pilot Deployment project. Each of the hazards is rated, and a plan for managing the risks through detailed design and deployment is ...

  5. The Deployment Life Study: Longitudinal Analysis of Military Families Across the Deployment Cycle.

    Science.gov (United States)

    Meadows, Sarah O; Tanielian, Terri; Karney, Benjamin; Schell, Terry; Griffin, Beth Ann; Jaycox, Lisa H; Friedman, Esther M; Trail, Thomas E; Beckman, Robin; Ramchand, Rajeev; Hengstebeck, Natalie; Troxel, Wendy M; Ayer, Lynsay; Vaughan, Christine Anne

    2017-01-01

    In 2009, RAND launched the Deployment Life Study, a longitudinal study of military families across a deployment cycle in order to assess family readiness. Family readiness refers to the state of being prepared to effectively navigate the challenges of daily living experienced in the unique context of military service. The study surveyed families at frequent intervals throughout a complete deployment cycle---before a service member deploys (sometimes months before), during the actual deployment, and after the service member returns (possibly a year or more after she or he redeployed). It assessed a number of outcomes over time, including: the quality of marital and parental relationshipsthe psychological, behavioral, and physical health of family memberschild and teen well-being (e.g., emotional, behavioral, social, and academic)military integration (e.g., attitudes toward military service, retention intentions).This culminating paper briefly reviews the study design and data collection procedures, presents results from analyses of the longitudinal data collected from some 2,700 military families, and offers recommendations for programs and future research related to military families. The research was jointly sponsored by the Office of the Surgeon General, U.S. Army, and by the Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury.

  6. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  7. Deadline-Aware Deployment for Time Critical Applications in Clouds

    NARCIS (Netherlands)

    Hu, Y.; Wang, J.; Zhou, H.; Martin, P.; Taal, A.; de Laat, C.; Zhao, Z.; Rivera, F.F.; Pena, T.F.; Cabaleiro, J.C.

    2017-01-01

    Time critical applications are appealing to deploy in clouds due to the elasticity of cloud resources and their on-demand nature. However, support for deploying application components with strict deadlines on their deployment is lacking in current cloud providers. This is particularly important for

  8. Internet-based Spousal Communication during Deployment: Does it Increase Post-deployment Marital Satisfaction?

    Directory of Open Access Journals (Sweden)

    Warren N. Ponder

    2012-04-01

    Full Text Available The purpose of this study was to explore the question: Is a service member’s post-deployment marital satisfaction correlated with frequency and mode of communication during deployment? This study used an anonymous exploratory design with a sample of 119 Operation Iraqi Freedom (OIF or Operation Enduring Freedom (OEF married veterans. Service members who communicated daily during deployment with their spouses had higher marital satisfaction scores than those who communicated less than once per week. Additionally, participants who used US mail had the highest marital satisfaction scores compared to telephone and internet-based communication. This study expands the overwhelmingly qualitative current literature to include quantitative analysis of this topic. This study also depicts the veterans’ experiences since many of the previous studies of this topic used samples of spouses.

  9. Quality function deployment: application to rehabilitation services.

    Science.gov (United States)

    Einspruch, E M; Omachonu, V K; Einspruch, N G

    1996-01-01

    Describes how the challenge of providing rehabilitative services at reasonable costs is beginning to mount. The management of quality in rehabilitative services is therefore gaining increasing attention in the health care arena. States that if a link is implied between the above stated goal and customer satisfaction, it is imperative to evaluate quality or customer satisfaction in the context of the patient's experience. Describes the quality function deployment (QFD) system and how it leads to a better understanding of the customer's needs and wants. Explores the process of applying the concept of QFD to physical therapy.

  10. Incomplete Excluder limb graft deployment: cause and solution.

    Science.gov (United States)

    Klonaris, Chris; Katsargyris, Athanasios; Koutsoumpelis, Andreas; Kouvelos, George; Georgopoulos, Sotiris

    2014-01-01

    The Excluder stent graft (W.L. Gore and Associates, Flagstaff, AZ) is one of the most frequently used devices for endovascular abdominal aortic aneurysm repair and offers the advantage of a simple and reliable deployment mechanism. We report an unexpected complication during deployment of an Excluder limb graft; the "rip cord" deployment system broke during pulling, most probably because of interference with a previously placed common iliac artery stent, thereby resulting in incomplete graft deployment. This report notes that problems may rarely arise when deploying an Excluder limb graft within already stented iliac arteries and provides technical considerations to manage such events successfully. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Astronaut Edwin Aldrin deploying the EASEP on surface of moon

    Science.gov (United States)

    1969-01-01

    Astronaut Edwin E. Aldrin Jr., lunar module pilot, is photographed deploying the Early Apollo Scientific Experiments Package (EASEP) during the Apollo 11 extravehicular activity on the Moon. Here, he is deploying the Passive Seismic Experiments Package (PSEP). Already deployed is the Laser Ranging Retro-Reflector (LR-3), which can be seen to the left and further in the background. In the center background is the Lunar Module (LM). A flag of the United States is deployed near the LM. In the far left background is the deployed black and white lunar surface television camera. Astronaut Neil A. Armstrong, commander, took this picture with the 70mm lunar surface camera.

  12. Scenarios for Fast Reactors Deployment with Plutonium Recycling

    International Nuclear Information System (INIS)

    Coquelet-Pascal, C.; Meyer, M.; Girieud, R.; Tiphine, M.; Eschbach, R.; Chabert, C.; Garzenne, C.; Barbrault, P.; Gannaz, B.; Van Den Durpel, L.; Favet, D.; Caron-Charles, M.; Carlier, B.; Lefèvre, J.-C.

    2013-01-01

    Conclusions: • Illustrative scenarios with contrasting assumptions to sketch the capability of SFR deployment to renew the French PWR fleet with different chronologies and to take advantage of Pu in PWR spent fuels. • Scenarios of SFR deployment in replacement of PWR French fleet: – Made feasible in terms of Pu availability by reducing the minimum cooling time of SFR spent fuels to less than 5 years or by adding fertile blankets; – Limited impacts on fuel cycle facilities (capacities are higher if SFR deployment is delayed to 2080, even if fuels composition remain compatible with the range of operation of SFRs); – Similar results obtained for different SFR cores design (SFR V2B and CFV). • Scenarios of SFR deployment in complement of PWR fleet: – Highlight a first stage of SFR deployment using Pu of accumulated PWR fuels, followed by a stage of regular SFR deployment using Pu yearly produced by PWR fleet; – Pace of SFR deployment: from 0.5 GWe/y to 0.9 GWe/y; – Key drivers to modulate SFR deployment: – PWR spent fuels cooling time impacts the first stage of SFR deployment; – SFR spent fuels cooling time impacts the pace of SFR deployment; – 25 GWe of SFR from 2040 to 2100: minimum SFR deployment to benefit from the Pu produced by the PWR French fleet with capacities (reprocessing, storage) in continuation of current available capacities

  13. The effect of military deployment on mental health

    DEFF Research Database (Denmark)

    Lyk-Jensen, Stéphanie; Weatherall, Cecilie Dohlmann; W. Jepsen, Peter

    In this paper we estimate the causal effect of military deployment on soldiers’ mental health. To handle the selection bias problem, we use longitudinal data for deployed and non-deployed eligible men in a difference-in-differences setting. Using pair-wise matching, we impute deployment dates...... for important variables like intelligence tests and family background. We find significant adverse effects of military deployment on soldiers’ mental health service use. Highlights: - Causal effect of military deployment on soldiers’ use of mental health service - Using a difference-in-differences approach...... - First evidence relying on administrative records of measures of mental health service use - Significant adverse effects of military deployment on soldiers’ mental health service use....

  14. Deployment-related risk factors of low back pain

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Marott, Jacob Louis; Gyntelberg, Finn

    2014-01-01

    Where much is known about the consequences of spinal and low back pain (LBP) during military deployments, there is lesser knowledge of risk factors for LBP among the deployed forces. The objective of this study was to identify deployment-related exposures associated with LBP. The study was a ques......Where much is known about the consequences of spinal and low back pain (LBP) during military deployments, there is lesser knowledge of risk factors for LBP among the deployed forces. The objective of this study was to identify deployment-related exposures associated with LBP. The study...... was a questionnaire-based cohort study among 1,931 Danish soldiers deployed to Iraq. Of the 680 respondents, 175 (26%) reported LBP. The population of respondents was adjusted for potential nonresponse bias. The associations between LBP and explanatory variables were analyzed using ordinal logistic regression models...

  15. SMUD Community Renewable Energy Deployment Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Sison-Lebrilla, Elaine [Sacramento Municipal Utility District, Sacramento, CA (United States); Tiangco, Valentino [Sacramento Municipal Utility District, Sacramento, CA (United States); Lemes, Marco [Sacramento Municipal Utility District, Sacramento, CA (United States); Ave, Kathleen [Sacramento Municipal Utility District, Sacramento, CA (United States)

    2015-06-08

    This report summarizes the completion of four renewable energy installations supported by California Energy Commission (CEC) grant number CEC Grant PIR-11-005, the US Department of Energy (DOE) Assistance Agreement, DE-EE0003070, and the Sacramento Municipal Utility District (SMUD) Community Renewable Energy Deployment (CRED) program. The funding from the DOE, combined with funding from the CEC, supported the construction of a solar power system, biogas generation from waste systems, and anaerobic digestion systems at dairy facilities, all for electricity generation and delivery to SMUD’s distribution system. The deployment of CRED projects shows that solar projects and anaerobic digesters can be successfully implemented under favorable economic conditions and business models and through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region. In addition to reducing GHG emissions, the projects also demonstrate that solar projects and anaerobic digesters can be readily implemented through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region.

  16. Regional Energy Deployment System (ReEDS)

    Energy Technology Data Exchange (ETDEWEB)

    Short, W.; Sullivan, P.; Mai, T.; Mowers, M.; Uriarte, C.; Blair, N.; Heimiller, D.; Martinez, A.

    2011-12-01

    The Regional Energy Deployment System (ReEDS) is a deterministic optimization model of the deployment of electric power generation technologies and transmission infrastructure throughout the contiguous United States into the future. The model, developed by the National Renewable Energy Laboratory's Strategic Energy Analysis Center, is designed to analyze the critical energy issues in the electric sector, especially with respect to potential energy policies, such as clean energy and renewable energy standards or carbon restrictions. ReEDS provides a detailed treatment of electricity-generating and electrical storage technologies and specifically addresses a variety of issues related to renewable energy technologies, including accessibility and cost of transmission, regional quality of renewable resources, seasonal and diurnal generation profiles, variability of wind and solar power, and the influence of variability on the reliability of the electrical grid. ReEDS addresses these issues through a highly discretized regional structure, explicit statistical treatment of the variability in wind and solar output over time, and consideration of ancillary services' requirements and costs.

  17. The medical software quality deployment method.

    Science.gov (United States)

    Hallberg, N; Timpka, T; Eriksson, H

    1999-03-01

    The objective of this study was to develop a Quality Function Deployment (QFD) model for design of information systems in health-care environments. Consecutive blocked-subject case studies were conducted, based on action research methods. Starting with a QFD model for software development, a model for information system design, the Medical Software Quality Deployment (MSQD) model, was developed. The MSQD model was divided into the pre-study phase, in which the customer categories and their power to influence the design are determined; the data collection phase, in which the voice of customers (VoC) is identified by observations and interviews and quantified by Critical. Incident questionnaires; the need specification phase, where the VoC is specified into ranked customer needs; and the design phase where the customer needs are transformed stepwise to technical requirements and design attributes. QFD showed to be useful for integrating the values of different customer categories in software development for health-care settings. In the later design phases, other quality methods should be used for software implementation and testing.

  18. Expert Oracle SQL optimization, deployment, and statistics

    CERN Document Server

    Hasler, Tony

    2014-01-01

    Expert Oracle SQL: Optimization, Deployment, and Statistics is about optimizing individual SQL statements, especially on production database systems. This Oracle-specific book begins by assuming you have already identified a particular SQL statement and are considering taking steps to improve its performance. The book describes a systematic process by which to diagnose a problem statement, identify a fix, and to implement that fix safely in a production system. You'll learn not only to improve performance when it is too slow, but also to stabilize performance when it is too variable. You'll learn about system statistics and how the Cost-Based Optimizer uses them to determine a suitable execution plan for a given statement. That knowledge provides the foundation from which to identify the root cause, and to stabilize and improve performance. Next after identifying a problem and the underlying root cause is to put in place a solution. Expert Oracle SQL: Optimization, Deployment, and Statistics explains how to ...

  19. Integrated assessment of dispersed energy resources deployment

    Energy Technology Data Exchange (ETDEWEB)

    Marnay, Chris; Blanco, Raquel; Hamachi, Kristina S.; Kawaan, Cornelia P.; Osborn, Julie G.; Rubio, F. Javier

    2000-06-01

    The goal of this work is to create an integrated framework for forecasting the adoption of distributed energy resources (DER), both by electricity customers and by the various institutions within the industry itself, and for evaluating the effect of this adoption on the power system, particularly on the overall reliability and quality of electrical service to the end user. This effort and follow on contributions are intended to anticipate and explore possible patterns of DER deployment, thereby guiding technical work on microgrids towards the key technical problems. An early example of this process addressed is the question of possible DER adopting customer disconnection. A deployment scenario in which many customers disconnect from their distribution company (disco) entirely leads to a quite different set of technical problems than a scenario in which customers self generate a significant share or all of their on-site electricity requirements and additionally buy and sell energy and ancillary services (AS) locally and/or into wider markets. The exploratory work in this study suggests that the economics under which customers disconnect entirely are unlikely.

  20. Testing the Deployment Repeatability of a Precision Deployable Boom Prototype for the Proposed SWOT Karin Instrument

    Science.gov (United States)

    Agnes, Gregory S.; Waldman, Jeff; Hughes, Richard; Peterson, Lee D.

    2015-01-01

    NASA's proposed Surface Water Ocean Topography (SWOT) mission, scheduled to launch in 2020, would provide critical information about Earth's oceans, ocean circulation, fresh water storage, and river discharge. The mission concept calls for a dual-antenna Ka-band radar interferometer instrument, known as KaRIn, that would map the height of water globally along two 50 km wide swaths. The KaRIn antennas, which would be separated by 10 meters on either side of the spacecraft, would need to be precisely deployable in order to meet demanding pointing requirements. Consequently, an effort was undertaken to design build and prototype a precision deployable Mast for the KaRIn instrument. Each mast was 4.5-m long with a required dilitation stability of 2.5 microns over 3 minutes. It required a minimum first mode of 7 Hz. Deployment repeatability was less than +/- 7 arcsec in all three rotation directions. Overall mass could not exceed 41.5 Kg including any actuators and thermal blanketing. This set of requirements meant the boom had to be three times lighter and two orders of magnitude more precise than the existing state of the art for deployable booms.

  1. Management of Acute Diarrheal Illness During Deployment: A Deployment Health Guideline and Expert Panel Report.

    Science.gov (United States)

    Riddle, Mark S; Martin, Gregory J; Murray, Clinton K; Burgess, Timothy H; Connor, Patrick; Mancuso, James D; Schnaubelt, Elizabeth R; Ballard, Timothy P; Fraser, Jamie; Tribble, David R

    2017-09-01

    Acute diarrheal illness during deployment causes significant morbidity and loss of duty days. Effective and timely treatment is needed to reduce individual, unit, and health system performance impacts. This critical appraisal of the literature, as part of the development of expert consensus guidelines, asked several key questions related to self-care and healthcare-seeking behavior, antibiotics for self-treatment of travelers' diarrhea, what antibiotics/regimens should be considered for treatment of acute watery diarrhea and febrile diarrhea and/or dysentery, and when and what laboratory diagnostics should be used to support management of deployment-related travelers' diarrhea. Studies of acute diarrhea management in military and other travelers were assessed for relevance and quality. On the basis of this critical appraisal, guideline recommendations were developed and graded by the Expert Panel using good standards in clinical guideline development methodology. New definitions for defining the severity of diarrhea during deployment were established. A total of 13 graded recommendations on the topics of prophylaxis, therapy and diagnosis, and follow-up were developed. In addition, four non-graded consensus-based statements were adopted. Successful management of acute diarrheal illness during deployment requires action at the provider, population, and commander levels. Strong evidence supports that single-dose antimicrobial therapy is effective in most cases of moderate to severe acute diarrheal illness during deployment. Further studies are needed to address gaps in available knowledge regarding optimal therapies for treatment, prevention, and laboratory testing of acute diarrheal illness. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  2. QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNINGTOOL

    Directory of Open Access Journals (Sweden)

    Burcu DEVRİM İÇTENBAŞ

    2011-07-01

    Full Text Available Quality Function Deployment (QFD uses a house of quality to translate customerrequirements into engineering specifications. QFD has been widely used as a toolto develop new products. It has been adopted in thefields of education quality,service quality, software development and marketingplanning. The tool hasrecently been applied in strategic planning .In this study authors reviewed currentresearch which uses QFD as a strategic planning tool and described how QFDmethods can be used as a robust tool in strategic planning. This study provides aninsight for strategic planners to utilize a QFD- based philosophy and the methodsare useful tools for the design of a customer-driven strategy and show how itsystematically translates vision into action, targeting opportunities and creatinginnovative strategies.

  3. Building Diagnostic Market Deployment - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas; Gayeski, N.

    2012-04-01

    The work described in this report was done as part of a Cooperative Research and Development Agreement (CRADA) between the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) and KGS Building LLC (KGS). PNNL and KGS both believe that the widespread adoption of automated fault de4tection and diagnostic (AFDD) tools will result in significant reduction to energy and peak energy consumption. The report provides an introduction, and summary of the various tasks performed under the CRADA. The CRADA project had three major focus areas: 1) Technical Assistance for Whole Building Energy Diagnostician (WBE) Commercialization, 2) Market Transfer of the Outdoor Air/Economizer Diagnostician (OAE), and 3) Development and Deployment of Automated Diagnostics to Improve Large Commercial Building Operations.

  4. Stochastic Optimization for Nuclear Facility Deployment Scenarios

    Science.gov (United States)

    Hays, Ross Daniel

    Single-use, low-enriched uranium oxide fuel, consumed through several cycles in a light-water reactor (LWR) before being disposed, has become the dominant source of commercial-scale nuclear electric generation in the United States and throughout the world. However, it is not without its drawbacks and is not the only potential nuclear fuel cycle available. Numerous alternative fuel cycles have been proposed at various times which, through the use of different reactor and recycling technologies, offer to counteract many of the perceived shortcomings with regards to waste management, resource utilization, and proliferation resistance. However, due to the varying maturity levels of these technologies, the complicated material flow feedback interactions their use would require, and the large capital investments in the current technology, one should not deploy these advanced designs without first investigating the potential costs and benefits of so doing. As the interactions among these systems can be complicated, and the ways in which they may be deployed are many, the application of automated numerical optimization to the simulation of the fuel cycle could potentially be of great benefit to researchers and interested policy planners. To investigate the potential of these methods, a computational program has been developed that applies a parallel, multi-objective simulated annealing algorithm to a computational optimization problem defined by a library of relevant objective functions applied to the Ver ifiable Fuel Cycle Simulati on Model (VISION, developed at the Idaho National Laboratory). The VISION model, when given a specified fuel cycle deployment scenario, computes the numbers and types of, and construction, operation, and utilization schedules for, the nuclear facilities required to meet a predetermined electric power demand function. Additionally, it calculates the location and composition of the nuclear fuels within the fuel cycle, from initial mining through

  5. Rapid deployable global sensing hazard alert system

    Science.gov (United States)

    Cordaro, Joseph V; Tibrea, Steven L; Shull, Davis J; Coleman, Jerry T; Shuler, James M

    2015-04-28

    A rapid deployable global sensing hazard alert system and associated methods of operation are provided. An exemplary system includes a central command, a wireless backhaul network, and a remote monitoring unit. The remote monitoring unit can include a positioning system configured to determine a position of the remote monitoring unit based on one or more signals received from one or more satellites located in Low Earth Orbit. The wireless backhaul network can provide bidirectional communication capability independent of cellular telecommunication networks and the Internet. An exemplary method includes instructing at least one of a plurality of remote monitoring units to provide an alert based at least in part on a location of a hazard and a plurality of positions respectively associated with the plurality of remote monitoring units.

  6. Scientific data management challenges, technology and deployment

    CERN Document Server

    Rotem, Doron

    2010-01-01

    Dealing with the volume, complexity, and diversity of data currently being generated by scientific experiments and simulations often causes scientists to waste productive time. Scientific Data Management: Challenges, Technology, and Deployment describes cutting-edge technologies and solutions for managing and analyzing vast amounts of data, helping scientists focus on their scientific goals. The book begins with coverage of efficient storage systems, discussing how to write and read large volumes of data without slowing the simulation, analysis, or visualization processes. It then focuses on the efficient data movement and management of storage spaces and explores emerging database systems for scientific data. The book also addresses how to best organize data for analysis purposes, how to effectively conduct searches over large datasets, how to successfully automate multistep scientific process workflows, and how to automatically collect metadata and lineage information. This book provides a comprehensive u...

  7. Clean energy deployment: addressing financing cost

    Science.gov (United States)

    Ameli, Nadia; Kammen, Daniel M.

    2012-09-01

    New methods are needed to accelerate clean energy policy adoption. To that end, this study proposes an innovative financing scheme for renewable and energy efficiency deployment. Financing barriers represent a notable obstacle for energy improvements and this is particularly the case for low income households. Implementing a policy such as PACE—property assessed clean energy—allows for the provision of upfront funds for residential property owners to install electric and thermal solar systems and make energy efficiency improvements to their buildings. This paper will inform the design of better policies tailored to the creation of the appropriate conditions for such investments to occur, especially in those countries where most of the population belongs to the low-middle income range facing financial constraints.

  8. Airbag deployment-related eye injuries.

    Science.gov (United States)

    Koisaari, Tapio; Leivo, Tiina; Sahraravand, Ahmad; Haavisto, Anna-Kaisa; Sulander, Pekka; Tervo, Timo M T

    2017-07-04

    We studied the correlation between airbag deployment and eye injuries using 2 different data sets. The registry of the Finnish Road Accident (FRA) Investigation Teams was analyzed to study severe head- and eyewear-related injuries. All fatal passenger car or van accidents that occurred during the years 2009-2012 (4 years) were included (n = 734). Cases in which the driver's front airbag was deployed were subjected to analysis (n = 409). To determine the proportion of minor, potentially airbag-related eye injuries, the results were compared to the data for all new eye injury patients (n = 1,151) recorded at the Emergency Clinic of the Helsinki University Eye Hospital (HUEH) during one year, from May 1, 2011, to April 30, 2012. In the FRA data set, the unbelted drivers showed a significantly higher risk of death (odds ratio [OR] = 5.89, 95% confidence interval [CI], 3.33-10.9, P = 2.6E-12) or of sustaining head injuries (OR = 2.50, 95% CI, 1.59-3.97, P = 3.8E-5). Only 4 of the 1,151 HUEH patients were involved in a passenger car accident. In one of the crashes, the airbag operated, and the belted driver received 2 sutured eye lid wounds and showed conjunctival sugillation. No permanent eye injuries were recorded during the follow-up. The calculated annual airbag-related eye injury incidence was less than 1/1,000,000 people, 4/100,000 accidents, and 4/10,000 injured occupants. Airbag-related eye injuries occurred very rarely in car accidents in cases where the occupant survived and the restraint system was appropriately used. Spectacle use did not appear to increase the risk of eye injury in restrained occupants.

  9. The financial impact of deployments on reserve health care providers.

    Science.gov (United States)

    Petinaux, Bruno

    2008-08-01

    This study retrospectively surveyed the financial impact of deployments on 17 U.S. Army Reserve health care providers. Due to multiple mobilizations, 29 separate deployments were reported. The deployments, mostly between 2001 and 2005, typically lasted 3 months during which 86% reported no civilian income and 76% reported no civilian benefits. Solo practice providers reported the greatest financial losses due to continuing financial responsibility related to their civilian practice despite being deployed. Overall, 2 deployments did not change, 9 increased, and 16 decreased the medical officer's income. Two were not reported. In this small retrospective convenience sample study, solo practice U.S. Army Reserve health care providers were found to be at highest risk of financial losses during military deployments. This being said, no price can be put on the privilege of serving our men and women in uniform.

  10. Accounting for variation in wind deployment between Canadian provinces

    International Nuclear Information System (INIS)

    Ferguson-Martin, Christopher J.; Hill, Stephen D.

    2011-01-01

    Wind energy deployment varies widely across regions and this variation cannot be explained by differences in natural wind resources alone. Evidence suggests that institutional factors beyond physical wind resources can influence the deployment of wind energy systems. Building on the work of , this study takes a historical institutionalist approach to examine the main factors influencing wind energy deployment across four Canadian provinces Canada: Alberta, Manitoba, Ontario and Nova Scotia. Our case studies suggest that wind energy deployment depends upon a combination of indirect causal factors-landscape values, political and social movements, government electricity policy, provincial electricity market structure and incumbent generation technologies and direct causal factors-grid architecture, ownership patterns, renewable incentive programs, planning and approvals processes and stakeholder support and opposition. - Research highlights: → Examines the reasons for variations in wind deployment between Canadian provinces. → Employs a historical institutional approach to the analysis. → Discusses social factors that affect wind deployment across Canadian jurisdictions.

  11. Self managing monitoring for highly elastic large scale Cloud deployments

    OpenAIRE

    Ward, Jonathan Stuart; Barker, Adam David

    2014-01-01

    Infrastructure as a Service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications affected by elasticity is monitoring. In this paper we investigate the challenges of monitoring large cloud deployments and how these challenges differ from previous monitoring problems. In order to mee...

  12. White Paper on Dish Stirling Technology: Path Toward Commercial Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Andraka, Charles E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Stechel, Ellen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Becker, Peter [Stirling Energy Systems, Scottsdale, AZ (United States); Messick, Brian [Stirling Energy Systems, Scottsdale, AZ (United States)

    2016-07-01

    Dish Stirling energy systems have been developed for distributed and large-scale utility deployment. This report summarizes the state of the technology in a joint project between Stirling Energy Systems, Sandia National Laboratories, and the Department of Energy in 2011. It then lays out a feasible path to large scale deployment, including development needs and anticipated cost reduction paths that will make a viable deployment product.

  13. Multiobjective Shape Optimization for Deployment and Adjustment Properties of Cable-Net of Deployable Antenna

    Directory of Open Access Journals (Sweden)

    Guoqiang You

    2015-01-01

    Full Text Available Based on structural features of cable-net of deployable antenna, a multiobjective shape optimization method is proposed to help to engineer antenna’s cable-net structure that has better deployment and adjustment properties. In this method, the multiobjective optimum mathematical model is built with lower nodes’ locations of cable-net as variables, the average stress ratio of cable elements and strain energy as objectives, and surface precision and natural frequency of cable-net as constraints. Sequential quadratic programming method is used to solve this nonlinear mathematical model in conditions with different weighting coefficients, and the results show the validity and effectiveness of the proposed method and model.

  14. Human Metabolism and Interactions of Deployment-Related Chemicals

    National Research Council Canada - National Science Library

    Hodgson, Ernest

    2003-01-01

    This study examines the human-metabolism and metabolic interactions of a subset of deployment-related chemicals, including chlorpyrifos, DEET, permethrin, pyridostigmine bromide, and sulfur mustard metabolites...

  15. Self-Deploying Gossamer Support Structure, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Phase I results demonstrated the feasibility of using shape memory polymer composites to deploy, tension and support gossamer antennas. Cornerstone Research Group,...

  16. Using Power Purchase Agreements for Solar Deployment at Universities

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, Jenny; O' Shaughnessy, Eric

    2016-02-24

    More than 60 universities have used solar power purchase agreements (PPAs) to deploy more than 100 megawatts of solar PV on campuses around the country. This webinar is intended for university financial planners and other stakeholders who are assessing the financial aspects of deploying solar. The speakers will provide an overview of how universities are using PPAs and key PPA components. In addition, they will discuss the process of using PPAs, why PPAs make sense for campus solar deployment, and the benefits and challenges for universities. Tools and other resources will be shared to help universities interested in using PPAs for campus solar deployment.

  17. Deployable Solar Array Structures with High Stowed Volume Efficiencies

    Data.gov (United States)

    National Aeronautics and Space Administration — Objectives: High stowed volume efficiencies for deployable solar array structures is a space mission enabling technology. Stowing large areas into tight volumes...

  18. Market and Policy Barriers to Energy Storage Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bhatnagar, Dhruv [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Currier, Aileen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hernandez, Jacquelynne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ma, Ookie [Dept. of Energy (DOE), Washington DC (United States) Office of Energy Efficiency and Renewable Energy; Kirby, Brendan [Consultant

    2013-09-01

    Electric energy storage technologies can provide numerous grid services; there are a number of factors that restrict their current deployment. The most significant barrier to deployment is high capital costs, though several recent deployments indicate that capital costs are decreasing and energy storage may be the preferred economic alternative in certain situations. However, a number of other market and regulatory barriers persist, limiting further deployment. These barriers can be categorized into regulatory barriers, market (economic) barriers, utility and developer business model barriers, cross-cutting barriers and technology barriers.

  19. The Deployment Life Study: Longitudinal Analysis of Military Families Across the Deployment Cycle

    Science.gov (United States)

    2016-01-01

    morbidity, homeless - ness, unemployment, or substance use among veterans. Our results indicate that service mem- bers who have separated from service...Introduction 13 References Belasco, A., The Cost of Iraq, Afghanistan, and Other Global War on Terror Operations Since 9/11, Washington, D.C...McLeland, K. C., G. W. Sutton, and W. R. Schumm, “Marital Satisfaction Before and After Deployments Associated with the Global War on Terror

  20. Six policy actions for accelerated deployment of renewable energy. READy Renewable Energy Action on Deployment. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-03-15

    The READy book presents a kaleidoscope of policy options that have proven to accelerate the deployment of renewable energy technologies, based on experiences around the world at the local and national levels. Lessons learned from successful cases are distilled into six essential action points. Together these categories of policy actions compose the ACTION Star, a guide for taking action now while preparing for growth over the long term.

  1. Swarm Deployable Boom Assembly (DBA) Development of a Deployable Magnetometer Boom for the Swarm Spacecraft

    Science.gov (United States)

    McMahon, Paul; Jung, Hans-Juergen; Edwards, Jeff

    2013-09-01

    The Swarm programme consists of 3 magnetically clean satellites flying in close formation designed to measure the Earth's magnetic field using 2 Magnetometers mounted on a 4.3m long deployable boom.Deployment is initiated by releasing 3 HDRMs, once released the boom oscillates back and forth on a pair of pivots, similar to a restaurant kitchen door hinge, for around 120 seconds before coming to rest on 3 kinematic mounts which are used to provide an accurate reference location in the deployed position. Motion of the boom is damped through a combination of friction, spring hysteresis and flexing of the 120+ cables crossing the hinge. Considerable development work and accurate numerical modelling of the hinge motion was required to predict performance across a wide temperature range and ensure that during the 1st overshoot the boom did not damage itself, the harness or the spacecraft.Due to the magnetic cleanliness requirements of the spacecraft no magnetic materials could be used in the design of the hardware.

  2. Technology Deployment Annual Report 2014 December

    Energy Technology Data Exchange (ETDEWEB)

    Arterburn, George K. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-12-01

    This report is a summary of key Technology Deployment activities and achievements for 2014, including intellectual property, granted copyrights, royalties, license agreements, CRADAs, WFOs and Technology-Based Economic Development. Idaho National Laboratory (INL) is a Department of Energy (DOE) multi-program national laboratory that conducts research and development in all DOE mission areas. Like all other federal laboratories, INL has a statutory, technology transfer mission to make its capabilities and technologies available to all federal agencies, to state and local governments, and to universities and industry. To fulfill this mission, INL encourages its scientific, engineering, and technical staff to disclose new inventions and creations to ensure the resulting intellectual property is captured, protected, and made available to others who might benefit from it. As part of the mission, intellectual property is licensed to industrial partners for commercialization, creating jobs and delivering the benefits of federally funded technology to consumers. In other cases, unique capabilities are made available to other federal agencies or to regional small businesses to solve specific technical challenges. INL employees also work cooperatively with researchers and technical staff from the university and industrial sectors to further develop emerging technologies. In our multinational global economy, INL is contributing to the development of the next generation of engineers and scientists by licensing software to educational instiutitons throughout the world. This report is a catalog of selected INL technology transfer and commercialization transactions during this past year. The size and diversity of INL technical resources, coupled with the large number of relationships with other organizations, virtually ensures that a report of this nature will fail to capture all interactions. Recognizing this limitation, this report focuses on transactions that are specifically

  3. Deployed Women Veterans: Important Culturally Sensitive Care.

    Science.gov (United States)

    Conard, Patricia L; Armstrong, Myrna L

    2017-10-01

    Today, with almost 23 million veterans in the nation, and currently only about 10 million, or less, of them seeking active services associated with the Veterans Administration (VA) health facilities, these men and women veterans will be seeking some, more, or even all of their health care over their life time in civilian-based facilities. Pertinent literary sources were reviewed to gather applicable data about the problem. Every patient that enters your health facility should be asked an essential assessment question: "Have you served in the military?" Importantly, to gain effective rapport when they present, civilian nurses will need to anticipate their health needs and provide culturally sensitive care. Specific issues of deployed women veterans are provided in a series of two articles. This article provides a snapshot of the uniquely entrenched military culture, as well as women service member experiences in wartime, including the Global War on Terror (Iraq and Afghanistan). The next article discusses the various healthcare differences (e.g., post-traumatic stress disorder and military sexual trauma), difficulties (e.g., reproductive, gynecologic, urinary, employment, homelessness issues), and gender disparities (varied treatment patterns) so the civilian nurse can better advocate for women veterans. © 2015 Wiley Periodicals, Inc.

  4. Development, deployment and operations of ATLAS databases

    International Nuclear Information System (INIS)

    Vaniachine, A. V.; von der Schmitt, J. G.

    2008-01-01

    In preparation for ATLAS data taking, a coordinated shift from development towards operations has occurred in ATLAS database activities. In addition to development and commissioning activities in databases, ATLAS is active in the development and deployment (in collaboration with the WLCG 3D project) of the tools that allow the worldwide distribution and installation of databases and related datasets, as well as the actual operation of this system on ATLAS multi-grid infrastructure. We describe development and commissioning of major ATLAS database applications for online and offline. We present the first scalability test results and ramp-up schedule over the initial LHC years of operations towards the nominal year of ATLAS running, when the database storage volumes are expected to reach 6.1 TB for the Tag DB and 1.0 TB for the Conditions DB. ATLAS database applications require robust operational infrastructure for data replication between online and offline at Tier-0, and for the distribution of the offline data to Tier-1 and Tier-2 computing centers. We describe ATLAS experience with Oracle Streams and other technologies for coordinated replication of databases in the framework of the WLCG 3D services

  5. Automating NEURON Simulation Deployment in Cloud Resources.

    Science.gov (United States)

    Stockton, David B; Santamaria, Fidel

    2017-01-01

    Simulations in neuroscience are performed on local servers or High Performance Computing (HPC) facilities. Recently, cloud computing has emerged as a potential computational platform for neuroscience simulation. In this paper we compare and contrast HPC and cloud resources for scientific computation, then report how we deployed NEURON, a widely used simulator of neuronal activity, in three clouds: Chameleon Cloud, a hybrid private academic cloud for cloud technology research based on the OpenStack software; Rackspace, a public commercial cloud, also based on OpenStack; and Amazon Elastic Cloud Computing, based on Amazon's proprietary software. We describe the manual procedures and how to automate cloud operations. We describe extending our simulation automation software called NeuroManager (Stockton and Santamaria, Frontiers in Neuroinformatics, 2015), so that the user is capable of recruiting private cloud, public cloud, HPC, and local servers simultaneously with a simple common interface. We conclude by performing several studies in which we examine speedup, efficiency, total session time, and cost for sets of simulations of a published NEURON model.

  6. Methods for deploying ultra-clean detectors

    Science.gov (United States)

    Schubert, Alexis

    2008-04-01

    Next-generation underground experiments, such as searches for neutrinoless double-beta decay and dark matter experiments, will perform high-sensitivity measurements that require extremely low backgrounds. The Majo-ra-na Collaboration ootnotetextF.T. Avignone III (2007) arXiv:0711.4808v1 proposes such an experiment to search for neutrinoless double-beta decay using an array of germanium crystals enriched in ^76Ge. The design of the Majo-ra-na experiment must minimize backgrounds while meeting criteria for electrical signal quality, structural integrity, and thermal cooling characteristics. Recent work has addressed detector deployment in ultra low-background environments. Advances have been made in fabrication of radiologically pure copper parts. Prototype designs for detector support structures reduce backgrounds by minimizing component mass and making use of ultra-pure materials. This talk will describe the design and use of cryostat test-stands to investigate the performance of prototype designs for detector strings. While Majo-ra-na uses germanium detectors, the design considerations and progress made by the collaboration are applicable to other detector technologies and fields of research.

  7. Deploying Renewables -- principles for effective policies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-29

    Renewable energy can play a fundamental role in tackling climate change, environmental degradation and energy security. As these challenges have become ever more pressing, governments and markets are seeking innovative solutions. Yet, what are the key factors that will determine the success of renewable energy policies? How can current policies be improved to encourage greater deployment of renewables? What impact can more effective policies have on renewables' share in the future global energy mix and how soon? This publication addresses these questions. Responding to the Gleneagles G8 call for a clean and secure energy future, it highlights key policy tools to fast-track renewables into the mainstream. This analysis illustrates good practices by applying the combined metrics of effectiveness and efficiency to renewable energy policies in the electricity, heating and transport sectors. It highlights significant barriers to accelerating renewables penetration, and argues that the great potential of renewables can be exploited much more rapidly and to a much larger extent if good practices are adopted. Carefully designed policy frameworks, customised to support technologies at differing stages of maturity, will deliver a strong portfolio of renewable energy technologies. The document provides recommendations on key principles for policy design as a template for decision makers.

  8. Post-deployment usability evaluation of a radiology workstation

    NARCIS (Netherlands)

    Jorritsma, Wiard; Cnossen, Fokie; Dierckx, Rudi; Oudkerk, Matthijs; van Ooijen, Peter

    2015-01-01

    Objective To evaluate the usability of a radiology workstation after deployment in a hospital. Significance In radiology, it is difficult to perform valid pre-deployment usability evaluations due to the heterogeneity of the user group, the complexity of the radiological workflow, and the complexity

  9. 15 CFR 292.2 - Training development and deployment projects.

    Science.gov (United States)

    2010-01-01

    ... evaluation under the Financial Plan criteria. (e) Training development and deployment projects evaluation... project activities to be used in the training development/deployment and the sources of technology and/or... plans, including internal evaluation for management control, external evaluation for assessing outcomes...

  10. Validating Timed Models of Deployment Components with Parametric Concurrency

    Science.gov (United States)

    Broch Johnsen, Einar; Owe, Olaf; Schlatte, Rudolf; Tapia Tarifa, Silvia Lizeth

    Many software systems today are designed without assuming a fixed underlying architecture, and may be adapted for sequential, multicore, or distributed deployment. Examples of such systems are found in, e.g., software product lines, service-oriented computing, information systems, embedded systems, operating systems, and telephony. Models of such systems need to capture and range over relevant deployment scenarios, so it is interesting to lift aspects of low-level deployment concerns to the abstraction level of the modeling language. This paper proposes an abstract model of deployment components for concurrent objects, extending the Creol modeling language. The deployment components are parametric in the amount of concurrency they provide; i.e., they vary in processing resources. We give a formal semantics of deployment components and characterize equivalence between deployment components which differ in concurrent resources in terms of test suites. Our semantics is executable on Maude, which allows simulations and test suites to be applied to a deployment component with different concurrent resources.

  11. Accommodating Thickness in Origami-Based Deployable Arrays

    Science.gov (United States)

    Zirbel, Shannon A.; Magleby, Spencer P.; Howell, Larry L.; Lang, Robert J.; Thomson, Mark W.; Sigel, Deborah A.; Walkemeyer, Phillip E.; Trease, Brian P.

    2013-01-01

    The purpose of this work is to create deployment systems with a large ratio of stowed-to-deployed diameter. Deployment from a compact form to a final flat state can be achieved through origami-inspired folding of panels. There are many models capable of this motion when folded in a material with negligible thickness; however, when the application requires the folding of thick, rigid panels, attention must be paid to the effect of material thickness not only on the final folded state, but also during the folding motion (i.e., the panels must not be required to flex to attain the final folded form). The objective is to develop new methods for deployment from a compact folded form to a large circular array (or other final form). This paper describes a mathematical model for modifying the pattern to accommodate material thickness in the context of the design, modeling, and testing of a deployable system inspired by an origami six-sided flasher model. The model is demonstrated in hardware as a 1/20th scale prototype of a deployable solar array for space applications. The resulting prototype has a ratio of stowed-to-deployed diameter of 9.2 (or 1.25 m deployed outer diameter to 0.136 m stowed outer diameter).

  12. Military deployment and reintegration: a systematic review of child coping.

    Science.gov (United States)

    Bello-Utu, Cindy F; DeSocio, Janiece E

    2015-02-01

    Child coping with parent military deployment and family reintegration. A systematic review of research literature was conducted to examine the effects of deployment and family reintegration on children in military families. A search of CINAHL, PubMed, Psyc-INFO, and SocINDEX databases was performed using the terms "military family," "military child," "child coping," "deployment," and "reintegration." The search was limited to publications between 2001 and 2014 to focus on the effects of Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF), and Operation New Dawn (OND). Twenty-seven research reports met inclusion criteria. Three themes were extracted: A child's coping is influenced by (a) the child's age and development, (b) the mental health and coping of the non-deployed parent during deployment, and the mental health of both parents during family reintegration, and (c) the pre-existing resilience/vulnerability, cumulative risks, and resources of the child and family. © 2015 Wiley Periodicals, Inc.

  13. Review of deployment technology for tethered satellite systems

    Science.gov (United States)

    Yu, B. S.; Wen, H.; Jin, D. P.

    2018-03-01

    Tethered satellite systems (TSSs) have attracted significant attention due to their potential and valuable applications for scientific research. With the development of various launched on-orbit missions, the deployment of tethers is considered a crucial technology for operation of a TSS. Both past orbiting experiments and numerical results have shown that oscillations of the deployed tether due to the Coriolis force and environmental perturbations are inevitable and that the impact between the space tether and end-body at the end of the deployment process leads to complicated nonlinear phenomena. Hence, a set of suitable control methods plays a fundamental role in tether deployment. This review article summarizes previous work on aspects of the dynamics, control, and ground-based experiments of tether deployment. The relevant basic principles, analytical expressions, simulation cases, and experimental results are presented as well.

  14. Deploying HEP applications using Xen and Globus Virtual Workspaces

    International Nuclear Information System (INIS)

    Agarwal, A; Desmarais, R; Gable, I; Grundy, D; P-Brown, D; Seuster, R; Vanderster, D C; Sobie, R; Charbonneau, A; Enge, R

    2008-01-01

    The deployment of HEP applications in heterogeneous grid environments can be challenging because many of the applications are dependent on specific OS versions and have a large number of complex software dependencies. Virtual machine monitors such as Xen could be used to package HEP applications, complete with their execution environments, to run on resources that do not meet their operating system requirements. Our previous work has shown HEP applications running within Xen suffer little or no performance penalty as a result of virtualization. However, a practical strategy is required for remotely deploying, booting, and controlling virtual machines on a remote cluster. One tool that promises to overcome the deployment hurdles using standard grid technology is the Globus Virtual Workspaces project. We describe strategies for the deployment of Xen virtual machines using Globus Virtual Workspace middleware that simplify the deployment of HEP applications

  15. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    -powered base stations is a promising cost-effective solution to considerably enhance user experience. In such a network topology, which is denoted as heterogeneous deployment, the macro layer is expected to provide wider coverage but lower average data speeds whereas small cells are targeted at extending...... network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...... statistical models of deployment areas, the performance analysis is carried out in the form of operator case studies for large-scale deployment scenarios, including realistic macro network layouts and inhomogeneous spatial traffic distributions. Deployment of small cells is performed by means of proposed...

  16. Folding, stowage, and deployment of viscoelastic tape springs

    DEFF Research Database (Denmark)

    Kwok, Kawai; Pellegrino, Sergio

    2013-01-01

    This paper presents an experimental and numerical study of the folding, stowage, and deployment behavior of viscoelastic tape springs. Experiments show that during folding the relationship between load and displacement is nonlinear and varies with rate and temperature. In particular, the limit...... and propagation loads increase with the folding rate but decrease with temperature. During stowage, relaxation behavior leads to a reduction in internal forces that significantly impacts the subsequent deployment dynamics. The deployment behavior starts with a short, dynamic transient that is followed by a steady...... deployment and ends with a slow creep recovery. Unlike elastic tape springs, localized folds in viscoelastic tape springs do not move during deployment. Finite-element simulations based on a linear viscoelastic constitutive model with an experimentally determined relaxation modulus are shown to accurately...

  17. The effects of military deployment on early child development.

    Science.gov (United States)

    Nguyen, Dana R; Ee, Juliana; Berry-Cabán, Cristobal S; Hoedebecke, Kyle

    2014-01-01

    The purpose of this observational, point prevalence study is to determine if parental deployment affects the cognitive, social and emotional development of preschool age children in the military family. Demographic information was collected and an age-appropriate Ages and Stages Questionnaire (ASQ-3) and Ages and Stages Social-Emotional Inventory (ASQ:SE) were administered. The primary outcome measure was the failure rates on the developmental instruments. We identified 151 parents of eligible children; 95 children had a parent that deployed during their lifetime. We found a significant difference in ASQ-3 failure rates for children in the deployed group compared to those in the nondeployed group. Children of deployed parents were at least twice as often to fail the ASQ-3 or ASQ:SE developmental screen compared to children whose parents did not deploy. 30.5% of children in the deployed group failed the ASQ-3 screen while 12.5% of children who did not have a deployed parent failed (P=.009). On the ASQ:SE developmental screen, 16.8% of children who had a parent deploy failed versus 5.4% of children who did not have a parent deploy (P=.031). This study suggests that parental deployment is related to adverse risk for developmental delays in children in military families. The psychological burden on military children could be life-long or require significant resources to address. These adverse outcomes could be possibly mitigated by early detection of developmental delay and firm attention to aggressive screening techniques in military communities.

  18. An innovative deployable solar panel system for Cubesats

    Science.gov (United States)

    Santoni, Fabio; Piergentili, Fabrizio; Donati, Serena; Perelli, Massimo; Negri, Andrea; Marino, Michele

    2014-02-01

    One of the main Cubesat bus limitations is the available on-board power. The maximum power obtained using body mounted solar panels and advanced triple junction solar cells on a triple unit Cubesat is typically less than 10 W. The Cubesat performance and the mission scenario opened to these small satellite systems could be greatly enhanced by an increase of the available power. This paper describes the design and realization of a modular deployable solar panel system for Cubesats, consisting of a modular hinge and spring system that can be potentially used on-board single (1U), double(2U), triple (3U) and six units (6U) Cubesats. The size of each solar panels is the size of a lateral Cubesat surface. The system developed is the basis for a SADA (Solar Array Drive Assembly), in which a maneuvering capability is added to the deployed solar array in order to follow the apparent motion of the sun. The system design trade-off is discussed, comparing different deployment concepts and architectures, leading to the final selection for the modular design. A prototype of the system has been realized for a 3U Cubesat, consisting of two deployable solar panel systems, made of three solar panels each, for a total of six deployed solar panels. The deployment system is based on a plastic fiber wire and thermal cutters, guaranteeing a suitable level of reliability. A test-bed for the solar panel deployment testing has been developed, supporting the solar array during deployment reproducing the dynamical situation in orbit. The results of the deployment system testing are discussed, including the design and realization of the test-bed, the mechanical stress given to the solar cells by the deployment accelerations and the overall system performance. The maximum power delivered by the system is about 50.4 W BOL, greatly enhancing the present Cubesat solar array performance.

  19. Technology Deployment Annual Report 2013 December

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2014-01-01

    available to the INL’s Office of Technology Deployment. However, the accomplishments cataloged in the report reflect the achievements and creativity of the researchers, technicians, support staff, and operators of the INL workforce.

  20. James WEBB Space Telescope Deployment Tower Assembly Deploying Anomaly and Lessons Learned

    Science.gov (United States)

    Tran, Anh N.; Halpin, Jacob D.

    2015-09-01

    During ground testing the Deployment Tower Assembly (DTA) on the James Webb Space Telescope occasionally failed to maintain the specified preload at the end of either stowed or deployed positions after the motor current was turned off. The design of this preload device relies on a magnetic detent brake attached to the motor rotor of a planetary gear motor. To study this characteristic a stepper motor model with dynamic loading conditions is developed using VISSIM program and the key parameters (i.e., Coulomb torque, magnetic detent torque, viscous torque, etc.) are derived by comparing the measured and the simulated data. The analytical tool illustrates that rotor backspin is caused by normal stepper motor response to an instantaneous transition from an energized holding state to a magnetic detent. Irregularities in both the magnetic detents and the various frictional elements within the system will cause variable holding capabilities that explain why backspin does not always occur. The key lesson learned is that magnetic detent holding capability is very sensitive to rotor dynamics and should not be based on torque capability from a test where loading is applied slowly (quasi-static torque).

  1. Deployment of vendor capabilities and competences throughout the outsourcing process

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Christoffersen, Mads; Mefford, Robert N.

    2012-01-01

    , the purpose of this paper is to explore how vendors deploy their capabilities in order to win, run and renew the outsourcing contracts. Design/methodology/approach - The research question has been derived by integrating a resource-based view theory with a model of a vendor's process in outsourcing. A multiple...... their deployment strategies to new, more dynamic and volatile environments. The paper proposes three different deployment strategies for three different operational contexts. Originality/value - In contrast with the existing static approach towards studying vendor's capabilities in outsourcing, the paper...

  2. CONTINUOUS DEPLOYMENT WORKFLOW : Case Lego Mindstorms EV3

    OpenAIRE

    Alatalo, Janne

    2014-01-01

    This thesis was created for N4S@JAMK project. The N4S@JAMK project is part of Need4Speed program run by DIGILE. The assignment for this thesis had two focuses: to create a continuous deployment chain that would deploy software to a Lego Mindstorms EV3 device, and to study ways to unit test the software of EV3 device on a normal computer. The continuous deployment chain was implemented using GitLab, Jenkins programs and Fabric python framework. Lego Mindstorms EV3 device had a third party ...

  3. Building Diagnostic Market Deployment - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, S.; Gayeski, N.

    2012-04-30

    Operational faults are pervasive across the commercial buildings sector, wasting energy and increasing energy costs by up to about 30% (Mills 2009, Liu et al. 2003, Claridge et al. 2000, Katipamula and Brambley 2008, and Brambley and Katipamula 2009). Automated fault detection and diagnostic (AFDD) tools provide capabilities essential for detecting and correcting these problems and eliminating the associated energy waste and costs. The U.S. Department of Energy's (DOE) Building Technology Program (BTP) has previously invested in developing and testing of such diagnostic tools for whole-building (and major system) energy use, air handlers, chillers, cooling towers, chilled-water distribution systems, and boilers. These diagnostic processes can be used to make the commercial buildings more energy efficient. The work described in this report was done as part of a Cooperative Research and Development Agreement (CRADA) between the U.S. Department of Energy's Pacific Northwest National Laboratory (PNNL) and KGS Building LLC (KGS). PNNL and KGS both believe that the widespread adoption of AFDD tools will result in significant reduction to energy and peak energy consumption. The report provides an introduction and summary of the various tasks performed under the CRADA. The CRADA project had three major focus areas: (1) Technical Assistance for Whole Building Energy Diagnostician (WBE) Commercialization, (2) Market Transfer of the Outdoor Air/Economizer Diagnostician (OAE), and (3) Development and Deployment of Automated Diagnostics to Improve Large Commercial Building Operations. PNNL has previously developed two diagnostic tools: (1) whole building energy (WBE) diagnostician and (2) outdoor air/economizer (OAE) diagnostician. WBE diagnostician is currently licensed non-exclusively to one company. As part of this CRADA, PNNL developed implementation documentation and provided technical support to KGS to implement the tool into their software suite, Clockworks

  4. Water Quality Vocabulary Development and Deployment

    Science.gov (United States)

    Simons, B. A.; Yu, J.; Cox, S. J.

    2013-12-01

    Semantic descriptions of observed properties and associated units of measure are fundamental to understanding of environmental observations, including groundwater, surface water and marine water quality. Semantic descriptions can be captured in machine-readable ontologies and vocabularies, thus providing support for the annotation of observation values from the disparate data sources with appropriate and accurate metadata, which is critical for achieving semantic interoperability. However, current stand-alone water quality vocabularies provide limited support for cross-system comparisons or data fusion. To enhance semantic interoperability, the alignment of water-quality properties with definitions of chemical entities and units of measure in existing widely-used vocabularies is required. Modern ontologies and vocabularies are expressed, organized and deployed using Semantic Web technologies. We developed an ontology for observed properties (i.e. a model for expressing appropriate controlled vocabularies) which extends the NASA/TopQuadrant QUDT ontology for Unit and QuantityKind with two additional classes and two properties (see accompanying paper by Cox, Simons and Yu). We use our ontology to populate the Water Quality vocabulary with a set of individuals of each of the four key classes (and their subclasses), and add appropriate relationships between these individuals. This ontology is aligned with other relevant stand-alone Water Quality vocabularies and domain ontologies. Developing the Water Quality vocabulary involved two main steps. First, the Water Quality vocabulary was populated with individuals of the ObservedProperty class, which was determined from a census of existing datasets and services. Each ObservedProperty individual relates to other individuals of Unit and QuantityKind (taken from QUDT where possible), and to IdentifiedObject individuals. As a large fraction of observed water quality data are classified by the chemical substance involved, the

  5. The Deployment Experience: Organizational Climate and Work Life

    National Research Council Canada - National Science Library

    Wilcove, Gerry L

    2006-01-01

    ...) and shore personnel (n = 5,032). Results for 2005 showed that deployed personnel had significantly more negative attitudes than shore personnel on several indices, including job satisfaction, quality of command leadership, available...

  6. Pre-Positioning Deployment System for Small Unmanned Underwater Vehicles

    National Research Council Canada - National Science Library

    Ansay, Michael T

    2005-01-01

    .... A transporter deploys to and releases the assembly proximate to the desired location. Once the assembly has fallen a safe distance after release, spring bands of the assembly are released by the action of lanyards of the transporter...

  7. Flexible, Phase Change Fabric for Deployable Decelerators, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — SDMA proposes to develop a flexible fabric containing Phase Change Materials that is suitable for use on Deployable Decelerators. This technology will make...

  8. Multi-Purpose Interplanetary Deployable Aerocapture System (MIDAS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Altius Space Machines and MSNW LLC propose the development of a cubesat-scale Multipurpose Interplanetary Deployable Aerocapture System (MIDAS), to provide cubesats...

  9. Software Testing During Post-Deployment Support of Weapon Systems

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1994-01-01

    We are providing this final audit report for your information and use. The report discusses policies, procedures, and methodologies for software testing during post-deployment support of weapon systems...

  10. Connected Vehicle Pilot Deployment Program Phase 2, Data Management Plan

    Science.gov (United States)

    2017-10-17

    This document represents a data management plan that delineates all of the data types and data treatment throughout the New York City Connected Vehicle Pilot Deployment (NYC CVPD). This plan includes an identification of the New York City connected v...

  11. CVISN model deployment initiative summary evaluation plan : executive summary

    Science.gov (United States)

    1998-07-01

    The purpose of the Commercial Vehicle Information Systems and Networks Model Deployment Initiative (CVISN MDI) is to demonstrate the technical and institutional feasibility, costs, and benefits of the primary Intelligent Transportation Systems (ITS) ...

  12. Design and Testing of CPAS Main Deployment Bag Energy Modulator

    Science.gov (United States)

    Mollmann, Catherine

    2017-01-01

    During the developmental testing program for CPAS (Capsule Parachute Assembly System), the parachute system for the NASA Orion Crew Module, simulation revealed that high loads may be experienced by the pilot risers during the most devere deployment conditions. As the role of the pilot parachutes is to deploy the main parachutes, these high loads introduced the possibility of main deployment failure. In order to mitigate these high loads, a set of energy modulators was incorporated between the pilot riser and the main deployment bag. An extensive developmental program was implemented to ensure the adequacy of these energy modulators. After initial design comparisons, the energy modulator design was validated through slow-speed joint tests as well as through high-speed bungee tests. This paper documents the design, development, and results of multiple tests completed on the final design.

  13. Patriot PAC-2 Development and Deployment in The Gulf War

    National Research Council Canada - National Science Library

    Sherman, J

    2003-01-01

    .... Patriot PAC-2 is a case study in effective project management that resulted in the extraordinary acceleration in the final stages of development production and deployment in time to play a historic role in the Gulf War...

  14. Elastic Deployable Composite Tubular Roll-Out Boom, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — DSS's innovative Elastic Deployable Composite Tubular Roll-Out Boom will provide revolutionary performance when compared to conventional state-of-the-art...

  15. Morphing structures using soft polymers for active deployment

    International Nuclear Information System (INIS)

    Daynes, Stephen; Grisdale, Amy; Trask, Richard; Seddon, Annela

    2014-01-01

    In this study, we take inspiration from morphing strategies observed in nature, origami design and stiffness tailoring principles in engineering, to develop a thin walled, low cost, bistable cell geometry capable of reversibly unfolding from a flat configuration to a highly textured configuration. Finite element analysis was used to model the cell deployment and capture the experimentally observed bistability of the reinforced silicone elastomer. Through the combination of flexible elastomers with locally reinforced regions enables a highly tailorable and controllable deployment response. These cells are bistable allowing them to maintain their shape when either deployed or retracted without sustained actuation. It is proposed that such deployable cells with reversible surfaces and texture change can be used as a means of adaptive camouflage. (fast track communication)

  16. Accelerating the deployment of offshore renewable energy technologies. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    MacDonald, Mott

    2011-02-15

    Offshore wind energy and ocean energy (i.e. wave and tidal) are at different stages of technology development and deployment, and, as such, they require different approaches for successful deployment. However, regardless of their deployment stage, these technologies may face common hurdles in their way to market competitiveness. IEA-RETD has completed a study with the overall objective to assist policy makers and project developers in a better understanding of these barriers and the specifics of offshore renewable energy and to give them practical guidelines. These include an offshore energy deployment framework, substantiated by evidence-based analyses, and recommendations for future policies design, including best practices for allocation of seafloor rights.

  17. Design and Deployment of Mobile FSO Communication System

    KAUST Repository

    Alheadary, Wael Ghazy

    2017-05-08

    As a potential solution to many applications, we developed a mobile free-space optical (FSO) system that achieves 1Gbps with transmission distance of 70 m. This system needs minimal preparation to be deployed within an hour.

  18. CV pilot deployment concept phase 1, outreach plan -- ICF Wyoming.

    Science.gov (United States)

    2016-06-24

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  19. Novel Heat Flow Probe Design and Deployment, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to develop a novel method for deploying heat flow sensors/heaters in a hole and also a novel approach to subsurface access using a percussive method. The...

  20. EOP CRITTERCAM Deployments on French Frigate Shoals monk seals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRITTERCAMs, were deployed on a 42 monk seals at French Frigate Shoals Hawaii. Sixty nine hours of video comprised of 3192 recording segments collected at...

  1. A Good War? Exploring British veterans' moral evaluation of deployment.

    Science.gov (United States)

    Burnell, Karen J; Boyce, Niall; Hunt, Nigel

    2011-01-01

    Historically, war trauma research has concentrated on the relationship between level of exposure and development of post-traumatic symptoms. More recently, it has been recognized that intra- and interpersonal differences can mediate how service personnel are affected by their experiences. This paper is a qualitative study exploring moral evaluations of 30 British male veterans towards their deployment in conflicts from WWII to the most recent Iraq War (2003-2009). Retrospective thematic analysis is used to explore moral evaluation and societal support. Four categories emerged based on veterans' moral evaluation of deployment: justifiable, implicitly justifiable, unclear, and unjustifiable. Analysis revealed broad differences between these groups. Veterans able to justify their experiences reported more positive aspects of both deployment and societal support than those unable to justify their deployment. These findings make clear the importance of future research exploring the interactions between civilians and service personnel, and the impact this has on mental health. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Quality Functional Deployment as a Conceptual Aircraft Design Tool

    National Research Council Canada - National Science Library

    Tan, Rendell

    2000-01-01

    Quality Functional Deployment (QFD) methodology was applied as a possible system integration tool for use during the conceptual configuration design phase of low speed High Altitude Long Endurance (HALE) UAVs...

  3. An Outrigger Component for a Deployable Occulter System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — In Phase II, Roccor proposes to build upon the results of Phase I to increase the technology readiness level (TRL) of the NASA JPL deployable external occulter. An...

  4. View of the deployed INSAT/PAM-D

    Science.gov (United States)

    1983-01-01

    View of the deployed Indian National Satellite (INSAT) attached to Payload Assist Module (PAM) D drifts above the earth's surface. A faint shadow of the open payload bay can be seen in the top left of the frame.

  5. Creating a Comprehensive Solar Water Heating Deployment Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Focus Marketing Services

    1999-08-18

    This report details the results of a research conducted in 1998 and 1999 and outlines a marketing deployment plan designed for businesses interested in marketing solar water heaters in the new home industry.

  6. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  7. New Analysis and Theory of Deployable Folded Structures, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical theory has great value for deployable space structures and in situ manufacture of large beams, panels, cylinders and other...

  8. New Analysis and Theory of Deployable Folded Structures, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical folding theory has great value for deployable space structures and in situ manufacture of large beams, panels and cylinders. The...

  9. Costs and benefits of MDOT intelligent transportation system deployments.

    Science.gov (United States)

    2015-07-01

    This report analyses costs and benefits of Intelligent Transportation Systems (ITS) deployed by : the Michigan Department of Transportation (MDOT). MDOT ITS focuses on traffic incident : management and also provide Freeway Courtesy Patrol services. A...

  10. Creating a Comprehensive Solar Water Heating Deployment Strategy

    International Nuclear Information System (INIS)

    Focus Marketing Services

    1999-01-01

    This report details the results of a research conducted in 1998 and 1999 and outlines a marketing deployment plan designed for businesses interested in marketing solar water heaters in the new home industry

  11. Astronaut-Deployable Geophysical and Environmental Monitoring Stations

    Science.gov (United States)

    Guzewich, S. D.; Bleacher, J. E.; Smith, M. D.; Khayat, A.; Conrad, P.

    2017-02-01

    Geophysical and environmental monitoring stations could be deployed by astronauts exploring Mars, the Moon, or asteroids, and create a broad network that would collect high-value scientific information while also enhancing astronaut safety.

  12. Surface Optimization Techniques for Deployable Reflectors, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Under this and several other programs, CTD has developed TEMBOREG deployable solid-surface reflectors (TEMBOREG Reflectors) to provide future NASA and Air Force...

  13. Effects of Deployments on Homestation Job Stress and Burnout

    National Research Council Canada - National Science Library

    Johnson, S. R

    2005-01-01

    .... The increased rate of deployments, coupled with the reduction in resources, has military leaders concerned that these changing demands will cause undue strain, adversely affecting the military member's quality of life...

  14. Airport Visibility Measuring Systems Elements of Deployment Cost Analysis

    Science.gov (United States)

    1976-09-01

    This report analyzes the deployment cost for different visibility measuring systems necessary to satisfy CAT I, II, and II operations. The analysis is based on airport operational requirements and data for commercially available visibility measuring ...

  15. Extreme Environment Sampling System Deployment Mechanism, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Future Venus or Comet mission architectures may feature robotic sampling systems comprised of a Sampling Tool and Deployment Mechanism. Since 2005, Honeybee has been...

  16. Modeling Deployment Decisions for Elastic Services with ABS

    Directory of Open Access Journals (Sweden)

    Einar Broch Johnsen

    2016-10-01

    Full Text Available The use of cloud technology can offer significant savings for the deployment of services, provided that the service is able to make efficient use of the available virtual resources to meet service-level requirements. To avoid software designs that scale poorly, it is important to make deployment decisions for the service at design time, early in the development of the service itself. ABS offers a formal, model-based approach which integrates the design of services with the modeling of deployment decisions. In this paper, we illustrate the main concepts of this approach by modeling a scalable pool of workers with an auto-scaling strategy and by using the model to compare deployment decisions with respect to client traffic with peak loads.

  17. Deployable Engine Air-Brake for Drag Management Applications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ATA Engineering, Inc., (ATA) proposes a Phase II SBIR program to demonstrate an innovative engine air-brake (EAB) technology that uses a deployable swirl vane...

  18. USDOT guidance summary for connected vehicle deployments : safety management.

    Science.gov (United States)

    2016-07-01

    This document provides guidance material in regards to safety management plan for the CV Pilots DeploymentConcept Development Phase. This guidance provides key concepts and references in developing the SafetyManagement Plan in Task 4, lists relevant ...

  19. Precision Deployable Mast for the SWOT KaRIn Instrument

    Data.gov (United States)

    National Aeronautics and Space Administration — Design and prototype a lightweight, precision-deployable mast for the Ka-band Radar Interferometer (KaRIn) antennas in the Surface Water and Ocean Topography (SWOT)...

  20. Forward Deployment of U.S. Naval Forces to Australia

    Science.gov (United States)

    2007-12-14

    potential. Beyond mere financial considerations, Australia -based ships would provide increased crisis -response capability to the theater commander...FORWARD DEPLOYMENT OF U.S. NAVAL FORCES TO AUSTRALIA A thesis presented to the Faculty of the U.S. Army Command and General...5b. GRANT NUMBER 4. TITLE AND SUBTITLE Forward Deployment of U.S. Naval Forces to Australia 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER

  1. NOC turbulence glider deployment report for the OSMOSIS Project

    OpenAIRE

    Balfour, C.; Knight, P.; McLaughlin, D.

    2011-01-01

    This document summarises the three deployments of the NOC Liverpool Teledyne Webb Research Slocum glider fitted with an external Rockland Scientific International micro-Rider turbulence probe during September 2011. The general aim of these glider deployments was to generate underwater turbulence and glider based CTD measurements for comparison with other sensor systems. This information will be used for evaluation of the performance of other measurement systems that are required for the Ocean...

  2. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  3. Telephone Support During Overseas Deployment for Military Spouses

    Science.gov (United States)

    2015-04-01

    test a behavioral caregiving intervention that has been used successfully for dementia and SCI/D caregivers to provide services to stressed and...Telephone Support Groups ) –Telephone support groups provided. Completed May, 2014. Task 7: Intervention 2 (Online Education/Webinar Sessions) – Webinar...parents, have contacted us to request assistance while their children are deployed and after deployment.  Interventions for Parent Caregivers of

  4. Sensor Deployment for Air Pollution Monitoring Using Public Transportation System

    OpenAIRE

    Yu, James J. Q.; Li, Victor O. K.; Lam, Albert Y. S.

    2015-01-01

    Air pollution monitoring is a very popular research topic and many monitoring systems have been developed. In this paper, we formulate the Bus Sensor Deployment Problem (BSDP) to select the bus routes on which sensors are deployed, and we use Chemical Reaction Optimization (CRO) to solve BSDP. CRO is a recently proposed metaheuristic designed to solve a wide range of optimization problems. Using the real world data, namely Hong Kong Island bus route data, we perform a series of simulations an...

  5. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2016-10-01

    resilience and child well-being, Soldier and non-deploying parents must successfully meet the challenges of caregiving throughout the deployment cycle...units) RANDOMIZED = 44 adult individuals (22 family units) Pending Start of Intervention = 2 (1 family unit) Drop-out Prior to Intervention = 0...Implications for Practice, Education , and Research.” University of Texas, Austin, TX. 2. Dondanville, K. A., DeVoe, E. R, & Blankenship, A. (Sept 2016

  6. Empirical Characterization of Unconstrained Tape Spring Deployment Dynamics

    Science.gov (United States)

    2012-03-22

    for CubeSats [13]). All of these designs are stowed compactly during launch, then deployed into larger shapes for use on orbit. Beyond these...for commercial off the shelf (COTS) solutions to supply them for CubeSats [13] The best known case may be MARSIS, which is a radar sounding experiment...on the ESA Mars Express spacecraft. Marsis is notable for a boom deployment issue caused by thermal conditions which was subsequently solved with no

  7. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  8. Renal lithiasis: addressing the risks of austere desert deployments.

    Science.gov (United States)

    Cramer, J Steven; Forrest, Kelly

    2006-06-01

    Renal lithiasis affects approximately 5% of the general population, with higher risks for men and increasing risks with increasing age. The forward deployment of the Air Force into austere desert environments with integration of the active duty, Reserves, and Guard presents increasing risks to mission accomplishment with the increased risk of developing renal lithiasis. This paper describes seven cases of presumed renal lithiasis in a deployed desert setting in Air Force personnel on flying status. Their status and the location of the base acted as a focus for a review of the literature on kidney stone causation, prevention, diagnosis, and management. A review of the literature revealed that current military recommendations to hydrate in the field may not be sufficient for the primary prevention of kidney stones. Beverage choice may prove more useful for prevention. Situations precipitating voluntary dehydration need to be prevented. Although there are superior ways to diagnose renal lithiasis, in the deployed setting patient history and physical examination are usually the only available means. Ultrasound is a viable diagnostic option for use in the deployed setting based on its portability, affordability, and ease of use. Additions to the standard management of renal lithiasis, such as subcutaneous Lidocaine and heat may have value in the deployed setting if the supply of narcotics is limited. In the deployed setting, hydration choices, the addition of portable ultrasound to the diagnostic process, and pain management with nontraditional therapies need to be explored.

  9. Using Deduplicating Storage for Efficient Disk Image Deployment

    Directory of Open Access Journals (Sweden)

    Xing Lin

    2015-08-01

    Full Text Available Many clouds and network testbeds use disk images to initialize local storage on their compute devices. Large facilities must manage thousands or more images, requiring significant amounts of storage. At the same time, to provide a good user experience, they must be able to deploy those images quickly. Driven by our experience in operating the Emulab site at the University of Utah---a long-lived and heavily-used testbed---we have created a new service for efficiently storing and deploying disk images. This service exploits the redundant data found in similar images, using deduplication to greatly reduce the amount of physical storage required. In addition to space savings, our system is also designed for highly efficient image deployment---it integrates with an existing highly-optimized disk image deployment system, Frisbee, without significantly increasing the time required to distribute and install images. In this paper, we explain the design of our system and discuss the trade-offs we made to strike a balance between efficient storage and fast disk image deployment. We also propose a new chunking algorithm, called AFC, which enables fixed-size chunking for deduplicating allocated disk sectors. Experimental results show that our system reduces storage requirements by up to 3x while imposing only a negligible runtime overhead on the end-to-end disk-deployment process.

  10. Applications of Dynamic Deployment of Services in Industrial Automation

    Science.gov (United States)

    Candido, Gonçalo; Barata, José; Jammes, François; Colombo, Armando W.

    Service-oriented Architecture (SOA) is becoming a de facto paradigm for business and enterprise integration. SOA is expanding into several domains of application envisioning a unified solution suitable across all different layers of an enterprise infrastructure. The application of SOA based on open web standards can significantly enhance the interoperability and openness of those devices. By embedding a dynamical deployment service even into small field de- vices, it would be either possible to allow machine builders to place built- in services and still allow the integrator to deploy on-the-run the services that best fit his current application. This approach allows the developer to keep his own preferred development language, but still deliver a SOA- compliant application. A dynamic deployment service is envisaged as a fundamental framework to support more complex applications, reducing deployment delays, while increasing overall system agility. As use-case scenario, a dynamic deployment service was implemented over DPWS and WS-Management specifications allowing designing and programming an automation application using IEC61131 languages, and deploying these components as web services into devices.

  11. Cognitive ability and risk of post-traumatic stress disorder after military deployment

    DEFF Research Database (Denmark)

    Nissen, Lars R.; Karstoft, Karen-Inge; Vedtofte, Mia S.

    2017-01-01

    Background: Studies of the association between pre-deployment cognitive ability and post-deployment post-traumatic stress disorder (PTSD) have shown mixed results. Aims: To study the influence of pre-deployment cognitive ability on PTSD symptoms 6-8 months post-deployment in a large population...... while controlling for pre-deployment education and deployment-related variables. Method: Study linking prospective pre-deployment conscription board data with post-deployment self-reported data in 9695 Danish Army personnel deployed to different war zones in 1997-2013. The association between pre......-deployment cognitive ability and post-deployment PTSD was investigated using repeated-measure logistic regression models. Two models with cognitive ability score as the main exposure variable were created (model 1 and model 2). Model 1 was only adjusted for pre-deployment variables, while model 2 was adjusted for both...

  12. Deployment Experiences of British Army Wives Before, During and After Deployment: Satisfaction with Military Life and Use of Support Networks

    National Research Council Canada - National Science Library

    Dandeker, Christopher; French, Claire; Birtles, Catherine; Wessely, S

    2006-01-01

    Introduction and Aims: During deployments, Service wives have to adapt to being alone and taking sole responsibility for their families and house-holds whilst dealing with the additional stress about whether their loved ones will return...

  13. Telephone Support During Overseas Deployment for Military Spouses Formerly: Telephone Support During Deployment for OEF/OIF Spouses

    Science.gov (United States)

    2016-04-01

    Martin, 2000). Stress deployment symptoms differ by gender . Both men and women report significant distress and a sense of having no control over the...high. Spouses’ reactions to deployment may include emotional distress, loneliness , anticipatory fear or grief, somatic complaints, and depression. The...was no difference between arms in resilience or depression. Webinar participants significantly improved in anxiety and showed a trend toward improved

  14. Performance Analysis of MTD64, our Tiny Multi-Threaded DNS64 Server Implementation: Proof of Concept

    OpenAIRE

    Gábor Lencse

    2016-01-01

    In the current stage of IPv6 deployment, the combination of DNS64 and NAT64 is an important IPv6 transition technology, which can be used to enable IPv6 only clients to communicate with IPv4 only servers. In addition to the existing free software DNS64 implementations, we proposed a tiny multithreaded one, MTD64. In this paper, the performance of MTD64 is measured and compared to that of the industry standard BIND in order to check the correctness of the design concepts of MTD64, especiall...

  15. Desarrollo de un conjunto de aplicaciones para detección de ataques en redes IPv4/IPv6 utilizando Python

    OpenAIRE

    Melgar Jara, Erick Santiago

    2015-01-01

    El complejo mundo de la seguridad informática presenta novedades día a día y requiere que el auditor de red se encuentre en constante crecimiento profesional. Los auditores de seguridad suelen disponer de un kit de herramientas o aplicaciones para ejercer sus proyectos. El siguiente trabajo comprende en realizar una herramienta para dichos auditores de red los cuales necesitan detectar los múltiples ataques producidos por personas ajenas que desean perjudicar a los usuarios obteniendo su info...

  16. An ARM Mobile Facility Designed for Marine Deployments

    Science.gov (United States)

    Wiscombe, W. J.

    2007-05-01

    The U.S. Dept. of Energy's ARM (Atmospheric Radiation Measurements) Program is designing a Mobile Facility exclusively for marine deployments. This marine facility is patterned after ARM's land Mobile Facility, which had its inaugural deployment at Point Reyes, California, in 2005, followed by deployments to Niger in 2006 and Germany in 2007 (ongoing), and a planned deployment to China in 2008. These facilities are primarily intended for the study of clouds, radiation, aerosols, and surface processes with a goal to include these processes accurately in climate models. They are preferably embedded within larger field campaigns which provide context. They carry extensive instrumentation (in several large containers) including: cloud radar, lidar, microwave radiometers, infrared spectrometers, broadband and narrowband radiometers, sonde-launching facilities, extensive surface aerosol measurements, sky imagers, and surface latent and sensible heat flux devices. ARM's Mobile Facilities are designed for 6-10 month deployments in order to capture climatically-relevant datasets. They are available to any scientist, U.S. or international, who wishes to submit a proposal during the annual Spring call. The marine facility will be adapted to, and ruggedized for, the harsh marine environment and will add a scanning two-frequency radar, a boundary-layer wind profiler, a shortwave spectrometer, and aerosol instrumentation adapted to typical marine aerosols like sea salt. Plans also include the use of roving small UAVs, automated small boats, and undersea autonomous vehicles in order to address the point-to-area-average problem which is so crucial for informing climate models. Initial deployments are planned for small islands in climatically- interesting cloud regimes, followed by deployments on oceanic platforms (like decommissioned oil rigs and the quasi-permanent platform of this session's title) and eventually on large ships like car carriers plying routine routes.

  17. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  18. Standardization of transportation classes for object-oriented deployment simulations.

    Energy Technology Data Exchange (ETDEWEB)

    Burke, J. F., Jr.; Howard, D. L.; Jackson, J.; Macal, C. M.; Nevins, M. R.; Van Groningen, C. N.

    1999-07-30

    Many recent efforts to integrate transportation and deployment simulations, although beneficial, have lacked a feature vital for seamless integration: a common data class representation. It is an objective of the Department of Defense (DoD) to standardize all classes used in object-oriented deployment simulations by developing a standard class attribute representation and behavior for all deployment simulations that rely on an underlying class representation. The Extensive Hierarchy and Object Representation for Transportation Simulations (EXHORT) is a collection of three hierarchies that together will constitute a standard and consistent class attribute representation and behavior that could be used directly by a large set of deployment simulations. The first hierarchy is the Transportation Class Hierarchy (TCH), which describes a significant portion of the defense transportation system; the other two deal with infrastructure and resource classes. EXHORT will allow deployment simulations to use the same set of underlying class data, ensure transparent exchanges, reduce the effort needed to integrate simulations, and permit a detailed analysis of the defense transportation system. This paper describes EXHORT's first hierarchy, the TCH, and provides a rationale for why it is a helpful tool for modeling major portions of the defense transportation system.

  19. Automated Deployment of Advanced Controls and Analytics in Buildings

    Science.gov (United States)

    Pritoni, Marco

    Buildings use 40% of primary energy in the US. Recent studies show that developing energy analytics and enhancing control strategies can significantly improve their energy performance. However, the deployment of advanced control software applications has been mostly limited to academic studies. Larger-scale implementations are prevented by the significant engineering time and customization required, due to significant differences among buildings. This study demonstrates how physics-inspired data-driven models can be used to develop portable analytics and control applications for buildings. Specifically, I demonstrate application of these models in all phases of the deployment of advanced controls and analytics in buildings: in the first phase, "Site Preparation and Interface with Legacy Systems" I used models to discover or map relationships among building components, automatically gathering metadata (information about data points) necessary to run the applications. During the second phase: "Application Deployment and Commissioning", models automatically learn system parameters, used for advanced controls and analytics. In the third phase: "Continuous Monitoring and Verification" I utilized models to automatically measure the energy performance of a building that has implemented advanced control strategies. In the conclusions, I discuss future challenges and suggest potential strategies for these innovative control systems to be widely deployed in the market. This dissertation provides useful new tools in terms of procedures, algorithms, and models to facilitate the automation of deployment of advanced controls and analytics and accelerate their wide adoption in buildings.

  20. Post-deployment family violence among UK military personnel.

    Science.gov (United States)

    Kwan, Jamie; Jones, Margaret; Somaini, Greta; Hull, Lisa; Wessely, Simon; Fear, Nicola T; MacManus, Deirdre

    2017-12-19

    Research into violence among military personnel has not differentiated between stranger- and family-directed violence. While military factors (combat exposure and post-deployment mental health problems) are risk factors for general violence, there has been limited research on their impact on violence within the family environment. This study aims to compare the prevalence of family-directed and stranger-directed violence among a deployed sample of UK military personnel and to explore risk factors associated with both family- and stranger-directed violence. This study utilised data from a large cohort study which collected information by questionnaire from a representative sample of randomly selected deployed UK military personnel (n = 6711). The prevalence of family violence immediately following return from deployment was 3.6% and 7.8% for stranger violence. Family violence was significantly associated with having left service, while stranger violence was associated with younger age, male gender, being single, having a history of antisocial behaviour as well as having left service. Deployment in a combat role was significantly associated with both family and stranger violence after adjustment for confounders [adjusted odds ratio (aOR) = 1.92 (1.25-2.94), p = 0.003 and aOR = 1.77 (1.31-2.40), p violence both inside and outside the family environment and should be considered in violence reduction programmes for military personnel. Further research using a validated measurement tool for family violence would improve comparability with other research.

  1. Biomarkers of post-deployment resilience among military service members

    Directory of Open Access Journals (Sweden)

    Krista B. Highland

    2015-01-01

    Full Text Available The development of PTSD after military deployment is influenced by a combination of biopsychosocial risk and resilience factors. In particular, physiological factors may mark risk for symptom progression or resiliency. Research in civilian populations suggests elevated catecholamines after trauma are associated with PTSD months following the trauma. However, less is known regarding physiological markers of PTSD resilience among post-deployment service members (SM. We therefore assessed whether catecholamines obtained shortly after deployment were associated with combat-related PTSD symptoms three months later. Eighty-seven SMs completed the Clinician-Administered PTSD Scale for DSM-IV and blood draws within two months after return from deployment to Iraq or Afghanistan (“Time 1” or “T1” and three months later (“Time 2” or “T2”. Linear regression analyses demonstrated that lower norepinephrine at T1 was associated with lower PTSD symptoms at T2. In particular, T1 norepinephrine was positively associated with T2 symptom intensity and avoidance symptoms. The present findings represent a biologically-informed method of assessing PTSD resilience after deployment, which may aid clinicians in providing tailored treatments for those in the greatest need. Further research is needed to validate these findings and incorporate physiological measures within an assessment battery.

  2. Equipment compatibility and logistics assessment for containment foam deployment.

    Energy Technology Data Exchange (ETDEWEB)

    McRoberts, Vincent M.; Martell, Mary-Alena; Jones, Joseph A.

    2005-09-01

    The deployment of the Joint Technical Operations Team (JTOT) is evolving toward a lean and mobile response team. As a result, opportunities to support more rapid mobilization are being investigated. This study investigates three specific opportunities including: (1) the potential of using standard firefighting equipment to support deployment of the aqueous foam concentrate (AFC-380); (2) determining the feasibility and needs for regional staging of equipment to reduce the inventory currently mobilized during a JTOT response; and (3) determining the feasibility and needs for development of the next generation AFC-380 to reduce the volume of foam concentrate required for a response. This study supports the need to ensure that requirements for alternative deployment schemes are understood and in place to support improved response activities.

  3. Deployment of SIP in MANET: challenges and circumvention

    Directory of Open Access Journals (Sweden)

    Abdelhamid Salma R.

    2017-01-01

    Full Text Available The immense growth in wireless network applications has encouraged the researchers to enhance and propose new approaches that facilitate the deployment of the widely used services, protocols, and applications of the wired networking area in the wireless networks. Among which, the Session Initiation Protocol (SIP is a signaling protocol that allows the establishment of multimedia sessions and calls between different parties. SIP functionality totally depends on a centralized infrastructure, and complexity arises when deploying such a protocol in a special type of wireless networks, namely Mobile Ad-hoc Networks (MANET, due to the absence of a centralized infrastructure, and the dynamic topology of the later. This paper highlights the the challenges arising when deploying SIP in MANETs and presents an overview of different proposed approaches to overcome these challenges.

  4. Sensorineural Hearing Loss due to Air Bag Deployment

    Directory of Open Access Journals (Sweden)

    Masafumi Ohki

    2012-01-01

    Full Text Available Deployment of the air bag in a passenger vehicle accident rarely causes otologic injuries. However, sensorineural hearing loss induced by air bag deployment is extremely rare, with only a few cases reported in the English literature. A 38-year-old man involved in a traffic accident while driving his car at 40 km/hour presented with right sensorineural hearing loss and tinnitus, without associated vertigo. Pure-tone audiometry demonstrated elevated thresholds of 30 dB and 25 dB at 4 kHz and 8 kHz, respectively, on the right side. Air bag deployment in car accidents is associated with the risk of development of sensorineural hearing loss.

  5. A tape-spring hexapod for deployable telescopes: dynamics

    Science.gov (United States)

    Blanchard, L.; Aridon, G.; Falzon, F.; Rémond, D.; Dufour, R.

    2017-11-01

    An hexapod based telescope concept whose legs are deployable has been investigated in order to stow the secondary mirror during launch and to self-deploy it in orbit The main advantages of this concept are: a reduced volume for launch with high reduction of passive stability requirements, mass and inertia reduction inducing an agility gain. The positioning errors are corrected thanks to the vertical displacement of the hexapod feet and the final optical performance is reached thanks to adaptive optics. The paper presents the first steps towards the optimal design of a breadboard and the method developed to model the dynamic behaviour of such a structure with highly deformed flexible elements and validated with the results of sine vibration testing of the hexapod. The following part deals with the evaluation of its deployment and correction capabilities.

  6. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  7. Vibration characteristics of a deployable controllable-geometry truss boom

    Science.gov (United States)

    Dorsey, J. T.

    1983-01-01

    An analytical study was made to evaluate changes in the fundamental frequency of a two dimensional cantilevered truss boom at various stages of deployment. The truss could be axially deployed or retracted and undergo a variety of controlled geometry changes by shortening or lengthening the telescoping diagonal members in each bay. Both untapered and tapered versions of the truss boom were modeled and analyzed by using the finite element method. Large reductions in fundamental frequency occurred for both the untapered and tapered trusses when they were uniformly retracted or maneuvered laterally from their fully deployed position. These frequency reductions can be minimized, however, if truss geometries are selected which maintain cantilever root stiffness during truss maneuvers.

  8. Deployment of the ATLAS High-Level Triggers

    CERN Document Server

    Anjos, A; Baines, J T M; Beck, H P; Bee, C P; Biglietti, M; Bogaerts, J A C; Bosman, M; Burckhart, Doris; Caprini, M; Caron, B; Casado, M P; Cataldi, G; Cavalli, D; Ciobotaru, M; Comune, G; Conde, P; Corso-Radu, A; Crone, G; Damazio, D; De Santo, A; Díaz-Gómez, M; Di Mattia, A; Dobson, M; Ellis, Nick; Emeliyanov, D; Epp, B; Falciano, S; Ferrari, R; Francis, D; Gadomski, S; Gameiro, S; Garitaonandia, H; George, S; Ghete, V; Goncalo, R; Gorini, B; Gruwé, M; Haeberli, C; Haller, J; Joos, M; Kabana, S; Kazarov, A; Khomich, A; Kilvington, G; Kirk, J; Kolos, S; Konstantinidis, N P; Kootz, A; Lankford, A; Lehmann, G; Lowe, A; Luminari, L; Maeno, T; Masik, J; Meirosu, C; Meessen, C; Mello, A G; Moore, R; Morettini, P; Negri, A; Nikitin, N; Nisati, A; Osuna, C; Padilla, C; Panikashvili, N; Parodi, F; Pasqualucci, E; Pérez-Réale, V; Petersen, J; Pinfold, J L; Pinto, P; Qian, Z; Resconi, S; Rosati, S; Sánchez, C; Santamarina-Rios, C; Scannicchio, D A; Schiavi, C; Segura, E; Seixas, J M; Sivoklokov, S Yu; Sloper, J; Sobreira, A; Soloviev, I; Soluk, R A; Stancu, S; Stefanidis, E; Sushkov, S; Sutton, M; Tapprogge, S; Tarem, S; Thomas, E; Touchard, F; Tremblet, L; Ünel, G; Usai, G; Vandelli, Wainer R; Venda-Pinto, B; Ventura, A; Vercesi, V; Wengler, T; Werner, P; Wheeler, S J; Wickens, F J; Wiedenmann, W; Wielers, M; Wiesmann, M; Yasu, Y; Zobernig, G; 14th IEEE - NPSS Real Time Conference 2005 Nuclear Plasma Sciences Society

    2005-01-01

    The ATLAS combined test beam in the second half of 2004 saw the first deployment of the ATLAS High-Level Triggers (HLT). The next steps are deployment on the pre-series farms in the experimental area during 2005, commissioning and cosmics tests in 2006 and collisions in 2007. This paper reviews the experience gained in the test beam, describes the current status and discusses the further enhancements to be made. We address issues related to the dataflow, selection algorithms, testing, software distribution, installation and improvements.

  9. Software, component, and service deployment in computational Grids

    International Nuclear Information System (INIS)

    von Laszewski, G.; Blau, E.; Bletzinger, M.; Gawor, J.; Lane, P.; Martin, S.; Russell, M.

    2002-01-01

    Grids comprise an infrastructure that enables scientists to use a diverse set of distributed remote services and resources as part of complex scientific problem-solving processes. We analyze some of the challenges involved in deploying software and components transparently in Grids. We report on three practical solutions used by the Globus Project. Lessons learned from this experience lead us to believe that it is necessary to support a variety of software and component deployment strategies. These strategies are based on the hosting environment

  10. Market deployment strategies for photovoltaics: an international review

    International Nuclear Information System (INIS)

    Haas, R.

    2003-01-01

    In the last decade of the 20th century a wide variety of deployment strategies and dissemination programmes for grid-connected PV systems in the built environment has been launched by quite different organizations and institutions. Governmental bodies on national and local levels have launched strategies, as have electric utilities and NGOs. The core objective of this paper is to document and evaluate the most important past and current market deployment strategies for the broader dissemination of grid-connected PV systems in the built environment. (author)

  11. Deployment of vendor innovation capability in contract electronic manufacturing

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Mefford, Robert N.

    2012-01-01

    This paper explores deployment of innovation capability in outsourcing from the vendor perspective. Vendor’s innovation-related competences are used to capture vendor innovativeness. A multiple-case study was applied with two Contract Electronic Manufacturers. Based on the data analysis we propose...... a model for calculating a vendor’s innovation potential measured by the deployment effect of innovation-related competences. The model suggests that a vendor’s innovation potential will be higher if it fosters innovation capability as a distinctive competitive advantage than if it develops innovation...... capability as an adjunct to other capabilities....

  12. A CubeSat deployable solar panel system

    Science.gov (United States)

    McGuire, Thomas; Hirsch, Michael; Parsons, Michael; Leake, Skye; Straub, Jeremy

    2016-05-01

    The power usage of CubeSat's onboard systems has increased with the complexity of the systems included. This paper presents a deployment system design which creates a plane of solar panels to collect energy. This allows more panels to be in direct normal sunlight at any given point (in conjunction with the onboard attitude determination and control system), facilitating increased power generation. The deployable system is comprised of a printed circuit board (holding the solar cells) which is attached to an aluminum hinge. The efficacy of this approach for power generation and its simplicity, as compared to other prospective approaches, are assessed herein.

  13. Base Station Antenna Pattern Distortion in Practical Urban Deployment Scenarios

    DEFF Research Database (Denmark)

    Rodriguez Larrad, Ignacio; Nguyen, Huan Cong; Sørensen, Troels Bundgaard

    2014-01-01

    In real urban deployments, base station antennas are typically not placed in free space conditions. Therefore, the radiation pattern can be affected by mounting structures and nearby obstacles located in the proximity of the antenna (near-field), which are often not taken into consideration. Also...... presents a combination of near-field and far-field simulations aimed to provide an overview of the distortion experienced by the base station antenna pattern in two different urban deployment scenarios: rooftop and telecommunications tower. The study illustrates how, in comparison with the near...

  14. Deployment of Mobile Learning Course Materials to Android Powered Mobile Devices

    Science.gov (United States)

    Chao, Lee

    2012-01-01

    The objective of this article is to facilitate mobile teaching and learning by providing an alternative course material deployment method. This article suggests a course material deployment platform for small universities or individual instructors. Different from traditional course material deployment methods, the method discussed deploys course…

  15. Connected Vehicle Pilot Deployment Program phase 1 : comprehensive deployment plan : New York City : volume 1 : technical application : part I : technical and management approach.

    Science.gov (United States)

    2016-08-01

    This document describes the Deployment Plan for the New York City Department of Transportation (NYC) Connected Vehicle Pilot Deployment (CVPD) Project. This plan describes the approach to complete Phase 2 Design/Build/Test, and Phase 3 Operate and Ma...

  16. IEA Wind Task 23 Offshore Wind Technology and Deployment. Subtask 1 Experience with Critical Deployment Issues. Final Technical Report

    DEFF Research Database (Denmark)

    Lemming, Jørgen Kjærgaard

    The final report for IEA Wind Task 23, Offshore Wind Energy Technology and Deployment, is made up of two separate reports: Subtask 1: Experience with Critical Deployment Issues and Subtask 2: Offshore Code Comparison Collaborative (OC3). The Subtask 1 report included here provides background...... information and objectives of Task 23. It specifically discusses ecological issues and regulation, electrical system integration and offshore wind, external conditions, and key conclusions for Subtask 1. The Subtask 2 report covers OC3 background information and objectives of the task, OC3 benchmark exercises...

  17. Design of a deployment rotation mechanism for microsatellite

    NARCIS (Netherlands)

    Abdelal, G.F.; Bakr Elhady, A.; Kassab, M.

    2009-01-01

    Solar array rotation mechanism provides a hinged joint between the solar panel and satellite body, smooth rotation of the solar array into deployed position and its fixation in this position. After unlocking of solar panel (while in orbit), rotation bracket turns towards ready-to-work position under

  18. Port-Hamiltonian approach to deployment on a line

    NARCIS (Netherlands)

    Vos, Ewoud; Scherpen, Jacquelien M.A.; van der Schaft, Abraham

    2012-01-01

    In this talk we present a port-Hamiltonian approach to the deployment on a line of a robotic sensor network (see e.g. [3] for related work). Using the port-Hamiltonian modelling framework has some clear benefits. Including physical interpretation of the model, insight in the system’s energy and

  19. Deployment of Ahmadu Bello University Zaria, Nigeria Institutional ...

    African Journals Online (AJOL)

    Deployment of Ahmadu Bello University Zaria, Nigeria Institutional Digital Repository. ... that repositories are very important to universities in helping them showcase, manage and capture their intellectual assets as a part of their information service strategy and contribution to universal access to knowledge and information.

  20. Post-deployment usability evaluation of a radiology workstation

    NARCIS (Netherlands)

    Jorritsma, Wiard; Cnossen, Fokie; Dierckx, Rudi A.; Oudkerk, Matthijs; Van Ooijen, Peter M. A.

    Objectives: To determine the number, nature and severity of usability issues radiologists encounter while using a commercially available radiology workstation in clinical practice, and to assess how well the results of a pre-deployment usability evaluation of this workstation generalize to clinical

  1. Role of ENT Surgeon in Managing Battle Trauma During Deployment.

    Science.gov (United States)

    Rajguru, Renu

    2013-01-01

    With technological improvements in body armour and increasing use of improvised explosive devices, it is the injuries to head, face and neck are the cause for maximum fatalities as military personnel are surviving wounds that would have otherwise been fatal. The priorities of battlefield surgical treatment are to save life, eyesight and limbs and then to give the best functional and aesthetic outcome for other wounds. Modern day battlefields pose unique demands on the deployed surgical teams and management of head and neck wounds demands multispecialty approach. Optimal result will depend on teamwork of head and neck trauma management team, which should also include otolaryngologist. Data collected by various deployed HFN surgical teams is studied and quoted in the article to give factual figures. Otorhinolaryngology becomes a crucial sub-speciality in the care of the injured and military otorhinolaryngologists need to be trained and deployed accordingly. The otolaryngologist's clinical knowledge base and surgical domain allows the ENT surgeon to uniquely contribute in response to mass casualty incident. Military planners need to recognize the felt need and respond by deploying teams of specialist head and neck surgeons which should also include otorhinolaryngologists.

  2. Novel Deployment Mechanism for Conventional Solar Array Enhancement

    Directory of Open Access Journals (Sweden)

    Hodgetts Paul A.

    2017-01-01

    Full Text Available A novel mechanism is described, by which flexible blankets could be deployed from existing solar panel designs. These blankets could be covered with flexible cells, or they could be reflective films to form a concentrator array. Either way, the performance of an existing array design could be enhanced.

  3. Facilitating ICN deployment with an extended open flow protocol

    NARCIS (Netherlands)

    Zuraniewski, P.; Adrichem, N. van; Ravesteijn, D.; IJntema, W.; Papadopoulos, C.; Fan, C.

    2017-01-01

    Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The

  4. Abstraction Layer For Development And Deployment Of Cloud Services

    Directory of Open Access Journals (Sweden)

    Binh Minh Nguyen

    2012-01-01

    Full Text Available In this paper, we will present an abstraction layer for cloud computing, which intends to simplify the manipulation with virtual machines in clouds for easy and controlled development and deployment of cloud services. It also ensures interoperability between different cloud infrastructures and allows developers to create cloud appliances easily via inheritance mechanisms.

  5. Emergent Behavior in Massively-Deployed Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ekaterina Shurkova

    2008-01-01

    Full Text Available The phenomenal advances in MEMS and nanotechnology make it feasible to build small devices, referred to as sensors that are able to sense, compute and communicate over small distances. The massive deployment of these small devices raises the fascinating question of whether or not the sensors, as a collectivity, will display emergent behavior, just as living organisms do. In this work we report on a recent effort intended to observe emerging behavior of large groups of sensor nodes, like living cells demonstrate. Imagine a massive deployment of sensors that can be in two states "red" and "blue". At deployment time individual sensors have an initial color. The goal is to obtain a uniform coloring of the deployment area. Importantly, the sensors can only talk to sensors that are one-hop away from them. The decisions to change colors are local, based on what the sensors can infer from collecting color information from their neighbors. We have performed extensive simulations involving 20,000 sensors in an area of 100 m × 100 m. Our simulation results show that the sensor network converges to a stable uniform coloring extremely fast.

  6. British International Schools: The Deployment and Training of Teaching Assistants

    Science.gov (United States)

    Tarry, Estelle

    2011-01-01

    This article reports on research carried out on behalf of the Council of British International Schools (COBIS) as to the role and deployment of British international school teaching assistants. Through questionnaires and a follow up open discussion with headteachers from British international schools it was found that, due to the differing…

  7. Does mental health stigma change across the deployment cycle?

    Science.gov (United States)

    Steenkamp, Maria M; Boasso, Alyssa M; Nash, William P; Litz, Brett T

    2014-12-01

    Prior research on mental health stigma in military personnel has been cross-sectional. We prospectively examined the course of perceived mental health stigma in a cohort of deployed U.S. combat Marines. Participants (N = 768) were assessed 1 month before a 7-month deployment to Afghanistan, and again at 1, 5, and 8 months postdeployment. We also examined three predictors of the course of stigma: post-traumatic stress disorder symptom severity, vertical and horizontal unit cohesion, and mental health treatment utilization while deployed. Perceptions of stigma remained largely stable across the deployment cycle, with latent growth curve analyses revealing a statistically significant but small decrease in stigma over time. Lower post-traumatic stress disorder symptoms and greater perceived vertical and horizontal support predicted decreases in stigma over time, whereas mental health treatment utilization in theater did not predict the course of stigma. Perceived stigma was low and largely stable over time. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  8. The ‘Deployment of Extra Processing’ Account of Attention

    DEFF Research Database (Denmark)

    Fazekas, Peter; Nanay, Bence

    2015-01-01

    The paper formulates an alternative view about the core function of attention claiming that attention is not selection but the deployment of extra processing capacity. This way of thinking about attention has greater explanatory power, since it proposes a common implementation both for selection...... and modulatory effects, and it offers a unificatory perspective on the workings of perception and cognition....

  9. Book Review: Deployment Psychology: Evidence-based strategies ...

    African Journals Online (AJOL)

    Book Review: Deployment Psychology: Evidence-based strategies to promote mental health in the Military. AB Adler, PD Bliese, CA Castro. Abstract. Washington, DC: American Psychological Association 2011 294 pages ISBN-13: 978-1-4338-0881-4. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  10. Energy storage deployment and innovation for the clean energy transition

    Science.gov (United States)

    Kittner, Noah; Lill, Felix; Kammen, Daniel M.

    2017-09-01

    The clean energy transition requires a co-evolution of innovation, investment, and deployment strategies for emerging energy storage technologies. A deeply decarbonized energy system research platform needs materials science advances in battery technology to overcome the intermittency challenges of wind and solar electricity. Simultaneously, policies designed to build market growth and innovation in battery storage may complement cost reductions across a suite of clean energy technologies. Further integration of R&D and deployment of new storage technologies paves a clear route toward cost-effective low-carbon electricity. Here we analyse deployment and innovation using a two-factor model that integrates the value of investment in materials innovation and technology deployment over time from an empirical dataset covering battery storage technology. Complementary advances in battery storage are of utmost importance to decarbonization alongside improvements in renewable electricity sources. We find and chart a viable path to dispatchable US$1 W-1 solar with US$100 kWh-1 battery storage that enables combinations of solar, wind, and storage to compete directly with fossil-based electricity options.

  11. Deployment of Recommender Systems: Operational and Strategic Issues

    Science.gov (United States)

    Ghoshal, Abhijeet

    2011-01-01

    E-commerce firms are increasingly adopting recommendation systems to effectively target customers with products and services. The first essay examines the impact that improving a recommender system has on firms that deploy such systems. A market with customers heterogeneous in their search costs is considered. We find that in a monopoly, a firm…

  12. Evaluation and Deployment of Rice Genotypes Resistant to Rice ...

    African Journals Online (AJOL)

    Evaluation and Deployment of Rice Genotypes Resistant to Rice Yellow Mottle Virus Disease in the Southern Highlands of Tanzania. ... Susceptible cultivars recorded up to 75% reduction in height and death of plants whereas those resistant had mild symptoms and negligible plant height reduction. Highly resistant ...

  13. How Have Deployments During the War on Terrorism Affected Reenlistment?

    Science.gov (United States)

    2009-01-01

    2007, p. A25. Castaneda, Laura Werber, Margaret C. Harrell, Danielle M. Varda, Kimberly Curry Hall, Megan K. Beckett , and Stefanie Stern, Deployment...As of April 6, 2009: http://www.rand.org/pubs/monograph_reports/MR1556/ Fricker, Ronald D., and Samuel E. Buttrey, Assessing the Effects of

  14. Quality function deployment in the food industry: a review

    NARCIS (Netherlands)

    Costa, A.I.A.; Dekker, M.; Jongen, W.M.F.

    2001-01-01

    This paper presents a detailed literature review on the topic of the application of quality function deployment (QFD) in the food industry. This review is extended with a thorough description of the methodologies involved in the practice of QFD within food companies, exemplified with the help of a

  15. Implications of Privatizing U.S Marine Deployed Tactical Telecommunications

    Science.gov (United States)

    2012-05-01

    Scope: To provide the first of two knowledge and skill areas required to effectively deploy the SWAN-D VSAT terminal. The first half o this 10...will be able to configure the networking equipment within a SWAN-D VSAT terminal to pass NIPR/SIPR data, voice and video traffic to distant end

  16. Strategies for Power Line Communications Smart Metering Network Deployment

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2014-04-01

    Full Text Available Smart Grids are becoming a reality all over the world. Nowadays, the research efforts for the introduction and deployment of these grids are mainly focused on the development of the field of Smart Metering. This emerging application requires the use of technologies to access the significant number of points of supply (PoS existing in the grid, covering the Low Voltage (LV segment with the lowest possible costs. Power Line Communications (PLC have been extensively used in electricity grids for a variety of purposes and, of late, have been the focus of renewed interest. PLC are really well suited for quick and inexpensive pervasive deployments. However, no LV grid is the same in any electricity company (utility, and the particularities of each grid evolution, architecture, circumstances and materials, makes it a challenge to deploy Smart Metering networks with PLC technologies, with the Smart Grid as an ultimate goal. This paper covers the evolution of Smart Metering networks, together with the evolution of PLC technologies until both worlds have converged to project PLC-enabled Smart Metering networks towards Smart Grid. This paper develops guidelines over a set of strategic aspects of PLC Smart Metering network deployment based on the knowledge gathered on real field; and introduces the future challenges of these networks in their evolution towards the Smart Grid.

  17. Financial Services and the Deployment of Agricultural Innovations in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As partners of farmers' associations and small agri-businesses, financial cooperatives can play an important role in the adoption of agricultural innovations by providing relevant financial services. This project will test the ability of financial services to support the deployment and large-scale adoption of innovations ...

  18. Designing and Deploying 3D Collaborative Games in Education

    Science.gov (United States)

    Mavridis, Apostolos; Tsiatsos, Thrasyvoulos; Terzidou, Theodouli

    2016-01-01

    This paper focuses on methodologies of serious games deployment and evaluation. Particularly, this study will present a specific category of serious games that are based on Collaborative Virtual Environments and they aim to support Collaborative Learning. We call these serious games Collaborative Virtual Educational Games (CVEG). The paper aims to…

  19. Development of a Device to Deploy Fluid Droplets in Microgravity

    Science.gov (United States)

    Robinson, David W.; Chai, An-Ti

    1997-01-01

    A free-floating droplet in microgravity is ideal for scientific observation since it is free of confounding factors such as wetting and nonsymmetrical heat transfer introduced by contact with surfaces. However, the technology to reliably deploy in microgravity has not yet been developed. In some recent fluid deployment experiments, droplets are either shaken off the dispenser or the dispenser is quickly retracted from the droplet. These solutions impart random residual motion to deployed droplet, which can be undesirable for certain investigations. In the present study, two new types of droplet injectors were built and tested. Testing of the droplet injectors consisted of neutral buoyancy tank tests, 5-sec drop tower tests at the NASA Lewis Zero Gravity Facility, and DC-9 tests. One type, the concentric injector, worked well in the neutral buoyancy tank but did not do well in low-gravity. However, it appeared that it makes a fine apparatus for constructing bubbles in low-gravity conditions. The other type, the T-injector, showed the most promise for future development. In both neutral buoyancy and DC-9 tests, water droplets were formed and deployed with some control and repeatability, although in low-gravity the residual velocities were higher than desirable. Based on our observations, further refinements are suggested for future development work.

  20. A demonstration of mobile phone deployment to support the ...

    African Journals Online (AJOL)

    Background: Benefits of mobile phone deployment for children <5 in low resource settings remain unproven. The target population of the current demonstration study in Bushenyi District, Uganda, presented with acute fever, pneumonia, or diarrhoea and were treated by community health workers (CHWs) providing ...