Network Virtualization

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-11-C-0119
Agency Tracking Number: F103-048-2488
Amount: $98,370.00
Phase: Phase I
Program: SBIR
Awards Year: 2011
Solicitation Year: 2010
Solicitation Topic Code: AF103-048
Solicitation Number: 2010.3
Small Business Information
1382 Quartz Mountain Drive, Larkspur, CO, -
DUNS: 623678591
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Samuel Hamilton
 Principal Investigator
 (619) 825-8709
Business Contact
 Allen Ott
Title: CEO
Phone: (303) 681-3966
Research Institution
ABSTRACT: Virtualization technologies have the capability to provide significant improvements in horizontal network scalability. There are significant challenges, however, when adapting these technologies to tactical networks, where bandwidth, latency, and connection reliability issues combine to foil network characteristics that many network protocols within a virtualized network rely on. In particular, providing secure communication with minimum reliance on bandwidth and latency is absolutely critical. We propose to develop a new protocol applicable to this problem, which can enable secure communication between virtual network nodes with minimal bandwidth and latency constraints. It will do so with an emphasis on security, maintaining the ability to provide access control to virtual nodes as desired without burdening the system with the need to pass large access control restriction lists around the system, a requirement already presenting a significant burden on our tactical networks even without the expanded issues presented by network virtualization. BENEFIT: The need for a small bandwidth footprint and low latency impact are self-evident. In addition to these requirements, tactical networks require the ability to execute in a secure, and in some cases anonymous manner. If unprivileged network observers were able to deduce elements of the data addressed there could be catastrophic repercussions in the field of operation. In some cases, even deducing the participants in a data exchange operation can be vital information to an enemy. A virtualized network, with the potential for non-static location identifiers has an above average ability to provide such anonymity, but only if the protocol providing secure communication does not compromise this by requiring static key exchanges or other stable patterns allowing for information extraction by a participant in the networking environment.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government