An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide
Multipath routing can be effectively used to maximize the utilization of network resources for real-time traffic. In mobile ad-hoc network environments, this approach can suffer from co-channel interference due to the simultaneous transmission of packets
For low bit-rate video communications, each video frame usually fills the payload of a single network packet. In this situation, the loss of a packet may result in loosing the entire video frame. Currently, most existing error concealment algorithms can
Several companies offer computation on demand for a fee. More companies are expected to enter this business over the next decade, leading to a marketplace for computation resources. Resources will be allocated through economic mechanisms that establish the
Richard A. Rouil, Nada T. Golmie, Nicolas Montavont
The Media Independent Handover (MIH) architecture is designed to facilitate the signaling and enable seamless handovers in heterogeneous networks. In this paper, we propose a solution using the Stream Control Transmission Protocol (SCTP) to efficiently
Channel scanning is an important aspect of seamless handovers since it is required in order to find a target point of attachment (PoA). In the IEEE 802.11 WLAN, scanning of other channels causes service disruptions with the current AP so that the provided
A simple technique to estimate the position of a mobile node inside a building is based on the Received Signal Strength (RSS). In previous publications, we investigated the effectiveness of using circular array antennas and beamforming in order to enable
While the frequency dependence of the wireless channel may be negligible for narrow to wideband signals, it has been shown that modeling this dependence for bandwidths in excess of 2 GHz improves channel reconstruction up to 40%.Yet to our knowledge, only
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of response time and the volume of traffic load it generates are important considerations. We
We investigate the behavior of a distributed server loss network with mobile users.While the Markov model provides an accurate ¿microscopic¿ model of the network behavior, the dimension of this model grows exponentially with the number of nodes precluding
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The document
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or more VPN devices to which users connect using their Web browsers. The traffic between the Web
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile for IPv6 in the USG that is intended to be applicable to all future uses of IPv6 in non-
Sheila E. Frankel, Paul Hoffman, Angela Orebaugh, Richard Park
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or more VPN devices to which users connect using their Web browsers. The traffic between the Web
Lijun Ma, Tiejun Chang, Alan Mink, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
Detection-time-bin-shift (DTBS) is a scheme that uses time division multiplexing of a single photon detector between two photon bases in a quantum key distribution (QKD) system. This scheme can simplify the structure of a QKD system, reduce its cost and
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV
Lijun Ma, Hai Xu, Tiejun Chang, Oliver T. Slattery, Xiao Tang
We have experimentally implemented a differential phase shift quantum-key distribution system with up-conversion detectors operating at 2.5 Gbps clock rate. A Michelson interferometer with Faraday mirrors is used to increase the system stability.
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them