An Environment Agnostic Architecture for the Identification and Modification of Network Datagrams
Navy SBIR FY2008.1


Sol No.: Navy SBIR FY2008.1
Topic No.: N08-055
Topic Title: An Environment Agnostic Architecture for the Identification and Modification of Network Datagrams
Proposal No.: N081-055-1035
Firm: Data Research & Analysis Corp.
1555 King St.
#300
Alexandria, Virginia 22314-2738
Contact: David Glick
Phone: (703) 299-0700
Web Site: www.dracorp.com
Abstract: As the Navy moves towards a Service Oriented Architecture (SOA) through initiatives such as Consolidated Afloat Networks and Enterprise Services (CANES), the high-level control of network information will become ever more important. This need is especially pronounced when dealing with complex and interrelated data flows. With such highly distributed yet interconnected network nodes, the ability to identify and act upon messages or portions of messages that should be restricted, redirected, reformatted, or otherwise modified is extremely valuable. This document addresses these concerns by proposing a flexible and modular architecture to identify those datagrams which need some form of modification and to perform such modification in a generic user-specified way. The solution relies heavily on accepted web services standards and makes abundant use of Extensible Markup Language (XML) and related technologies and standards. In addition, the components of the architecture are able to integrate with a wide variety of hardware and software systems on multiple platforms as well as operate at the network level. Support for multiple network protocols with the ability to expand those supported will also be provided. The proposed solution is highly commercializable due to its adaptable design and multi-use capability.
Benefits: The primary benefit is the ability to easily specify and identify datagrams needing some form of modification and the ability to easily specify the modification actions to be performed, on a variety of software and hardware systems, platforms, and networks and on a variety of network protocols. The solution could be used in any situation (government or industry) where network traffic needs to be influenced.

Return