WorldWideScience

Sample records for ipv6 deployment activities

  1. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  2. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  3. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  4. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  5. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  6. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  7. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    gaming, and many other new applications cost even higher to be deployed on IPv4 ... mitigate the effects of the imminent depletion of the IPv4 address space and .... The government of Korea plans to achieve complete IPv6 transition in the.

  8. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  9. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  10. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  11. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  12. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  13. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  14. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  15. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  16. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  17. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  18. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  19. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  20. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  1. IPv6-protokolla

    OpenAIRE

    Hautanen, Jukka-Pekka

    2012-01-01

    Tämän työn tarkoituksena on tutkia IPv6-protokollaa ja IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työn alussa tarkastellaan IPv6-protokollan historiaa ja tämän hetkistä levinneisyyttä. Työssä paneudutaan tarkemmin IPv6-protokollan pääpiirteisiin: IPv6-protokollan osoitetyypit ja niiden esitystavat, aliverkotus, IPv6-protokollan uudistetun otsikon rakenne ja uudet lisäotsikot. Edellä mainittuja pääpiirteitä verrataan tarvittaessa IPv4-protokollaan, jotta nähdään parannukset...

  2. IPv6:n tietoturvaominaisuudet

    OpenAIRE

    Sorsa, Kari

    2013-01-01

    Opinnäytetyön tavoitteena on esitellä IPv6-protokolla ja selvittää sen tärkeimmät tietoturvaominaisuudet ja -riskit. Työtä tullaan käyttämään teoreettisena apuna Turun Ammattikorkeakoulun Lemminkäisenkadun toimipisteen laboratorioverkon siirtämisessä IPv6:een. Opinnäytetyö on jaettu kolmeen osaan. Ensimmäisessä esitellään lyhyesti IPv6:n historia ja kehitysvaiheet sekä uuden protokollan ominaisuudet. Toinen osa koostuu ominaisuus- ja tietoturvavertailusta IPv4:n ja IPv6:n välillä, jo...

  3. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  4. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  5. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  6. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  7. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  8. IPv6 geolokace a vizualizace

    OpenAIRE

    Suchomel, Tomáš

    2011-01-01

    Tato diplomová práce se zabývá problematikou geolokace IPv6 adres a vizualizace jejich lokalit. Má za úkol prozkoumat oblast IPv6, dále porovnává současné přístupy ke geolokaci. Jejím hlavním cílem je vybudovat systém, který dokáže vytvořit geolokační databázi s pravidelnou aktualizací a který bude schopen zobrazit geografickou lokalitu IPv6 adresy na světové mapě. Geolokační systém nejprve získá geografické adresy pro jednotlivé prefixy IPv6 z veřejně přístupného systému Whois. Tyto adresy t...

  9. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  10. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  11. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  12. A Brief History of MPLS Usage in IPv6

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2016-01-01

    Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is st...

  13. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  14. Esimerkkiyrityksen IPv6-lähiverkko

    OpenAIRE

    Palkki, Ville

    2013-01-01

    Insinöörityön tavoitteena oli suunnitella ja toteuttaa esimerkkiyrityksen IPv6-lähiverkko. Toisena tavoitteena oli suunnitella esimerkkiyrityksen siirtyminen IPv4-protokollasta IPv6-protokollaan. Työssä käsiteltiin IPv6-protokollaa ensin teoreettisesti ja tämän jälkeen suunniteltiin sekä rakennettiin toimiva IPv6-lähiverkko. Aluksi työssä käytiin läpi IPv6-protokollan etuja verrattuna vanhaan IPv4-protokollaan. Teoriaosuudessa selvitettiin myös IPv6-protokollan rakennetta ja lähetysformaa...

  15. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  16. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  17. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  18. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  19. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  20. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when...

  1. Current Status of IPv6 Management

    OpenAIRE

    Astic , Isabelle; Festor , Olivier

    2002-01-01

    Nowadays, we are at an important time of the development of the IPv6 (Internet Protocol version 6) network. Until now, this protocol was used only between IPv6 «islands». These islands were connected by IPv4 (Internet Protocol version 4) networks. So the transport of IPv6 packets was made through IPv4 ones, or into MPLS (MultiProtocol Label Switching) tunnels. Now, that real IPv6 native equipment appears, it is possible to create real native IPv6 networks.Because in these networks, IPv4 does ...

  2. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  3. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    39 List of References 43 Initial Distribution List 47 vii THIS PAGE INTENTIONALLY LEFT BLANK viii List of Figures Figure 1.1 Google User IPv6 Adoption...2 Figure 1.1: Google User IPv6 Adoption Statistics, from June 2014 [3] For example, as a result of expanding use of IPv6, it is hypothesized that a...excessive annoyance of poorly crafted advertising emails, they can sometimes contain attachments or links to scam offers, phishing attempts, or malicious

  4. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  5. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    ground truth datasets. In doing so, we investigate the following: • What is the accuracy of CBG when geolocating IPv6 hosts? • What are the accuracy...the overall PL is shorter for IPv6 than IPv4 which is consistent to what was found in recent work discussed in Section 3.5. Note that the average PL...growth of IPv6 addresses has increased significantly since 2010.The rate of increase of IPv6 usage is expected to continue; thus the need to determine

  6. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  7. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  8. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  9. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  10. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  11. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  12. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  13. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  14. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  15. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  16. Siirtyminen IPv6-protokollaan yrityksen verkkolaitteistossa

    OpenAIRE

    Lindén, Kalle

    2012-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, mitä muutoksia Päijät-Hämeen koulutuskonsernin (PHKK) tietoverkon runkolaitteissa tarvitsee tehdä, jotta voidaan ottaa IPv6-protokolla käyttöön. Siirtyminen IPv6-protokollaan tulee olemaan välttämätön toimenpide, koska IPv4-protokollasta loppuvat uudet yksilölliset osoitteet. IPv4- ja IPv6-protokollien suurimmat erot ovat osoitekentän koon kasvaminen 32 bitistä 128 bittiin. Aluksi IPv4-osoitteistuksessa oli käytössä luokallinen osoitejärjest...

  17. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  18. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far t...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses.......The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...

  19. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  20. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  1. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  2. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  3. A Literature Survey on Handoff for Mobile IPv6

    OpenAIRE

    Zongpu Jia; Gaolei Wang; Ran Zhao

    2011-01-01

    With the development of network technology, IPv6 will be widely used in the next generation Internet, IPv6 will be used in the next generation Internet, IPv6 could combine mobile networks and fixed wireless networks closely, which brings great convenience to people’s live. The handoff delay of Mobile IPv6 seriously affected the real-time communication service quality, therefore various improvement methods based on the basic Mobile IPv6 protocol are proposed. The working principle of Mob...

  4. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  5. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  6. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  7. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  8. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  9. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  10. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  11. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  12. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  13. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  14. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  15. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  16. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  17. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  18. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  19. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  20. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  1. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  2. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  3. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  4. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  5. RIPng- A next Generation Routing Protocal (IPv6) | Falaye | Journal ...

    African Journals Online (AJOL)

    ... Information Protocol Next Generation (RIPng) owing to the current depletion rate of IPv4. ... that support the Internet Protocol Version 6 (IPv6).addressing scheme. ... A brief history is given; its various versions are discussed, and detailed ...

  6. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  7. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  8. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  9. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  10. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  11. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  12. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  13. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  14. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  15. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  16. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  17. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  18. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  19. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  20. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  1. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Science.gov (United States)

    2010-09-17

    ... importance of the Internet to U.S. innovation, prosperity, education, and political and cultural life, NTIA... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Internet..., the U.S. Government, and the Internet Economy AGENCY: National Telecommunications and Information...

  2. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  3. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  4. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  5. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  6. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  7. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  8. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  9. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  10. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  11. CORPORATE MIGRATION FROM IPv4 TO IPv6 USING DIFFERENT TRANSITION MECHANISMS

    OpenAIRE

    Nellore Karthikeyan*, K.Chandra Mouli

    2016-01-01

    Currently, the Internet world is confronting the huge issue that is exhaustion of IP addresses with the IPv4 protocol. This paper contains the imperative hypothetical ideas of new era Internet Protocol IPv6 which tackles the issue of IP tending to furthermore concentrate on IPv6 address design, directing and three mechanisms of migration from IPv4 to IPv6 system: Dual Stack, Translation and Tunneling utilizing Network Simulator as Packet tracer. This paper more accentuation on network migrati...

  12. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  13. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  14. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  15. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  16. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  17. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  18. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  19. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  20. IPv6:n käyttöönotto PK-yrityksessä

    OpenAIRE

    Salonen, Arttu Petteri

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, kuinka IPv6-yhteydet otetaan käyt-töön PK-yrityksessä. Työssä selvitetään minkälaiset vaatimukset IPv6 asettaa lait-teistolle ja minkälaisia käytännön asioita yrityksen täytyy huomioida IPv6:n käyt-töönotossa. Lisäksi työssä on laboratoriosimulaation avulla havainnollistettu eri käyt-töjärjestelmien tukea IPv6:lle ja käyttöönottoon liittyviä reititin- ja osoitekonfiguraati-oita. Käyttöönoton lisäksi opinnäytetyössä esitellään IPv6-protokoll...

  1. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  2. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  3. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  4. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  5. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  6. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  7. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  8. IPv4 to IPv6 Transition: Optimal Routing Protocol within Dual Stack and Tunneling

    OpenAIRE

    Aparna Sivaprakash; S. Kayalvizhi

    2016-01-01

    The number of global internet users has been growing exponentially, necessitating a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet the current requirement for IP addresses. To meet the future IP address requirement, a new version IPv6 has been introduced since 1999. However IPv6 is not backward compatible with IPv4.since it is not possible to migrate all the networking devices to ...

  9. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  10. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  11. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  12. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  13. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  14. Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter

    OpenAIRE

    Andersson, David

    2012-01-01

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.   Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då...

  15. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  16. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  17. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  18. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  19. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  20. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  1. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  2. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  3. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  4. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  5. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  6. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  7. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  8. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  9. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  10. Estudi d'implantació de la IPv6 al CTTC

    OpenAIRE

    Escoda Ramon, Jordi

    2017-01-01

    In recent years, the number of devices connected to Internet has increased exponentially and in fact, it is estimated that the demand keep on increasing. When IPv4 protocol was introduced, this evolution was not expected. Over the years several limitations have arosen, including scalability and the unsustainable growth of the Internet routing table. In the late 90s, IPv6 protocol was defined to solve these issues and add new features. Currently, the Centre Tecnològic de Telecomunicacions de C...

  11. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  12. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  13. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  14. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  15. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  16. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  17. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  18. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  19. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  20. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  1. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  2. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  3. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  4. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  5. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  6. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  7. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  8. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  9. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  10. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  11. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  12. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  13. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  14. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  15. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  16. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  17. Implantación de IPv6 : red, mecanismos de transición IPv4-IPv6, servicios de aplicación y migración de aplicaciones

    OpenAIRE

    Rodríguez Hervella, Juan Francisco

    2003-01-01

    El presente proyecto fin de carrera trata los aspectos más importantes de la gestión y migración de las redes IP hacia el nuevo protocolo de red IPv6 y pone gran énfasis en experiencias de implantación de los mismos. A lo largo de este proyecto se profundiza sobre los distintos mecanismos de transición IPv4/IPv6 existentes, concretamente se describen y se prueban (en entornos Linux y FreeBSD) los siguientes: .Túneles 6t04, automáticos, configurados. .Mecanismo DSTM, TRT, ISATAP, NAT-PT. Tambi...

  18. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  19. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  20. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  1. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  2. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  3. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  4. Modelování IPv6 v prostředí OMNeT++

    OpenAIRE

    Černý, Marek

    2011-01-01

    OMNeT++ je diskrétní simulátor hojně používaný k vytváření nejrůznějších síťových simulací. Lze jej dále rozšířit např. frameworkem INET, který obsahuje modely protokolů a zařízení z prostředí TCP/IP síti. V této práci se soustředíme na zkoumání současných možností balíku INET modelovat internetový protokol verze 6. Obzvláště se zaměřujeme na podporu směrování. V rámci implementace pak byly vytvořeny moduly dual-stack směrovače a dual-stack klienta s podporou manuální i automatické IPv6 adres...

  5. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  6. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  7. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  8. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  9. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  10. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  11. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  12. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  13. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    Science.gov (United States)

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  14. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    Science.gov (United States)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  15. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  16. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  17. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  18. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  19. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  20. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  1. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  2. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  3. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  4. High-Frequency Mapping of the IPV6 Internet Using YARRP

    Science.gov (United States)

    2017-03-01

    Network CIDR Classless Inter-Domain Routing DNS Domain Name System HMAC Hashed Message Authentication Code HTTP Hypertext Transfer Protocol IANA...is connected (i.e., the interconnection of the routers that make up the network). Topology mapping can be conducted through either passive or active...means. In passive topology mapping, inferences are made about network connections based on data-plane traffic observed at specific points such as web

  5. Daddy's Days Away. A Deployment Activity Book for Parents & Children.

    Science.gov (United States)

    Marine Corps, Washington, DC.

    This booklet grew from an idea that the children of Marines might appreciate some special discussion of their family's separation during deployment. Information is provided for parents to help them express their feelings with their children about the deployment. Outlines of activities to do before leaving are included. Suggestions are given for…

  6. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  7. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  8. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  9. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  10. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  11. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  12. Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti směrování

    OpenAIRE

    Filip, Tomáš

    2015-01-01

    This master thesis deals with integration of IPv6 network protocol into production computer network of Mendel University in Brno in the routing field. The integration includes the Dual Stack transition mechanism, IPv6 address plan, static routing at the perimeter of the university network, and OSPFv3 and MP-BGP routing protocols. Proposed integration plan was verified in the Laboratory of computer networking at the Department of Informatics at FBE MENDELU, and it serves as a template for a fi...

  13. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  14. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  15. Mobile IPv6における分散ホームエージェントの実現

    OpenAIRE

    福田, 浩章

    2005-01-01

    電子機器端末の小型化技術や通信技術の発達により、身の周りのあらゆる電子機器がなんらかのかたちでインターネットに接続されるようになってきた。こうしたときにさらなる利便性として求められるものが、移動通信のサポートである。Mobile IPv6 技術は、移動中の継続的な通信を支援する技術の一つである。MobileIPv6 では移動中でも同じIP アドレスを使い続けることができる。これはホームエージェントと呼ばれるノードが移動端末の所在を把握し、他の端末との通信を仲介することにより実現される。このホームエージェントは、基本的には1 台の設置を前提として仕様が決められている。本研究では複数のホームエージェントをネットワーク上に分散して配置する仕組みを提案し、実現する。それにより、Mobile IPv6 の運用における全体的なネットワークの効率化と負荷分散を目指す。...

  16. EPRI activities in support of new nuclear plant deployment

    International Nuclear Information System (INIS)

    Mulford, T.

    2007-01-01

    This paper describes the challenges to new plant deployment in the United States and discusses the role of the Electric Power Research Institute (EPRI) in efforts to address these challenges. These technical challenges include completing remaining design work, licensing review, and standardization required to ensure that new LWRs are a competitive near-term option. The costs for construction, licensing, and operation of new nuclear plants are uncertain and this uncertainty, along with concerns about construction schedule form a financial challenge to investment. Because the new process for licensing nuclear power plants in the United States has not been fully demonstrated, regulatory concerns also serve as a challenge to near-term commitments to build new nuclear power plants. EPRI is working in concert with utilities and vendors to upgrade certified LWR designs and obtain certification of new LWR designs. Specific technical areas being addressed by EPRI projects include updating the Utility Requirements Document (URD), seismic resolution, radiation protection, radioactive waste management, the development of utility planning tools, and staff optimization. EPRI's key on-going project, the New Plant Deployment Program Model (NPDPM), is designed to help prospective and actual new nuclear plant managers and staff to identify schedule and resource requirements from the point of the decision to build a plant through to the start of commercial operation. This model will describe and organize key activities and assess schedule, activity duration, logic relationships and critical path analysis. The new plant licensing and deployment process is a five to ten year activity representing a significant financial investment that requires coordination with federal and state regulators, designers, architect engineers, and numerous other contributing organizations. Planning is crucial to schedule and budget control. EPRI has also supported projects to quantify the environmental

  17. ApertosオペレーティングシステムによるIPv6ルータの構築

    OpenAIRE

    伊藤, 純一郎; 横手, 靖彦; 所, 真理雄; Jun-ichiro, Itoh; Yasuhiko, Yokote; Mario, Tokoro; 慶応義塾大学理工学研究科計算機科学専攻:Sony CSL; ソニー(株)アーキテクチャ研究所; 慶応義塾大学:Sony CSL; Department of Computer Science, Keio University:Sony CSL; Architecture Laboratory, Sony Corporation; Keio University:Sony CSL

    1997-01-01

    インターネットで現在利用されているIPv4プロトコルは,インターネットの爆発的成長に耐えられない,という指摘がある.このため,IPv6プロトコルが提案され,現在移行へ向けた考察が行われている.しかしながら,現在のルータソフトウェア構成法では,今後行われるプロトコル策定やプロトコルの仕様変更などに柔軟に対処することが困難である.本論文では,Apertosオペレーティングシステム上にIPv6ルータのプロトコル処理部を実装することで,これらの問題の解決を目指している.本方法では,並行オブジェクトによるソフトウェア構成によりプロトコル処理部のモジュール間の独立性を確保し,自己反映計算に基づくOSアーキテクチャの利用によりプログラマに最適なプログラミング環境を提供することができる....

  18. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    OpenAIRE

    Nelson Enrique Vera Parra; Danilo Alfonso López; Héctor Cristyan Manta Caro

    2014-01-01

    En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN), redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M), al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro....

  19. Active Directory Designing, Deploying, and Running Active Directory

    CERN Document Server

    Desmond, Brian

    2008-01-01

    By giving you a thorough grounding in Active Directory, this bestselling book teaches you how to design, manage, and maintain an AD infrastructure, whether it's for a small business network or a multinational enterprise with thousands of resources, services, and users. The fourth edition covers Active Directory from Windows 2000 through Windows Server 2008 in an easy-to-understand narrative style.

  20. Effects of combat deployment on risky and self-destructive behavior among active duty military personnel.

    Science.gov (United States)

    Thomsen, Cynthia J; Stander, Valerie A; McWhorter, Stephanie K; Rabenhorst, Mandy M; Milner, Joel S

    2011-10-01

    Although research has documented negative effects of combat deployment on mental health, few studies have examined whether deployment increases risky or self-destructive behavior. The present study addressed this issue. In addition, we examined whether deployment effects on risky behavior varied depending on history of pre-deployment risky behavior, and assessed whether psychiatric conditions mediated effects of deployment on risky behavior. In an anonymous survey, active duty members of the U.S. Marine Corps and U.S. Navy (N = 2116) described their deployment experiences and their participation in risky recreational activities, unprotected sex, illegal drug use, self-injurious behavior, and suicide attempts during three time frames (civilian, military pre-deployment, and military post-deployment). Respondents also reported whether they had problems with depression, anxiety, or PTSD during the same three time frames. Results revealed that risky behavior was much more common in civilian than in military life, with personnel who had not deployed, compared to those who had deployed, reporting more risky behavior and more psychiatric problems as civilians. For the current time period, in contrast, personnel who had deployed (versus never deployed) were significantly more likely to report both risky behavior and psychiatric problems. Importantly, deployment was associated with increases in risky behavior only for personnel with a pre-deployment history of engaging in risky behavior. Although psychiatric conditions were associated with higher levels of risky behavior, psychiatric problems did not mediate associations between deployment and risky behavior. Implications for understanding effects of combat deployment on active duty personnel and directions for future research are discussed. Published by Elsevier Ltd.

  1. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  2. Morphing structures using soft polymers for active deployment

    International Nuclear Information System (INIS)

    Daynes, Stephen; Grisdale, Amy; Trask, Richard; Seddon, Annela

    2014-01-01

    In this study, we take inspiration from morphing strategies observed in nature, origami design and stiffness tailoring principles in engineering, to develop a thin walled, low cost, bistable cell geometry capable of reversibly unfolding from a flat configuration to a highly textured configuration. Finite element analysis was used to model the cell deployment and capture the experimentally observed bistability of the reinforced silicone elastomer. Through the combination of flexible elastomers with locally reinforced regions enables a highly tailorable and controllable deployment response. These cells are bistable allowing them to maintain their shape when either deployed or retracted without sustained actuation. It is proposed that such deployable cells with reversible surfaces and texture change can be used as a means of adaptive camouflage. (fast track communication)

  3. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  4. PROTOTIPO PARA EL ANÁLISIS DEL RENDIMIENTO EN EL TRÁFICO DE UN SERVICIO BROADCAST UTILIZANDO LOS PROTOCOLOS HTTP Y RTP SOBRE IPV6 EN UNA RED ACADÉMICA DE TECNOLOGÍA AVANZADA

    Directory of Open Access Journals (Sweden)

    Roberto Ferro

    2011-08-01

    Full Text Available En el presente artículo se condensan los resultados obtenidos de la implementación y modelado de un Prototipo de Servicio Streaming sobre el Sistema Operativo Fedora 13 con el Programa VLC en la Red de Investigación y  Tecnología Avanzada de la Universidad Distrital RITA-UD sobre IPV6 utilizando como cliente la Universidad Minuto de Dios vía RUMBO mediante un Tunel 6a4.

  5. Framework en estructuras con direccionamiento IPV6 sobre OSSTMM para la corrección de vulnerabilidades de seguridad en un laboratorio de la academia CISCO de la ESPOCH

    OpenAIRE

    Martínez Santander, Carlos José

    2015-01-01

    Se elaboró una propuesta para realizar un Framework en estructuras con direccionamiento IPv6 sobre Open Source Security Testing Methodology Manual (OSSTMM) para la corrección de vulnerabilidades de seguridad en un laboratorio de Academia Local de redes (CISCO) de la Escuela Superior Politécnica de Chimborazo.Se recopilo tendencias sobre vulnerabilidades de seguridad, además de una experimentación, análisis y aplicación, para solucionar errores de seguridad en arquitecturas I...

  6. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  7. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    Directory of Open Access Journals (Sweden)

    Nelson Enrique Vera Parra

    2014-04-01

    Full Text Available En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN, redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M, al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro. Estas redes de nueva generación imponen restricciones en cuanto al poder de procesamiento, ancho de banda y recursos de energía, lo que re¬presenta una gran limitante en la implementación de mecanismos de seguridad. En este sentido, en lo últimos años han surgido diversas propuestas para la administración de claves, procedimientos de firma digital y cifrado de datos basados en curvas elípticas e híper-elípticas, que logran niveles de seguridad equivalentes a los algoritmos convencionales basados en algoritmos Diffie-Hellman y Rivest-Shamir-Adleman (RSA, pero que reducen la longitud de clave y, por ende, los recursos computacionales y de red asociados. Este artículo examina los algoritmos basados en criptografía de curvas elípticas (ECC y su aplicación a redes móviles e inalámbricas de nueva generación habilitadas para IPv6. Así mismo, describe un modelo de simulación para la evaluación de ECC, donde se comparan los recursos computacionales necesarios y las limitaciones en mecanismos ligeros de seguridad.

  8. Deployment of business development activities of Tohoku electric power Co

    Energy Technology Data Exchange (ETDEWEB)

    Ikeda, Hiroshi

    1988-11-01

    In order to cope with the transition period which accompanies big structural changes of society and economy of Japan in facing closely the forthcoming 21st century, Tohoku Electric Power Co. determined in June 1987 the basic concept for achieving operational prosperity towards the 21st century, and defined itself as a consolidated energy industry which contributes to the establishment of prosperous Tohoku Region. In order to realize the above, the company selected three strategic issues, namely business development, technology development and talent development. For the purpose of realization of the above, the Business Development Headquarters was created and under it, (1) Public Relation and Service Division, (2) Business Development Division and (3) Business Division were established. This article introduces an outline of business development activities of these three divisions. (1) above deals with illumination demands and household demands (hot water supply and utilization of 200V), (2) deals with particular demands for industry and business (air conditioning of buildings, kitchen for business use, area heat supply, and demands for industry, agriculture and fishery) and (3) deals with exact handling of such daily services as contracting, inspection and rate calculation, etc. as well as consulting. 2 figures, 2 tables.

  9. Benchmarking promotion and deployment activities regarding intelligent vehicle safety systems in the EU

    NARCIS (Netherlands)

    Kievit, M. de; Malone, K.M.; Zwijnenberg, H.; Arem, B. van

    2008-01-01

    This paper presents the results of a Benchmarking study performed in the European Union on Awareness and Promotion & Deployment activities related to Intelligent Vehicle Safety (IVS) systems (1). The study, commissioned by the European Commission under the Intelligent Car Initiative (a i2010

  10. Benchmarking Promotion and Deployment Activities Regarding Intelligent Vehicle Safety Systems in the European Union

    NARCIS (Netherlands)

    de Kievit, M.; Malone, K.M.; Zwijnenberg, H.; van Arem, B.

    2008-01-01

    This paper presents the results of a Benchmarking study performed in the European Union on Awareness and Promotion & Deployment activities related to Intelligent Vehicle Safety (IVS) systems (1). The study, commissioned by the European Commission under the Intelligent Car Initiative (a i2010

  11. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  12. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    emphasis on wireless networks, distributed ... their own processing power, memory and other resources. The interconnection may be ... Networks that transfer data in the form of packets are called packet switched networks. Here, the data to.

  13. Domain Name Server Security (DNSSEC) Protocol Deployment

    Science.gov (United States)

    2014-10-01

    Platform How IPv6 and DNSSEC Change the Intranets OARC Workshop San Francisco, March 2011 Materials available at: https://indico.dns-oarc.net...DNSSEC In Operation NIC .sn The Mensa project - Measuring DNS Health and Security How IPv6 and DNSSEC change the Intranets DNSSEC Update for DE...Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill Global IPv6 Summit, Taipei, Taiwan, November 2011 TWCERT/CC

  14. Active wavefront control challenges of the NASA Large Deployable Reflector (LDR)

    Science.gov (United States)

    Meinel, Aden B.; Meinel, Marjorie P.; Manhart, Paul K.; Hochberg, Eric B.

    1989-01-01

    The 20-m Large Deployable Reflector will have a segmented primary mirror. Achieving diffraction-limited performance at 50 microns requires correction for the errors of tilt and piston of the primary mirror. This correction can be obtained in two ways, the use of an active primary or a correction at a demagnified pupil of the primary. A critical requirement is the means for measurement of the wavefront error and maintaining phasing during the observation of objects that may be too faint for determining the error. Absolute phasing can only be determined using a cooperative source. Maintenance of phasing can be done with an on-board source. A number of options are being explored as discussed below. The many issues concerning the assessment and control of an active segmented mirror will be addressed with an early construction of the Precision Segmented Reflector testbed.

  15. Active wavefront control challenges of the NASA Large Deployable Reflector (LDR)

    Science.gov (United States)

    Meinel, Aden B.; Meinel, Marjorie P.; Manhart, Paul K.; Hochberg, Eric B.

    1989-09-01

    The 20-m Large Deployable Reflector will have a segmented primary mirror. Achieving diffraction-limited performance at 50 microns requires correction for the errors of tilt and piston of the primary mirror. This correction can be obtained in two ways, the use of an active primary or a correction at a demagnified pupil of the primary. A critical requirement is the means for measurement of the wavefront error and maintaining phasing during the observation of objects that may be too faint for determining the error. Absolute phasing can only be determined using a cooperative source. Maintenance of phasing can be done with an on-board source. A number of options are being explored as discussed below. The many issues concerning the assessment and control of an active segmented mirror will be addressed with an early construction of the Precision Segmented Reflector testbed.

  16. Scientific Grid activities and PKI deployment in the Cybermedia Center, Osaka University.

    Science.gov (United States)

    Akiyama, Toyokazu; Teranishi, Yuuichi; Nozaki, Kazunori; Kato, Seiichi; Shimojo, Shinji; Peltier, Steven T; Lin, Abel; Molina, Tomas; Yang, George; Lee, David; Ellisman, Mark; Naito, Sei; Koike, Atsushi; Matsumoto, Shuichi; Yoshida, Kiyokazu; Mori, Hirotaro

    2005-10-01

    The Cybermedia Center (CMC), Osaka University, is a research institution that offers knowledge and technology resources obtained from advanced researches in the areas of large-scale computation, information and communication, multimedia content and education. Currently, CMC is involved in Japanese national Grid projects such as JGN II (Japan Gigabit Network), NAREGI and BioGrid. Not limited to Japan, CMC also actively takes part in international activities such as PRAGMA. In these projects and international collaborations, CMC has developed a Grid system that allows scientists to perform their analysis by remote-controlling the world's largest ultra-high voltage electron microscope located in Osaka University. In another undertaking, CMC has assumed a leadership role in BioGrid by sharing its experiences and knowledge on the system development for the area of biology. In this paper, we will give an overview of the BioGrid project and introduce the progress of the Telescience unit, which collaborates with the Telescience Project led by the National Center for Microscopy and Imaging Research (NCMIR). Furthermore, CMC collaborates with seven Computing Centers in Japan, NAREGI and National Institute of Informatics to deploy PKI base authentication infrastructure. The current status of this project and future collaboration with Grid Projects will be delineated in this paper.

  17. Router Dual IPv4/IPv6: una transición hacia las Redes IPv6

    OpenAIRE

    Marco Hernández; César Acevedo; César Berdeja; Keith Peña

    2006-01-01

    Desde su inicio, Internet ha crecido rápidamente transformándose desde una red de investigación a una red comercial con un alcance mundial. Internet se ha convertido en un medio apropiado y económico para la colaboración de usuarios, aprendizaje, comercio electrónico y entretenimiento. Un consenso común indica que Internet se podría transformar en el medio común para la convergencia de la comunicación de voz, video y datos. Al mismo tiempo, está evolucionando desde un servicio sin garantías h...

  18. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  19. Neural activity and emotional processing following military deployment: Effects of mild traumatic brain injury and posttraumatic stress disorder.

    Science.gov (United States)

    Zuj, Daniel V; Felmingham, Kim L; Palmer, Matthew A; Lawrence-Wood, Ellie; Van Hooff, Miranda; Lawrence, Andrew J; Bryant, Richard A; McFarlane, Alexander C

    2017-11-01

    Posttraumatic Stress Disorder (PTSD) and mild traumatic brain injury (mTBI) are common comorbidities during military deployment that affect emotional brain processing, yet few studies have examined the independent effects of mTBI and PTSD. The purpose of this study was to examine distinct differences in neural responses to emotional faces in mTBI and PTSD. Twenty-one soldiers reporting high PTSD symptoms were compared to 21 soldiers with low symptoms, and 16 soldiers who reported mTBI-consistent injury and symptoms were compared with 16 soldiers who did not sustain an mTBI. Participants viewed emotional face expressions while their neural activity was recorded (via event-related potentials) prior to and following deployment. The high-PTSD group displayed increased P1 and P2 amplitudes to threatening faces at post-deployment compared to the low-PTSD group. In contrast, the mTBI group displayed reduced face-specific processing (N170 amplitude) to all facial expressions compared to the no-mTBI group. Here, we identified distinctive neural patterns of emotional face processing, with attentional biases towards threatening faces in PTSD, and reduced emotional face processing in mTBI. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. CMS Results of Grid-related activities using the early deployed LCG Implementations

    CERN Document Server

    Coviello, Tommaso; De Filippis, Nicola; Donvito, Giacinto; Maggi, Giorgio; Pierro, A; Bonacorsi, Daniele; Capiluppi, Paolo; Fanfani, Alessandra; Grandi, Claudio; Maroney, Owen; Nebrensky, H; Donno, Flavia; Jank, Werner; Sciabà, Andrea; Sinanis, Nick; Colling, David; Tallini, Hugh; MacEvoy, Barry C; Wang, Shaowen; Kaiser, Joseph; Osman, Asif; Charlot, Claude; Semenjouk, I; Biasotto, Massimo; Fantinel, Sergio; Corvo, Marco; Fanzago, Federica; Mazzucato, Mirco; Verlato, Marco; Go, Apollo; Khan Chia Ming; Andreozzi, S; Cavalli, A; Ciaschini, V; Ghiselli, A; Italiano, A; Spataro, F; Vistoli, C; Tortone, G

    2004-01-01

    The CMS Experiment is defining its Computing Model and is experimenting and testing the new distributed features offered by many Grid Projects. This report describes use by CMS of the early-deployed systems of LCG (LCG-0 and LCG-1). Most of the used features here discussed came from the EU implemented middleware, even if some of the tested capabilities were in common with the US developed middleware. This report describes the simulation of about 2 million of CMS detector events, which were generated as part of the official CMS Data Challenge 04 (Pre-Challenge-Production). The simulations were done on a CMS-dedicated testbed (CMS-LCG-0), where an ad-hoc modified version of the LCG-0 middleware was deployed and where the CMS Experiment had a complete control, and on the official early LCG delivered system (with the LCG-1 version). Modifications to the CMS simulation tools for events produc tion where studied and achieved, together with necessary adaptations of the middleware services. Bilateral feedback (betwee...

  1. Active vortex generator deployed on demand by size independent actuation of shape memory alloy wires integrated in fiber reinforced polymers

    Science.gov (United States)

    Hübler, M.; Nissle, S.; Gurka, M.; Wassenaar, J.

    2016-04-01

    Static vortex generators (VGs) are installed on different aircraft types. They generate vortices and interfuse the slow boundary layer with the fast moving air above. Due to this energizing, a flow separation of the boundary layer can be suppressed at high angles of attack. However the VGs cause a permanently increased drag over the whole flight cycle reducing the cruise efficiency. This drawback is currently limiting the use of VGs. New active VGs, deployed only on demand at low speed, can help to overcome this contradiction. Active hybrid structures, combining the actuation of shape memory alloys (SMA) with fiber reinforced polymers (FRP) on the materials level, provide an actuation principle with high lightweight potential and minimum space requirements. Being one of the first applications of active hybrid structures from SMA and FRP, these active vortex generators help to demonstrate the advantages of this new technology. A new design approach and experimental results of active VGs are presented based on the application of unique design tools and advanced manufacturing approaches for these active hybrid structures. The experimental investigation of the actuation focuses on the deflection potential and the dynamic response. Benchmark performance data such as a weight of 1.5g and a maximum thickness of only 1.8mm per vortex generator finally ensure a simple integration in the wing structure.

  2. Deployment Repeatability

    Science.gov (United States)

    2016-08-31

    large cohort of trials to spot unusual cases. However, deployment repeatability is inherently a nonlinear phenomenon, which makes modeling difficult...and GEMS tip position were both tracked during ground testing by a laser target tracking system. Earlier SAILMAST testing in 2005 [8] used...recalls the strategy used by SRTM, where a constellation of lights was installed at the tip of the boom and a modified star tracker was used to track tip

  3. Remote Systems Design & Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  4. Law no. 111/1996 on the safe deployment of nuclear activities - A law central to the Romanian nuclear law system

    International Nuclear Information System (INIS)

    Chiripus, Vlad-Ionut

    2004-01-01

    Law no. 111/1996 on the safe deployment of nuclear activities was published in its original form in the Official Gazette of Romania, Part no. 267 of 29th October 1996. The complexity of this law prevents from performing a comprehensive analysis of the legal provisions thereof for which reason the author shall review only those aspects he consider to be relevant to the issues dealt with by this law. Furthermore, as the author intends his undertaking to be a comparative analysis of Law no. 111/1996 in its successive stages - from its issue till the present - he uses mostly the present tense even though the law has been amended and in some respects the changes are quite significant. The presentation contains the following three sections: 1. Passing of Law no. 111/1996 on the safe deployment of nuclear activities - a turning point in the development of the Romanian nuclear law; 2. The successive modifications of Law no. 111/1996 on safe deployment of nuclear activities; 3. Law no. 193/2003 for the modification and completion of Law no. 111/1996 on the safe deployment of nuclear activities - a key moment in the modernization of Romanian nuclear law and harmonization with the relevant international requirement. In conclusion, the issue of Law no. 111/1996 on safe deployment of nuclear activities represents a turning point in the development of Romanian nuclear law. From this moment on one may regard it as a modern area of the Romanian law, European in spirit. The pre-existent legal framework - namely the Law no. 61/1974 on the deployment of activities in the Romanian nuclear field - was no longer up to the existing standards and its replacement by a new, modern law, fully harmonized with the European and NATO accession requirements was a must. Such a new, European law was to fully guarantee the safe deployment of nuclear activities for exclusively peaceful purposes, so that the requirements regarding the nuclear safety, protection of professionally exposed personnel

  5. The Role of Natural Support Systems in the Post-deployment Adjustment of Active Duty Military Personnel.

    Science.gov (United States)

    Welsh, Janet A; Olson, Jonathan; Perkins, Daniel F; Travis, Wendy J; Ormsby, LaJuana

    2015-09-01

    This study examined the relations among three different types of naturally occurring social support (from romantic partners, friends and neighbors, and unit leaders) and three indices of service member well-being (self reports of depressive symptoms, satisfaction with military life, and perceptions of unit readiness) for service members who did and did not report negative experiences associated with military deployment. Data were drawn from the 2011 Community Assessment completed anonymously by more than 63,000 USAF personnel. Regression analyses revealed that higher levels of social support was associated with better outcomes regardless of negative deployment experiences. Evidence of moderation was also noted, with all forms of social support moderating the impact of negative deployment experiences on depressive symptoms and support from unit leaders moderating the impact of negative deployment experience on satisfaction with military life. No moderation was found for perceptions of unit readiness. Subgroup analyses revealed slightly different patterns for male and female service members, with support providing fewer moderation effects for women. These findings may have value for military leaders and mental health professionals working to harness the power of naturally occurring relationships to maximize the positive adjustment of service members and their families. Implications for practices related to re-integration of post-deployment military personnel are discussed.

  6. Message Oriented Communication For Ipv6 Enabled Pervasive Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Szydlo

    2013-01-01

    Full Text Available An increasing number of electronic devices in our environment is equipped with radio interfaces used for exposing and using their functionality by other devices and applications. Wireless communication in this class of devices is exposed to a number of situations that may occur including limited energy resources, equipment failures, nodes mobility and loss of communication between nodes. It causes that commonly used standards and protocols for sharing services are not practical and do not take into account the occurrence of these problems. The paper presents the concept of communication that relies on the exchange of messages between wireless pervasive devices available in the environment.

  7. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  8. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    Science.gov (United States)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  9. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  10. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  11. Treatment Deployment Evaluation Tool

    International Nuclear Information System (INIS)

    M. A. Rynearson; M. M. Plum

    1999-01-01

    The U.S. Department of Energy (DOE) is responsible for the final disposition of legacy spent nuclear fuel (SNF). As a response, DOE's National Spent Nuclear Fuel Program (NSNFP) has been given the responsibility for the disposition of DOE-owned SNF. Many treatment technologies have been identified to treat some forms of SNF so that the resulting treated product is acceptable by the disposition site. One of these promising treatment processes is the electrometallurgical treatment (EMT) currently in development; a second is an Acid Wash Decladding process. The NSNFP has been tasked with identifying possible strategies for the deployment of these treatment processes in the event that a treatment path is deemed necessary. To support the siting studies of these strategies, economic evaluations are being performed to identify the least-cost deployment path. This model (tool) was developed to consider the full scope of costs, technical feasibility, process material disposition, and schedule attributes over the life of each deployment alternative. Using standard personal computer (PC) software, the model was developed as a comprehensive technology economic assessment tool using a Life-Cycle Cost (LCC) analysis methodology. Model development was planned as a systematic, iterative process of identifying and bounding the required activities to dispose of SNF. To support the evaluation process, activities are decomposed into lower level, easier to estimate activities. Sensitivity studies can then be performed on these activities, defining cost issues and testing results against the originally stated problem

  12. Quality function deployment

    International Nuclear Information System (INIS)

    1981-10-01

    This book indicates quality function deployment with quality and deployment of quality function, process and prospect of quality function deployment and development, product process and conception of quality table, deployment of quality demand, design of quality table and application of concurrent multi design, progress design and quality development, main safe part and management of important function part, quality development and deployment of method of construction, quality deployment and economics, total system of quality function deployment and task of quality function deployment in the present and future.

  13. Solar sail deployment experiment

    OpenAIRE

    Shimose, Shigeru; 下瀬 滋

    2006-01-01

    Solar Sail move by receiving momentum of photons in sunlight. This paper presents results of some Spin-Stabilized Solar Sail deployment experiment. ISAS has successfully deployed, for the first time in the world, the polyimide Solar Sail taking advantage of centrifugal force in space. Based on this result, the new deployment mechanism is being developed which retracts the 50 m diameter sail.

  14. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  15. Regulatory Assistance, Stakeholder Outreach, and Coastal and Marine Spatial Planning Activities in Support of Marine and Hydrokinetic Energy Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Geerlofs, Simon H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Copping, Andrea E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Van Cleve, Frances B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Blake, Kara M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hanna, Luke A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2011-09-01

    This fiscal year 2011 progress report summarizes activities carried out under DOE Water Power Task 2.1.7, Permitting and Planning. Activities under Task 2.1.7 address the concerns of a wide range of stakeholders with an interest in the development of the marine and hydrokinetic (MHK) energy industry, including regulatory and resource management agencies, tribes, nongovernmental organizations, and industry.

  16. Tether Deployer And Brake

    Science.gov (United States)

    Carroll, Joseph A.; Alexander, Charles M.

    1993-01-01

    Design concept promises speed, control, and reliability. Scheme for deploying tether provides for fast, free, and snagless payout and fast, dependable braking. Developed for small, expendable tethers in outer space, scheme also useful in laying transoceanic cables, deploying guidance wires to torpedoes and missiles, paying out rescue lines from ship to ship via rockets, deploying antenna wires, releasing communication and power cables to sonobuoys and expendable bathythermographs, and in reeling out lines from fishing rods.

  17. RSOI: Force Deployment Bottleneck

    National Research Council Canada - National Science Library

    D'Amato, Mark

    1998-01-01

    This study uses The Theory Of Constraints (TOC) management methodology and recent military missions to show that RSOI operations are generally the limiting constraint to force deployment operations...

  18. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  19. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    .... Gulf War health questions have resulted in controversy over potentially hazardous exposures during the deployment, the possibility of adverse affects from preventive health measures, and the role...

  20. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  1. Optimal deployment schedule of an active twist rotor for performance enhancement and vibration reduction in high-speed flights

    Directory of Open Access Journals (Sweden)

    Young H. YOU

    2017-08-01

    Full Text Available The best active twist schedules exploiting various waveform types are sought taking advantage of the global search algorithm for the reduction of hub vibration and/or power required of a rotor in high-speed conditions. The active twist schedules include two non-harmonic inputs formed based on segmented step functions as well as the simple harmonic waveform input. An advanced Particle Swarm assisted Genetic Algorithm (PSGA is employed for the optimizer. A rotorcraft Computational Structural Dynamics (CSD code CAMRAD II is used to perform the rotor aeromechanics analysis. A Computation Fluid Dynamics (CFD code is coupled with CSD for verification and some physical insights. The PSGA optimization results are verified against the parameter sweep study performed using the harmonic actuation. The optimum twist schedules according to the performance and/or vibration reduction strategy are obtained and their optimization gains are compared between the actuation cases. A two-phase non-harmonic actuation schedule demonstrates the best outcome in decreasing the power required while a four-phase non-harmonic schedule results in the best vibration reduction as well as the simultaneous reductions in the power required and vibration. The mechanism of reduction to the performance gains is identified illustrating the section airloads, angle-of-attack distribution, and elastic twist deformation predicted by the present approaches.

  2. Aerosol-radiation-cloud interactions in the South-East Atlantic: first results from the ORACLES-2016 deployment and plans for future activities

    Science.gov (United States)

    Redemann, J.; Wood, R.; Zuidema, P.; Haywood, J. M.; Piketh, S.; Formenti, P.; Abel, S.

    2016-12-01

    Southern Africa produces almost a third of the Earth's biomass burning (BB) aerosol particles. Particles lofted into the mid-troposphere are transported westward over the South-East (SE) Atlantic, home to one of the three permanent subtropical stratocumulus (Sc) cloud decks in the world. The SE Atlantic stratocumulus deck interacts with the dense layers of BB aerosols that initially overlay the cloud deck, but later subside and may mix into the clouds. These interactions include adjustments to aerosol-induced solar heating and microphysical effects, and their global representation in climate models remains one of the largest uncertainties in estimates of future climate. Hence, new observations over the SE Atlantic have significant implications for regional and global climate change predictions. Our understanding of aerosol-cloud interactions in the SE Atlantic is severely limited. Most notably, we are missing knowledge on the absorptive and cloud nucleating properties of aerosols, including their vertical distribution relative to clouds, on the locations and degree of aerosol mixing into clouds, on the processes that govern cloud property adjustments, and on the importance of aerosol effects on clouds relative to co-varying synoptic scale meteorology. We describe first results from various synergistic, international research activities aimed at studying aerosol-cloud interactions in the region: NASA's airborne ORACLES (ObseRvations of Aerosols Above Clouds and Their IntEractionS) deployment in August/September of 2016, the DoE's LASIC (Layered Atlantic Smoke Interactions with Clouds) deployment of the ARM Mobile Facility to Ascension Island (June 2016 - October 2017), the ground-based components of CNRS' AEROCLO-sA (Aerosols Clouds and Fog over the west coast of southern Africa), and ongoing regional-scale integrative, process-oriented science efforts as part of SEALS-sA (Sea Earth Atmosphere Linkages Study in southern Africa). We expect to describe experimental

  3. Part 8. Deployment considerations

    International Nuclear Information System (INIS)

    Dance, K.D.; Chang, Y.I.; Daly, T.A.

    1980-01-01

    This report addresses considerations of fast breeder reactor development and deployment from a national perspective. Nations vary greatly in their expertise and interest relative to nuclear power, and hence a single set of steps to be taken by a nation in decision-making on breeder development and deployment cannot be presented. The approach taken in this report is to present discussions on key factors influencing the breeder development and deployment decisions, especially in non-breeder nations, by drawing upon historical perspectives of the Light Water Reactor for comparison

  4. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    ... of stress in causing chronic illness. The lack of comprehensive deployment health surveillance has made it difficult to determine possible causes of adverse health effects reported by Gulf War veterans...

  5. Modeling EERE deployment programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge for future research.

  6. RSOI: Force Deployment Bottleneck

    National Research Council Canada - National Science Library

    D'Amato, Mark

    1998-01-01

    .... This runs counter to the popular belief that strategic lift is the limiting constraint. The study begins by highlighting the genesis of the military's current force projection strategy and the resulting importance of rapid force deployments...

  7. Deployable Brake for Spacecraft

    Science.gov (United States)

    Rausch, J. R.; Maloney, J. W.

    1987-01-01

    Aerodynamic shield that could be opened and closed proposed. Report presents concepts for deployable aerodynamic brake. Brake used by spacecraft returning from high orbit to low orbit around Earth. Spacecraft makes grazing passes through atmosphere to slow down by drag of brake. Brake flexible shield made of woven metal or ceramic withstanding high temperatures created by air friction. Stored until needed, then deployed by set of struts.

  8. Advanced OS deployment system

    OpenAIRE

    Galiano Molina, Sebastián

    2007-01-01

    The main project’s objective is to design and build an OS deployment system taking advantage of the Linux OS and the Open Source community developments. This means to use existing technologies that modularize the system. With this philosophy in mind, the number of developed code lines within the project is keeping as small as possible. As REMBO, the OS deployment system to develop has to be transparent to the user. This means a system with a friendly user interface and no te...

  9. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, Katherine A.; Hostick, Donna J.; Belzer, David B.; Livingston, Olga V.

    2007-11-08

    The purpose of this report is to compile information and conclusions gathered as part of three separate tasks undertaken as part of the overall project, “Modeling EERE Deployment Programs,” sponsored by the Planning, Analysis, and Evaluation office within the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE). The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address improvements to modeling in the near term, and note gaps in knowledge where future research is needed.

  10. The recent activities of nuclear power globalization. Our provision against global warming by global deployment of our own technologies as integrated nuclear power plant supply company'

    International Nuclear Information System (INIS)

    Yamauchi, Kiyoshi; Suzuki, Shigemitsu

    2008-01-01

    Mitsubishi Heavy Industries, Ltd. (MHI) is striving to expand and spread nuclear power plants as an 'Integrated Nuclear Power Plant Supply Company' based on its engineering, manufacturing, and technological support capabilities. The company also has ample experience in the export of major components. MHI is accelerating its global deployment through the market introduction of large-sized strategic reactor US-APWR, the joint development of a mid-sized strategic reactor ATMEA1 with AREVA, and a small strategic reactor PBMR. The company also plans to internationally deploy technologies for the nuclear fuel cycle. We present here the leading-edge trends in the global deployment of these nuclear businesses, all of which help to solve the energy and environmental issues in the world. (author)

  11. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  12. Cooperative Technolgy Deployed

    NARCIS (Netherlands)

    Koenders, E.; Velt, R. in 't

    2011-01-01

    After the successful demonstrations of cooperative technology by the CVIS and Safespot projects the question remains how this technology can be successfully deployed. This question is explored by the Field Operational Test project FREILOT, which aims to provide fuel economy applications that must be

  13. Fusion Power Deployment

    International Nuclear Information System (INIS)

    Schmidt, J.A.; Ogden, J.M.

    2002-01-01

    Fusion power plants could be part of a future portfolio of non-carbon dioxide producing energy supplies such as wind, solar, biomass, advanced fission power, and fossil energy with carbon dioxide sequestration. In this paper, we discuss key issues that could impact fusion energy deployment during the last half of this century. These include geographic issues such as resource availability, scale issues, energy storage requirements, and waste issues. The resource needs and waste production associated with fusion deployment in the U.S. should not pose serious problems. One important feature of fusion power is the fact that a fusion power plant should be locatable within most local or regional electrical distribution systems. For this reason, fusion power plants should not increase the burden of long distance power transmission to our distribution system. In contrast to fusion power, regional factors could play an important role in the deployment of renewable resources such as wind, solar and biomass or fossil energy with CO2 sequestration. We examine the role of these regional factors and their implications for fusion power deployment

  14. Large Deployable Reflector (LDR)

    Science.gov (United States)

    Alff, W. H.

    1980-01-01

    The feasibility and costs were determined for a 1 m to 30 m diameter ambient temperature, infrared to submillimeter orbiting astronomical telescope which is to be shuttle-deployed, free-flying, and have a 10 year orbital life. Baseline concepts, constraints on delivery and deployment, and the sunshield required are examined. Reflector concepts, the optical configuration, alignment and pointing, and materials are also discussed. Technology studies show that a 10 m to 30 m diameter system which is background and diffraction limited at 30 micron m is feasible within the stated time frame. A 10 m system is feasible with current mirror technology, while a 30 m system requires technology still in development.

  15. Deployable reflector configurations

    Science.gov (United States)

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  16. Economics of ALMR deployment

    International Nuclear Information System (INIS)

    Delene, J.G.; Fuller, L.C.; Hudson, C.R.

    1994-01-01

    The Advanced Liquid Metal Reactor (ALMR) has the potential to extend the economic life of the nuclear option and of reducing the number of high level waste repositories which will eventually be needed in an expanding nuclear economy. This paper reports on an analysis which models and evaluates the economics of the use of ALMRs as a component of this country's future electricity generation mix. The ALMR concept has the ability to utilize as fuel the fissile material contained in previously irradiated nuclear fuel (i.e., spent fuel) or from surplus weapons grade material. While not a requirement for the successful deployment of ALMR power plant technology, the reprocessing of spent fuel from light water reactors (LWR) is necessary for any rapid introduction of ALMR power plants. In addition, the reprocessing of LWR spent fuel may reduce the number of high level waste repositories needed in the future by burning the long-lived actinides produced in the fission process. With this study, the relative economics of a number of potential scenarios related to these issues are evaluated. While not encompassing the full range of all possibilities, the cases reported here provide an indication of the potential costs, timings, and relative economic attractiveness of ALMR deployment

  17. ALMR deployment economic analysis

    International Nuclear Information System (INIS)

    Delene, J.G.; Fuller, L.C.; Hudson, C.R.

    1993-06-01

    This analysis seeks to model and evaluate the economics of the use of Advanced Liquid Metal Reactors (ALMR) as a component of this country's future electricity generation mix. The ALMR concept has the ability to utilize as fuel the fissile material contained in previously irradiated nuclear fuel (i.e., spent fuel). While not a requirement for the successful deployment of ALMR power plant technology, the reprocessing of spent fuel from light water reactors (LWR) is necessary for any rapid introduction of ALMR power plants. In addition, the reprocessing of LWR spent fuel may reduce the number of high level waste repositories needed in the future by burning the long-lived actinides produced in the fission process. With this study, the relative economics of a number of potential scenarios related to these issues are evaluated. While not encompassing the full range of all possibilities, the cases reported here provide an indication of the potential costs, timings, and relative economic attractiveness of ALMR deployment

  18. Vaginal yeast infections while deployed in Southwest/Central Asia, active component females, U.S. Armed Forces, 2008-2013.

    Science.gov (United States)

    2014-08-01

    In field settings, female service members may not have adequate access to bathrooms, showers, laundry, or sanitary products necessary to maintain adequate feminine hygiene; therefore, service women may be at risk for vaginal yeast infections while deployed. During the 6-year surveillance period, nearly 3,000 U.S. military service women were diagnosed with at least one clinically significant yeast infection while supporting combat operations in Southwest/Central Asia. The crude overall incidence rate was 35.1 per 1,000 person-years (p-yrs). Overall incidence rates were higher among black, non-Hispanic service women, and among those in the Army and Air Force, in enlisted grades, and in communications/intelligence and motor transport occupations. The yearly rate of yeast infections was relatively stable from 2008 through 2010, then decreased in 2011 through 2013. Prior to deploying to austere operational settings, female service members should be provided practical and useful information, realistic training, and material support to decrease the risk of acquiring and increase the effectiveness of treating clinically and military operationally significant yeast infections.

  19. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2016-10-01

    Group, Family Advocacy, Child and Family Behavioral Health, Soldier Readiness Program (SRP), Family Life Chaplain Training Center, Fort Hood Housing ...resilience and child well-being, Soldier and non-deploying parents must successfully meet the challenges of caregiving throughout the deployment cycle ...reintegration program to reduce parenting stress and promote family resilience in Active Duty military families through all phases of the deployment cycle

  20. Iron Status of Deployed Military Members

    Science.gov (United States)

    2017-01-04

    ready force Deploy with and care for the warrior Care for all entrusted to our care Nursing Competencies and Practice: Patient outcomes...duties, physical activities, iron intake through diet ). This additional information would improve the ability to determine factors associated with

  1. Complex Deployed Responsive Service

    Science.gov (United States)

    Parry, Glenn; McLening, Marc; Caldwell, Nigel; Thompson, Rob

    A pizza restaurant must provide product, in the form of the food and drink, and service in the way this is delivered to the customer. Providing this has distinct operational challenges, but what if the restaurant also provides a home delivery service? The service becomes deployed as the customer is no-longer co-located with the production area. The business challenge is complicated as service needs to be delivered within a geographic region, to time or the pizza will be cold, and within a cost that is not ­prohibitive. It must also be responsive to short term demand; needing to balance the number of staff it has available to undertake deliveries against a forecast of demand.

  2. Implementation and Evaluation of DSMIPv6 for MIPL

    Science.gov (United States)

    Wang, Mingli; Hu, Bo; Chen, Shanzhi; Sun, Qinxue

    Mobile IPv6 performs mobility management to mobile node within IPv6 networks. Since IPv6 is not widely deployed yet, it’s an important feature to let Mobile IPv6 support mobile node moving to IPv4 network and maintaining the established communications. DSMIPv6 specification extends Mobile IPv6 capabilities to allow dual stack mobile nodes to move within IPv4 and IPv6 networks. This paper describes the implementation of this feature based on open source MIPL under Linux. By performing experiments on testbed using the implementation, it is confirmed that the DSMIPv6 works as expected.

  3. CCT deployment considerations

    International Nuclear Information System (INIS)

    Yamagata, B.

    1993-01-01

    The deployment of Clean Coal Technologies (CCT) is discussed by asserting that in the case of commercializing CCT, the government's involvement should not stop at the demonstration gate. Two areas in this regard are described. First, the need for the domestic DOE CCT Program to focus on the domestic deployment of demonstrated technologies, and second, the need to recognize that to participate in the phenomenal growth of international power markets through use of clean coal or advanced coal technologies an aggressive partnering between the government and industry to demonstrate technologies abroad will be required. The Clean Coal Technology Coalition's (CCT) primary mission has been to promote the development and use of CCTs. The CCT is a strong advocate for the DOE CCT Program and applauds the Department's and industry's success at developing many coal-based technologies. By current design, the DOE program is said to go no further than the initial demonstration of a technology. Since the inception of CCT in 1986, the Coalition has advocated the need to pursue a partnership with government in which more than one demonstration of the same or similar technology is supported by the clean coal program. Only in this way can one be assured of widespread acceptance of any given technology. There exists a gap (call it a open-quotes risk gapclose quotes) between CCTs that have been successfully demonstrated (and presumably available for commercial use) and their widespread commercial use. A technology matrix has been developed in which the developmental status of a variety of clean coal technologies is demonstrated. While still too early to pass judgment, it appears that while success is being achieved in demonstrating advanced coal technologies, the market place - for several reasons - is not, indeed may have no plans, to adopt these technologies

  4. Deploying Embodied AI into Virtual Worlds

    Science.gov (United States)

    Burden, David J. H.

    The last two years have seen the start of commercial activity within virtual worlds. Unlike computer games where Non-Player-Character avatars are common, in most virtual worlds they are the exception — and until recently in Second Life they were non-existent. However there is real commercial scope for Als in these worlds — in roles from virtual sales staff and tutors to personal assistants. Deploying an embodied AI into a virtual world offers a unique opportunity to evaluate embodied Als, and to develop them within an environment where human and computer are on almost equal terms. This paper presents an architecture being used for the deployment of chatbot driven avatars within the Second Life virtual world, looks at the challenges of deploying an AI within such a virtual world, the possible implications for the Turing Test, and identifies research directions for the future.

  5. CMS software deployment on OSG

    International Nuclear Information System (INIS)

    Kim, B; Avery, P; Thomas, M; Wuerthwein, F

    2008-01-01

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment

  6. CMS software deployment on OSG

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B; Avery, P [University of Florida, Gainesville, FL 32611 (United States); Thomas, M [California Institute of Technology, Pasadena, CA 91125 (United States); Wuerthwein, F [University of California at San Diego, La Jolla, CA 92093 (United States)], E-mail: bockjoo@phys.ufl.edu, E-mail: thomas@hep.caltech.edu, E-mail: avery@phys.ufl.edu, E-mail: fkw@fnal.gov

    2008-07-15

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment.

  7. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  8. Infrastructure Engineering and Deployment Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Infrastructure Engineering and Deployment Division advances transportation innovation by being leaders in infrastructure technology, including vehicles and...

  9. Malicious Activity Simulation Tool (MAST) and Trust

    Science.gov (United States)

    2015-06-01

    development considerations assesses whether an application is capable of operating in an IPV6 environment as well as how well it maintains its...configuration files. MAST, as a desktop application, likely does not need to provide any additional protection to its resources beyond what is ...from ASD STIG Mitigation APP3980 Medium The designer will ensure the application is compliant with IPv6 multicast addressing and features an IPv6

  10. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  11. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  12. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  13. Efficient and scalable IPv6 communication functions for wireless outdour lighting networks

    NARCIS (Netherlands)

    Mamo, S.T.

    2014-01-01

    Outdoor lighting today is becoming increasingly network-connected. The rapid development in wireless communication technologies makes this progress faster and competitive. Philips Research and Philips Lighting are part of the leading forces in exploration and development of a wide spectrum of

  14. Migración de redes de voz IPv4 a IPv6

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-03-01

    Full Text Available This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from measuring and evaluating outstanding parametersdelay, jitter and packet loss.

  15. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  16. The Deployment Life Study: Longitudinal Analysis of Military Families Across the Deployment Cycle

    Science.gov (United States)

    2016-01-01

    deployment. The 11 events, grouped by type of trauma, are as follows: • combat – engaging in hand-to-hand combat – being physically knocked over...leaving home; missing classes at school because you don’t like your school; missing after-school activities (such as school activities, sports ) because...you don’t feel like participating; missing after-school activities (such as school activi- ties, sports ) because of transportation problems/issues

  17. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  18. Family Reintegration Following Guard Deployment

    Science.gov (United States)

    2010-09-20

    Somalia Peacekeepers. Journal of Consulting and Clinical Psychology, 72(5), 909-913. Haas DM . Pazdernik LA. Olsen CH. A cross-sectional survey of the...relationship between partner deployment and stress in pregnancy during wartime. Haas DM . Pazdernik LA. Partner deployment and stress in pregnant...Identify 3-5 key words relating to the proposal. (Required) I used MESH Headings instead of the CRISP Thesaurus for key

  19. The effect of deployment frequencies on the military divorce rate

    OpenAIRE

    Arenstein, Stacy J.

    2011-01-01

    Approved for public release; distribution is unlimited. The primary goal of this research is to investigate whether the length and frequency of deployments affect the likelihood of divorce. The study uses data from the Contingency Tracking System (CTS) and the Active Duty Military Personnel file. The sample includes all active duty Navy and Marine Corps members from 2000 to 2009. Three models of divorce are estimated, each with a different control for the stress of deployment on the f...

  20. Pupil size signals mental effort deployed during multiple object tracking and predicts brain activity in the dorsal attention network and the locus coeruleus.

    Science.gov (United States)

    Alnæs, Dag; Sneve, Markus Handal; Espeseth, Thomas; Endestad, Tor; van de Pavert, Steven Harry Pieter; Laeng, Bruno

    2014-04-01

    Attentional effort relates to the allocation of limited-capacity attentional resources to meet current task demands and involves the activation of top-down attentional systems in the brain. Pupillometry is a sensitive measure of this intensity aspect of top-down attentional control. Studies relate pupillary changes in response to cognitive processing to activity in the locus coeruleus (LC), which is the main hub of the brain's noradrenergic system and it is thought to modulate the operations of the brain's attentional systems. In the present study, participants performed a visual divided attention task known as multiple object tracking (MOT) while their pupil sizes were recorded by use of an infrared eye tracker and then were tested again with the same paradigm while brain activity was recorded using fMRI. We hypothesized that the individual pupil dilations, as an index of individual differences in mental effort, as originally proposed by Kahneman (1973), would be a better predictor of LC activity than the number of tracked objects during MOT. The current results support our hypothesis, since we observed pupil-related activity in the LC. Moreover, the changes in the pupil correlated with activity in the superior colliculus and the right thalamus, as well as cortical activity in the dorsal attention network, which previous studies have shown to be strongly activated during visual tracking of multiple targets. Follow-up pupillometric analyses of the MOT task in the same individuals also revealed that individual differences to cognitive load can be remarkably stable over a lag of several years. To our knowledge this is the first study using pupil dilations as an index of attentional effort in the MOT task and also relating these to functional changes in the brain that directly implicate the LC-NE system in the allocation of processing resources.

  1. A Comparison of Dependent Primary Care Utilization Rates Based on Deployments

    Science.gov (United States)

    2009-03-09

    analysis to obtain the deployment data was completed by ASMR , another contractor used to Health Care Utilization and Deployments 15 complete...2007. The deployment dataset was created by ASMR using all encounter data for active duty Soldiers and running the Social Security numbers of these

  2. Remotely deployable aerial inspection using tactile sensors

    Science.gov (United States)

    MacLeod, C. N.; Cao, J.; Pierce, S. G.; Sullivan, J. C.; Pipe, A. G.; Dobie, G.; Summan, R.

    2014-02-01

    For structural monitoring applications, the use of remotely deployable Non-Destructive Evaluation (NDE) inspection platforms offer many advantages, including improved accessibility, greater safety and reduced cost, when compared to traditional manual inspection techniques. The use of such platforms, previously reported by researchers at the University Strathclyde facilitates the potential for rapid scanning of large areas and volumes in hazardous locations. A common problem for both manual and remote deployment approaches lies in the intrinsic stand-off and surface coupling issues of typical NDE probes. The associated complications of these requirements are obviously significantly exacerbated when considering aerial based remote inspection and deployment, resulting in simple visual techniques being the preferred sensor payload. Researchers at Bristol Robotics Laboratory have developed biomimetic tactile sensors modelled on the facial whiskers (vibrissae) of animals such as rats and mice, with the latest sensors actively sweeping their tips across the surface in a back and forth motion. The current work reports on the design and performance of an aerial inspection platform and the suitability of tactile whisking sensors to aerial based surface monitoring applications.

  3. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2017-10-01

    Traumatic Stress Studies (ISTSS) Conference. Chicago, IL. 2. Kritikos*, T.K. & DeVoe, E.R. Relationship quality of recently deployed military...prevention and family orientation of the study . We continue to have impact on multiple disciplinary areas, including social work, psychology , and public...resilience in Active Duty military families through all phases of the deployment cycle. The study will be conducted in three phases. In phase 1

  4. Home front: post-deployment mental health and divorces.

    Science.gov (United States)

    Negrusa, Brighita; Negrusa, Sebastian

    2014-06-01

    Since 2003, about 14 % of U.S. Army soldiers have reported symptoms of posttraumatic stress disorder (PTSD) following deployments. In this article, we examine how post-deployment symptoms of PTSD and of other mental health conditions are related to the probability of divorce among married active-duty U.S. Army soldiers. For this purpose, we combine Army administrative individual-level longitudinal data on soldiers' deployments, marital history, and sociodemographic characteristics with their self-reported post-deployment health information. Our estimates indicate that time spent in deployment increases the divorce risk among Army enlisted personnel and that PTSD symptoms are associated with further increases in the odds of divorce. Although officers are generally less likely to screen positive for PTSD than enlisted personnel, we find a stronger relationship between PTSD symptoms and divorces among Army officers who are PTSD-symptomatic than among enlisted personnel. We estimate a larger impact of deployments on the divorce risk among female soldiers, but we do not find a differential impact of PTSD symptoms by gender. Also, we find that most of the effect of PTSD symptoms occurs early in the career of soldiers who deploy multiple times.

  5. When Loved Ones Get Deployed

    Science.gov (United States)

    ... different from hearing about conflicts and violence that break out in the world during our own time. If someone you care about is in the military and is deployed for duty, it's natural to worry about their safety. That's especially true if the person is going ...

  6. Non-traditional Infrasound Deployment

    Science.gov (United States)

    McKenna, M. H.; McComas, S.; Simpson, C. P.; Diaz-Alvarez, H.; Costley, R. D.; Hayward, C.; Golden, P.; Endress, A.

    2017-12-01

    Historically, infrasound arrays have been deployed in rural environments where anthropological noise sources are limited. As interest in monitoring low energy sources at local distances grows in the infrasound community, it will be vital to understand how to monitor infrasound sources in an urban environment. Arrays deployed in urban centers have to overcome the decreased signal-to-noise ratio and reduced amount of real estate available to deploy an array. To advance the understanding of monitoring infrasound sources in urban environments, local and regional infrasound arrays were deployed on building rooftops on the campus at Southern Methodist University (SMU), and data were collected for one seasonal cycle. The data were evaluated for structural source signals (continuous-wave packets), and when a signal was identified, the back azimuth to the source was determined through frequency-wavenumber analysis. This information was used to identify hypothesized structural sources; these sources were verified through direct measurement and dynamic structural analysis modeling. In addition to the rooftop arrays, a camouflaged infrasound sensor was installed on the SMU campus and evaluated to determine its effectiveness for wind noise reduction. Permission to publish was granted by Director, Geotechnical and Structures Laboratory.

  7. SATWG networked quality function deployment

    Science.gov (United States)

    Brown, Don

    1992-01-01

    The initiative of this work is to develop a cooperative process for continual evolution of an integrated, time phased avionics technology plan that involves customers, technologists, developers, and managers. This will be accomplished by demonstrating a computer network technology to augment the Quality Function Deployment (QFD). All results are presented in viewgraph format.

  8. Miniature field deployable terahertz source

    Science.gov (United States)

    Mayes, Mark G.

    2006-05-01

    Developments in terahertz sources include compacted electron beam systems, optical mixing techniques, and multiplication of microwave frequencies. Although significant advances in THz science have been achieved, efforts continue to obtain source technologies that are more mobile and suitable for field deployment. Strategies in source development have approached generation from either end of the THz spectrum, from up-conversion of high-frequency microwave to down-conversion of optical frequencies. In this paper, we present the design of a THz source which employs an up-conversion method in an assembly that integrates power supply, electronics, and radiative component into a man-portable unit for situations in which a lab system is not feasible. This unit will ultimately evolve into a ruggedized package suitable for use in extreme conditions, e.g. temporary security check points or emergency response teams, in conditions where THz diagnostics are needed with minimal planning or logistical support. In order to meet design goals of reduced size and complexity, the inner workings of the unit ideally would be condensed into a monolithic active element, with ancillary systems, e.g. user interface and power, coupled to the element. To attain these goals, the fundamental component of our design is a THz source and lens array that may be fabricated with either printed circuit board or wafer substrate. To reduce the volume occupied by the source array, the design employs a metamaterial composed of a periodic lattice of resonant elements. Each resonant element is an LC oscillator, or tank circuit, with inductance, capacitance, and center frequency determined by dimensioning and material parameters. The source array and supporting electronics are designed so that the radiative elements are driven in-phase to yield THz radiation with a high degree of partial coherence. Simulation indicates that the spectral width of operation may be controlled by detuning of critical dimensions

  9. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  10. Supply strategy for SMR deployment

    International Nuclear Information System (INIS)

    Coccagna, A.F.

    2013-01-01

    This document provides a description of Babcock and Wilcox's deployment strategy for the mPower™ Small Modular Reactor from the perspective of Supply Chain and Manufacturing. A desirable future state of readiness is described as one which leverages and revitalizes an existing supply chain and manufacturing infrastructure, as well as leveraging an existing workforce of engineering, construction, and project management employees. B and W's mPower™ SMR value proposition offers many desired design and operating advantages to the SMR market. (author)

  11. Verification Test for Ultra-Light Deployment Mechanism for Sectioned Deployable Antenna Reflectors

    Science.gov (United States)

    Zajac, Kai; Schmidt, Tilo; Schiller, Marko; Seifart, Klaus; Schmalbach, Matthias; Scolamiero, Lucio

    2013-09-01

    The ultra-light deployment mechanism (UDM) is based on three carbon fibre reinforced plastics (CFRP) curved tape springs made of carbon fibre / cyanate ester prepregs.In the frame of the activity its space application suitability for the deployment of solid reflector antenna sections was investigated. A projected diameter of the full reflector of 4 m to 7 m and specific mass in the order of magnitude of 2.6kg/m2 was focused for requirement derivation.Extensive verification tests including health checks, environmental and functional tests were carried out with an engineering model to enable representative characterizing of the UDM unit.This paper presents the design and a technical description of the UDM as well as a summary of achieved development status with respect to test results and possible design improvements.

  12. RSG Deployment Case Testing Results

    Energy Technology Data Exchange (ETDEWEB)

    Owsley, Stanley L.; Dodson, Michael G.; Hatchell, Brian K.; Seim, Thomas A.; Alexander, David L.; Hawthorne, Woodrow T.

    2005-09-01

    The RSG deployment case design is centered on taking the RSG system and producing a transport case that houses the RSG in a safe and controlled manner for transport. The transport case was driven by two conflicting constraints, first that the case be as light as possible, and second that it meet a stringent list of Military Specified requirements. The design team worked to extract every bit of weight from the design while striving to meet the rigorous Mil-Spec constraints. In the end compromises were made primarily on the specification side to control the overall weight of the transport case. This report outlines the case testing results.

  13. Supporting Knowledge Transfer in IS Deployment Projects

    Science.gov (United States)

    Schönström, Mikael

    To deploy new information systems is an expensive and complex task, and does seldom result in successful usage where the system adds strategic value to the firm (e.g. Sharma et al. 2003). It has been argued that innovation diffusion is a knowledge integration problem (Newell et al. 2000). Knowledge about business processes, deployment processes, information systems and technology are needed in a large-scale deployment of a corporate IS. These deployments can therefore to a large extent be argued to be a knowledge management (KM) problem. An effective deployment requires that knowledge about the system is effectively transferred to the target organization (Ko et al. 2005).

  14. Optimization of Hydroacoustic Equipment Deployment at Foster Dam, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, James S.; Johnson, Gary E.; Ploskey, Gene R.; Hennen, Matthew J.; Fischer, Eric S.; Zimmerman, Shon A.

    2013-03-01

    The goal of the study was to optimize performance of the fixed-location hydroacoustic systems at Foster Dam (FOS) by determining deployment and data acquisition methods that minimized structural, electrical, and acoustic interference. Optimization of the hydroacoustic systems will establish methodology for sampling by active acoustic methods during this year-long evaluation of juvenile salmonid passage at FOS.

  15. Determining the Optimal C-130 Deployed Crew Ratio

    Science.gov (United States)

    2014-06-13

    components. The active component operates at a 1:2 (with a goal of 1:3) deploy-to- dwell while the ARC plans a 1:5 ( Stenner , 2011, pp. 5, 10). This...Rand Corporation, 2011. Rand Corporation. Intratheater Airlift Functional Solution Analysis. Santa Monica: Rand Corporation, 2011. Stenner

  16. A scope of the problem: Post-deployment reintegration challenges in a National Guard Unit.

    Science.gov (United States)

    Wilcox, Sherrie L; Oh, Hyunsung; Redmond, Sarah A; Chicas, Joseph; Hassan, Anthony M; Lee, Pey-Jiuan; Ell, Kathleen

    2015-01-01

    More Reserve and Guard members have been activated in the past few years than in any other time in history. In addition to the high rates of psychological and behavioral challenges among military personnel, there are other equally important post-deployment reintegration challenges. Post-deployment reintegration challenges are particularly important to Reserve and Guard members, who transition rapidly from civilian-military-civilian. This study aims to describe the scope of challenges that a battalion of National Guard members (NGM) report experiencing after returning from a one-year deployment to Iraq. This article reports data from a sample of 126 NGM who recently returned from a one-year deployment to Iraq. The scope of post-deployment problems at baseline, 3- and 6-month post-deployment are presented. Overall, the rates of post-deployment psychological and behavioral problems were elevated upon returning from deployment and remained fairly constant for up to 6 months post-deployment. Approximately 30% of respondents were unsatisfied with their relationship and upwards of 30% reported family reintegration challenges. Comparisons with similar research and implications for prevention and improvement of post-deployment quality of life are addressed.

  17. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2016-07-01

    Response rate for Wave 8 = 88% Our final sample contained 554 men and 556 women (n = 554 cross- sex couples, 1 same- sex couple). Individuals were...story in the Killeen Daily Herald (10 April 2016) http://kdhnews.com/news/local/ kids -deployments-when-a-parent-deploys-children-face- tough...years old), and (c) “Me getting sick and having to go to sick call.” (deployed Army husband, 25 years old). Sex and fidelity. Comments fell into

  18. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections....

  19. Low Mass Aeroshell Deployment Mechanism, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protective systems (TPS) panels to...

  20. Low Mass Aeroshell Deployment Mechanism, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protection system (TPS) panels to...

  1. The Long War and Parental Combat Deployment: Effects on Military Children and At-Home Spouses

    Science.gov (United States)

    Lester, Patricia; Peterson, Kris; Reeves, James; Knauss, Larry; Glover, Dorie; Mogil, Catherine; Duan, Naihua; Saltzman, William; Pynoos, Robert; Wilt, Katherine; Beardslee, William

    2010-01-01

    Objective: Given the growing number of military service members with families and the multiple combat deployments characterizing current war time duties, the impact of deployments on military children requires clarification. Behavioral and emotional adjustment problems were examined in children (aged 6 through 12) of an active duty Army or Marine…

  2. Development, deployment and operations of ATLAS databases

    International Nuclear Information System (INIS)

    Vaniachine, A. V.; von der Schmitt, J. G.

    2008-01-01

    In preparation for ATLAS data taking, a coordinated shift from development towards operations has occurred in ATLAS database activities. In addition to development and commissioning activities in databases, ATLAS is active in the development and deployment (in collaboration with the WLCG 3D project) of the tools that allow the worldwide distribution and installation of databases and related datasets, as well as the actual operation of this system on ATLAS multi-grid infrastructure. We describe development and commissioning of major ATLAS database applications for online and offline. We present the first scalability test results and ramp-up schedule over the initial LHC years of operations towards the nominal year of ATLAS running, when the database storage volumes are expected to reach 6.1 TB for the Tag DB and 1.0 TB for the Conditions DB. ATLAS database applications require robust operational infrastructure for data replication between online and offline at Tier-0, and for the distribution of the offline data to Tier-1 and Tier-2 computing centers. We describe ATLAS experience with Oracle Streams and other technologies for coordinated replication of databases in the framework of the WLCG 3D services

  3. Concurrent engineering: effective deployment strategies

    Directory of Open Access Journals (Sweden)

    Unny Menon

    1996-12-01

    Full Text Available This paper provides a comprehensive insight into current trends and developments in Concurrent Engineering for integrated development of products and processes with the goal of completing the entire cycle in a shorter time, at lower overall cost and with fewer engineering design changes after product release. The evolution and definition of Concurrent Engineering are addressed first, followed by a concise review of the following elements of the concurrent engineering approach to product development: Concept Development: The Front-End Process, identifying Customer Needs and Quality Function Deployment, Establishing Product Specifications, Concept Selection, Product Architecture, Design for Manufacturing, Effective Rapid Prototyping, and The Economics of Product Development. An outline of a computer-based tutorial developed by the authors and other graduate students funded by NASA ( accessible via the world-wide-web . is provided in this paper. A brief discussion of teamwork for successful concurrent engineering is included, t'ase histories of concurrent engineering implementation at North American and European companies are outlined with references to textbooks authored by Professor Menon and other writers. A comprehensive bibliography on concurrent engineering is included in the paper.

  4. Cloud Environment Automation: from infrastructure deployment to application monitoring

    Science.gov (United States)

    Aiftimiei, C.; Costantini, A.; Bucchi, R.; Italiano, A.; Michelotto, D.; Panella, M.; Pergolesi, M.; Saletta, M.; Traldi, S.; Vistoli, C.; Zizzi, G.; Salomoni, D.

    2017-10-01

    The potential offered by the cloud paradigm is often limited by technical issues, rules and regulations. In particular, the activities related to the design and deployment of the Infrastructure as a Service (IaaS) cloud layer can be difficult to apply and time-consuming for the infrastructure maintainers. In this paper the research activity, carried out during the Open City Platform (OCP) research project [1], aimed at designing and developing an automatic tool for cloud-based IaaS deployment is presented. Open City Platform is an industrial research project funded by the Italian Ministry of University and Research (MIUR), started in 2014. It intends to research, develop and test new technological solutions open, interoperable and usable on-demand in the field of Cloud Computing, along with new sustainable organizational models that can be deployed for and adopted by the Public Administrations (PA). The presented work and the related outcomes are aimed at simplifying the deployment and maintenance of a complete IaaS cloud-based infrastructure.

  5. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2017-07-01

    reintegration. Communication and Generalized Anxiety The emotional cycle of deployment model provides a descrip- tive framework for understanding the...counseling. Thus, communication can have a reciprocal influence on the very appraisals and emotions that motivate interaction in the first place. Communication...of service members back into family life after deployment can be extremely challenging for military couples. Understanding the factors that

  6. 5-Beam ADCP Deployment Strategy Considerations

    Science.gov (United States)

    Moore, T.; Savidge, D. K.; Gargett, A.

    2016-02-01

    With the increasing availability of 5 beam ADCPs and expanding opportunities for their deployment within both observatory and dedicated process study settings, refinements in deployment strategies are needed.Measuring vertical velocities directly with a vertically oriented acoustic beam requires that the instrument be stably mounted and leveled within fractions of a degree. Leveled shallow water deployments to date have utilized divers to jet pipes into the sand for stability, manually mount the instruments on the pipes, and level them. Leveling has been guided by the deployed instrument's pitch and roll output, available in real-time because of the observatory settings in which the deployments occurred. To expand the range of feasible deployments to deeper, perhaps non-real-time capable settings, alternatives to diver deployment and leveling must be considered. To determine stability requirements, mooring motion (heading, pitch and roll) has been sampled at 1Hz by gimballed ADCPs at a range of instrument deployment depths, and in shrouded and unshrouded cages. Conditions under which ADCP cages resting on the bottom experience significant shifts in tilt, roll or heading are assessed using co-located wind and wave measurements. The accuracy of estimating vertical velocities using all five beams relative to a well leveled vertical single beam is assessed from archived high frequency five beam data, to explore whether easing the leveling requirement is feasible.

  7. Renewable Energy: Policy Considerations for Deploying Renewables

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This information paper accompanies the IEA publication Deploying Renewables 2011: Best and Future Policy Practice (IEA, 2011a). It provides more detailed data and analysis on policies for Deploying Renewables, and is intended to complement the main publication. It provides an account of the strategic drivers underpinning renewable energy (RE) technology deployment (energy security, economic development and environment protection) and assesses RE technologies with respect to these drivers, including an estimate of GHG emissions reductions due to RE technologies. The paper also explores the different barriers to deploying renewables at a given stage of market maturity and discusses what tools policy makers can avail of to succeed in removing deployment barriers. An additional topical highlight explores the challenges associated with accelerating the diffusion of RE technologies in developing countries.

  8. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  9. Rover deployment system for lunar landing mission

    Science.gov (United States)

    Sutoh, Masataku; Hoshino, Takeshi; Wakabayashi, Sachiko

    2017-09-01

    For lunar surface exploration, a deployment system is necessary to allow a rover to leave the lander. The system should be as lightweight as possible and stored retracted when launched. In this paper, two types of retractable deployment systems for lunar landing missions, telescopic- and fold-type ramps, are discussed. In the telescopic-type system, a ramp is stored with the sections overlapping and slides out during deployment. In the fold-type system, it is stored folded and unfolds for the deployment. For the development of these ramps, a design concept study and structural analysis were conducted first. Subsequently, ramp deployment and rover release tests were performed using the developed ramp prototypes. Through these tests, the validity of their design concepts and functions have been confirmed. In the rover release test, it was observed that the developed lightweight ramp was sufficiently strong for a 50-kg rover to descend. This result suggests that this ramp system is suitable for the deployment of a 300-kg-class rover on the Moon, where the gravity is about one-sixth that on Earth. The lightweight and sturdy ramp developed in this study will contribute to both safe rover deployment and increase of lander/rover payload.

  10. Light Duty Utility Arm deployment in Tank WM-188

    International Nuclear Information System (INIS)

    Patterson, M.

    1999-01-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of Non-Compliance (NON) Consent Order requirements and several other ongoing initiatives

  11. Light Duty Utility Arm deployment in Tank WM-188

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, M.W.

    1999-12-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of Non-Compliance (NON) Consent Order requirements and several other ongoing initiatives.

  12. Light Duty Utility Arm Deployment in Tank WM-188

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, Michael W

    2000-01-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of NonCompliance (NON) Consent Order requirements and several other ongoing initiatives.

  13. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  14. Building the Internet of Things with IPv6 and MIPv6 the evolving world of m2m communications

    CERN Document Server

    Minoli, Daniel

    2013-01-01

    ""If we had computers that knew everything there was to know about things-using data they gathered without any help from us-we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.""-Kevin Ashton, originator of the term, Internet of Things An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with

  15. Aplicación de Multicast IPv6 Seguro a Servicios de Información en Entornos Grid

    OpenAIRE

    Trejo, Natalia Bibiana

    2008-01-01

    Los Servicios de Información constituyen piezas fundamentales de la infraestructura de los sistemas Grid. Estos servicios tienen por objetivo realizar el descubrimiento inicial y posterior monitorización de la disponibilidad y estado de los recursos y servicios puestos a disposición por los participantes de las llamadas organizaciones Virtuales. El servicio de información utilizado por sistemas Grid basados en el middleware Globus Toolkit 4, se conoce como Sistema de Monitorización y Descubri...

  16. Metodología de Implementación de Ipv6 en La Red de La Universidad de Oriente

    Directory of Open Access Journals (Sweden)

    Luis Armando Gurris Aragón

    2010-07-01

    Full Text Available Este trabajo presenta una estrategia para adoptar el Protocolo de Internet versión 6 en la red de la Universidad de Oriente (UOnet. El nuevo protocolo ha surgido para sustituir a la versión 4 actualmente en uso de manera global, debido al florecimiento de un conjunto de deficiencias en este último, provocado principalmente por el crecimiento exponencial de Internet y el desarrollo de nuevas tecnologías y servicios, que demandan mayor calidad en el desempeño del Protocolo de Internet. Además de los principales aspectos a tener en cuenta para emprender una transición hacia esta nueva tecnología, tales como: mecanismos de transición y otros elementos fundamentales a considerar como el Sistema de Nombres de Dominio, métodos de configuración de direcciones, sistemas operativos y aplicaciones. Este análisis constituye una guía para la implementación del protocolo en el escenario existente en la UOnet, y a su vez es aplicable en otras redes locales del país.

  17. Automating NEURON Simulation Deployment in Cloud Resources.

    Science.gov (United States)

    Stockton, David B; Santamaria, Fidel

    2017-01-01

    Simulations in neuroscience are performed on local servers or High Performance Computing (HPC) facilities. Recently, cloud computing has emerged as a potential computational platform for neuroscience simulation. In this paper we compare and contrast HPC and cloud resources for scientific computation, then report how we deployed NEURON, a widely used simulator of neuronal activity, in three clouds: Chameleon Cloud, a hybrid private academic cloud for cloud technology research based on the OpenStack software; Rackspace, a public commercial cloud, also based on OpenStack; and Amazon Elastic Cloud Computing, based on Amazon's proprietary software. We describe the manual procedures and how to automate cloud operations. We describe extending our simulation automation software called NeuroManager (Stockton and Santamaria, Frontiers in Neuroinformatics, 2015), so that the user is capable of recruiting private cloud, public cloud, HPC, and local servers simultaneously with a simple common interface. We conclude by performing several studies in which we examine speedup, efficiency, total session time, and cost for sets of simulations of a published NEURON model.

  18. Deploying the advanced U.S. EPR

    International Nuclear Information System (INIS)

    Hagan, C.

    2007-01-01

    As electricity demand, clean air concerns and energy prices increase in the U.S., interest in new nuclear reactors is also on the rise. These factors - along with decades of outstanding performance of the nation's existing nuclear fleet - have contributed to a favorable market for new nuclear power in the U.S. Although no U.S. company has declared it actually will buy and build new reactors, many have actively expressed their interest through investment and regulatory interaction. The timing is also right for new reactors in terms of public perception, government policy and acceptance of the investment community. Amid this environment, the U.S. commercial power industry recently has begun pursuing new nuclear generation in earnest. AREVA, whose ongoing global market analyses indicated the need for additional baseload nuclear generation in the U.S., chose to license its EPR design to meet that need. This article will discuss the American market landscape for new nuclear and how AREVA is approaching it, present an overview of the company's U.S. EPR technology, and provide an update on the regulatory status of the design and deployment schedule. (orig.)

  19. Technology Deployment Annual Report 2014 December

    Energy Technology Data Exchange (ETDEWEB)

    Arterburn, George K. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-12-01

    This report is a summary of key Technology Deployment activities and achievements for 2014, including intellectual property, granted copyrights, royalties, license agreements, CRADAs, WFOs and Technology-Based Economic Development. Idaho National Laboratory (INL) is a Department of Energy (DOE) multi-program national laboratory that conducts research and development in all DOE mission areas. Like all other federal laboratories, INL has a statutory, technology transfer mission to make its capabilities and technologies available to all federal agencies, to state and local governments, and to universities and industry. To fulfill this mission, INL encourages its scientific, engineering, and technical staff to disclose new inventions and creations to ensure the resulting intellectual property is captured, protected, and made available to others who might benefit from it. As part of the mission, intellectual property is licensed to industrial partners for commercialization, creating jobs and delivering the benefits of federally funded technology to consumers. In other cases, unique capabilities are made available to other federal agencies or to regional small businesses to solve specific technical challenges. INL employees also work cooperatively with researchers and technical staff from the university and industrial sectors to further develop emerging technologies. In our multinational global economy, INL is contributing to the development of the next generation of engineers and scientists by licensing software to educational instiutitons throughout the world. This report is a catalog of selected INL technology transfer and commercialization transactions during this past year. The size and diversity of INL technical resources, coupled with the large number of relationships with other organizations, virtually ensures that a report of this nature will fail to capture all interactions. Recognizing this limitation, this report focuses on transactions that are specifically

  20. Project implementation plan: ASTD remote deployment

    International Nuclear Information System (INIS)

    CRASS, D.W.

    1999-01-01

    This document is the project implementation plan for the ASTD Remote Deployment Project. The Plan identifies the roles and responsibilities for the project and defines the integration between the ASTD Project and the B-Cell Cleanout Project

  1. Office of Civilian Response Deployment Tracking System

    Data.gov (United States)

    US Agency for International Development — The purpose of OCR DTS is to establish, manage and track relevant Civilian Response Corps teams for deployment by sector experience, training, education etc.

  2. RadNet Air Quality (Deployable) Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — RadNet Deployable Monitoring is designed to collect radiological and meteorological information and data asset needed to establish the impact of radiation levels on...

  3. Self-Deploying, Composite Habitats, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's VeritexTM materials. These...

  4. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  5. Community integration after deployment to Afghanistan

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Armour, Cherie; Andersen, Søren B.

    2015-01-01

    OBJECTIVE: In the years following military deployment, soldiers may experience problems integrating into the community. However, little is known about the nature and prevalence of these problems and if they relate to posttraumatic symptomatology. METHODS: In a prospective, longitudinal study...

  6. Deployment strategies of managed lanes on arterials.

    Science.gov (United States)

    2015-02-01

    This report investigates issues related to planning, financing, deployment, and operation of managed : lanes on arterials. In this report, a strategy for managed lanes refers to a combination of the managed : lane type, the design and implementation,...

  7. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  8. Deployable structures for a human lunar base

    Science.gov (United States)

    Gruber, Petra; Häuplik, Sandra; Imhof, Barbara; Özdemir, Kürsad; Waclavicek, Rene; Perino, Maria Antoinetta

    2007-06-01

    The study Lunar exploration architecture—deployable structures for a lunar base was performed within the Alcatel Alenia Space “Lunar Exploration Architecture” study for the European Space Agency. The purpose of the study was to investigate bionic concepts applicable to deployable structures and to interpret the findings for possible implementation concepts. The study aimed at finding innovative solutions for deployment possibilities. Translating folding/unfolding principles from nature, candidate geometries were developed and researched using models, drawings and visualisations. The use of materials, joints between structural elements and construction details were investigated for these conceptual approaches. Reference scenarios were used to identify the technical and environmental conditions, which served as design drivers. Mechanical issues and the investigation of deployment processes narrowed the selection down to six chosen concepts. Their applicability was evaluated at a conceptual stage in relation to the timescale of the mission.

  9. Military Families: Child Care Support During Deployments

    Science.gov (United States)

    ... temporary caregiver far in advance will make your children feel more secure. Try to have the caregiver connect prior to deployment through visits, phone calls, or social media. If you will be relocating to a family ...

  10. Concept of Deployable Network Operations Center (DNOC)

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Thiry, Jeff; Johnson, Shawn

    2005-01-01

    .... The increasing use of expeditionary and special operations forces in ad hoc, dynamic, and tactical environments poses a need for an adaptable, flexible, and responsive deployable network operations center (DNOC...

  11. In-Flight Suppressant Deployment Temperatures

    National Research Council Canada - National Science Library

    Bein, Donald

    2006-01-01

    .... An assessment is made of the model output versus some aircraft measurement data, fire suppressant boiling point criterion, as well as the history of altitude/temperature at which fire suppressants have been deployed...

  12. Demonstration and Deployment Strategy Workshop: Summary

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2014-05-01

    This report is based on the proceedings of the U.S. Department of Energy Bioenergy Technologies Office Demonstration and Deployment Strategy Workshop, held on March 12–13, 2014, at Argonne National Laboratory.

  13. A Novel Methodology for Charging Station Deployment

    Science.gov (United States)

    Sun, Zhonghao; Zhao, Yunwei; He, Yueying; Li, Mingzhe

    2018-02-01

    Lack of charging stations has been a main obstacle to the promotion of electric vehicles. This paper studies deploying charging stations in traffic networks considering grid constraints to balance the charging demand and grid stability. First, we propose a statistical model for charging demand. Then we combine the charging demand model with power grid constraints and give the formulation of the charging station deployment problem. Finally, we propose a theoretical solution for the problem by transforming it to a Markov Decision Process.

  14. State perspectives on clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Moreland, T. [State of Illinois Washington Office, Washington, DC (United States)

    1997-12-31

    State governments have been funding partners in the Clean Coal Technology program since its beginnings. Today, regulatory and market uncertainties and tight budgets have reduced state investment in energy R and D, but states have developed program initiatives in support of deployment. State officials think that the federal government must continue to support these technologies in the deployment phase. Discussions of national energy policy must include attention to the Clean Coal Technology program and its accomplishments.

  15. DRAGON - 8U Nanosatellite Orbital Deployer

    Science.gov (United States)

    Dobrowolski, Marcin; Grygorczuk, Jerzy; Kedziora, Bartosz; Tokarz, Marta; Borys, Maciej

    2014-01-01

    The Space Research Centre of the Polish Academy of Sciences (SRC PAS) together with Astronika company have developed an Orbital Deployer called DRAGON for ejection of the Polish scientific nanosatellite BRITE-PL Heweliusz (Fig. 1). The device has three unique mechanisms including an adopted and scaled lock and release mechanism from the ESA Rosetta mission MUPUS instrument. This paper discusses major design restrictions of the deployer, unique design features, and lessons learned from development through testing.

  16. Deploying Renewables - Best and Future Policy Practice

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-11-23

    The global energy system faces urgent challenges. Concerns about energy security are growing, as highlighted by the recent political turmoil in Northern Africa and the nuclear incident in Fukushima. At the same time, the need to respond to climate change is more critical than ever. Against this background, many governments have increased efforts to promote deployment of renewable energy -- low-carbon sources that can strengthen energy security. This has stimulated unprecedented rise in deployment, and renewables are now the fastest growing sector of the energy mix. This 'coming of age' of renewable energy also brings challenges. Growth is focused on a few of the available technologies, and rapid deployment is confined to a relatively small number of countries. In more advanced markets, managing support costs and system integration of large shares of renewable energy in a time of economic weakness and budget austerity has sparked vigorous political debate. The IEA's new report, Deploying Renewables 2011: Best and Future Policy Practice: - Provides a comprehensive review and analysis of renewable energy policy and market trends; - Analyses in detail the dynamics of deployment and provides best-practice policy principles for different stages of market maturity; - Assesses the impact and cost-effectiveness of support policies using new methodological tools and indicators; - Investigates the strategic reasons underpinning the pursuit of RE deployment by different countries and the prospects for globalisation of RE. This new book builds on and extends a 2008 IEA publication, drawing on recent policy and deployment experience world-wide. It provides guidance for policy makers and other stakeholders to avoid past mistakes, overcome new challenges and reap the benefits of deploying renewables -- today and tomorrow.

  17. Simulating CubeSat Structure Deployment Dynamics, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — There is high value in simulating the nonlinear dynamics of stowing, deploying, and performance of deployable space structures, especially given the profound...

  18. A Remotely Deployable Wind Sonic Anemometer

    Directory of Open Access Journals (Sweden)

    Muhammad Awais

    2017-12-01

    Full Text Available Communication and computing shape up base for explosion of Internet of Things (IoT era. Humans can efficiently control the devices around their environment as per requirements because of IoT, the communication between different devices brings more flexibility in surrounding. Useful data is also gathered from some of these devices to create Big Data; where, further analysis assist in making life easier by developing good business models corresponding to user needs, enhance scientific research, formulating weather prediction or monitoring systems and contributing in other relative fields as well. Thus, in this research a remotely deployable IoT enabled Wind Sonic Anemometer has been designed and deployed to calculate average wind speed, direction, and gust. The proposed design is remotely deployable, user-friendly, power efficient and cost-effective because of opted modules i.e., ultrasonic sensors, GSM module, and solar panel. The testbed was also deployed at the roof of Computer & Information Systems Engineering (CIS department, NED UET. Further, its calibration has been carried out by using long short-term memory (LSTM, a deep learning technique; where ground truth data has been gathered from mechanical wind speed sensor (NRG-40 H deployed at top of Industrial & Manufacturing (IM department of NED UET. The obtained results are satisfactory and the performance of designed sensor is also good under various weather conditions.

  19. Environmental issues affecting clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.J. [Electric Power Research Inst., Palo Alto, CA (United States)

    1997-12-31

    The author outlines what he considers to be the key environmental issues affecting Clean Coal Technology (CCT) deployment both in the US and internationally. Since the international issues are difficult to characterize given different environmental drivers in various countries and regions, the primary focus of his remarks is on US deployment. However, he makes some general remarks, particularly regarding the environmental issues in developing vs. developed countries and how these issues may affect CCT deployment. Further, how environment affects deployment depends on which particular type of clean coal technology one is addressing. It is not the author`s intention to mention many specific technologies other than to use them for the purposes of example. He generally categorizes CCTs into four groups since environment is likely to affect deployment for each category somewhat differently. These four categories are: Precombustion technologies such as coal cleaning; Combustion technologies such as low NOx burners; Postcombustion technologies such as FGD systems and postcombustion NOx control; and New generation technologies such as gasification and fluidized bed combustion.

  20. Pulmonary Function and Respiratory Health of Military Personnel Before Southwest Asia Deployment.

    Science.gov (United States)

    Skabelund, Andrew J; Rawlins, Frederic A; McCann, Edward T; Lospinoso, Joshua A; Burroughs, Lorraine; Gallup, Roger A; Morris, Michael J

    2017-09-01

    Significant concern exists regarding the respiratory health of military personnel deployed to Southwest Asia, given their exposures to numerous environmental hazards. Although the deployed military force is generally assumed to be fit, the pre-deployment respiratory health of these individuals is largely unknown. Soldiers deploying to Southwest Asia were recruited from the pre-deployment processing center at Fort Hood, Texas. Participants completed a general and respiratory health questionnaire and performed baseline spirometry. One thousand six hundred ninety-three pre-deployment evaluations were completed. The average age of the participants was 32.2 y, and 83.1% were male. More than one third of surveyed solders had a smoking history, 73% were overweight or obese, and 6.2% reported a history of asthma. Abnormal spirometry was found in 22.3% of participants. Soldiers with abnormal spirometry reported more asthma (10.1% vs 5.1%, P military personnel that delineates factors potentially associated with the development of pulmonary symptoms and/or disease. This study suggests that deploying soldiers are older, heavier, frequently smoke, and may have undiagnosed pre-deployment lung disease. Abnormal spirometry is common but may not represent underlying disease. Self-reported asthma, wheezing, and slower 2-mile run times were predictive of abnormal spirometry. Pre-deployment evaluation of military personnel identified numerous soldiers with active pulmonary symptoms and abnormal spirometry. When combined with questions regarding asthma history, wheezing and exercise intolerance, spirometry may identify individuals at risk for deployment-related respiratory complaints. Copyright © 2017 by Daedalus Enterprises.

  1. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current......This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  2. Deployment Instabilities of Lobed-Pumpkin Balloon

    Science.gov (United States)

    Nakashino, Kyoichi

    A lobed-pumpkin balloon, currently being developed in ISAS/JAXA as well as in NASA, is a promising vehicle for long duration scientific observations in the stratosphere. Recent ground and flight experiments, however, have revealed that the balloon has deployment instabilities under certain conditions. In order to overcome the instability problems, a next generation SPB called 'tawara' type balloon has been proposed, in which an additional cylindrical part is appended to the standard lobed-pumpkin balloon. The present study investigates the deployment stability of tawara type SPB in comparison to that of standard lobed-pumpkin SPB through eigenvalue analysis on the basis of finite element methods. Our numerical results show that tawara type SPB enjoys excellent deployment performance over the standard lobed-pumpkin SPBs.

  3. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    OBJECTIVE: Insight on how different missions have impacted rates of mental health service (MHS) utilization is unexplored. We compared postdeployment MHS utilization in a national cohort of first-time deployed to missions in Balkan, Iraq, and Afghanistan respectively. METHODS: A prospective...... national cohort study of 13 246 first-time deployed in the period 1996 through 2012 to missions in Balkan area, Iraq, or Afghanistan respectively. Soldiers 'MHS utilization was also compared with a 5:1 sex-, age-, and calendar year-matched never-deployed background population. Postdeployment utilization...... of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  4. Plant stress analysis technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Ebadian, M.A.

    1998-01-01

    Monitoring vegetation is an active area of laser-induced fluorescence imaging (LIFI) research. The Hemispheric Center for Environmental Technology (HCET) at Florida International University (FIU) is assisting in the transfer of the LIFI technology to the agricultural private sector through a market survey. The market survey will help identify the key eco-agricultural issues of the nations that could benefit from the use of sensor technologies developed by the Office of Science and Technology (OST). The principal region of interest is the Western Hemisphere, particularly, the rapidly growing countries of Latin America and the Caribbean. The analysis of needs will assure that the focus of present and future research will center on economically important issues facing both hemispheres. The application of the technology will be useful to the agriculture industry for airborne crop analysis as well as in the detection and characterization of contaminated sites by monitoring vegetation. LIFI airborne and close-proximity systems will be evaluated as stand-alone technologies and additions to existing sensor technologies that have been used to monitor crops in the field and in storage.

  5. Industrial deployment of system engineering methods

    CERN Document Server

    Romanovsky, Alexander

    2013-01-01

    A formal method is not the main engine of a development process, its contribution is to improve system dependability by motivating formalisation where useful. This book summarizes the results of the DEPLOY research project on engineering methods for dependable systems through the industrial deployment of formal methods in software development. The applications considered were in automotive, aerospace, railway, and enterprise information systems, and microprocessor design.  The project introduced a formal method, Event-B, into several industrial organisations and built on the lessons learned to

  6. Challenges to Deploy Service Design in Organizations

    DEFF Research Database (Denmark)

    Akasaka, Fumiya; Ohno, Takehiko; Jensen, Mika Yasuoka

    2016-01-01

    More and more companies are applying service design approaches to develop services and products. Not every project, however, has achieved its goals. In many cases, difficulties arise from organizational issues such as organization structure and evaluation system. In this research, we held workshops...... where success and failure factors of service design projects in organization are presented. By analysing the results, we construct a model that explains the “difficulties of deploying the service design approach in organization.” On the basis of the model, this paper discusses the challenges...... to the deployment of the service design approach in organizations....

  7. The Design and Implementation of a Novel Open Source Massive Deployment System

    Directory of Open Access Journals (Sweden)

    Steven J. H. Shiau

    2018-06-01

    Full Text Available The hypervisor and container are emerging cloud computing and fog computing technologies, which enable rapid system deployment. However, both of the technologies depend on the operating system (OS and applications that are installed on the host machines. System deployment is the activity to deliver and install OSs and applications onto computers. Such deployment activities are widely required in the infrastructure of cloud computing, fog computing, high-performance computing clusters, and classrooms of computer education. Albeit the concept of system deployment is not new, traditional solutions cannot support the rapid evolution of open source file systems. Furthermore, existing solutions cannot support the massive deployment of disks in a computer as well as the massive deployment in large-scale computers. To resolve the issue, the authors proposed novel system architecture as well as software that is openly available. The experiments are undertaken by deploying a Linux system to 1 to 30 Universal Serial Bus (USB flash drives in a single machine and to 1 to 32 machines in a network using the software that is being developed in this work. The results have demonstrated the feasibility and efficiency of the proposed work. The relationships between the bus bandwidth, the writing rate of the USB flash drive, and the number of flash drives were also formulated as a govern equation. Performance evaluation and cost savings in comparing to the deployment cases adopting commercial software were also provided for demonstrating the performance enhancement and cost reduction by using the novel deployment system. In general, the proposed architecture and the developed software are highly effective from the aspects of both performance and cost.

  8. Accelerating the deployment of energy efficient and renewable energy technologies in South Africa

    Energy Technology Data Exchange (ETDEWEB)

    Shickman, Kurt [Trust for Conservation Innovation, San Francisco, CA (United States). Global Cool Cities Alliance (GCCA)

    2017-02-13

    Purpose of the project was to accelerate the deployment of energy efficient and renewable energy technologies in South Africa. Activities were undertaken to reduce barriers to deployment by improving product awareness for the South African market; market and policy intelligence for U.S. manufacturers; product/service availability; local technical capacity at the workforce, policymaker and expert levels; and ease of conducting business for these technologies/services in the South African market.

  9. Implementation plan for deployment of Federal Interim Storage facilities for commercial spent nuclear fuel

    International Nuclear Information System (INIS)

    1986-12-01

    This document is the third annual report on plans for providing Federal Interim Storage (FIS) capacity. References are made to the first and second annual reports, as necessary. Background factors and aspects that were considered in the development of this deployment plan and activities and interactions considered to be required to implement an FIS program are discussed. A generic description of the approach that the Department plans to follow in deploying FIS facilities is also described

  10. Implementation plan for deployment of Federal Interim Storage facilities for commercial spent nuclear fuel

    International Nuclear Information System (INIS)

    1985-01-01

    This document is the second annual report on plans for providing Federal Interim Storage (FIS) capacity. References are made to the first annual report as necessary (DOE/RW-0003, 1984). Background factors and aspects that were considered in the development of this deployment plan and activities and interactions considered to be required to implement an FIS program are discussed. The generic approach that the Department plans to follow in deploying FIS facilities is also described

  11. Implementation plan for deployment of Federal Interim Storage facilities for commercial spent nuclear fuel

    International Nuclear Information System (INIS)

    1989-01-01

    This document is the sixth annual report on plans for providing FIS capacity. References are made to the first, second, third, fourth, and fifth annual reports, as necessary. Background factors and aspects that were considered in the development of this deployment plan and activities and interactions considered to be required to implement an FIS program are discussed. A generic description of the approach that the Department plans to follow in deploying FIS facilities is also described. 21 refs., 1 fig., 1 tab

  12. Computational modeling of interventions and protective thresholds to prevent disease transmission in deploying populations.

    Science.gov (United States)

    Burgess, Colleen; Peace, Angela; Everett, Rebecca; Allegri, Buena; Garman, Patrick

    2014-01-01

    Military personnel are deployed abroad for missions ranging from humanitarian relief efforts to combat actions; delay or interruption in these activities due to disease transmission can cause operational disruptions, significant economic loss, and stressed or exceeded military medical resources. Deployed troops function in environments favorable to the rapid and efficient transmission of many viruses particularly when levels of protection are suboptimal. When immunity among deployed military populations is low, the risk of vaccine-preventable disease outbreaks increases, impacting troop readiness and achievement of mission objectives. However, targeted vaccination and the optimization of preexisting immunity among deployed populations can decrease the threat of outbreaks among deployed troops. Here we describe methods for the computational modeling of disease transmission to explore how preexisting immunity compares with vaccination at the time of deployment as a means of preventing outbreaks and protecting troops and mission objectives during extended military deployment actions. These methods are illustrated with five modeling case studies for separate diseases common in many parts of the world, to show different approaches required in varying epidemiological settings.

  13. Computational Modeling of Interventions and Protective Thresholds to Prevent Disease Transmission in Deploying Populations

    Directory of Open Access Journals (Sweden)

    Colleen Burgess

    2014-01-01

    Full Text Available Military personnel are deployed abroad for missions ranging from humanitarian relief efforts to combat actions; delay or interruption in these activities due to disease transmission can cause operational disruptions, significant economic loss, and stressed or exceeded military medical resources. Deployed troops function in environments favorable to the rapid and efficient transmission of many viruses particularly when levels of protection are suboptimal. When immunity among deployed military populations is low, the risk of vaccine-preventable disease outbreaks increases, impacting troop readiness and achievement of mission objectives. However, targeted vaccination and the optimization of preexisting immunity among deployed populations can decrease the threat of outbreaks among deployed troops. Here we describe methods for the computational modeling of disease transmission to explore how preexisting immunity compares with vaccination at the time of deployment as a means of preventing outbreaks and protecting troops and mission objectives during extended military deployment actions. These methods are illustrated with five modeling case studies for separate diseases common in many parts of the world, to show different approaches required in varying epidemiological settings.

  14. AP1000R licensing and deployment in the United States

    International Nuclear Information System (INIS)

    Jordan, R. P.; Russ, P. A.; Filiak, P. P.; Castiglione, L. L.

    2012-01-01

    In recent years, both domestic and foreign utilities have turned to the standardized Westinghouse AP1000 plant design in satisfying their near - and long-term - sustainable energy needs. As direct support to these actions, licensing the AP1000 design has played a significant role by providing one of the fundamental bases in clearing regulatory hurdles leading to the start of new plant construction. Within the U.S. alone, Westinghouse AP1000 licensing activities have reached unprecedented milestones with the approvals of both AP1000 Design Certification and Southern Company's combined construction permit and operating license (COL) application directly supporting the construction of two new nuclear plants in Georgia. Further COL application approvals are immediately pending for an additional two AP1000 plants in South Carolina. And, across the U.S. nuclear industry spectrum, there are 10 other COL applications under regulatory review representing some 16 new plants at 10 sites. In total, these actions represent the first wave of new plant licensing under the regulatory approval process since 1978. Fundamental to the Nuclear Regulatory Commission's AP1000 Design Certification is the formal recognition of the AP1000 passive safety design through regulatory acceptance rulemaking. Through recognition and deployment of the AP1000 Design Certification, the utility licensee / operator of this reactor design are now offered an opportunity to use a simplified 'one-step' combined license process, thereby managing substantial back-end construction schedule risk from regulatory and intervention delays. Application of this regulatory philosophy represents both acceptance and encouragement of standardized reactor designs like the AP1000. With the recent AP1000 Design Certification and utility COL acceptances, the fundamental licensing processes of this philosophy have successfully proven the attainment of significant milestones with the next stage licensing actions directed

  15. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  16. Microsoft System Center Configuration Manager advanced deployment

    CERN Document Server

    Coupland, Martyn

    2014-01-01

    If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this book.

  17. Military Deployment and Elementary Student Achievement

    Science.gov (United States)

    Phelps, Terri; Dunham, Mardis; Lyons, Robert

    2010-01-01

    This study investigated the impact that military deployment has upon academic achievement of elementary school students. TerraNova test scores of 137 fourth and fifth grade students in two elementary schools with a high proportion of military dependent children were examined for two consecutive years. Although the academic test performance fell…

  18. 77 FR 36903 - Accelerating Broadband Infrastructure Deployment

    Science.gov (United States)

    2012-06-20

    ... the Nation's global competitiveness in the 21st century, driving job creation, promoting innovation, and expanding markets for American businesses. Broadband access also affords public safety agencies... infrastructure has been deployed in a vast majority of communities across the country, today too many areas still...

  19. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    August 8, 2013; Ta Kung Pao, August 12, 2013. 22 Sam Kim, “N. Korea Deploys Medium-Range Missiles, Bolsters Special Forces,” Yonhap, Seoul, February 23...building up its submarine force (both nuclear-powered and diesel-electric). In November 2004, the PLA Navy sent a Han -class nuclear attack submarine

  20. Very Low Head Turbine Deployment in Canada

    International Nuclear Information System (INIS)

    Kemp, P; Williams, C; Sasseville, Remi; Anderson, N

    2014-01-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  1. Very Low Head Turbine Deployment in Canada

    Science.gov (United States)

    Kemp, P.; Williams, C.; Sasseville, Remi; Anderson, N.

    2014-03-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  2. Abstracting application deployment on Cloud infrastructures

    Science.gov (United States)

    Aiftimiei, D. C.; Fattibene, E.; Gargana, R.; Panella, M.; Salomoni, D.

    2017-10-01

    Deploying a complex application on a Cloud-based infrastructure can be a challenging task. In this contribution we present an approach for Cloud-based deployment of applications and its present or future implementation in the framework of several projects, such as “!CHAOS: a cloud of controls” [1], a project funded by MIUR (Italian Ministry of Research and Education) to create a Cloud-based deployment of a control system and data acquisition framework, “INDIGO-DataCloud” [2], an EC H2020 project targeting among other things high-level deployment of applications on hybrid Clouds, and “Open City Platform”[3], an Italian project aiming to provide open Cloud solutions for Italian Public Administrations. We considered to use an orchestration service to hide the complex deployment of the application components, and to build an abstraction layer on top of the orchestration one. Through Heat [4] orchestration service, we prototyped a dynamic, on-demand, scalable platform of software components, based on OpenStack infrastructures. On top of the orchestration service we developed a prototype of a web interface exploiting the Heat APIs. The user can start an instance of the application without having knowledge about the underlying Cloud infrastructure and services. Moreover, the platform instance can be customized by choosing parameters related to the application such as the size of a File System or the number of instances of a NoSQL DB cluster. As soon as the desired platform is running, the web interface offers the possibility to scale some infrastructure components. In this contribution we describe the solution design and implementation, based on the application requirements, the details of the development of both the Heat templates and of the web interface, together with possible exploitation strategies of this work in Cloud data centers.

  3. Regulatory Assistance, Stakeholder Outreach, and Coastal and Marine Spatial Planning Activities In Support Marine and Hydrokinetic Energy Deployment: Task 2.1.7 Permitting and Planning Fiscal Year 2012 Year-End Report

    Energy Technology Data Exchange (ETDEWEB)

    Geerlofs, Simon H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hanna, Luke A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Judd, Chaeli R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Blake, Kara M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2012-09-01

    This fiscal year 2012 year-end report summarizes activities carried out under DOE Water Power task 2.1.7, Permitting and Planning. Activities under Task 2.1.7 address the concerns of a wide range of stakeholders with an interest in the development of the MHK industry, including regulatory and resource management agencies, tribes, NGOs, and industry.

  4. Garden State Parkway Corridor : ITS early deployment planning study : strategic deployment plan

    Science.gov (United States)

    1997-12-01

    This Strategic Deployment Plan describes ways of improving travel within the Garden : State Parkway Corridor using intelligent transportation systems (ITS) and without : constructing additional roadway lanes. Travel improvements will be possible with...

  5. Deployable reflector configurations. [for space telescope

    Science.gov (United States)

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    1983-01-01

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  6. Planning and Management of Technology Deployment Center

    International Nuclear Information System (INIS)

    Park, Jae Won; Joo, Po Kook; Kim, Jun Yeon and others

    2005-08-01

    The R and D contents are summarized as follows ; Models were set-up for transferring the developed technologies to the industry and managing technology deployment center to vitalize the commercialization and then the set-up model was tried to apply for transferring technologies for commercialization and to define interfaces between the R and D and industrial applications In this project, new products and processes were developed for promoting the commercialization. Infra-structures were firmly set-up for the venture company promotion and technology deployment developed during executing the proton Engineering frontier Project. Commercialization methodology connection with industrial companies were studied by outside specializing institute. Development of gem-stone coloring and new photo catalyst producing techniques are very high value-adding technologies, therefore, experimental and theoretical R and D were transacted simultaneously to obtain the originality of the technology. The theoretical R and D was committed to a specialist outside

  7. Stratus Ocean Reference Station (20 deg. S, 85 deg. W) : Mooring Recovery and Deployment Cruise, R/V Ronald H. Brown Cruise 05-05, September 26, 2005-October 21, 2005

    National Research Council Canada - National Science Library

    Hutto, Lara; Weller, Robert; Lord, Jeff; Smith, Jason; Bouchard, Paul; Fairall, Chris; Pezoa, Sergio; Bariteau, Ludovic; Lundquist, Jessica; Ghate, Virendra

    2006-01-01

    .... During the October 2005 cruise of NOAA's R/V Ronald H. Brown to the ORS Stratus site, the primary activities were recovery of the WHOl surface mooring that had been deployed in December 2004, deployment of a new...

  8. Towards the Ubiquitous Deployment of DNSSEC

    Science.gov (United States)

    2016-01-01

    and Session Initiation Protocol ( SIP ). However, it remains to be seen how quickly these enhancements are picked up and deployed. The second...Security RDI Resources for the DNSSEC Initiative System (the C&A system) RFC Request For Comments SIP Session Initiation Protocol SMTP Simple Mail...DISTRIBUTION UNLIMITED 1 Summary The Secure Extensions to the Domain Name System (DNSSEC) comprise of a set of protocol extensions that fix a

  9. THE PROTECTION AND DEPLOYMENT OF FINANCIAL INNOVATION

    OpenAIRE

    PETER GIANIODIS; JILL A. BROWN

    2013-01-01

    Prevailing theory suggests that firms that effectively protect technological discoveries from emulation will create and capture value. Despite its importance, little research has examined the specific mechanisms of how to protect technological discoveries, and have heretofore emphasized the importance of inherent resource attributes to limit competitor emulation. Using a sample of financial patents, we test theory regarding the effects of resource attributes and deployment mechanisms on resou...

  10. IRIS. Progress in licensing and toward deployment

    International Nuclear Information System (INIS)

    Petrovic, B.; Carelli, M.D.; Kling, C.L.; Cavlina, N.; Grgic, D.

    2006-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light water cooled, pressurized reactor of smaller generating capacity (1000 MWt, or 335 MWe). It is being developed through a strong international partnership by a team lead by Westinghouse and including organizations from 10 countries. The main objective of the project is to offer a simple nuclear power plant with outstanding safety, attractive economics and enhanced proliferation resistance characteristics ready for deployment within the next decade. IRIS embodies the requirements set forth by the recently announced US DOE Global Nuclear Energy Partnership (GNEP) program for worldwide deployment of a smaller-scale reactors and provides a viable bridge to Generation IV reactors. IRIS is designed to address the needs of both developed and emerging markets. Its smaller power level provides deployment flexibility in larger developed markets, and makes it in particular well suited for markets with limited grids or where the annual energy demand growth is moderate. Due to its short construction time and the staggered build option, IRIS significantly reduces the required financing, improves cash flow, and provides a viable solution for economies with limited resources. While based on proven and worldwide accepted LWR technology, IRIS introduces a number of innovative solutions to simplify its design and improve safety and operational characteristics, including the integral primary system and its components, as well as the safety-by-design approach. These features will be tested and demonstrated in a testing program that has been initiated. As its centerpiece, the program will include the integral test facility. Results of this program will support licensing with the US NRC. A multinational licensing is considered to facilitate worldwide deployment. (author)

  11. Bomber Deployments: A New Power Projection Strategy

    Science.gov (United States)

    2016-08-21

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY BOMBER DEPLOYMENTS: A NEW POWER PROJECTION STRATEGY by...operating base (FOB), main operating base ( MOB ) and intermediate staging base (ISB).10 Each type of base requires certain actions to make it suitable for...closure of many main operating bases ( MOB ) overseas and the reluctance of many nations to permit permanent military bases on their soil.”15 This

  12. Quality Function Deployment for Large Systems

    Science.gov (United States)

    Dean, Edwin B.

    1992-01-01

    Quality Function Deployment (QFD) is typically applied to small subsystems. This paper describes efforts to extend QFD to large scale systems. It links QFD to the system engineering process, the concurrent engineering process, the robust design process, and the costing process. The effect is to generate a tightly linked project management process of high dimensionality which flushes out issues early to provide a high quality, low cost, and, hence, competitive product. A pre-QFD matrix linking customers to customer desires is described.

  13. Reactor power system deployment and startup

    International Nuclear Information System (INIS)

    Wetch, J.R.; Nelin, C.J.; Britt, E.J.; Klein, G.; Rasor Associates, Inc., Sunnyvale, CA; California Institute of Technology, Pasadena)

    1985-01-01

    This paper addresses issues that should receive further examination in the near-term as concept selection for development of a U.S. space reactor power system is approached. The issues include: the economics, practicality and system reliability associated with transfer of nuclear spacecraft from low earth shuttle orbits to operational orbits, via chemical propulsion versus nuclear electric propulsion; possible astronaut supervised reactor and nuclear electric propulsion startup in low altitude Shuttle orbit; potential deployment methods for nuclear powered spacecraft from Shuttle; the general public safety of low altitude startup and nuclear safe and disposal orbits; the question of preferred reactor power level; and the question of frozen versus molten alkali metal coolant during launch and deployment. These issues must be considered now because they impact the SP-100 concept selection, power level selection, weight and size limits, use of deployable radiators, reliability requirements, and economics, as well as the degree of need for and the urgency of developing space reactor power systems. 5 references

  14. FBR/VHTR deployment scenarios in Japan

    International Nuclear Information System (INIS)

    Richards, Matt; Kunitomi, Kazuhiko

    2008-01-01

    Co-deployment of Fast Breeder Reactors (FBRs) and Very High Temperature Reactors (VHTRs) can be used as the nuclear technologies to meet a significant portion of Japan's future energy demands. The FBR provides the fissile fuel for energy security and sustainability, and can be used to provide a significant portion of the electricity demand. The VHTR can provide flexible energy outputs (electricity, hydrogen, and high-temperature heat) with high efficiency, can operate with a wide variety of fuel cycles, and can be sited at locations that have limited availability of cooling water. These features, combined with its passive safety and high degree of proliferation resistance, make the VHTR an ideal complement for co-deployment with the FBR in Japan and also a very low-risk technology of export to foreign countries. In addition to hydrogen production, the high-temperature thermal energy produced by the VHTR fleet can be used for a wide variety of process-heat applications, and the VHTR can play a key role for significantly reducing greenhouse-gas emissions. This paper describes assessments for deploying FBRs and VHTRs in Japan using a closed fuel cycle, with the FBRs supplying the fissile material to sustain the combined FBR/VHTR fleet. (author)

  15. Hybrid deployable support truss designs for LDR

    Science.gov (United States)

    Hedgepeth, J.

    1988-01-01

    Concepts for a 20-meter diameter Large Deployable Reflector (LDR) deployable truss backup structure, and analytical predictions of its structural characteristics are discussed. The concept shown is referred to as the SIXPAC; It is a combination of the PACTRUSS concept and a single-fold beam, which would make up the desired backup structure. One advantage of retaining the PACTRUSS concept is its packaging density and its capability for synchronous deployment. Various 2-meter hexagonal panel arrangements are possible for this Hybrid PACTRUSS structure depending on the panel-to-structure attachment strategies used. Static analyses of the SIXPAC using various assumptions for truss designs and panel masses of 10 kg sq meters were performed to predict the tip displacement of the structure when supported at the center. The tip displacement ranged from 0.20 to 0.44 mm without the panel mass, and from 0.9 to 3.9 mm with the panel mass (in a 1-g field). The data indicate that the structure can be adequately ground tested to validate its required performance in space, assuming the required performance in space is approximately 100 microns. The static displacement at the tip of the structure when subjected to an angular acceleration of 0.001 rad/sec squared were estimated to range from 0.8 to 7.5 microns, depending on the type of truss elements.

  16. Modular VO oriented Java EE service deployer

    Science.gov (United States)

    Molinaro, Marco; Cepparo, Francesco; De Marco, Marco; Knapic, Cristina; Apollo, Pietro; Smareglia, Riccardo

    2014-07-01

    The International Virtual Observatory Alliance (IVOA) has produced many standards and recommendations whose aim is to generate an architecture that starts from astrophysical resources, in a general sense, and ends up in deployed consumable services (that are themselves astrophysical resources). Focusing on the Data Access Layer (DAL) system architecture, that these standards define, in the last years a web based application has been developed and maintained at INAF-OATs IA2 (Italian National institute for Astrophysics - Astronomical Observatory of Trieste, Italian center of Astronomical Archives) to try to deploy and manage multiple VO (Virtual Observatory) services in a uniform way: VO-Dance. However a set of criticalities have arisen since when the VO-Dance idea has been produced, plus some major changes underwent and are undergoing at the IVOA DAL layer (and related standards): this urged IA2 to identify a new solution for its own service layer. Keeping on the basic ideas from VO-Dance (simple service configuration, service instantiation at call time and modularity) while switching to different software technologies (e.g. dismissing Java Reflection in favour of Enterprise Java Bean, EJB, based solution), the new solution has been sketched out and tested for feasibility. Here we present the results originating from this test study. The main constraints for this new project come from various fields. A better homogenized solution rising from IVOA DAL standards: for example the new DALI (Data Access Layer Interface) specification that acts as a common interface system for previous and oncoming access protocols. The need for a modular system where each component is based upon a single VO specification allowing services to rely on common capabilities instead of homogenizing them inside service components directly. The search for a scalable system that takes advantage from distributed systems. The constraints find answer in the adopted solutions hereafter sketched. The

  17. INTERNATIONAL ENVIRONMENTAL TECHNOLOGY IDENTIFICATION, DEVELOPMENT, DEMONSTRATION, DEPLOYMENT AND EXCHANGE

    Energy Technology Data Exchange (ETDEWEB)

    Roy C. Herndon

    2001-02-28

    Cooperative Agreement (DE-FC21-95EW55101) between the U.S. Department of Energy (DOE) and the Florida State University's Institute for International Cooperative Environmental Research (IICER) was designed to facilitate a number of joint programmatic goals of both the DOE and the IICER related to international technology identification, development, demonstration and deployment using a variety of mechanisms to accomplish these goals. These mechanisms included: laboratory and field research; technology demonstrations; international training and technical exchanges; data collection, synthesis and evaluation; the conduct of conferences, symposia and high-level meetings; and other appropriate and effective approaches. The DOE utilized the expertise and facilities of the IICER at Florida State University to accomplish its goals related to this cooperative agreement. The IICER has unique and demonstrated capabilities that have been utilized to conduct the tasks for this cooperative agreement. The IICER conducted activities related to technology identification, development, evaluation, demonstration and deployment through its joint centers which link the capabilities at Florida State University with collaborating academic and leading research institutions in the major countries of Central and Eastern Europe (e.g., Czech Republic, Hungary, Poland) and Russia. The activities and accomplishments for this five-year cooperative agreement are summarized in this Final Technical Report.

  18. Deployment Effects of Marin Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Brian Polagye; Mirko Previsic

    2010-06-17

    Given proper care in siting, design, deployment, operation and maintenance, marine and hydrokinetic technologies could become one of the more environmentally benign sources of electricity generation. In order to accelerate the adoption of these emerging hydrokinetic and marine energy technologies, navigational and environmental concerns must be identified and addressed. All developing hydrokinetic projects involve a wide variety of stakeholders. One of the key issues that site developers face as they engage with this range of stakeholders is that many of the possible conflicts (e.g., shipping and fishing) and environmental issues are not well-understood, due to a lack of technical certainty. In September 2008, re vision consulting, LLC was selected by the Department of Energy (DoE) to apply a scenario-based approach to the emerging wave and tidal technology sectors in order to evaluate the impact of these technologies on the marine environment and potentially conflicting uses. The project’s scope of work includes the establishment of baseline scenarios for wave and tidal power conversion at potential future deployment sites. The scenarios will capture variations in technical approaches and deployment scales to properly identify and characterize environmental impacts and navigational effects. The goal of the project is to provide all stakeholders with an improved understanding of the potential effects of these emerging technologies and focus all stakeholders onto the critical issues that need to be addressed. This groundwork will also help in streamlining siting and associated permitting processes, which are considered key hurdles for the industry’s development in the U.S. today. Re vision is coordinating its efforts with two other project teams funded by DoE which are focused on regulatory and navigational issues. The results of this study are structured into three reports: 1. Wave power scenario description 2. Tidal power scenario description 3. Framework for

  19. Fundamentals of 3D Deployable Mechanisms in Space

    Data.gov (United States)

    National Aeronautics and Space Administration — Fundamentals of 3D Deployable Origami Structures in Space The primary objectives of my research are to study the application of 3D deployable origami structures in...

  20. STEP flight experiments Large Deployable Reflector (LDR) telescope

    Science.gov (United States)

    Runge, F. C.

    1984-01-01

    Flight testing plans for a large deployable infrared reflector telescope to be tested on a space platform are discussed. Subsystem parts, subassemblies, and whole assemblies are discussed. Assurance of operational deployability, rigidization, alignment, and serviceability will be sought.

  1. Elastic Deployable Composite Tubular Roll-Out Boom, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Deployable Space Systems (DSS) has developed an affordable and ultra-lightweight elastically self-deployable Roll-Out Boom technology that provides affordability and...

  2. Structures and Mechanisms Design Concepts for Adaptive Deployable Entry Placement Technology

    Science.gov (United States)

    Yount, Bryan C.; Arnold, James O.; Gage, Peter J.; Mockelman, Jeffrey; Venkatapathy, Ethiraj

    2012-01-01

    System studies have shown that large deployable aerodynamic decelerators such as the Adaptive Deployable Entry and Placement Technology (ADEPT) concept can revolutionize future robotic and human exploration missions involving atmospheric entry, descent and landing by significantly reducing the maximum heating rate, total heat load, and deceleration loads experienced by the spacecraft during entry [1-3]. ADEPT and the Hypersonic Inflatable Aerodynamic Decelerator (HIAD) [4] share the approach of stowing the entry system in the shroud of the launch vehicle and deploying it to a much larger diameter prior to entry. The ADEPT concept provides a low ballistic coefficient for planetary entry by employing an umbrella-like deployable structure consisting of ribs, struts and a fabric cover that form an aerodynamic decelerator capable of undergoing hypersonic flight. The ADEPT "skin" is a 3-D woven carbon cloth that serves as a thermal protection system (TPS) and as a structural surface that transfers aerodynamic forces to the underlying ribs [5]. This paper focuses on design activities associated with integrating ADEPT components (cloth, ribs, struts and mechanisms) into a system that can function across all configurations and environments of a typical mission concept: stowed during launch, in-space deployment, entry, descent, parachute deployment and separation from the landing payload. The baseline structures and mechanisms were selected via trade studies conducted during the summer and fall of 2012. They are now being incorporated into the design of a ground test article (GTA) that will be fabricated in 2013. It will be used to evaluate retention of the stowed configuration in a launch environment, mechanism operation for release, deployment and locking, and static strength of the deployed decelerator. Of particular interest are the carbon cloth interfaces, underlying hot structure, (Advanced Carbon- Carbon ribs) and other structural components (nose cap, struts, and

  3. Psychiatric Effects of Military Deployment on Children and Families

    Science.gov (United States)

    James, Trenton

    2012-01-01

    Deployments in the United States military have increased greatly in the past 10 years. Families and children are psychiatrically affected by these deployments, and recent studies are clarifying these effects. This article focuses on the psychiatric effects of deployment on children and uses a composite case example to review the use of play therapy to treat children who are having psychiatric issues related to the deployment of one or both parents. PMID:22468239

  4. Deployment-related risk factors of low back pain

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Marott, Jacob Louis; Gyntelberg, Finn

    2014-01-01

    Where much is known about the consequences of spinal and low back pain (LBP) during military deployments, there is lesser knowledge of risk factors for LBP among the deployed forces. The objective of this study was to identify deployment-related exposures associated with LBP. The study was a ques...... their subordinates and involve medical personnel, especially deployed physiotherapists, by giving advice to soldiers of different military occupational specialties on how to optimize ergonomics at work....

  5. Design aspects of a deployable tensegrity-hollow-rope footbridge

    OpenAIRE

    Rhode-Barbarigos , Landolf; Bel Hadj Ali , Nizar; Motro , René; Smith , Ian F.C.

    2012-01-01

    International audience; Tensegrity structures are composed of cables and struts in a pre-stressed self-equilibrium. Although tensegrity first appeared in the 1950s, it is seldom used in civil engineering. This paper focuses on the design aspects of a deployable tensegrity-hollow-rope footbridge. Deployment is usually not a critical design case for traditional deployable structures. However, for tensegrity systems deployment may be critical due to the actuation required. In this paper, deploym...

  6. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  7. Use of Docker for deployment and testing of astronomy software

    Science.gov (United States)

    Morris, D.; Voutsinas, S.; Hambly, N. C.; Mann, R. G.

    2017-07-01

    We describe preliminary investigations of using Docker for the deployment and testing of astronomy software. Docker is a relatively new containerization technology that is developing rapidly and being adopted across a range of domains. It is based upon virtualization at operating system level, which presents many advantages in comparison to the more traditional hardware virtualization that underpins most cloud computing infrastructure today. A particular strength of Docker is its simple format for describing and managing software containers, which has benefits for software developers, system administrators and end users. We report on our experiences from two projects - a simple activity to demonstrate how Docker works, and a more elaborate set of services that demonstrates more of its capabilities and what they can achieve within an astronomical context - and include an account of how we solved problems through interaction with Docker's very active open source development community, which is currently the key to the most effective use of this rapidly-changing technology.

  8. AIRSAR South American deployment: Operation plan, version 3.0

    Science.gov (United States)

    Kobrick, M.

    1993-01-01

    The United States National Aeronautics and Space Administration (NASA) and the Brazilian Commission for Space Activities (COBAE) are undertaking a joint experiment involving NASA's DC-8 research aircraft and the Airborne Synthetic Aperture Radar (AIRSAR) system during late May and June 1993. The research areas motivating these activities are: (1) fundamental research in the role of soils, vegetation, and hydrology in the global carbon cycle; and (2) in cooperation with South American scientists, airborne remote sensing research for the upcoming NASA Spaceborne Imaging Radar (SIR)-C/X-SAR flights on the Space Shuttle. A flight schedule and plans for the deployment that were developed are included. Maps of the site locations and schematic indications of flight routes and dates, plots showing swath locations derived from the flight requests and generated by flight planning software, and, most importantly, a calendar showing which sites will be imaged each day are included.

  9. Alignment and phasing of deployable telescopes

    Science.gov (United States)

    Woolf, N. J.; Ulich, B. L.

    1983-01-01

    The experiences in coaligning and phasing the Multi-Mirror Telescope (MMT), together with studies in setting up radio telescopes, are presented. These experiences are discussed, and on the basis they furnish, schemes are suggested for coaligning and phasing four large future telescopes with complex primary mirror systems. These telescopes are MT2, a 15-m-equivalent MMT, the University of California Ten Meter Telescope, the 10 m sub-mm wave telescope of the University of Arizona and the Max Planck Institute for Radioastronomy, and the Large Deployable Reflector, a future space telescope for far-IR and sub-mm waves.

  10. Large Deployable Reflector (LDR) feasibility study update

    Science.gov (United States)

    Alff, W. H.; Banderman, L. W.

    1983-01-01

    In 1982 a workshop was held to refine the science rationale for large deployable reflectors (LDR) and develop technology requirements that support the science rationale. At the end of the workshop, a set of LDR consensus systems requirements was established. The subject study was undertaken to update the initial LDR study using the new systems requirements. The study included mirror materials selection and configuration, thermal analysis, structural concept definition and analysis, dynamic control analysis and recommendations for further study. The primary emphasis was on the dynamic controls requirements and the sophistication of the controls system needed to meet LDR performance goals.

  11. Quality function deployment: application to rehabilitation services.

    Science.gov (United States)

    Einspruch, E M; Omachonu, V K; Einspruch, N G

    1996-01-01

    Describes how the challenge of providing rehabilitative services at reasonable costs is beginning to mount. The management of quality in rehabilitative services is therefore gaining increasing attention in the health care arena. States that if a link is implied between the above stated goal and customer satisfaction, it is imperative to evaluate quality or customer satisfaction in the context of the patient's experience. Describes the quality function deployment (QFD) system and how it leads to a better understanding of the customer's needs and wants. Explores the process of applying the concept of QFD to physical therapy.

  12. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...

  13. Staged deployment of the International Fusion Materials Irradiation Facility

    International Nuclear Information System (INIS)

    Takeuchi, H.; Sugimoto, M.; Nakamura, H.

    2001-01-01

    The International Fusion Materials Irradiation Facility (IFMIF) employs an accelerator based D-Li intense neutron source as defined in the 1995-96 Conceptual Design Activity (CDA) study. In 1999, IEA mandated a review of the CDA IFMIF design for cost reduction without change to its original mission. This objective was accomplished by eliminating the previously assumed possibility of potential upgrade of IFMIF beyond the user requirements. The total estimated cost was reduced from $797.2 M to $487.8 M. An option of deployment in 3 stages was also examined to reduce the initial investment and annual expenditures during construction. In this scenario, full performance is achieved gradually with each interim stage as follows. 1st Stage: 20% operation for material selection for ITER breeding blanket, 2nd Stage: 50% operation to demonstrate materials performance of a reference alloy for DEMO, 3rd Stage: full performance operation ( 2MW/m 2 at 500cm 3 ) to obtain engineering data for potential DEMO materials under irradiation up to 100-200 dpa. In summary, the new, reduced cost IFMIF design and staged deployment still satisfies the original mission. The estimated cost of the 1st Stage facility is only $303.6 M making it financially much more attractive. Currently, IFMIF Key Element Technology Phase (KEP) is underway to reduce the key technology risk factors. (author)

  14. Development and modeling of self-deployable structures

    Science.gov (United States)

    Neogi, Depankar

    Deployable space structures are prefabricated structures which can be transformed from a closed, compact configuration to a predetermined expanded form in which they are stable and can bear loads. The present research effort investigates a new family of deployable structures, called the Self-Deployable Structures (SDS). Unlike other deployable structures, which have rigid members, the SDS members are flexible while the connecting joints are rigid. The joints store the predefined geometry of the deployed structure in the collapsed state. The SDS is stress-free in both deployed and collapsed configurations and results in a self-standing structure which acquires its structural properties after a chemical reaction. Reliability of deployment is one of the most important features of the SDS, since it does not rely on mechanisms that can lock during deployment. The unit building block of these structures is the self-deployable structural element (SDSE). Several SDSE members can be linked to generate a complex building block such as a triangular or a tetrahedral structure. Different SDSE and SDS concepts are investigated in the research work, and the performance of SDS's are experimentally and theoretically explored. Triangular and tetrahedral prototype SDS have been developed and presented. Theoretical efforts include modeling the behavior of 2-dimensional SDSs. Using this design tool, engineers can study the effects of different packing configurations and deployment sequence; and perform optimization on the collapsed state of a structure with different external constraints. The model also predicts if any lockup or entanglement occurs during deployment.

  15. The effect of military deployment on mental health

    DEFF Research Database (Denmark)

    Lyk-Jensen, Stéphanie; Weatherall, Cecilie Dohlmann; W. Jepsen, Peter

    for the non-deployed eligible men, and our results hold to various robustness checks. Our administrative records provide objective measures of mental health service use in the form of psychiatric diagnoses and purchase of mental health-related medication. The very rich data makes it possible to control......In this paper we estimate the causal effect of military deployment on soldiers’ mental health. To handle the selection bias problem, we use longitudinal data for deployed and non-deployed eligible men in a difference-in-differences setting. Using pair-wise matching, we impute deployment dates...... for important variables like intelligence tests and family background. We find significant adverse effects of military deployment on soldiers’ mental health service use. Highlights: - Causal effect of military deployment on soldiers’ use of mental health service - Using a difference-in-differences approach...

  16. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...... statistical models of deployment areas, the performance analysis is carried out in the form of operator case studies for large-scale deployment scenarios, including realistic macro network layouts and inhomogeneous spatial traffic distributions. Deployment of small cells is performed by means of proposed...... heuristic deployment algorithms, which combine network coverage and spatial user density information. As a secondary aspect, deployment solutions achieving the same coverage performance are compared in terms of Total Cost of Ownership (TCO), in order to investigate the viability of different deployment...

  17. Integrated assessment of dispersed energy resources deployment

    Energy Technology Data Exchange (ETDEWEB)

    Marnay, Chris; Blanco, Raquel; Hamachi, Kristina S.; Kawaan, Cornelia P.; Osborn, Julie G.; Rubio, F. Javier

    2000-06-01

    The goal of this work is to create an integrated framework for forecasting the adoption of distributed energy resources (DER), both by electricity customers and by the various institutions within the industry itself, and for evaluating the effect of this adoption on the power system, particularly on the overall reliability and quality of electrical service to the end user. This effort and follow on contributions are intended to anticipate and explore possible patterns of DER deployment, thereby guiding technical work on microgrids towards the key technical problems. An early example of this process addressed is the question of possible DER adopting customer disconnection. A deployment scenario in which many customers disconnect from their distribution company (disco) entirely leads to a quite different set of technical problems than a scenario in which customers self generate a significant share or all of their on-site electricity requirements and additionally buy and sell energy and ancillary services (AS) locally and/or into wider markets. The exploratory work in this study suggests that the economics under which customers disconnect entirely are unlikely.

  18. Hadoop Cluster Deployment: A Methodological Approach

    Directory of Open Access Journals (Sweden)

    Ronaldo Celso Messias Correia

    2018-05-01

    Full Text Available For a long time, data has been treated as a general problem because it just represents fractions of an event without any relevant purpose. However, the last decade has been just about information and how to get it. Seeking meaning in data and trying to solve scalability problems, many frameworks have been developed to improve data storage and its analysis. As a framework, Hadoop was presented as a powerful tool to deal with large amounts of data. However, it still causes doubts about how to deal with its deployment and if there is any reliable method to compare the performance of distinct Hadoop clusters. This paper presents a methodology based on benchmark analysis to guide the Hadoop cluster deployment. The experiments employed The Apache Hadoop and the Hadoop distributions of Cloudera, Hortonworks, and MapR, analyzing the architectures on local and on clouding—using centralized and geographically distributed servers. The results show the methodology can be dynamically applied on a reliable comparison among different architectures. Additionally, the study suggests that the knowledge acquired can be used to improve the data analysis process by understanding the Hadoop architecture.

  19. Regional Energy Deployment System (ReEDS)

    Energy Technology Data Exchange (ETDEWEB)

    Short, W.; Sullivan, P.; Mai, T.; Mowers, M.; Uriarte, C.; Blair, N.; Heimiller, D.; Martinez, A.

    2011-12-01

    The Regional Energy Deployment System (ReEDS) is a deterministic optimization model of the deployment of electric power generation technologies and transmission infrastructure throughout the contiguous United States into the future. The model, developed by the National Renewable Energy Laboratory's Strategic Energy Analysis Center, is designed to analyze the critical energy issues in the electric sector, especially with respect to potential energy policies, such as clean energy and renewable energy standards or carbon restrictions. ReEDS provides a detailed treatment of electricity-generating and electrical storage technologies and specifically addresses a variety of issues related to renewable energy technologies, including accessibility and cost of transmission, regional quality of renewable resources, seasonal and diurnal generation profiles, variability of wind and solar power, and the influence of variability on the reliability of the electrical grid. ReEDS addresses these issues through a highly discretized regional structure, explicit statistical treatment of the variability in wind and solar output over time, and consideration of ancillary services' requirements and costs.

  20. SMUD Community Renewable Energy Deployment Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Sison-Lebrilla, Elaine [Sacramento Municipal Utility District, Sacramento, CA (United States); Tiangco, Valentino [Sacramento Municipal Utility District, Sacramento, CA (United States); Lemes, Marco [Sacramento Municipal Utility District, Sacramento, CA (United States); Ave, Kathleen [Sacramento Municipal Utility District, Sacramento, CA (United States)

    2015-06-08

    This report summarizes the completion of four renewable energy installations supported by California Energy Commission (CEC) grant number CEC Grant PIR-11-005, the US Department of Energy (DOE) Assistance Agreement, DE-EE0003070, and the Sacramento Municipal Utility District (SMUD) Community Renewable Energy Deployment (CRED) program. The funding from the DOE, combined with funding from the CEC, supported the construction of a solar power system, biogas generation from waste systems, and anaerobic digestion systems at dairy facilities, all for electricity generation and delivery to SMUD’s distribution system. The deployment of CRED projects shows that solar projects and anaerobic digesters can be successfully implemented under favorable economic conditions and business models and through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region. In addition to reducing GHG emissions, the projects also demonstrate that solar projects and anaerobic digesters can be readily implemented through collaborative partnerships. This work helps other communities learn how to assess, overcome barriers, utilize, and benefit from renewable resources for electricity generation in their region.

  1. Dynamic analysis of the large deployable reflector

    Science.gov (United States)

    Calleson, Robert E.; Scott, A. Don

    1987-01-01

    The Large Deployable Reflector (LDR) is to be an astronomical observatory orbiting above Earth's obscuring atmosphere and operating in the spectral range between 30 microns and 1000 microns wavelength. The LDR will be used to study such astronomical phenomena as stellar and galactic formation, cosmology, and planetary atmospheres. The LDR will be the first observatory to be erected and assembled in space. This distinction brings with it several major technological challenges such as the development of ultra-lightweight deployable mirrors, advanced mirror fabrication techniques, advanced structures, and control of vibrations due to various sources of excitation. The purpose of this analysis is to provide an assessment of the vibrational response due to secondary mirror chopping and LDR slewing. The dynamic response of two 20-m LDR configurations was studied. Two mirror support configurations were investigated for the Ames concept, the first employs a six-strut secondary mirror support structure, while the second uses a triple-bipod support design. All three configurations were modeled using a tetrahedral truss design for the primary mirror support structure. Response resulting from secondary mirror chopping was obtained for the two Ames configurations, and the response of the primary mirror from slewing was obtained for all three configurations.

  2. Scenario study on the FBR deployment

    International Nuclear Information System (INIS)

    Ono, Kiyoshi; Kofuji, Hirohide; Otaki, Akira; Yonezawa, Shigeaki; Shinoda, Yoshihiko; Hirao, Kazunori; Ikegami, Tetsuo

    2000-12-01

    This study on success scenarios for the Fast Breeder Reactor (FBR) deployment was performed taking account of future situation of fossil, renewable and nuclear energies in Japan as well as the world from the viewpoints of the following four items; economics, environment, energy security and restriction of natural uranium resources. In the economics scenario, if carbon tax is added to generating cost of LNG, coal and oil and the economics of FBR cycle is competitive with LWR cycle in the future, FBR cycle will be expected to introduce as the middle and base load power plant. In the environment scenario, there is also any possibility that FBR cycle which can burn and transmute minor actinide and fission product elements will be introduced in order to reduce the burden of deposit facility and the toxicity of high-level waste. In the uranium resources restriction scenario, FBR cycle needs to be deployed at the latest in the middle of 21st century from the viewpoint of the restriction of natural uranium resources. This study was carried out in a part of JNC's feasibility study on commercialized FBR cycle system. (author)

  3. The medical software quality deployment method.

    Science.gov (United States)

    Hallberg, N; Timpka, T; Eriksson, H

    1999-03-01

    The objective of this study was to develop a Quality Function Deployment (QFD) model for design of information systems in health-care environments. Consecutive blocked-subject case studies were conducted, based on action research methods. Starting with a QFD model for software development, a model for information system design, the Medical Software Quality Deployment (MSQD) model, was developed. The MSQD model was divided into the pre-study phase, in which the customer categories and their power to influence the design are determined; the data collection phase, in which the voice of customers (VoC) is identified by observations and interviews and quantified by Critical. Incident questionnaires; the need specification phase, where the VoC is specified into ranked customer needs; and the design phase where the customer needs are transformed stepwise to technical requirements and design attributes. QFD showed to be useful for integrating the values of different customer categories in software development for health-care settings. In the later design phases, other quality methods should be used for software implementation and testing.

  4. Testing the Deployment Repeatability of a Precision Deployable Boom Prototype for the Proposed SWOT Karin Instrument

    Science.gov (United States)

    Agnes, Gregory S.; Waldman, Jeff; Hughes, Richard; Peterson, Lee D.

    2015-01-01

    NASA's proposed Surface Water Ocean Topography (SWOT) mission, scheduled to launch in 2020, would provide critical information about Earth's oceans, ocean circulation, fresh water storage, and river discharge. The mission concept calls for a dual-antenna Ka-band radar interferometer instrument, known as KaRIn, that would map the height of water globally along two 50 km wide swaths. The KaRIn antennas, which would be separated by 10 meters on either side of the spacecraft, would need to be precisely deployable in order to meet demanding pointing requirements. Consequently, an effort was undertaken to design build and prototype a precision deployable Mast for the KaRIn instrument. Each mast was 4.5-m long with a required dilitation stability of 2.5 microns over 3 minutes. It required a minimum first mode of 7 Hz. Deployment repeatability was less than +/- 7 arcsec in all three rotation directions. Overall mass could not exceed 41.5 Kg including any actuators and thermal blanketing. This set of requirements meant the boom had to be three times lighter and two orders of magnitude more precise than the existing state of the art for deployable booms.

  5. Finding Their Way Back In: Family Reintegration Following Guard Deployment.

    Science.gov (United States)

    Messecar, Deborah C

    2017-03-01

    The aim of this study was to describe deployed National Guard members' and their families' perceptions of their experience with family reintegration, and the causes and conditions of challenges reintegration presents after deployment. A total of 26 National Guard members and 19 family members participated in individual (n = 22), couples (n = 6), or focus group (n = 17) interviews. In-depth interviews were used to assess needs and maximize input from military families regarding deployment-related experiences and reintegration issues. Qualitative coding and analysis of data were completed using NVivo. Finding their way back in is the key process that the military members must complete to successfully reestablish their desired social connections with the family and reclaim their place within the family. Several conditions shape the degree of challenges with reintegration that veterans and their family will encounter. These include preparation for deployment, length and type of deployment, communication during deployment, and finally, awareness of how deployment changes the military member and the family. Support resources dedicated to providing National Guard members and their families with assistance in preparing for deployments and educating them about the importance of communication during deployment should be maintained and expanded. Broader educational efforts that increase awareness of what to expect regarding how deployment changes the military member and the family are needed. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  6. Performance study of the primary standard ionization chamber for deployment of the diagnostic radiology qualities

    International Nuclear Information System (INIS)

    Cardoso, Ricardo de Souza; Bossio, Francisco; Quaresma, Daniel da Silva; Peixoto, Jose Guilherme Pereira

    2013-01-01

    Activities radiotherapy, diagnostic radiology and radiation protection, require knowledge of physical and dosimetric parameters, to be applied safely. Aiming to meet demand in Brazil, the National Laboratory of Metrology of Ionising Radiation - LNMRI - is deploying the primary standard for the calibration of secondary standard chambers, used in quality control in hospitals, clinics and industries. (author)

  7. The effect of military deployment on mental health

    DEFF Research Database (Denmark)

    Vincent, Stéphanie; Weatherall, Cecilie Dohlmann; W. Jepsen, Peter

    2016-01-01

    Public concern about soldiers’ mental health has increased over the last decade. Yet the large literature on the mental health problems of returning soldiers relies primarily on self-reported measures that may suffer from non-response bias, usually refers to older conflicts, and focuses mainly...... on specific diagnoses such as PTSD. Another challenge is that the differences between soldiers and non-soldiers are not necessarily causal, instead possibly reflecting an underlying propensity towards active military service. Using the objective measures of hospitalizations and the purchase of mental health...... medication, this paper is the first to investigate the effect of recent military deployments on a broader measure of mental health, for a full population of Danish soldiers and a comparison group of eligible men. We exploit a panel of Danish health administrative records and use propensity score matching...

  8. Rendezvous, proximity operations and capture quality function deployment report

    Science.gov (United States)

    Lamkin, Stephen L. (Editor)

    1991-01-01

    Rendezvous, Proximity Operations, and Capture (RPOC) is a missions operations area which is extremely important to present and future space initiatives and must be well planned and coordinated. To support this, a study team was formed to identify a specific plan of action using the Quality Function Deployment (QFD) process. This team was composed of members from a wide spectrum of engineering and operations organizations which are involved in the RPOC technology area. The key to this study's success is an understanding of the needs of potential programmatic customers and the technology base available for system implementation. To this end, the study team conducted interviews with a variety of near term and future programmatic customers and technology development sponsors. The QFD activity led to a thorough understanding of the needs of these customers in the RPOC area, as well as the relative importance of these needs.

  9. System concept for a moderate cost Large Deployable Reflector (LDR)

    Science.gov (United States)

    Swanson, P. N.; Breckinridge, J. B.; Diner, A.; Freeland, R. E.; Irace, W. R.; Mcelroy, P. M.; Meinel, A. B.; Tolivar, A. F.

    1986-01-01

    A study was carried out at JPL during the first quarter of 1985 to develop a system concept for NASA's LDR. Major features of the concept are a four-mirror, two-stage optical system; a lightweight structural composite segmented primary reflector; and a deployable truss backup structure with integral thermal shield. The two-stage optics uses active figure control at the quaternary reflector located at the primary reflector exit pupil, allowing the large primary to be passive. The lightweight composite reflector panels limit the short-wavelength operation to approximately 30 microns but reduce the total primary reflector weight by a factor of 3 to 4 over competing technologies. On-orbit thermal analysis indicates a primary reflector equilibrium temperature of less than 200 K with a maximum gradient of about 5 C across the 20-m aperture. Weight and volume estimates are consistent with a single Shuttle launch, and are based on Space Station assembly and checkout.

  10. Application Of Quality Function Deployment (QFD) To Measure Performance

    International Nuclear Information System (INIS)

    Fazila Said; Mohd Amirul Shafiq Shafiee; Nurul Hasanah Mohd Abd Basir

    2014-01-01

    This study aims to measure service quality performance and identify critical service quality characteristics as perceived by the customers. An integrated results survey that conducted by seven service centers that certified with Quality Management System (QMS) in Nuclear Malaysia are analysed. This is followed by constructing House of Quality (HoQ) and identifying other parameters for the Quality Function Deployment (QFD) matrix. HoQ is a simple and attractive service innovation tool which can be used to directly show comprehensive information which contained the voice of customer (VOC), technical response, technical correlation and matrix relationship. This study revealed that the information's from HoQ with further discussion on planning part which can be used to assist management in knowing the overall detail information of service center achievement and recognizes the solution for unsatisfied customer through priority improvement activity to enhance the customer satisfaction in future. (author)

  11. A programmable autosampler for a field deployable tritium analysis system

    International Nuclear Information System (INIS)

    Hofstetter, K.J.; Cable, P.R.; Beals, D.M.; Jones, J.

    1996-01-01

    Researchers in the Environmental Technology Section of the Savannah River Technology Center, in cooperation with Sampling Systems, Inc. are developing a fully programmable, remotely operated, fixed volume, automatic sampler for use with the field deployable tritium analysis system currently under development at U. of GA's Center for Applied Isotope Studies. The sampler will collect a limited-volume sample and perform on-line sample purification for tritium analyses from multiple collection sites. Pneumatically operated stainless steel samplers operate satisfactorily upon remote activation. The one-step purification system removes all impurities with interfere with tritium analysis by liquid scintillation. Field testing has confirmed system operation. The autosampler may act as a stand-alone device and is enclosed in a rugged, field-portable case with wheels. The system weighs about 40 lbs

  12. Rendezvous, proximity operations and capture quality function deployment report

    Science.gov (United States)

    Lamkin, Stephen L.

    1991-12-01

    Rendezvous, Proximity Operations, and Capture (RPOC) is a missions operations area which is extremely important to present and future space initiatives and must be well planned and coordinated. To support this, a study team was formed to identify a specific plan of action using the Quality Function Deployment (QFD) process. This team was composed of members from a wide spectrum of engineering and operations organizations which are involved in the RPOC technology area. The key to this study's success is an understanding of the needs of potential programmatic customers and the technology base available for system implementation. To this end, the study team conducted interviews with a variety of near term and future programmatic customers and technology development sponsors. The QFD activity led to a thorough understanding of the needs of these customers in the RPOC area, as well as the relative importance of these needs.

  13. QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNINGTOOL

    Directory of Open Access Journals (Sweden)

    Burcu DEVRİM İÇTENBAŞ

    2011-07-01

    Full Text Available Quality Function Deployment (QFD uses a house of quality to translate customerrequirements into engineering specifications. QFD has been widely used as a toolto develop new products. It has been adopted in thefields of education quality,service quality, software development and marketingplanning. The tool hasrecently been applied in strategic planning .In this study authors reviewed currentresearch which uses QFD as a strategic planning tool and described how QFDmethods can be used as a robust tool in strategic planning. This study provides aninsight for strategic planners to utilize a QFD- based philosophy and the methodsare useful tools for the design of a customer-driven strategy and show how itsystematically translates vision into action, targeting opportunities and creatinginnovative strategies.

  14. Stochastic Optimization for Nuclear Facility Deployment Scenarios

    Science.gov (United States)

    Hays, Ross Daniel

    Single-use, low-enriched uranium oxide fuel, consumed through several cycles in a light-water reactor (LWR) before being disposed, has become the dominant source of commercial-scale nuclear electric generation in the United States and throughout the world. However, it is not without its drawbacks and is not the only potential nuclear fuel cycle available. Numerous alternative fuel cycles have been proposed at various times which, through the use of different reactor and recycling technologies, offer to counteract many of the perceived shortcomings with regards to waste management, resource utilization, and proliferation resistance. However, due to the varying maturity levels of these technologies, the complicated material flow feedback interactions their use would require, and the large capital investments in the current technology, one should not deploy these advanced designs without first investigating the potential costs and benefits of so doing. As the interactions among these systems can be complicated, and the ways in which they may be deployed are many, the application of automated numerical optimization to the simulation of the fuel cycle could potentially be of great benefit to researchers and interested policy planners. To investigate the potential of these methods, a computational program has been developed that applies a parallel, multi-objective simulated annealing algorithm to a computational optimization problem defined by a library of relevant objective functions applied to the Ver ifiable Fuel Cycle Simulati on Model (VISION, developed at the Idaho National Laboratory). The VISION model, when given a specified fuel cycle deployment scenario, computes the numbers and types of, and construction, operation, and utilization schedules for, the nuclear facilities required to meet a predetermined electric power demand function. Additionally, it calculates the location and composition of the nuclear fuels within the fuel cycle, from initial mining through

  15. Clean energy deployment: addressing financing cost

    International Nuclear Information System (INIS)

    Ameli, Nadia; Kammen, Daniel M

    2012-01-01

    New methods are needed to accelerate clean energy policy adoption. To that end, this study proposes an innovative financing scheme for renewable and energy efficiency deployment. Financing barriers represent a notable obstacle for energy improvements and this is particularly the case for low income households. Implementing a policy such as PACE—property assessed clean energy—allows for the provision of upfront funds for residential property owners to install electric and thermal solar systems and make energy efficiency improvements to their buildings. This paper will inform the design of better policies tailored to the creation of the appropriate conditions for such investments to occur, especially in those countries where most of the population belongs to the low–middle income range facing financial constraints. (letter)

  16. Lessons learnt from WLCG service deployment

    International Nuclear Information System (INIS)

    Shiers, J D

    2008-01-01

    This paper summarises the main lessons learnt from deploying WLCG production services, with a focus on Reliability, Scalability, Accountability, which lead to both manageability and usability. Each topic is analysed in turn. Techniques for zero-user-visible downtime for the main service interventions are described, together with pathological cases that need special treatment. The requirements in terms of scalability are analysed, calling for as much robustness and automation in the service as possible. The different aspects of accountability - which covers measuring/tracking/logging/monitoring what is going on - and has gone on - is examined, with the goal of attaining a manageable service. Finally, a simple analogy is drawn with the Web in terms of usability - what do we need to achieve to cross the chasm from small-scale adoption to ubiquity?

  17. Techno-Economics of Residential Broadband Deployment

    DEFF Research Database (Denmark)

    Sigurdsson, Halldor Matthias

    2007-01-01

    on account of their existing telecom network (”the raw copper”), and typically they will prefer an xDSL-based strategy (various types of Digital Subscriber Line-technology: ADSL, VDSL, etc.), where the rate of speed of data connections are increased gradually to 10-50 Mbit/s or even more, in order to gain...... broadband deployment strategy is depending on a complexed set of parameters, and there is a demand for precise techno-economic cost models estimating financial feasibility. The existing cost models do not consider the dynamic developments in the market caused by competition. The PhD thesis has a profound...... the general principles from the Danish LRAIC-model (Long Run Average Incremental Cost) and divides Denmark in 4 geografical profiles. Considering the existing copper-infrastructure the most advantageous strategies for the players of each of these profiles are identified. The importance of the time horizon...

  18. Rapid deployable global sensing hazard alert system

    Science.gov (United States)

    Cordaro, Joseph V; Tibrea, Steven L; Shull, Davis J; Coleman, Jerry T; Shuler, James M

    2015-04-28

    A rapid deployable global sensing hazard alert system and associated methods of operation are provided. An exemplary system includes a central command, a wireless backhaul network, and a remote monitoring unit. The remote monitoring unit can include a positioning system configured to determine a position of the remote monitoring unit based on one or more signals received from one or more satellites located in Low Earth Orbit. The wireless backhaul network can provide bidirectional communication capability independent of cellular telecommunication networks and the Internet. An exemplary method includes instructing at least one of a plurality of remote monitoring units to provide an alert based at least in part on a location of a hazard and a plurality of positions respectively associated with the plurality of remote monitoring units.

  19. Scientific data management challenges, technology and deployment

    CERN Document Server

    Rotem, Doron

    2010-01-01

    Dealing with the volume, complexity, and diversity of data currently being generated by scientific experiments and simulations often causes scientists to waste productive time. Scientific Data Management: Challenges, Technology, and Deployment describes cutting-edge technologies and solutions for managing and analyzing vast amounts of data, helping scientists focus on their scientific goals. The book begins with coverage of efficient storage systems, discussing how to write and read large volumes of data without slowing the simulation, analysis, or visualization processes. It then focuses on the efficient data movement and management of storage spaces and explores emerging database systems for scientific data. The book also addresses how to best organize data for analysis purposes, how to effectively conduct searches over large datasets, how to successfully automate multistep scientific process workflows, and how to automatically collect metadata and lineage information. This book provides a comprehensive u...

  20. Clean energy deployment: addressing financing cost

    Science.gov (United States)

    Ameli, Nadia; Kammen, Daniel M.

    2012-09-01

    New methods are needed to accelerate clean energy policy adoption. To that end, this study proposes an innovative financing scheme for renewable and energy efficiency deployment. Financing barriers represent a notable obstacle for energy improvements and this is particularly the case for low income households. Implementing a policy such as PACE—property assessed clean energy—allows for the provision of upfront funds for residential property owners to install electric and thermal solar systems and make energy efficiency improvements to their buildings. This paper will inform the design of better policies tailored to the creation of the appropriate conditions for such investments to occur, especially in those countries where most of the population belongs to the low-middle income range facing financial constraints.

  1. A Nodes Deployment Algorithm in Wireless Sensor Network Based on Distribution

    Directory of Open Access Journals (Sweden)

    Song Yuli

    2014-07-01

    Full Text Available Wireless sensor network coverage is a basic problem of wireless sensor network. In this paper, we propose a wireless sensor network node deployment algorithm base on distribution in order to form an efficient wireless sensor network. The iteratively greedy algorithm is used in this paper to choose priority nodes into active until the entire network is covered by wireless sensor nodes, the whole network to multiply connected. The simulation results show that the distributed wireless sensor network node deployment algorithm can form a multiply connected wireless sensor network.

  2. iPhone with Microsoft Exchange Server 2010 Business Integration and Deployment

    CERN Document Server

    Goodman, Steve

    2012-01-01

    iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment is a practical, step-by-step tutorial on planning, installing and configuring Exchange Server to deploy iPhones into your business. This book is aimed at system administrators who don't necessarily know about Exchange Server 2010 or ActiveSync-based mobile devices. A basic level of knowledge around Windows Servers is expected, and knowledge of smartphones and email systems in general will make some topics a little easier.

  3. Time Deployment Study for Annulus Pumping

    International Nuclear Information System (INIS)

    REBERGER, D.W.

    2000-01-01

    Radioactive wastes from processing irradiated uranium fuels have been stored as alkaline slurries in underground tanks at the Hanford Site. Single-shell tanks (SST) and double-shell tanks (DST) of various sizes were used for waste storage. Of the total 177 tanks, there are 28 DSTs. DSTs are located in AN, AP, AW, AY, AZ, and SY tank farms in the 200 East (200E) and 200-West (200W) Areas. The storage capacities of the DSTs vary from 980,000 to 1,140,000 gal. DSTs are designed and constructed as an integral steel structure, i.e., an inner shell within an outer shell, so that any leak from the inner shell is confined within the annulus without impacting the environment. The inner shell provides primary containment for the wastes and the outer shell provides secondary containment in the form of an annulus. The annulus of a DST is equipped with a pump pit, leak detection probes, and other accessories. The existing annulus pumps in the DSTs need to be revamped with a new system to reduce operating costs and reduce the time to deploy a pumping system. The new pumping system will minimize the likelihood of a release of waste into the environment; improve capability of waste removal to the maximum extent possible to comply with Washington Administrative Code (WAC) 173-303-640 and Code of Federal Regulations (CFR) 40 CFR 265.193. This study addresses the time required to deploy an annulus pumping system designed to fit any DST after detection of a leak in the inner shell of the DST

  4. Airbag deployment-related eye injuries.

    Science.gov (United States)

    Koisaari, Tapio; Leivo, Tiina; Sahraravand, Ahmad; Haavisto, Anna-Kaisa; Sulander, Pekka; Tervo, Timo M T

    2017-07-04

    We studied the correlation between airbag deployment and eye injuries using 2 different data sets. The registry of the Finnish Road Accident (FRA) Investigation Teams was analyzed to study severe head- and eyewear-related injuries. All fatal passenger car or van accidents that occurred during the years 2009-2012 (4 years) were included (n = 734). Cases in which the driver's front airbag was deployed were subjected to analysis (n = 409). To determine the proportion of minor, potentially airbag-related eye injuries, the results were compared to the data for all new eye injury patients (n = 1,151) recorded at the Emergency Clinic of the Helsinki University Eye Hospital (HUEH) during one year, from May 1, 2011, to April 30, 2012. In the FRA data set, the unbelted drivers showed a significantly higher risk of death (odds ratio [OR] = 5.89, 95% confidence interval [CI], 3.33-10.9, P = 2.6E-12) or of sustaining head injuries (OR = 2.50, 95% CI, 1.59-3.97, P = 3.8E-5). Only 4 of the 1,151 HUEH patients were involved in a passenger car accident. In one of the crashes, the airbag operated, and the belted driver received 2 sutured eye lid wounds and showed conjunctival sugillation. No permanent eye injuries were recorded during the follow-up. The calculated annual airbag-related eye injury incidence was less than 1/1,000,000 people, 4/100,000 accidents, and 4/10,000 injured occupants. Airbag-related eye injuries occurred very rarely in car accidents in cases where the occupant survived and the restraint system was appropriately used. Spectacle use did not appear to increase the risk of eye injury in restrained occupants.

  5. Deployment Methods for an Origami-Inspired Rigid-Foldable Array

    Science.gov (United States)

    Zirbel, Shannon A.; Trease, Brian P.; Magleby, Spencer P.; Howell, Larry L.

    2014-01-01

    The purpose of this work is to evaluate several deployment methods for an origami-inspired solar array at two size scales: 25-meter array and CubeSat array. The array enables rigid panel deployment and introduces new concepts for actuating CubeSat deployables. The design for the array was inspired by the origami flasher model (Lang, 1997; Shafer, 2001). Figure 1 shows the array prototyped from Garolite and Kapton film at the CubeSat scale. Prior work demonstrated that rigid panels like solar cells could successfully be folded into the final stowed configuration without requiring the panels to flex (Zirbel, Lang, Thomson, & al., 2013). The design of the array is novel and enables efficient use of space. The array can be wrapped around the central bus of the spacecraft in the case of the large array, or can accommodate storage of a small instrument payload in the case of the CubeSat array. The radial symmetry of this array around the spacecraft is ideally suited for spacecraft that need to spin. This work focuses on several actuation methods for a one-time deployment of the array. The array is launched in its stowed configuration and it will be deployed when it is in space. Concepts for both passive and active actuation were considered.

  6. Severe Neuropsychiatric Reaction in a Deployed Military Member after Prophylactic Mefloquine

    Directory of Open Access Journals (Sweden)

    Alan L. Peterson

    2011-01-01

    Full Text Available Recent studies of military personnel who have deployed to Iraq and Afghanistan have reported a number of combat-related psychiatric disorders such as posttraumatic stress disorder, depression, and traumatic brain injury. This case report involves a 27-year-old male active-duty US military service member who developed severe depression, psychotic hallucinations, and neuropsychological sequelae following the prophylactic use of the antimalarial medication mefloquine hydrochloride. The patient had a recent history of depression and was taking antidepressant medications at the time of his deployment to the Middle East. Psychiatrists and other health care providers should be aware of the possible neuropsychiatric side effects of mefloquine in deployed military personnel and should consider the use of other medications for malaria prophylaxis in those individuals who may be at increased risk for side effects.

  7. The financial impact of deployments on reserve health care providers.

    Science.gov (United States)

    Petinaux, Bruno

    2008-08-01

    This study retrospectively surveyed the financial impact of deployments on 17 U.S. Army Reserve health care providers. Due to multiple mobilizations, 29 separate deployments were reported. The deployments, mostly between 2001 and 2005, typically lasted 3 months during which 86% reported no civilian income and 76% reported no civilian benefits. Solo practice providers reported the greatest financial losses due to continuing financial responsibility related to their civilian practice despite being deployed. Overall, 2 deployments did not change, 9 increased, and 16 decreased the medical officer's income. Two were not reported. In this small retrospective convenience sample study, solo practice U.S. Army Reserve health care providers were found to be at highest risk of financial losses during military deployments. This being said, no price can be put on the privilege of serving our men and women in uniform.

  8. Early identification of posttraumatic stress following military deployment

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Statnikov, Alexander; Andersen, Søren B

    2015-01-01

    BACKGROUND: Pre-deployment identification of soldiers at risk for long-term posttraumatic stress psychopathology after home coming is important to guide decisions about deployment. Early post-deployment identification can direct early interventions to those in need and thereby prevents...... the development of chronic psychopathology. Both hold significant public health benefits given large numbers of deployed soldiers, but has so far not been achieved. Here, we aim to assess the potential for pre- and early post-deployment prediction of resilience or posttraumatic stress development in soldiers...... by application of machine learning (ML) methods. METHODS: ML feature selection and prediction algorithms were applied to a prospective cohort of 561 Danish soldiers deployed to Afghanistan in 2009 to identify unique risk indicators and forecast long-term posttraumatic stress responses. RESULTS: Robust pre...

  9. Accounting for variation in wind deployment between Canadian provinces

    International Nuclear Information System (INIS)

    Ferguson-Martin, Christopher J.; Hill, Stephen D.

    2011-01-01

    Wind energy deployment varies widely across regions and this variation cannot be explained by differences in natural wind resources alone. Evidence suggests that institutional factors beyond physical wind resources can influence the deployment of wind energy systems. Building on the work of , this study takes a historical institutionalist approach to examine the main factors influencing wind energy deployment across four Canadian provinces Canada: Alberta, Manitoba, Ontario and Nova Scotia. Our case studies suggest that wind energy deployment depends upon a combination of indirect causal factors-landscape values, political and social movements, government electricity policy, provincial electricity market structure and incumbent generation technologies and direct causal factors-grid architecture, ownership patterns, renewable incentive programs, planning and approvals processes and stakeholder support and opposition. - Research highlights: → Examines the reasons for variations in wind deployment between Canadian provinces. → Employs a historical institutional approach to the analysis. → Discusses social factors that affect wind deployment across Canadian jurisdictions.

  10. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-09-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  11. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-06-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  12. White Paper on Dish Stirling Technology: Path Toward Commercial Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Andraka, Charles E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Stechel, Ellen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Power Dept.; Becker, Peter [Stirling Energy Systems, Scottsdale, AZ (United States); Messick, Brian [Stirling Energy Systems, Scottsdale, AZ (United States)

    2016-07-01

    Dish Stirling energy systems have been developed for distributed and large-scale utility deployment. This report summarizes the state of the technology in a joint project between Stirling Energy Systems, Sandia National Laboratories, and the Department of Energy in 2011. It then lays out a feasible path to large scale deployment, including development needs and anticipated cost reduction paths that will make a viable deployment product.

  13. Self managing monitoring for highly elastic large scale Cloud deployments

    OpenAIRE

    Ward, Jonathan Stuart; Barker, Adam David

    2014-01-01

    Infrastructure as a Service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications affected by elasticity is monitoring. In this paper we investigate the challenges of monitoring large cloud deployments and how these challenges differ from previous monitoring problems. In order to mee...

  14. Multiobjective Shape Optimization for Deployment and Adjustment Properties of Cable-Net of Deployable Antenna

    Directory of Open Access Journals (Sweden)

    Guoqiang You

    2015-01-01

    Full Text Available Based on structural features of cable-net of deployable antenna, a multiobjective shape optimization method is proposed to help to engineer antenna’s cable-net structure that has better deployment and adjustment properties. In this method, the multiobjective optimum mathematical model is built with lower nodes’ locations of cable-net as variables, the average stress ratio of cable elements and strain energy as objectives, and surface precision and natural frequency of cable-net as constraints. Sequential quadratic programming method is used to solve this nonlinear mathematical model in conditions with different weighting coefficients, and the results show the validity and effectiveness of the proposed method and model.

  15. Market and Policy Barriers to Energy Storage Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bhatnagar, Dhruv [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Currier, Aileen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hernandez, Jacquelynne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ma, Ookie [Dept. of Energy (DOE), Washington DC (United States) Office of Energy Efficiency and Renewable Energy; Kirby, Brendan [Consultant

    2013-09-01

    Electric energy storage technologies can provide numerous grid services; there are a number of factors that restrict their current deployment. The most significant barrier to deployment is high capital costs, though several recent deployments indicate that capital costs are decreasing and energy storage may be the preferred economic alternative in certain situations. However, a number of other market and regulatory barriers persist, limiting further deployment. These barriers can be categorized into regulatory barriers, market (economic) barriers, utility and developer business model barriers, cross-cutting barriers and technology barriers.

  16. LWR Spent Fuel Management for the Smooth Deployment of FBR

    International Nuclear Information System (INIS)

    Fukasawa, T.; Yamashita, J.; Hoshino, K.; Sasahira, A.; Inoue, T.; Minato, K.; Sato, S.

    2015-01-01

    Fast breeder reactors (FBR) and FBR fuel cycle are indispensable to prevent the global warming and to secure the long-term energy supply. Commercial FBR expects to be deployed from around 2050 until around 2110 in Japan by the replacement of light water reactors (LWR) after their 60 years life. The FBR deployment needs Pu (MOX) from the LWR-spent fuel (SF) reprocessing. As Japan can posses little excess Pu, its balance control is necessary between LWR-SF management (reprocessing) and FBR deployment. The fuel cycle systems were investigated for the smooth FBR deployment and the effectiveness of proposed flexible system was clarified in this work. (author)

  17. Human Metabolism and Interactions of Deployment-Related Chemicals

    National Research Council Canada - National Science Library

    Hodgson, Ernest

    2003-01-01

    This study examines the human-metabolism and metabolic interactions of a subset of deployment-related chemicals, including chlorpyrifos, DEET, permethrin, pyridostigmine bromide, and sulfur mustard metabolites...

  18. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2000-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective: producing innovative, useful, and interesting research results in the areas of software configuration and deployment...

  19. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2001-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective; producing innovative, useful and interesting research results in the areas of software configuration and deployment...

  20. Deployment Testing of the De-Orbit Sail Flight Hardware

    OpenAIRE

    Hillebrandt, Martin; Meyer, Sebastian; Zander, Martin; Hühne, Christian

    2015-01-01

    The paper describes the results of the deployment testing of the De-Orbit Sail flight hardware, a drag sail for de-orbiting applications, performed by DLR. It addresses in particular the deployment tests of the fullscale sail subsystem and deployment force tests performed on the boom deployment module. For the fullscale sail testing a gravity compensation device is used which is described in detail. It allows observations of the in-plane interaction of the booms with the sail membrane and the...

  1. Six policy actions for accelerated deployment of renewable energy. READy Renewable Energy Action on Deployment. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-03-15

    The READy book presents a kaleidoscope of policy options that have proven to accelerate the deployment of renewable energy technologies, based on experiences around the world at the local and national levels. Lessons learned from successful cases are distilled into six essential action points. Together these categories of policy actions compose the ACTION Star, a guide for taking action now while preparing for growth over the long term.

  2. Child maltreatment among U.S. Air Force parents deployed in support of Operation Iraqi Freedom/Operation Enduring Freedom.

    Science.gov (United States)

    Rabenhorst, Mandy M; McCarthy, Randy J; Thomsen, Cynthia J; Milner, Joel S; Travis, Wendy J; Colasanti, Marie P

    2015-02-01

    This study examined child maltreatment perpetration among 99,697 active-duty U.S. Air Force parents who completed a combat deployment. Using the deploying parent as the unit of analysis, we analyzed whether child maltreatment rates increased postdeployement relative to predeployment. These analyses extend previous research that used aggregate data and extend our previous work that used data from the same period but used the victim as the unit of analysis and included only deploying parents who engaged in child maltreatment. In this study, 2% (n = 1,746) of deploying parents perpetrated child maltreatment during the study period. Although no overall differences were found in child maltreatment rates postdeployment compared to predeployment, several maltreatment-related characteristics qualified this finding. Rates for emotional abuse and mild maltreatment were lower following deployment, whereas child maltreatment rates for severe maltreatment were higher following deployment. The finding that rates of severe child maltreatment, including incidents involving alcohol use, were higher postdeployment suggests a need for additional support services for parents following their return from combat deployment, with a focus on returning parents who have an alcohol use problem. © The Author(s) 2014.

  3. Swarm Deployable Boom Assembly (DBA) Development of a Deployable Magnetometer Boom for the Swarm Spacecraft

    Science.gov (United States)

    McMahon, Paul; Jung, Hans-Juergen; Edwards, Jeff

    2013-09-01

    The Swarm programme consists of 3 magnetically clean satellites flying in close formation designed to measure the Earth's magnetic field using 2 Magnetometers mounted on a 4.3m long deployable boom.Deployment is initiated by releasing 3 HDRMs, once released the boom oscillates back and forth on a pair of pivots, similar to a restaurant kitchen door hinge, for around 120 seconds before coming to rest on 3 kinematic mounts which are used to provide an accurate reference location in the deployed position. Motion of the boom is damped through a combination of friction, spring hysteresis and flexing of the 120+ cables crossing the hinge. Considerable development work and accurate numerical modelling of the hinge motion was required to predict performance across a wide temperature range and ensure that during the 1st overshoot the boom did not damage itself, the harness or the spacecraft.Due to the magnetic cleanliness requirements of the spacecraft no magnetic materials could be used in the design of the hardware.

  4. Tunable bandgaps in a deployable metamaterial

    Science.gov (United States)

    Nanda, Aditya; Karami, M. A.

    2018-06-01

    In this manuscript, we investigate deployable structures (such as solar arrays) and origami-inspired foldable structures as metamaterials capable of tunable wave manipulation. Specifically, we present a metamaterial whose bandgaps can be modulated by changing the fold angle of adjacent panels. The repeating unit cell of the structure consists of a beam (representing a panel) and a torsional spring (representing the folding mechanism). Two important cases are considered. Firstly, the fold angle (angle between adjacent beams), Ψ, is zero and only flexural waves propagate. In the second case, the fold angle is greater than zero (Ψ > 0). This causes longitudinal and transverse vibration to be coupled. FEM models are used to validate both these analyses. Increasing the fold angle was found to inflict notable changes to the wave transmission characteristics of the structure. In general, increasing the fold angles caused the bandwidth of bandgaps to increase. For the lowest four bandgaps we found bandwidth increases of 252 %, 177 %, 230 % and 163 % respectively at Ψ = 90 deg (relative to the bandwidths at Ψ = 0). In addition, non-trivial increases in bandwidth of the odd-numbered bandgaps occurs even at small fold angles-the bandwidth for the first and third bandgaps effectively double in size (increase by 100 %) at Ψ = 20 deg relative to those at Ψ = 0. This could have ramifications in the context of tunable wave manipulation and adaptive filtering. In addition, by expanding out the characteristic equation of transfer matrix for the straight structure, we prove that the upper band edge of the nth bandgap will always equal the nth simply supported natural frequency of the constituent beam. Further, we found that the ratio (EI/kt) is a pertinent parameter affecting the bandwidth of bandgaps. For low values of the ratio, effectively, no bandgap exists. For higher values of the ratio (EI/kt), we obtain a relatively large bandgap over which no waves propagate. This can

  5. Space Situational Awareness of Large Numbers of Payloads From a Single Deployment

    Science.gov (United States)

    Segerman, A.; Byers, J.; Emmert, J.; Nicholas, A.

    2014-09-01

    The nearly simultaneous deployment of a large number of payloads from a single vehicle presents a new challenge for space object catalog maintenance and space situational awareness (SSA). Following two cubesat deployments last November, it took five weeks to catalog the resulting 64 orbits. The upcoming Kicksat mission will present an even greater SSA challenge, with its deployment of 128 chip-sized picosats. Although all of these deployments are in short-lived orbits, future deployments will inevitably occur at higher altitudes, with a longer term threat of collision with active spacecraft. With such deployments, individual scientific payload operators require rapid precise knowledge of their satellites' locations. Following the first November launch, the cataloguing did not initially associate a payload with each orbit, leaving this to the satellite operators. For short duration missions, the time required to identify an experiment's specific orbit may easily be a large fraction of the spacecraft's lifetime. For a Kicksat-type deployment, present tracking cannot collect enough observations to catalog each small object. The current approach is to treat the chip cloud as a single catalog object. However, the cloud dissipates into multiple subclouds and, ultimately, tiny groups of untrackable chips. One response to this challenge may be to mandate installation of a transponder on each spacecraft. Directional transponder transmission detections could be used as angle observations for orbit cataloguing. Of course, such an approach would only be employable with cooperative spacecraft. In other cases, a probabilistic association approach may be useful, with the goal being to establish the probability of an element being at a given point in space. This would permit more reliable assessment of the probability of collision of active spacecraft with any cloud element. This paper surveys the cataloguing challenges presented by large scale deployments of small spacecraft

  6. Deploying Renewables -- principles for effective policies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-29

    Renewable energy can play a fundamental role in tackling climate change, environmental degradation and energy security. As these challenges have become ever more pressing, governments and markets are seeking innovative solutions. Yet, what are the key factors that will determine the success of renewable energy policies? How can current policies be improved to encourage greater deployment of renewables? What impact can more effective policies have on renewables' share in the future global energy mix and how soon? This publication addresses these questions. Responding to the Gleneagles G8 call for a clean and secure energy future, it highlights key policy tools to fast-track renewables into the mainstream. This analysis illustrates good practices by applying the combined metrics of effectiveness and efficiency to renewable energy policies in the electricity, heating and transport sectors. It highlights significant barriers to accelerating renewables penetration, and argues that the great potential of renewables can be exploited much more rapidly and to a much larger extent if good practices are adopted. Carefully designed policy frameworks, customised to support technologies at differing stages of maturity, will deliver a strong portfolio of renewable energy technologies. The document provides recommendations on key principles for policy design as a template for decision makers.

  7. Deployable structures using bistable reeled composites

    Science.gov (United States)

    Daton-Lovett, Andrew J.; Compton-Bishop, Quentin M.; Curry, Richard G.

    2000-06-01

    This paper describes an innovative, patented use of composite materials developed by RolaTube Technology Ltd. to make smart deployable structures. Bi-stable reeled composites (BRCs) can alternate between two stable forms; that of a strong, rigid structure and that of a compact coil of flat-wound material. Bi-stability arises as a result of the manipulation of Poisson's ratio and isotropy in the various layers of the material. BRCs are made of fiber- reinforced composite materials, most often with a thermoplastic matrix. A range of fibers and polymer matrices can be used according to the requirements of the operating environment. Samples of a BRC structure were constructed using layers of unidirectional, fiber-reinforced thermoplastic sheet with the layers at different angles. The whole assembly was then consolidated under conditions of elevated temperature and pressure. The properties of the BRC are described and the result of a series of experiments performed on the sample to determine the tensile strength of the BRC structure are reported. A full analysis using finite element methods is being undertaken in collaboration with the University of Cambridge, England. The first commercial use has been to fabricate boom and drive mechanisms for the remote inspection of industrial plant.

  8. New technologies deployment for advanced power plants

    International Nuclear Information System (INIS)

    Kiyoshi, Yamauchi

    2007-01-01

    Mitsubishi Heavy Industries, Ltd. (MHI) has been the total engineering and manufacturing company of pressurized water reactors (PWRs) in Japan since the commencement of commercial operations of Mihama Unit 1 of the Kansai Electric Power Company in 1970. Over these decades, MHI has endeavored to develop a broad spread of nuclear technology, from design, manufacturing, and construction, to plant maintenance services. More recently, with the ever rising need for nuclear power generation around the world to prevent global warming and to cope with surging oil prices, MHI is striving to expand its nuclear power business in the world market, such as US-APWR (Advanced Pressurized Water Reactor) in the U.S., as well as to develop technology for advanced reactors and nuclear fuel cycles to ensure energy security in the future. This paper introduces these approaches, especially focused on new technologies deployment for the global needs, and clarifies the current status and future prospects of MHI as the world's leading nuclear company. (author)

  9. Quality function deployment in launch operations

    Science.gov (United States)

    Portanova, P. L.; Tomei, E. J., Jr.

    1990-11-01

    The goal of the Advanced Launch System (ALS) is a more efficient launch capability that provides a highly reliable and operable system at substantially lower cost than current launch systems. Total Quality Management (TQM) principles are being emphasized throughout the ALS program. A continuous improvement philosophy is directed toward satisfying users' and customer's requirements in terms of quality, performance, schedule, and cost. Quality Function Deployment (QFD) is interpreted as the voice of the customer (or user), and it is an important planning tool in translating these requirements throughout the whole process of design, development, manufacture, and operations. This report explores the application of QFD methodology to launch operations, including the modification and addition of events (operations planning) in the engineering development cycle, and presents an informal status of study results to date. QFD is a technique for systematically analyzing the customer's (Space Command) perceptions of what constitutes a highly reliable and operable system and functionally breaking down those attributes to identify the critical characteristics that determine an efficient launch system capability. In applying the principle of QFD, a series of matrices or charts are developed with emphasis on the one commonly known as the House of Quality (because of its roof-like format), which identifies and translates the most critical information.

  10. Hitting the ground running: Healthgrid deployment and adoption

    NARCIS (Netherlands)

    Gwadry-Sridhar, Femida; Olabarriaga, Silvia D.; van Kampen, Antoine; Bauer, Michael; Solomonides, Tony

    2010-01-01

    We consider the issues of healthgrid development, deployment and adoption in health care and research environments. While healthgrid technology could be deployed to support advanced medical research, we are not seeing its wide adoption. Understanding why this technology is not being exploited is one

  11. Accommodating Thickness in Origami-Based Deployable Arrays

    Science.gov (United States)

    Zirbel, Shannon A.; Magleby, Spencer P.; Howell, Larry L.; Lang, Robert J.; Thomson, Mark W.; Sigel, Deborah A.; Walkemeyer, Phillip E.; Trease, Brian P.

    2013-01-01

    The purpose of this work is to create deployment systems with a large ratio of stowed-to-deployed diameter. Deployment from a compact form to a final flat state can be achieved through origami-inspired folding of panels. There are many models capable of this motion when folded in a material with negligible thickness; however, when the application requires the folding of thick, rigid panels, attention must be paid to the effect of material thickness not only on the final folded state, but also during the folding motion (i.e., the panels must not be required to flex to attain the final folded form). The objective is to develop new methods for deployment from a compact folded form to a large circular array (or other final form). This paper describes a mathematical model for modifying the pattern to accommodate material thickness in the context of the design, modeling, and testing of a deployable system inspired by an origami six-sided flasher model. The model is demonstrated in hardware as a 1/20th scale prototype of a deployable solar array for space applications. The resulting prototype has a ratio of stowed-to-deployed diameter of 9.2 (or 1.25 m deployed outer diameter to 0.136 m stowed outer diameter).

  12. Post-deployment usability evaluation of a radiology workstation

    NARCIS (Netherlands)

    Jorritsma, Wiard; Cnossen, Fokie; Dierckx, Rudi; Oudkerk, Matthijs; van Ooijen, Peter

    2015-01-01

    Objective To evaluate the usability of a radiology workstation after deployment in a hospital. Significance In radiology, it is difficult to perform valid pre-deployment usability evaluations due to the heterogeneity of the user group, the complexity of the radiological workflow, and the complexity

  13. How Have Deployments During the War on Terrorism Affected Reenlistment?

    Science.gov (United States)

    2009-01-01

    Ethiopia, certain areas of Greece, Haiti, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Kosovo, Kuwait, Kyrgyzstan, Lebanon, Liberia, Malaysia ...deployment is a direct source of utility, as modeled in Chapter Three. Deployment is not simply another form of “work” that takes time away from “ leisure

  14. 50 CFR 635.21 - Gear operation and deployment restrictions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Gear operation and deployment restrictions....21 Gear operation and deployment restrictions. Link to an amendment published at 75 FR 57701, Sept. 22, 2010. The green-stick gear authorization requirements under paragraphs (c)(2)(v)(A), (c)(2)(v)(B...

  15. Review of deployment technology for tethered satellite systems

    Science.gov (United States)

    Yu, B. S.; Wen, H.; Jin, D. P.

    2018-03-01

    Tethered satellite systems (TSSs) have attracted significant attention due to their potential and valuable applications for scientific research. With the development of various launched on-orbit missions, the deployment of tethers is considered a crucial technology for operation of a TSS. Both past orbiting experiments and numerical results have shown that oscillations of the deployed tether due to the Coriolis force and environmental perturbations are inevitable and that the impact between the space tether and end-body at the end of the deployment process leads to complicated nonlinear phenomena. Hence, a set of suitable control methods plays a fundamental role in tether deployment. This review article summarizes previous work on aspects of the dynamics, control, and ground-based experiments of tether deployment. The relevant basic principles, analytical expressions, simulation cases, and experimental results are presented as well.

  16. Deploying HEP applications using Xen and Globus Virtual Workspaces

    International Nuclear Information System (INIS)

    Agarwal, A; Desmarais, R; Gable, I; Grundy, D; P-Brown, D; Seuster, R; Vanderster, D C; Sobie, R; Charbonneau, A; Enge, R

    2008-01-01

    The deployment of HEP applications in heterogeneous grid environments can be challenging because many of the applications are dependent on specific OS versions and have a large number of complex software dependencies. Virtual machine monitors such as Xen could be used to package HEP applications, complete with their execution environments, to run on resources that do not meet their operating system requirements. Our previous work has shown HEP applications running within Xen suffer little or no performance penalty as a result of virtualization. However, a practical strategy is required for remotely deploying, booting, and controlling virtual machines on a remote cluster. One tool that promises to overcome the deployment hurdles using standard grid technology is the Globus Virtual Workspaces project. We describe strategies for the deployment of Xen virtual machines using Globus Virtual Workspace middleware that simplify the deployment of HEP applications

  17. Clinical Predictive Modeling Development and Deployment through FHIR Web Services.

    Science.gov (United States)

    Khalilia, Mohammed; Choi, Myung; Henderson, Amelia; Iyengar, Sneha; Braunstein, Mark; Sun, Jimeng

    2015-01-01

    Clinical predictive modeling involves two challenging tasks: model development and model deployment. In this paper we demonstrate a software architecture for developing and deploying clinical predictive models using web services via the Health Level 7 (HL7) Fast Healthcare Interoperability Resources (FHIR) standard. The services enable model development using electronic health records (EHRs) stored in OMOP CDM databases and model deployment for scoring individual patients through FHIR resources. The MIMIC2 ICU dataset and a synthetic outpatient dataset were transformed into OMOP CDM databases for predictive model development. The resulting predictive models are deployed as FHIR resources, which receive requests of patient information, perform prediction against the deployed predictive model and respond with prediction scores. To assess the practicality of this approach we evaluated the response and prediction time of the FHIR modeling web services. We found the system to be reasonably fast with one second total response time per patient prediction.

  18. Military deployment and reintegration: a systematic review of child coping.

    Science.gov (United States)

    Bello-Utu, Cindy F; DeSocio, Janiece E

    2015-02-01

    Child coping with parent military deployment and family reintegration. A systematic review of research literature was conducted to examine the effects of deployment and family reintegration on children in military families. A search of CINAHL, PubMed, Psyc-INFO, and SocINDEX databases was performed using the terms "military family," "military child," "child coping," "deployment," and "reintegration." The search was limited to publications between 2001 and 2014 to focus on the effects of Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF), and Operation New Dawn (OND). Twenty-seven research reports met inclusion criteria. Three themes were extracted: A child's coping is influenced by (a) the child's age and development, (b) the mental health and coping of the non-deployed parent during deployment, and the mental health of both parents during family reintegration, and (c) the pre-existing resilience/vulnerability, cumulative risks, and resources of the child and family. © 2015 Wiley Periodicals, Inc.

  19. Shape memory alloy fracture as a deployment actuator

    International Nuclear Information System (INIS)

    Buban, Darrick M; Frantziskonis, George N

    2013-01-01

    The paper reports an experimental investigation into using shape memory alloy (SMA) as a deployment actuator. SMA specimens were heated and pulled to failure or pulled and heated to failure, thus developing an environmental and structural operating envelope for application as deployment mechanisms. The experimental results strongly suggest that SMAs can be implemented as deployment actuators. Recorded data shows that SMA fracture is possible over a wide range of temperatures and strains, filling a material performance gap not found in the literature. The obtained information allows design engineers to appropriately size SMAs given the design requirements for achieving the desired deployment effects. The major conclusion of the reported work is that SMAs as actuators are strong competitors to typical existing deployment efforts that use explosive or non-explosive actuators having implementation drawbacks such as the expense associated with special handling and the volume encountered in mounting the devices. (paper)

  20. Design of the De-Orbit Sail Boom Deployment Unit

    Science.gov (United States)

    Meyer, Sebastian; Hillebrandt, Martin; Straubel, Marco; Huhne, Christian

    2014-06-01

    The design of the De-Orbit Sail boom deployment unit is strongly driven by volume constraints, which are given by the cubesat container. Four CFRP (carbon fiber reinforced polymer) booms [4] with a cross-sectional shape of a double-omega and a length of 3.6 m are reeled on one spool in the center of the unit. The deployment of the four booms are controlled by an electric motor, which acts on the boom spool. Due to the volume limitation caused by the dimensions of the cubesat deployer the deployment unit has little room for the mechanisms components. With the aim to achieve a robust design, the deployment concept of the unit has greatly changed during the development process. The history of the design as well as the mechanisms are described. Additionally the results of the flight model testing are presented.

  1. An innovative deployable solar panel system for Cubesats

    Science.gov (United States)

    Santoni, Fabio; Piergentili, Fabrizio; Donati, Serena; Perelli, Massimo; Negri, Andrea; Marino, Michele

    2014-02-01

    One of the main Cubesat bus limitations is the available on-board power. The maximum power obtained using body mounted solar panels and advanced triple junction solar cells on a triple unit Cubesat is typically less than 10 W. The Cubesat performance and the mission scenario opened to these small satellite systems could be greatly enhanced by an increase of the available power. This paper describes the design and realization of a modular deployable solar panel system for Cubesats, consisting of a modular hinge and spring system that can be potentially used on-board single (1U), double(2U), triple (3U) and six units (6U) Cubesats. The size of each solar panels is the size of a lateral Cubesat surface. The system developed is the basis for a SADA (Solar Array Drive Assembly), in which a maneuvering capability is added to the deployed solar array in order to follow the apparent motion of the sun. The system design trade-off is discussed, comparing different deployment concepts and architectures, leading to the final selection for the modular design. A prototype of the system has been realized for a 3U Cubesat, consisting of two deployable solar panel systems, made of three solar panels each, for a total of six deployed solar panels. The deployment system is based on a plastic fiber wire and thermal cutters, guaranteeing a suitable level of reliability. A test-bed for the solar panel deployment testing has been developed, supporting the solar array during deployment reproducing the dynamical situation in orbit. The results of the deployment system testing are discussed, including the design and realization of the test-bed, the mechanical stress given to the solar cells by the deployment accelerations and the overall system performance. The maximum power delivered by the system is about 50.4 W BOL, greatly enhancing the present Cubesat solar array performance.

  2. Perceived effect of deployment on families of UK military personnel.

    Science.gov (United States)

    Thandi, G; Greenberg, N; Fear, N T; Jones, N

    2017-10-01

    In the UK, little is known about the perceived effects of deployment, on military families, from military personnel in theatre. To investigate military personnel's perceptions of the impact of deployment on intimate relationships and children. Deployed service personnel who were in a relationship, and who had children, completed a survey while deployed on combat operations. Data were taken from four mental health surveys carried out in Iraq in 2009 and Afghanistan in 2010, 2011 and 2014. Among 4265 participants, after adjusting for military and social-demographic covariates, perceiving that deployment had a negative impact on intimate relationships and children was associated with psychological distress, and traumatic stress symptoms. Military personnel who reported being in danger of being injured or killed during deployment, were more likely to report a perceived negative effect of deployment on their intimate relationships. Reservists were less likely to report a perceived negative impact of deployment on their children compared with regulars. Military personnel who themselves planned to separate from their partner were more likely to report psychological distress, and stressors at home. Perceived insufficient support from the Ministry of Defence was associated with poor mental health, and holding a junior rank. Deployed UK military personnel with symptoms of psychological distress, who experienced stressors at home, were especially likely to perceive that their family were inadequately supported by the military. Those planning to separate from their partner were at increased risk of suffering with mental health problems while deployed. © The Author 2017. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  3. Technology Deployment Annual Report 2013 December

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2014-01-01

    available to the INL’s Office of Technology Deployment. However, the accomplishments cataloged in the report reflect the achievements and creativity of the researchers, technicians, support staff, and operators of the INL workforce.

  4. A Conceptual Design for a Small Deployer Satellite

    Science.gov (United States)

    Zumbo, S.

    2002-01-01

    industrial partners, has started the development of a space mission, named DeSat, focused on a new highly innovative micro satellite bus for LEO, entirely designed by an integrated team of students and researchers. The first mission is scheduled to fly at the end of 2003 on a converted Russian ICBM. The paper is intended to present the main features of DeSat mission, its goals and the activities that have been done by students and researchers to achieve the micro satellite platform design. The principal payload of the entire system is represented by a recirculating ball screw boom whose mass reaches one third of the total mass budget. The goal of the mission is to demonstrate the validity of its design also for space applications, which may range from precise off platform positioning of devices and instruments to GPS interferometry, sensor measurements and robotics. The satellite geometry, when the boom is in deployed configuration, is so stretched that the name "deployable satellite" has come out naturally. The large deployment mechanism, compared to the small bus, has influenced the design of every satellite subsystem leading to innovative solutions in terms of design, materials, equipment and instruments.

  5. Pre-Deployment Handbook: Timor-Leste

    Science.gov (United States)

    2014-05-01

    rates of youth unemployment and low school attendance, group activities provide purpose and a sense of inclusion. Popular activities include sport ...soccer, basketball and volleyball are the most popular), art and music. Sport is a great way to engage with the local population. Many youth activities...whales and pilot whales are to be found on the north coast. The large coral reefs mean that there is potential for eco tourism , including game

  6. Scarab III Remote Vehicle Deployment for Waste Retrieval and Tank Inspection

    International Nuclear Information System (INIS)

    Burks, B.L.; Falter, D.D.; Noakes, M.; Vesco, D.

    1999-01-01

    The Robotics Technology Development Program now known as the Robotics Crosscut Program, funded the development and deployment of a small remotely operated vehicle for inspection and cleanout of small horizontal waste storage tanks that have limited access. Besides the advantage of access through tank risers as small as 18-in. diameter, the small robotic system is also significantly less expensive to procure and to operate than larger remotely operated vehicle (ROV) systems. The vehicle specified to support this activity was the ROV Technologies, Inc., Scarab. The Scarab is a tracked vehicle with an independently actuated front and rear ''toe'' degree-of-freedom which allows the stand-off and angle of the vehicle platform with respect to the floor to be changed. The Scarab is a flexible remote tool that can be used for a variety of tasks with its primary uses targeted for inspection and small scale waste retrieval. The vehicle and any necessary process equipment are mounted in a deployment and containment enclosure to simplify deployment and movement of the system from tank to tank. This paper outlines the technical issues related to the Scarab vehicle and its deployment for use in tank inspection and waste retrieval operation

  7. Occupational correlates of low back pain among U.S. Marines following combat deployment.

    Science.gov (United States)

    MacGregor, Andrew J; Dougherty, Amber L; Mayo, Jonathan A; Rauh, Mitchell J; Galarneau, Michael R

    2012-07-01

    Many U.S. Marines have experienced routine combat deployments during Operation Iraqi Freedom, which present numerous occupational hazards that may result in low back pain (LBP). The objective of this retrospective cohort study was to identify new-onset LBP among Marines following initial deployment to Operation Iraqi Freedom. Active duty Marines deployed to Iraq or Kuwait between 2005 and 2008 were identified from deployment records and linked to medical databases (n = 36,680). The outcome of interest was an International Classification of Diseases, 9th Revision, Clinical Modification code indicating LBP (724.2) within 1 year postdeployment. Multivariate logistic regression examined the effect of occupation on LBP. Overall, 4.1% (n = 1,517) of Marines were diagnosed with LBP. After adjusting for covariates, the service/supply (odds ratio 1.33, 95% confidence interval, 1.12-1.59) and electrical/mechanical/craftsworker occupations (odds ratio 1.31, 95% confidence interval, 1.12-1.53) had higher odds of LBP when compared to the administrative/other referent group. Within these groups, the highest LBP prevalence was in the construction (8.6%) and law enforcement (6.2%) subgroups. Although infantry occupations purposefully engage the enemy and often face sustained physical rigors of combat, LBP was most prevalent in noninfantry occupations. Future studies should include detailed exposure histories to elucidate occupation-specific etiologies of LBP in order to guide prevention efforts.

  8. Technological innovation in the energy sector: R and D, deployment, and learning-by-doing

    International Nuclear Information System (INIS)

    Sagar, Ambuj D.; Zwaan, Bob van der

    2006-01-01

    Technological innovation is fundamental for rendering the energy economy cleaner and more efficient with concomitant economic, developmental, and environmental benefits. This paper discusses aspects of R and D and 'learning-by-doing,' the main contributors to technological change that are complementary yet inter-linked. The relationship between the level of national energy R and D investments and changes in the trajectory of the country's energy system is complex; targeted efforts to promote deployment of new energy technologies play a major role in translating the results of R and D activities to changes in the energy system. Learning-by-doing is an important element of deployment, but it remains largely poorly understood. Hence this phenomenon needs to be 'unpacked' and its various aspects analyzed in detail, so as to allow better design of early deployment efforts to enhance learning gains. This paper highlights how public R and D and deployment efforts must work in tandem to expand the portfolio, and realize the potential, of new and improved energy technologies

  9. Pneumothorax, without chest wall fracture, following airbag deployment

    Directory of Open Access Journals (Sweden)

    Samuel Parsons

    2010-12-01

    Full Text Available Air bags are an automatic crash protection system. They have been shown to reduce mortality from motor vehicle accidents by 31% following direct head-on impacts, by 19% following any frontal impact and by 11% overall. Despite obvious benefits there has been a corresponding increase in the number of injuries resulting from their deployment. We describe a case of a pneumothorax in the absence of chest wall pathology associated with airbag deployment, in a belted driver. There has been one previous description of pneumothorax associated with airbag deployment, in an unbelted driver.

  10. Strategic Studies Quarterly. Volume 6, Number 3. Fall 2012

    Science.gov (United States)

    2012-01-01

    in use, down to the level of specific version, the build number in use, and the history of security patches applied to it; • IP addresses of...IP addresses from 4,294,967,296 in IPv4 to 2128 in IPv6. It is recognized today that “deploying IPv6 is the only perennial way to ease pressure on...the public IPv4 address pool.”41 As the world begins a transition from using IPv4 to IPv6 as the dominant communications protocol for the global

  11. The Belgian End of Mission Transition Period: Lessons Learned from Third Location Decompression after Operational Deployment

    Science.gov (United States)

    2011-04-01

    Third Location Decompression after Operational Deployment 11 - 2 RTO-MP-HFM-205 programs is based upon the literature on combat motivation ...exposure to normal leisure activities and tourism . Massage is another interesting element in the French program. Each soldier receives at least one... gastronomy ; during the French TLD, soldiers were allowed to drink wine or beer with their meal starting at 7pm and bars closed at 1am ultimately. Alcohol

  12. Prediction, Expectation, and Surprise: Methods, Designs, and Study of a Deployed Traffic Forecasting Service

    OpenAIRE

    Horvitz, Eric J.; Apacible, Johnson; Sarin, Raman; Liao, Lin

    2012-01-01

    We present research on developing models that forecast traffic flow and congestion in the Greater Seattle area. The research has led to the deployment of a service named JamBayes, that is being actively used by over 2,500 users via smartphones and desktop versions of the system. We review the modeling effort and describe experiments probing the predictive accuracy of the models. Finally, we present research on building models that can identify current and future surprises, via efforts on mode...

  13. Testing and Deployment of Software Systems (in practice)

    DEFF Research Database (Denmark)

    Nyborg, Mads; Høgh, Stig

    2014-01-01

    . The aim of this paper is to describe: • the unified software development process and compare this with CDIO. • the activities covering the ‘O’ part in software engineering. • the course structure and schedule. • the evaluations and comments received from students. The paper concludes that: It is possible......The CDIO concept is now well integrated into many curricula at universities around the world and it has meant an increase in the quality of engineering education. However, the main focus has been on design-build projects and less on the ‘C’ and ‘O’ part. In particular, the ‘O’ part of CDIO has...... received very little focus, since this is probably the most difficult part to implement in a university environment. Because of this observation, in 2011 we decided to launch a new elective course, ‘Testing and deployment of software systems (in practice)’, focusing entirely on the ‘O’ part in CDIO...

  14. Water Quality Vocabulary Development and Deployment

    Science.gov (United States)

    Simons, B. A.; Yu, J.; Cox, S. J.

    2013-12-01

    Semantic descriptions of observed properties and associated units of measure are fundamental to understanding of environmental observations, including groundwater, surface water and marine water quality. Semantic descriptions can be captured in machine-readable ontologies and vocabularies, thus providing support for the annotation of observation values from the disparate data sources with appropriate and accurate metadata, which is critical for achieving semantic interoperability. However, current stand-alone water quality vocabularies provide limited support for cross-system comparisons or data fusion. To enhance semantic interoperability, the alignment of water-quality properties with definitions of chemical entities and units of measure in existing widely-used vocabularies is required. Modern ontologies and vocabularies are expressed, organized and deployed using Semantic Web technologies. We developed an ontology for observed properties (i.e. a model for expressing appropriate controlled vocabularies) which extends the NASA/TopQuadrant QUDT ontology for Unit and QuantityKind with two additional classes and two properties (see accompanying paper by Cox, Simons and Yu). We use our ontology to populate the Water Quality vocabulary with a set of individuals of each of the four key classes (and their subclasses), and add appropriate relationships between these individuals. This ontology is aligned with other relevant stand-alone Water Quality vocabularies and domain ontologies. Developing the Water Quality vocabulary involved two main steps. First, the Water Quality vocabulary was populated with individuals of the ObservedProperty class, which was determined from a census of existing datasets and services. Each ObservedProperty individual relates to other individuals of Unit and QuantityKind (taken from QUDT where possible), and to IdentifiedObject individuals. As a large fraction of observed water quality data are classified by the chemical substance involved, the

  15. Patriot PAC-2 Development and Deployment in The Gulf War

    National Research Council Canada - National Science Library

    Sherman, J

    2003-01-01

    .... Patriot PAC-2 is a case study in effective project management that resulted in the extraordinary acceleration in the final stages of development production and deployment in time to play a historic role in the Gulf War...

  16. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  17. New Analysis and Theory of Deployable Folded Structures, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical theory has great value for deployable space structures and in situ manufacture of large beams, panels, cylinders and other...

  18. New Analysis and Theory of Deployable Folded Structures, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — A recently developed mathematical folding theory has great value for deployable space structures and in situ manufacture of large beams, panels and cylinders. The...

  19. Costs and benefits of MDOT intelligent transportation system deployments.

    Science.gov (United States)

    2015-07-01

    This report analyses costs and benefits of Intelligent Transportation Systems (ITS) deployed by : the Michigan Department of Transportation (MDOT). MDOT ITS focuses on traffic incident : management and also provide Freeway Courtesy Patrol services. A...

  20. Design and Deployment of Mobile FSO Communication System

    KAUST Repository

    Alheadary, Wael Ghazy

    2017-05-08

    As a potential solution to many applications, we developed a mobile free-space optical (FSO) system that achieves 1Gbps with transmission distance of 70 m. This system needs minimal preparation to be deployed within an hour.