EXHIBIT A-1 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX. Service Description: PCI Texas South Region Dedicated Burstable/Shared Network
|
|
- Madeleine Francis
- 6 years ago
- Views:
Transcription
1 Contract No. EXHIBIT A-1 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX Service Description: PCI Texas South Region Dedicated Burstable/Shared Network Overview PCI South Region Dedicated Burstable/Shared Network supports a customer that has a fleet of sites and wishes to deploy a network solely for their own use. PCI will work with the customer to design, procure, deploy, and manage the network with requisite reporting and management functions ported to the customer. The customer chooses the contention model. The T14 satellite and Mt Jackson teleport will be used for this service to support Texas and the South region of the US. CIR and unique Quality of Service engineering can be applied to support the DIR customer needs. Burstable Satellite Ku Bandwidth is shared bandwidth among the fleet sites customers within a single network. PCI uses the idirect Time Division Multiple Access (TDMA) technology to achieve high performance in reservation-based (ad hoc) networks. PCI s will work with the customer to design a contention ratio that will accommodate day-to-day support for simultaneous VPN tunneling, internet browsing, , Voice over IP (VoIP) phone service, and selected data applications. Higher contention ratios make Voice telephony virtually impossible and are normally used only for data transfers such as internet browsing. To ensure that our customer s service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. The Service provides 2-way high-speed IP connectivity between a fleet of customer remote locations and the public Internet via a satellite network based upon a hub-spoke (star) topology. The hub topology consists of a Hub and multiple very small aperture terminals ( VSATs ) located at CUSTOMER s remote sites. The platform provides a 2-way broadband network with all traffic on the outroute or downstream broadcast over a Time Division Multiplexed ( TDM ) carrier. The VSATs pass traffic to the Hub on a shared inroute or upstream carrier using a highly efficient bandwidth-efficient proprietary access protocol known as Deterministic-Time Division Multiple Access ( D-TDMA ). This architecture is optimized for networks with traffic patterns that follow a hub-to-spoke model and are bursty in nature. This is typical of packet-based protocols such as TCP/IP. The platform design provides features such as frame structure, turbo product coding, multiple frequency hopping, and automatic uplink power control that enable highly reliable and bandwidth-efficient downstream and upstream links. The highly scalable and flexible broadband Hub has been designed to support multiple, dedicated, private networks. The Hub can be partitioned so that multiple networks (outroute and one or more inroutes) can co-exist within a single Hub chassis. In addition, each network can be connected to up to five different satellites simultaneously. This architecture enables the network operator or service provider to realize cost savings and increased operational efficiencies. Features are supported that optimize IP performance over the large-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration DNS Caching The VSAT CPE provides a highly integrated satellite modem and IP routing device. Such features include: Firewall DHCP NAT 1
2 RIPv2 (and static routes) VLANs (802.1q) PCI South Region Dedicated Burstable/Shared Network Service Features The Service utilizes resources (satellite, Hub, RFT) that are allocated to a specific CUSTOMER fleet/network. In this Service the provisioning of the resources (e.g. oversubscription, quality of service, dedicated bandwidth) amongst the sites is specified by the CUSTOMER. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Average data rates per VSAT will be subject to overall service level usage. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources across the sites in the network. This allows the network to be configured based upon applications, for example real-time versus nonreal time. These features include: Traffic Engineering: CIR Rate Limiting Quality of Service / Prioritization Network based Site based (Application) CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is designed to be supported by no less than 1.8m reflector and an 4 Watt BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-1 to Appendix D 2
3 Contract No. EXHIBIT A-2 to Appendix D to DIR Contract No. DIR-TEX-AN-NG-ICXXX Service Description PCI South Region Single Channel Per Carrier (SCPC) Overview SCPC is a dedicated satellite-based transmission circuit that has guaranteed Ku bandwidth sized to meet customer requirements within Texas and the surrounding South region of the US. The bandwidth is not shared with any other network or customer; however, these services are more expensive than Burstable/Shared/Reservation-based Ku Bandwidth networks. PCI will use the T14 satellite with teleport at Mt Jackson, Va. PCI South Region SCPC services should be focused on high-density user nodes, VTC, or other server/applications supporting nodes. The Service provides 2-way high-speed IP connectivity between remote locations and the public Internet via a satellite network based upon a point-to-point topology. Data is transmitted via a customer provided modem (ComTech 570 L), to the satellite to the PCI provided modem (ComTech 570L) at the teleport. PCI then routes the circuit to its dedicated Internet Service. This architecture is optimized for networks with heavy traffic patterns that require dedicated circuit performance. Features are supported that optimize IP performance over the high-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration The Customer VSAT CPE should include features include: Firewall DHCP NAT RIPv2 (and static routes) VLANs (802.1q) PCI South Region Single Channel per Carrier (SCPC) Features The Service utilizes resources (satellite, modem, RFT) that are allocated to a specific CUSTOMER circuit. In this Service the provisioning of the resources (e.g. dedicated bandwidth, quality of service,) is specified by the CUSTOMER. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources at the site. This allows the network to be configured based upon applications, for example real-time versus non-real time. These features include: Traffic Engineering: Rate Limiting Quality of Service / Prioritization CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is initially sized for no less than 1.8m reflector and 4 Watt Ku BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect 1
4 fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-2 to Appendix D 2
5 Contract No. EXHIBIT A-3 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX Overview Service Description PCI South Region Burstable/Shared Burstable Satellite Ku Bandwidth is shared bandwidth between customers within a network. PCI uses the idirect Time Division Multiple Access (TDMA) technology to achieve high performance in reservation-based (ad hoc) networks. The geographic region served is Texas and the South region of the US. PCI s model is a 10:1 contention ratio for these services across occasional use customers (1, 5, 10 days per month, with the availability to support 30 days/month). Burstable bandwidth is less expensive than SCPC/Dedicated bandwidth. PCI s contention ratio will accommodate day-today support for simultaneous VPN tunneling, internet browsing, , Voice over IP (VoIP) phone service, and selected data applications. Higher contention ratios make Voice telephony virtually impossible and are normally used only for data transfers such as internet browsing. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. Committed Information Rate (CIR) - CIR is dedicated bandwidth that is purchased to augment Burstable/Shared bandwidth for use with Voice-over-IP telephone services, FTP, VTC, and other bandwidth sensitive programs and applications. Voice over IP uses the UDP protocol and requires dedicated bandwidth in order guarantee a clear phone conversation. CIR is engineered to be used across the customer s link, but can be prioritized to VoIP or VTC when that service is initiated. Quality of Service (QOS) engineering is implemented and offers assurance that Voice telephony data packets receive priority queuing across the idirect segment of the network. Our QOS gives UDP packets priority over the common TCP protocol packets that are used for internet browsing and other protocols. The G25 or T14 satellite and the Mt Jackson teleport provide this service. The Service provides 2-way high-speed IP connectivity between remote locations and the public Internet via a satellite network based upon a hub-spoke (star) topology. Data is transmitted via a PCI hub ( Hub ), to and from the Internet via Internet Service Providers ( ISPs ). The hub topology consists of a Hub and multiple very small aperture terminals ( VSATs ) located at CUSTOMER s remote sites. The platform provides a 2-way broadband network with all traffic on the out route or downstream broadcast over a Time Division Multiplexed ( TDM ) carrier. The VSATs pass traffic to the Hub on a shared in route or upstream carrier using a highly efficient bandwidth-efficient proprietary access protocol known as Deterministic-Time Division Multiple Access ( D-TDMA ). This architecture is optimized for networks with traffic patterns that follow a hub-to-spoke model and are bursty in nature. This is typical of packet-based protocols such as TCP/IP. The platform design provides features such as frame structure, turbo product coding, multiple frequency hopping, and automatic uplink power control that enable highly reliable and bandwidth-efficient downstream and upstream links. The highly scalable and flexible broadband Hub has been designed to support multiple, dedicated, private networks. The Hub can be partitioned so that multiple networks (out route and one or more in routes) can co-exist within a single Hub chassis. In addition, each network can be connected to up to five different satellites simultaneously. This architecture enables the network operator or service provider to realize cost savings and increased operational efficiencies. Features are supported that optimize IP performance over the large-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration DNS Caching 1
6 The VSAT CPE provides a highly integrated satellite modem and IP routing device. Such features include: Firewall DHCP NAT RIPv2 (and static routes) VLANs (802.1q) PCI South Region Burstable/Shared Service Features The Service utilizes resources (satellite, Hub, RFT) that are allocated to a specific CUSTOMER site. In this Service, the provisioning of the resources (e.g. oversubscription, quality of service, dedicated bandwidth) amongst the sites is specified by the PCI to be 5:1. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Average data rates per VSAT will be subject to overall service level usage. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources across the site(s) in the network. This allows the site(s) to be configured based upon applications, for example real-time versus nonreal time. These features include: Traffic Engineering: CIR Rate Limiting Quality of Service / Prioritization Network based Site based (Application) CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is designed to be supported by no less than.96m reflector and an 25 Watt BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-3 to Appendix D 2
AfriConnect Satellite Technology Overview
AfriConnect Satellite Technology Overview Topics Why VSAT? Defining The Network Requirements Coverage Traffic & Connectivity Features Public & Private Networks Understanding The Technology VSAT Terminal
More informationSupporting critical IP applications across the enterprise from VoIP and VPN, to streaming media
The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing complexity of deploying and managing global IP networks.
More informationSimple Satellite Network Solutions. Radyne SkyWire Company Proprietary -- 1
TM Simple Satellite Network Solutions Radyne SkyWire Company Proprietary -- 1 SkyWire is a next generation product TM designed specifically for IP networks running over satellite. SkyWire is an extremely
More informationGeneral Tariff Information
General Tariff Information Service Provider Name License: Tariff Number Service Name Harris Salam VSAT Networks and Services QAR0001 VSAT Tariff Type Business Tariff Effective Date 25 September 2018 Tariff
More informationOverview of Adaptive TDMA in idx 3.2. May 2015
Overview of Adaptive TDMA in idx 3.2 May 2015 INTRODUCTION The idirect Adaptive Time Division Multiple Access (TDMA) delivers higher spectral efficiency and greater network versatility by optimally changing
More informationidirect Satellite Routers
idirect Satellite Routers Advancing a Connected World 0213 The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing
More informationTooway Grade Of Service
Tooway Grade Of Service 16-06-2009 SERVICE DEFINITION Introduction The Tooway service is strictly limited to Internet connections by individual private users. Only 4 levels of services are available. In
More informationUHP - UNIVERSAL VSAT PLATFORM PRODUCT OVERVIEW
UHP - UNIVERSAL VSAT PLATFORM PRODUCT OVERVIEW UHP-1000 Satellite Router Modern, reliable and easy to deploy VSAT platform Universal solution for geographically distributed telecommunication networks that
More informationEight Essentials to Implementing Backhaul over Satellite for Mobile Operators. June 2009
Eight Essentials to Implementing Backhaul over Satellite for Mobile Operators June 2009 Introduction: For cellular operators one of the biggest challenges is finding the appropriate resources and technologies
More informationidirect Broadband Router Hub Solutions
idirect Broadband Router Hub Solutions A GROWING OPPORTUNITY There is enormous demand for high-speed broadband IP services, especially in remote areas poorly served by land-based solutions. According to
More informationEUROPEAN TELEPORT GLOBAL TELESAT STRENGTHS
EUROPEAN TELEPORT GLOBAL TELESAT STRENGTHS Teleport in Europe Extensive experience in African markets 11 years operations and office in Angola Agent and resellers in most African countries Enterprises
More informationSatellite Network Design. Robert Girard Customer Solutions Engineering
1 Satellite Network Design Robert Girard Customer Solutions Engineering 2 Agenda Which Network is Best for My Network? Service Level Discussion Satellite Network Technology Options Total Cost of Ownership
More informationSatellite-Based Cellular Backhaul in the Era of LTE
Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only
More informationImplementing A STAR Network Using Comtech EF Data's IP-Enabled Satellite Modems
Implementing A STAR Network Using Comtech EF Data's IPEnabled Satellite Modems April 30, 2002 Copyright 2002 Comtech EF Data Corp. All rights reserved. Comtech EF Data Proprietary Subject to change without
More informationPremium Services Using Vipersat Dynamic SCPC (dscpc) With Guaranteed Bandwidth
Premium Services Using Vipersat Dynamic SCPC (dscpc) With Guaranteed Bandwidth July 2009 Summary Premium services offered by satellite service providers are far more attractive if Service Level Agreements
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More informationProcurement of a Satellite Service
Procurement of a Satellite Service Agenda Which Network is Best for My Network? Service Level Discussion Satellite Network Technology Options Total Cost of Ownership (OPEX Vs CAPEX) Procurement & Logistics
More informationBANDWIDTH EFFICIENT CELLULAR BACKHAUL SOLUTIONS
BANDWIDTH EFFICIENT CELLULAR BACKHAUL SOLUTIONS LinkIP TM Cellular Solution Overview Backhaul solutions for CDMA, 2G & 3G GSM networks Built-in LinkShrink data compression engine gets 2:1 or better compression
More information5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing
1 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationidirect Satellite Routers
idirect Satellite Routers Advancing a Connected World 0316 idirect s product portfolio combines innovative technology and solutions to support all your networking requirements for bandwidth, location,
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability
More informationThe following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.
The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules. Service Offerings Jefferson Telephone Company via the Jefferson Telephone Company brand directly offers
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationRecommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router
Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router Recommended QoS Configuration TP-LINK Archer C3200 Contents Contents Introduction.......................................
More informationRecommended Network Configurations
Recommended Network Configurations The following configurations are the supported types of connections from the customer s site to Mitel s hosted data center. It is important that the WAN connectivity
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY
SECURITY, PERFORMANCE, IP TRANSPARENCY INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationNetwork Planning Guide
Network Planning Guide Global Reach. Local Presence. Premier Service. Introduction Maritime, Energy and Mining companies know that strategic investment in their corporate communications network is critical
More informationNetwork Management System ibuilder User Guide
Network Management System ibuilder User Guide Release 7.0.1 October 15, 2007 .Copyright 2007, idirect, Inc. All rights reserved. This manual may not be reproduced, in part or in whole, without the permission
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationHN/HX System Bandwidth Efficiency
HN/HX System Bandwidth Efficiency It is well understood by satellite network operators that bandwidth efficiency for a VSAT system is a critical element in achieving profitability, as higher efficiency
More informationArdmore Telephone Network TRANSPARENCY statement
Ardmore Telephone Network TRANSPARENCY statement Ardmore Telephone ( Ardmore Telephone or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules
More informationGLOSSARY. See ACL. access control list.
GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs
More informationSatNet AmerHis Mesh Terminals
SatNet AmerHis Mesh Terminals > SatNet AmerHis Mesh Terminals Advantech Satellite Networks AmerHis terminals are full-featured DVB-RCS compliant terminals. These rackmountable units are a slim 1U form
More informationAdvanced VSAT Networking Infrastructures Solutions for Offshore. John Meyers Wavestream Thailand November 20, 2014
Advanced Networking Infrastructures Solutions for Offshore John Meyers Wavestream Thailand November 20, 2014 WaveStream at a Glance Vision: Lead Satcom Industry with Innovative Commercial and Defense Products
More informationComputer Communication Networks
Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationComputer Networks and the internet. Daniel Graham Ph.D
Computer Networks and the internet Daniel Graham Ph.D 1.1 What Is the Internet? The Internet is a computer network that interconnects hundreds of millions of computing devices throughout the world. As
More informationKey Features of the Hughes HN System
White Paper Key Features of the Hughes HN System HN System Overview The HN System provides high-speed Internet Protocol (IP) satellite connectivity for multiple remote sites connecting to a corporate headquarters
More informationChoosing a WAN Solution IP VPN vs. Frame Relay or ATM
W H I T E P A P E R Choosing a WAN Solution IP VPN vs. Frame Relay or ATM 555 Anton Boulevard, Suite 200 Costa Mesa, CA 92626 877.634.2728 Introduction At MegaPath, we are committed to providing the right
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More informationOptimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture
1 Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture Author: Mikael Forsten TeliaSonera Sonera Carrier Networks Supervisor: Docent Timo O. Korhonen Instructor: M.Sc Jari
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationTechnology Brief. VeloCloud Dynamic. Multipath Optimization. Page 1 TECHNOLOGY BRIEF
Technology Brief Page 1 This document discusses the key functionalities and benefits of (DMPO) that assures enterprise and cloud application performance over Internet and hybrid WAN. Contents Page 2 Introduction
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationSonicwall NSA240 / TZ210 Configuration Guide (Firmware: SonicOS Enhanced o & up)
Sonicwall Configuration Guide v1.0 Sonicwall NSA240 / TZ210 Configuration Guide (Firmware: SonicOS Enhanced 5.8.1.1-35o & up) 169 Saxony Road, Suite 212 Encinitas, CA 92024 Phone & Fax: (800) 477-1477
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationNetwork Services Enterprise Broadband
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationSTATE OF ALASKA RFP NUMBER 2518S032 AMENDMENT NUMBER FOUR (4) MANDATORY RETURN AMENDMENT
STATE OF ALASKA RFP NUMBER 2518S032 AMENDMENT NUMBER FOUR (4) MANDATORY RETURN AMENDMENT AMENDMENT ISSUING OFFICE: Department of Transportation & Public Facilities Statewide procurement P.O. Box 112500
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationNavpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationWhite Paper. SIP Trunking: Deployment Considerations at the Network Edge
SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,
More informationUpstream Scheduler Mode Configuration for the Cisco ubr CMTS
Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationTrafffic Engineering 2015/16 1
Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215
More informationTransmission Security (TRANSEC) in an IP based VSAT Architecture April 2007
Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007-1 - As the ability to monitor satellite transmissions grows increasingly sophisticated, the need to implement increased levels
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationRequirements for a CableHome Residential Gateway
White Paper Lior Storfer, Product Marketing and Architectures Manager Jeff Mandin, Software System Architect Cable Broadband Communications Texas Instruments Abstract Cable operators wish to deliver additional
More informationGVF Connectivity 2017 Serving the next generation customers, extending the demarcation Comtech EF Data Corp.
GVF Connectivity 2017 Serving the next generation customers, extending the demarcation 2015 Comtech EF Data Corp. The Challenge (Cisco VNI Mobile Traffic Feb. 2017) MEA mobile data traffic grew 96% in
More informationNetwork Management Policy ( Policy ) 1
Network Management Policy ( Policy ) 1 I. OVERVIEW Viasat s Network is a shared network; at any given time, subscribers within a given geographic area must share available network capacity. Viasat aims
More informationPage 2 Skype Connect Requirements Guide
Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and the Skype community. By adding Skype Connect to your existing SIP-enabled
More informationITU-T. FS-VDSL White Paper. Full-Service VDSL. Focus Group White Paper. FS-VDSL Service Scenarios INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU FS-VDSL White Paper Full-Service VDSL Focus Group White Paper FS-VDSL Service Scenarios Version 1.00 29 November
More informationENTERPRISE CONNECTIVITY
ENTERPRISE CONNECTIVITY Elevating Enterprise Private Networks with Cost-effective Satellite Services The success of today s organizations and enterprises highly depends on reliable and secure connectivity.
More informationWHIT E PA PER. HughesON ActiveTechnologies
WHIT E PA PER HughesON ActiveTechnologies WHITE PAPER HughesON ActiveTechnologies Solving the Challenges of the Distributed Enterprise Network Distributed enterprises today are deploying hybrid WANs that
More informationNetwork Configuration Guide
Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN
Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationXO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
More informationQoS User view From modelling to service class
QoS User view From modelling to service class STQ Workshop - 1 & 2 July 2009 P-Y Hebert AFUTT User Group vice-chairman ETSI 2009. All rights reserved Index UMTS Classes of Service (CoS) ITU-T Y.1541 QoS
More informationQUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des
Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to
More informationidirect Hubs and Line Cards
idirect Hubs and Line Cards Advancing a Connected World 1017 idirect s product portfolio combines innovative technology and solutions to support all your networking requirements for bandwidth, location,
More informationidirect Defense Portfolio
idirect Defense Portfolio Advancing a Connected World 0117 idirect s product portfolio combines innovative technology and solutions to support all your networking requirements for bandwidth, location,
More informationCisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.
Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware
More informationSecurity SSID Selection: Broadcast SSID:
69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationRingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices
White Paper UCaaS Connectivity Options in the New Age: Best Practices 1 Today s IT stacks are cloud-first, taking advantage of the many benefits of SaaS applications, while answering the increasing needs
More informationT H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second
No. 200235 March 2001 StreamCore StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) TCP/IP WAN Access Link Flow Regulation System Performance Evaluation Premise: Network professionals
More informationGrandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management
Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Table of Contents INTRODUCTION... 4 DSCP CLASSIFICATION... 5 QUALITY OF SERVICE ON GWN7000... 6 USING QOS TO PRIORITIZE VOIP TRAFFIC...
More informationSection 3 - Configuration. Enable Auto Channel Scan:
Enable Auto Channel Scan: Wireless Channel: The Auto Channel Scan setting can be selected to allow the DGL-4500 to choose the channel with the least amount of interference. Indicates the channel setting
More informationLevelOne Broadband Routers
LevelOne Broadband Routers FBR-1100TX FBR-1400TX FBR-1401TX FBR-1700TX User's Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your LevelOne Broadband Router... 1 Package Contents... 4
More informationNetwork Management Policy ( Policy ) 1
Network Management Policy ( Policy ) 1 I. OVERVIEW Viasat s Network is a shared network; at any given time, subscribers within a given geographic area must share available network capacity. Viasat aims
More informationA Whirlwind Introduction to the Internet Overview
CS 455/555 / Spring 2013 Intro to Networks and Communications Whirlwind Introduction to the Inter (part 1) Dr. Michele C. Weigle http://www.cs.odu.edu/~mweigle/cs455-s13/ A Whirlwind Introduction to the
More informationIngate Firewall & SIParator Product Training. SIP Trunking Focused
Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent
More informationProduct Technical Specification
Product Technical Specification Satellite Mobility (LCPA) Agreement This agreement is a Standard Form of Access Agreement for the purposes of Part XIC of the Competition and Consumer Act 2010. Product
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:
MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More information