November 1985 | NTIA Technical Report TR-85-185
Robert F. Linfield; Martin Nesenbergs
Abstract: This report addresses the concepts, the justification, and the eventual configuration of military access areas. Many factors enter into this access area characterization effort. The key factors emphasized here are: the current telecommunications environment in the United States and abroad, the military (in particular, the U.S. Army) telecommunications requirements, pertinent architectures of present and future networks, and the associated major cost elements for access areas. An attempt is made to define the term "access area" in a quantitative and unambiguous way. To that end, many defining parameters appear needed to specify both the facilities and the functional elements of significance. The report does not culminate in a particular recommended definition of access areas. Instead, the report recommends that automated means (computers and algorithms) be developed and used for network optimization. The reasons for this conclusion are elaborated in detail. However, the main features have to do with the ever–changing complexity, both in the costs, the end–user requirements, and in the technological world of communications. Dramatic changes take place repeatedly and create new circumstances for access area network designers. To take full advantage of this dynamic environment, the adequacy of skills and speeds of the best human experts can be disputed. Furthermore, the methods should be logically delineated and with repeatable results. To that end, a network optimization model such as the Consolidated Service Administrative Telephone System or CSATS, may be considered for modification and enhancement.
Keywords: performance; network architecture; access area; cost; military communications; switches; traffic
To request a reprint of this report, contact:
Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.