Peer-To-Peer Communication

Smith, Brad
September 2001
Wireless Week;9/3/2001, Vol. 7 Issue 36, p24
Trade Publication
Focuses on peer-to-peer, a self-forming network being developed by MeshNetworks Inc. for the United States Department of Defense. Target date of release; Comparison with a local area network; Purpose of the technology.


Related Articles

  • mesh: it works, but will anyone Use it? Smith, Brad // Wireless Week;12/2/2002, Vol. 8 Issue 42, p28 

    Looks at the prospects of mesh network technologies in the U.S. Features of MeshNetworks' technology; Origin of the Meshnetworks technology; Issue facing the technology; Comments from Allen Nogee, an analyst with In-Stat/MDR.

  • Reviews. Adams, Megan // Government Information Quarterly;1996, Vol. 13 Issue 3, p331 

    Reviews the World Wide Web homepage of the United States Department of Defense.

  • Anatomy of America's Secret Internet. WEINBERGER, SHARON // Popular Mechanics;Feb2011, Vol. 188 Issue 2, p20 

    The article offers information the various network security levels of the U.S. Department of Defense.

  • Red alert! Bottoms, David // Industry Week/IW;7/3/95, Vol. 244 Issue 13, p55 

    Reports on an evaluation of commercial network security products prepared by the Department of Defense, titled `Trusted Computer Security System Evaluation Guidelines.' Concerns with computer security via Internet; Contact information. INSET: Fact..

  • PENTAGON SETS NEW PROTOCOL.  // PM Network;Jan2004, Vol. 18 Issue 1, p10 

    Provides information on the Adopt Internet Protocol version 6 project that sets to replace the U.S. Defense Department's Internet protocol system by 2008. Project timeline; Technical details; Expected benefits from the project.

  • Unclassified but Sensitive Internet Protocol Router Network.  // Network Dictionary;2007, p502 

    A definition of the term "Unclassified but Sensitive Internet Protocol Router Network" is presented. Previously known as Non-secure Internet Protocol Router Network (NIPRET), it refers to a network of Internet protocol routers owned by the U.S. Department of Defense (DOD) and created by the...

  • Welcome (Spies), You've Got Secrets! Brown, Doug // Inter@ctive Week;04/24/2000, Vol. 7 Issue 16, p12 

    Reports on the plans of the United States Defense Department to create a classified intranet for spies. Goal of the project; Efforts of the Defense Intelligence Agency to fund the project; Concept of the Web-based system.

  • CHAPTER 11: THE DARK FRUIT OF GLOBALIZATION: HOSTILE USE OF THE INTERNET. Megill, Todd A. // Strategic Challenges for Counterinsurgency & the Global War on T;9/1/2006, p215 

    Chapter 11 of the book "Strategic Challenges for Counterinsurgency and the Global War on Terrorism" is presented. It explores the functions of the Internet as a tool by insurgents/terrorists to operate and conduct targeting operations employing a similar methodology adopted by the U.S....

  • A Culture Shock Is Coming. Strassmann, Paul A. // Signal;Jul2011, Vol. 65 Issue 11, p33 

    The author discusses the barriers to the U.S. Defense Department's transition to a personal information assistant (PIA)-based hybrid cloud computing network. The main obstacles are cultural, not technological, and would include the prevalence of an acquisition-centered culture and organizational...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics