Military Messaging. Over Low. Bandwidth. Connections

Size: px
Start display at page:

Download "Military Messaging. Over Low. Bandwidth. Connections"

Transcription

1 Military Messaging Over Low Bandwidth Connections White Paper

2 Contents Paper Overview 3 The Technical Challenges 4 Low Bandwidth 4 High Latency 4 High Error Rates 4 Multicast 4 Emission Control (EMCON) 4 Priority 4 Scenarios 5 Surface Fleet Communication 5 Submarine Communication 6 Army Deployment Communication 6 Special Services Communication 7 Drivers for Change 8 Technology Summary 9 Radio and Satellite Networks 9 IP Integration and Routers 11 ACP STANAG4406 Annex E 12 LMTA an TIA 13 Annex E Server Solution 14 Solution Overview 14 ACP142 Channel Operation 14 Configuration Management 15 Operational Management 15 Audit, Tracking and Statistics 16 Communication Channel Integration Points 16 Handling Multiple Communication Channels 17 Scenarios and Requirements 17 Network Level Configuration 18 MTA Level Configuration 19 About Boldon James 20 Further Information Boldon James Ltd. All rights reserved. The copyright of this paper is solely vested in Boldon James Ltd. The contents must not be reproduced, used, distributed or disclosed (wholly or in part) without the prior written permission of Boldon James Ltd. The Boldon James logo and all product names are trademarks of Boldon James Ltd. All other trademarks are the property of their respective owners and are acknowledged. Boldon James Ltd. (registered number ) is registered in Great Britain with registered offices at Berkshire SL6 1SQ.

3 Paper Overview Military messages often need to be transferred over low bandwidth networks such as High Frequency (HF) radio and other constrained communication channels. Two military communication standards have evolved to deal with these messaging environments, the Combined Communications Electronics Board (CCEB) of AU, CA, NZ, US, and the UK, has developed ACP142, and NATO s STANAG4406 Annex E. This paper describes how the STANAG4406 Annex E and ACP142 technology standards are used to support military messaging through different deployed scenarios. It then describes our approach to implementing these technologies through our Annex E Server and how basic and advanced operational problems, management and integration with other components, as part of a larger solution are addressed.

4 The Technical Challenges There are a number of basic technical challenges that arise from military messaging deployments, some of which are particularly relevant to constrained communications channels and are summarised below. These challenges will be illustrated through scenarios. Low Bandwidth Many of the communication channels used are very slow, down to as little as 300 bits per second. With bandwidth this constrained, it s imperative that protocols make the most efficient use of it. High Latency Very often, slow links have long round trip times. Satellite links are faster, however they have a very high latency. To work well in high latency environments, protocols should be as non-blocking as possible. High Error Rates Typical communication channels often have high error rates and applications must be robust enough to cater for them. Multicast Many of the communication channels used are inherently multicast, for example, radio and satellite. Messages are often sent to multiple destinations and it s desirable that protocols can take advantage of the multicast nature of the underlying media. To some extent, this can compensate for low bandwidth. Emission Control (EMCON) In many situations, deployed units don t want to broadcast signals in order to help hide their location. The situation where signals can be received and not sent is referred to as EMCON. It s important to be able to send messages to a unit in EMCON. Priority Formal military communications have an associated priority i.e. precedence. In a low bandwidth environment it s easy for message queues to build up, so it s critical to have mechanisms that ensure the highest priority messages get through first.

5 Scenarios This section considers a number of scenarios where the technologies are important. It s not intended to be an exhaustive list. Surface Fleet Communication Naval communication is a major target. Although communication can flow from the strategic environment directly to taskforce ships using broadcast radio, this is not generally the approach used. When ships are deployed as part of a taskforce, communications generally go to the designated command ship which is usually a larger surface unit with the necessary command, control and communication equipment. At the strategic level, messages may come from a Communications Centre (COMCEN) located on shore or directly from originators in the strategic environment. Therefore maximum support of messages direct from originators is desirable. Messages are then relayed onwards to the other ships in the taskforce, often using the same communications technology as in ship-to-shore. Figure 1 shows the use of satellite communication to reach the command ship and broadcast HF radio for communication with the other units in the taskforce. Multicast can be used for communication from the command ship to the other ships. In EMCON, messages can be received from shore or from other vessels, rather than transmitted between ships or back to shore. More complex situations may arise with individual vessels in EMCON. In general, a ship would have quite a number of potential internal message recipients, and the external message communication needs to be connected with the internal messaging infrastructure. Figure 1 Surface Fleet Communication

6 Submarine Communication Communication with submarines introduces a number of special requirements. Submarines may use higher bandwidth channels when they are on the surface and also use Very Low Frequency (VLF) radio, which has a data rate of around 300 bits per second. VLF radio has the advantage that it can penetrate below the surface for a moderate distance and be used without surfacing. When submarines dive below the level of VLF penetration, they are out of all communication. There are therefore in one of three states: 1. full communication 2. EMCON 3. no communication. These need to be managed and shore systems will be most effective if they understand the current communication status. This is achieved by the planned timing of communication status shared between the submarine and the shore. This is also relevant to the previous scenario. Army Deployment Communication Figure 2 Submarine Communication The army has similar requirements. Typically, there will be high bandwidth communication to the field HQ and communication to field units may be bandwidth constrained. Therefore, there may be a requirement for EMCON. In some situations, store and forward messaging is useful, for example to send key information such as map data or to send a formal message in preference to voice communication. In Figure 3 below, there is no direct communication from field HQ to a second field unit. Instead messages are relayed using the messaging system in the first field unit. This relay needs to be fully automated rather than requiring manual intervention at the first field unit. Figure 3 Army Deployment Communication

7 Special Services Communication Another requirement is to support special services operatives. It will often be desirable or essential to have radio silence (EMCON) as well as retain the ability to listen and receive messages. Figure 4 Special Services Communication

8 Drivers for Change Military formal messages over low bandwidth networks are generally sent using ACP127, which is a text based protocol. There are two main reasons why formal messaging is moving on from this older technology: 1. NATO nations are moving to an Microsoft Exchange / X.400 (ACP123 & STANAG4406) based system for formal messaging, and all components need to be migrated to become part of this new system 2. ACP127 is text only. There is now a requirement to send other types of information such as images, maps, photos and documents.

9 Technology Summary The overall layered architecture for the new solution is illustrated in Figure 5 below. The components and layers are described in more detail in the following sections. Figure 5 Layered Architecture Solution Radio and Satellite Networks It s beyond the scope of this whitepaper to discuss in detail radio and satellite networks i.e. the typical constrained communication channels, and their related technologies. The focus is therefore on the messaging applications that use them. The characteristics of these underlying communication channels and their integration are critical to the overall solution. A common underlying standard is STANAG5066 Profile for Maritime High Frequency Radio Data Communications and is used as an example communications technology in this paper. Other underlying technologies utilised include: different protocols to support different underlying technologies vendor proprietary protocols and vendor extensions to STANAG5066 future NATO standards. There are two basic approaches to support applications over the underlying communications channels 1) with Internet Protocol (IP), and 2) without IP. STANAG5066 defines how to support IP (Annex F.10) as shown in Figure 6 below.

10 Figure 6 - STANAG5066 Supporting IP (Annex F.10) Direct use of STANAG5066 without IP for military messaging is defined in Appendix A of Annex E of STANAG4406, and has the advantage of removing a protocol layer. This only improves bandwidth utilisation by a small amount. Using IP however, has a number of advantages: 1. the application is decoupled from the router using a standard protocol interface, therefore the application and router components can be decoupled. This leads to the other advantages described below 2. procurement is simplified, as the application and channel can be selected separately i.e. mixed and matched 3. multicast can be supported which generally requires the IP layer 4. EMCON can be supported, however, direct application binding does not always support this 5. multiple applications can easily share the underlying channel 6. migration of applications to new channels is easy 7. application support of multiple communication channels is straightforward. Because of these advantages, this paper is focused on using IP. Our products support the use of and enable the direct use of the underlying protocol to be supported as illustrated in Figure 7 below. Here the resulting product is a close integration between a communication channel and our Annex E solution. Annex E MTA ACP 142 Communications Channel (eg STANNAG 5066) (Radio Vendor) API to Communication Channel (defined by Vendor) Figure 7 Underlying Protocol Support from Boldon James

11 IP Integration and Routers The approach to integrate an application with two communication channels using IP is illustrated in Figure 8 below. All of the components talk IP and will typically be connected by a local network such as Ethernet when the components are not operating on the same system. The application will be an IP end point. The communication channels interconnect with other systems and a router will be integrated with the communication channel so that appropriate packets will be correctly routed over it. In order to support multicast applications, it s necessary to support multicast at the IP level. Where multicast is needed, the routers must be capable of multicast. Figure 8 Application Integration with Two Communication Channels Using IP ACP142 ACP142 P_Mul A Protocol for Reliable Multicast Messaging in Constrained Bandwidth and Delayed Acknowledgement (EMCON) Environments is a CCEB standard for multicast and EMCON support, specifically designed to support NATO s STANAG4406 Annex E. P_Mul is an end-to-end protocol that makes use of the Internet Standard User Datagram Protocol (UDP) over IP. It works to transfer data reliably from one system to one or more recipient systems. In summary it works as follows: 1. it works out which IP address to use for the set of intended recipients from three options: - Single Recipient (Unicast) ACP142 is fundamentally a multicast standard. Unicast is a special case and the standard IP address of the recipient is used - Static Multicast Here a multicast IP address is assigned to a fixed set of recipients. This is useful for very small networks and for frequently used combinations of recipients in large networks. A static multicast address can be used without any special negotiation

12 - Dynamic Multicast Each sender has a set of IP multicast addresses reserved for dynamic multicast. ACP142 allows the sender to negotiate a specific set of recipients to be associated with one of these addresses. This allows dynamic multicast to be used for an arbitrary set of recipients. 2. the sender breaks up the data to be sent into a fixed number of packets and communicates the number of packets to be sent 3. the sender then starts sending out data packets at a rate appropriate to the underlying communication channel 4. in non-emcon, each recipient will communicate back to the sender a list of packets that it has not received. This allows the sender to re-transmit any lost packets and to efficiently complete the transfer of the data to all recipients 5. in EMCON mode, a recipient will not be able to send any data back to the sender. The sender will simply re-transmit the entire message at intervals, to maximise the likelihood that all packets are correctly received 6. ACP142 is aware of STANAG4406 (six level) message priority. The priority is passed down to the packet level and higher priority packets are always sent first. This means that a higher level message will naturally overtake a lower priority message that is partially transmitted. The details are more complex, but the essence of how ACP142 works is quite straightforward and it therefore provides the core EMCON and multicast functionality needed. STANAG4406 Annex E STANAG4406 Annex E specifies operation over ACP142. It uses P1 and still uses X.400 P1, however replaces the full stack. Annex E provides a number of capabilities: 1. the full stack between P1 and IP is replaced with a simple protocol that provides the necessary services over ACP142, and minimises overheads. This provides a block of data to ACP142 that encapsulates the X.400 P1 information 2. it provides general purpose data compression to help reduce data transfer volume for the protocol, addressing information and general data transferred (e.g. text). This compression complements application specific compression techniques for map and image compression for example 3. it adapts to distributed operation procedures for a Microsoft Exchange or an X.400 Message Transfer Agent (MTA), to correctly integrate with EMCON and multicast. The key functions of Annex E are to reduce to a minimum the amount of data transmitted and to integrate ACP142 multicast and EMCON functionality into an X.400 MTA.

13 LMTA and TIA Annex E defines protocols and procedures for integrating an X.400 MTA with ACP142, and defines two basic configurations of MTA: 1. Lightweight MTA (LMTA) This is where the only external communication makes use of P1 / Annex E. It s appropriate for a ship where all internal communication goes direct to the LMTA 2. Tactical Interface Agent (TIA) This makes use of P1 / Annex E to communicate with LMTAs (or other TIAs). It will also communicate with the full stack P1 to other MTAs enabling LMTAs to be interconnected to a general X.400 network. Our Annex E Server can act either as an LMTA or as a TIA. This is a configuration choice only as there is no product difference between TIA and LMTA. Figure 9

14 Annex E Server Solution Our Annex E Server provides for both ACP142 and STANAG4406 Annex E. This section provides a high level overview of the implementation and the key design features. Solution Overview Figure 10 Boldon James Annex E Server Components Figure 10 above illustrates how the relevant core components of our Annex E Server operate. The central part of an MTA is the queue of messages in disk. The messages can then be sent onwards or delivered locally and are then removed from the queue. Even when a message is only held for a few hundred milliseconds, this reliable storage is central to MTA function. The Annex E Server has a queue manager process (QMGR) responsible for scheduling and controlling MTA operations. QMGR interacts with the communication channels that send and receive messages. The X.400 channel is used for handling the full stack X.400 P1 communication over high bandwidth channels. ACP142 and Annex E support are provided by a new ACP142 / X.400 channel that provides support for transferring X.400 P1 over ACP142. ACP142 Channel Operation The ACP142 channel is a static process that listens in on a UDP port for incoming packets. This is essential as incoming data may arrive at any time. It can access the MTA queue and has its own disk cache that contains information that will optimise performance and allow the correct operation in the event of a system restart. In particular: status of all transfers (send and receive) pre-computed data packets to send received data packets from partial transfers. The ACP142 channel will gather incoming packets and report transfer status to the QMGR. When a complete message is received, it s submitted into the M- Switch queue. When a message is to be routed over ACP142, the QMGR will

15 instruct the ACP142 channel to process the message in the MTA queue. It then pre-computes the data packets and sends the message. It also will inform QMGR of the transfer status and update information in the MTA queue when needed. Configuration Management Our approach to configuration management is to hold information in a directory. In most deployments a directory server will be operated on the same server as the Annex E Server. Directory based configuration allows for secure client / server configuration management and facilitates sharing configuration information between multiple mail servers. The Annex E Server and the ACP142 channel both access the directory using Lightweight Directory Access Protocol (LDAP). Operational Management The QMGR process is at the centre of operational control. It interacts with the ACP142 channel for both incoming and outgoing messages. When a message needs to be sent over ACP142, it requests a start transfer to the ACP142 channel, which then begins to process the message. QMGR has the option to pause or abort the transfer of messages. This can be in response to specific operator control, as a consequence of QMGR intelligent scheduling, or in support of general events such as a minimise where only messages above a certain priority are processed. The ACP142 channel will periodically report to the QMGR the transfer status of both inbound and outbound messages. This ensures that QMGR is aware of the status of all partially complete inbound and outbound transfers. Management applications interact with the QMGR using a Switch Operational Management (SOM) protocol. This is a management interface that allows operators to view message and queue status and perform control operations such as pausing transfer, requesting non-delivery, and the re-direction of messages.

16 Audit, Tracking and Statistics The Annex E Server records its activity into an audit log that is processed and placed into an ODBC audit database. It publishes the schema of this audit database, in order that third party applications can analyse the data, for example, to generate reports. It also provides a number of applications based on the audit database, in particular to enable message tracking and provide statistics. Communication Channel Integration Points The Annex E Server will generally be part of a larger system, therefore good integration is critical. The basic integration approach with communication channel components is via IP. However, this could be replaced with direct integration with the communication channel. Moving a system into EMCON requires changes to both the communication channel and the Annex E Server. By holding EMCON status as a directory attribute, it s straightforward to integrate control into a separate application. This enables the integrator to provide a simple EMCON control allowing the operator to switch both components from one place. Bandwidth and retransmission parameters are also externally configurable. In a Transport Control Protocol (TCP) system, a good TCP implementation will automatically adapt its parameters to the performance of the underlying channels. This is not so easy for ACP142, as it doesn t receive information to enable this to happen, particularly in EMCON mode. Changes in the underlying communication channel may lead to an increase or decrease of available bandwidth, as would other applications sharing the same underlying channel. It s therefore desirable to integrate this control with the underlying communication channel and directory based configuration enables this.

17 Handling Multiple Communication Channels The paper has primarily considered using a single constrained bandwidth communication channel. This section shows that many deployments have multiple communication channels and explains how our Annex E manages this. Scenarios and Requirements Figure 11 A ship will typically have two or more communication channels: HF radio and satellite as shown in Figure 11 above. The combinations in use will depend on the type of threat, for example: both channels are in EMCON both channels are active one channel is in EMCON, typically the satellite channel as it has a stronger signal and is more visible. However, the pencil beam nature of the satellite and the location of the threat may lead to using an HF channel in EMCON and the satellite in active. When both channels are open, the use of satellite may be preferred for higher bandwidth or HF radio as it s lower cost, or a more complex preference depending on the messaging load. With a HQ unit, the EMCON status is simpler as it would never be in EMCON. However, there may be many more channels, for example, to support multiple satellites with different ships reached through different satellite services. Other shore based systems, such as Special Operations, could be in EMCON. Therefore, multi-channel scenarios add significant complexity.

18 Network Level Configuration Figure 12 Network Level Configuration Given the use of IP, a natural approach to handling multiple networks is to use a single ACP142 channel and IP level configuration as shown in Figure 12 above. In this structure, an MTA has a single ACP142 channel connected to the two communication channels. IP routing is then used to control which of the channels are used. This is a clean and simple approach with easy switching between channels and switching channels mid-message. However, it has a number of disadvantages: ACP142 parameters, such as transmission rate and re-transmission timers, cannot be tuned for both communication channels at the same time where messages, or specific classes of message (e.g. high priority), need to be sent over a specific channel, this cannot be configured dealing with multicast i.e. where connectivity of the two channels is different, is likely to be very complex to configure. For these reasons, MTA level configuration as described in the next section, is usually preferable.

19 MTA Level Configuration Figure 13 MTA Level Configuration Configuration can be managed at the MTA level by using one channel for each individual communication channel. ACP142 parameters can be tuned appropriately for each communication channel as shown in Figure 13 above. The Annex E Server routing can be used to select an appropriate channel for each recipient. When channels need to be changed while messages are queued, a routing table modification followed by reprocessing the queue manages this. This will cause transfers on the first channel to be aborted and then the messages will be moved to the other channel and queue.

20 About Boldon James Boldon James has over twenty years experience specialising in message handling solutions tailored to meet the formal messaging requirements of the worldwide Defence, Homeland Security, Aviation and Government sectors. Using extensions to Microsoft commercial off-the-shelf (COTS) software, Boldon James provides the added functionality that customers require, but retains the ease of use and implementation of a COTS solution. This results in solutions with a low total cost of ownership and significantly reduced deployment risk. Boldon James is a Microsoft Certified Partner. Further Information Visit: info@boldonjames.com Tel: +44 (0)

Military Message Handling System

Military Message Handling System Military Message Handling System HFIA, KJELLER 8 SEP 2017 Bengt R. Kristiansen, Øyvind Jonsson www.thalesgroup.com MMHS used in HF networks www.thalesgroup.com Minimum Military Requirements Built-in support

More information

Messaging & Directory Servers. XMPP over HF Radio: CEO Isode Ltd. HFIA San Diego, January

Messaging & Directory Servers. XMPP over HF Radio: CEO Isode Ltd. HFIA San Diego, January XMPP over HF Radio: Measurements and Analysis Steve Kille CEO Isode Ltd HFIA San Diego, January 2011 Overview Gave talk on theory of XMPP over HF at February 2009 HFIA Today: What we ve built; measurements;

More information

Secure information exchange

Secure information exchange www.thales.no Secure information exchange 2 together. Safer. everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,

More information

Messaging & Directory S. Application and STANAG performance over

Messaging & Directory S. Application and STANAG performance over Application and STANAG 5066 performance over Wide-B and HF Stevee Kille CEO - Isode Ltd Overview ESII Maritime Wideband HF Pro oject Applications Run over WBHF The Headline Success Detailed Findings: not

More information

WAN-DDS A wide area data distribution capability

WAN-DDS A wide area data distribution capability 1 A wide area data distribution capability Piet Griffioen, Thales Division Naval - Above Water Systems, Netherlands Abstract- The publish-subscribe paradigm has shown many qualities to efficiently implement

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Ethernet Network Redundancy in SCADA and real-time Automation Platforms.

Ethernet Network Redundancy in SCADA and real-time Automation Platforms. Ethernet Network Redundancy in SCADA and real-time Automation Platforms www.copadata.com sales@copadata.com Content 1. ABSTRACT... 2 2. INTRODUCTION... 2 IEC 61850 COMMUNICATION SERVICES... 2 APPLICATION

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Contents. Configuring GRE 1

Contents. Configuring GRE 1 Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE security mechanisms 2 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

Limited-Bandwidth Plug-ins for DDS

Limited-Bandwidth Plug-ins for DDS May 2011 Limited-Bandwidth Plug-ins for DDS Integrating Applications over Low Bandwidth, Unreliable and Constrained Networks using RTI Data Distribution Service Edwin de Jong, Director of Product Management

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

HSCN Quality of Service (QoS) Policy

HSCN Quality of Service (QoS) Policy HSCN Quality of Service (QoS) Policy Published March 2018 Copyright 2018 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

Cloudamize Agents FAQ

Cloudamize Agents FAQ Cloudamize Agents FAQ Cloudamize is a cloud infrastructure analytics platform that provides data analysis and recommendations to speed and simplify cloud migration and management. Our platform helps you

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Radyne s SkyWire Gateway Quality of Service

Radyne s SkyWire Gateway Quality of Service Radyne s SkyWire Gateway Quality of Service White Paper WP026 Rev 1.0 April 2008 Radyne Corporation 3138 E. Elwood St. Phoenix, AZ 85034 (602) 437-9620 Fax: (602) 437-4811 Radyne s SkyWire Gateway Quality

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

Last Class: RPCs and RMI. Today: Communication Issues

Last Class: RPCs and RMI. Today: Communication Issues Last Class: RPCs and RMI Case Study: Sun RPC Lightweight RPCs Remote Method Invocation (RMI) Design issues Lecture 9, page 1 Today: Communication Issues Message-oriented communication Persistence and synchronicity

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Inmarsat L-TAC. Supports both UHF and VHF tactical radios. GLOBAL GOVERNMENT > Product > L-TAC

Inmarsat L-TAC. Supports both UHF and VHF tactical radios. GLOBAL GOVERNMENT > Product > L-TAC Inmarsat L-TAC Supports both UHF and VHF tactical radios GLOBAL GOVERNMENT > Product > L-TAC Inmarsat L-TAC UHF and VHF Beyond line of sight communications. Mobile communications in the field Designed

More information

Designing an Exchange 2000/2003 Routing Group Connector Topology

Designing an Exchange 2000/2003 Routing Group Connector Topology Pg. 1 Designing an Exchange 2000/2003 Routing Group Connector Topology By: Craig Borysowich Chief Technology Architect Imagination Edge Inc. www.imedge.net Version 3.7 BACKGROUND Large Exchange 5.5 environments

More information

Deploying the BIG-IP System for LDAP Traffic Management

Deploying the BIG-IP System for LDAP Traffic Management Deploying the BIG-IP System for LDAP Traffic Management Welcome to the F5 deployment guide for LDAP traffic management. This document provides guidance for configuring the BIG-IP system version 11.4 and

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

IPTV Explained. Part 1 in a BSF Series.

IPTV Explained. Part 1 in a BSF Series. IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding

More information

NIC TEAMING IEEE 802.3ad

NIC TEAMING IEEE 802.3ad WHITE PAPER NIC TEAMING IEEE 802.3ad NIC Teaming IEEE 802.3ad Summary This tech note describes the NIC (Network Interface Card) teaming capabilities of VMware ESX Server 2 including its benefits, performance

More information

Reliable UDP (RDP) Transport for CORBA

Reliable UDP (RDP) Transport for CORBA OMG Embedded and Real-Time 2002 Workshop Reliable UDP (RDP) Transport for CORBA Voula Fotopoulos Catherine Heaberlin January 10, 2002 (voula.fotopoulos@lmco.com, catherine.t.heaberlin@lmco.com) Naval Electronics

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services

More information

Reflector - User Information

Reflector - User Information Reflector - User Information Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Management Software AT-S67 AT-S68. User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION PN Rev A

Management Software AT-S67 AT-S68. User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION PN Rev A Management Software AT-S67 AT-S68 User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION 1.0.0 PN 613-50494-00 Rev A Copyright 2003 Allied Telesyn, Inc. 960 Stewart Drive Suite B, Sunnyvale,

More information

Chapter 3: Network Protocols and Communications

Chapter 3: Network Protocols and Communications Chapter 3: Network Protocols and Communications Introduction to Networks Intro to Networks v5 Message Delivery Options IPv4 Unicast One-to-One Multicast One-to-Many Broadcast One-to-All IPv6 Unicast One-to-One

More information

Using RAD Vmux voice trunking over FleetBroadband

Using RAD Vmux voice trunking over FleetBroadband Using RAD Vmux voice trunking over FleetBroadband Version 01 22 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability

More information

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE

More information

CSE 461 Module 10. Introduction to the Transport Layer

CSE 461 Module 10. Introduction to the Transport Layer CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

Introduction to PTT. Multicast

Introduction to PTT. Multicast PTT Call Flow Introduction to PTT PTT traffic in the Spectralink system utilizes a proprietary technology to create a one-tomany call. In order to accomplish this multicast is used to ensure that only

More information

Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time

Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time A CONNECTED A CONNECTED Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time Service providers gain a competitive advantage by responding to customer

More information

Reduces latency and buffer overhead. Messaging occurs at a speed close to the processors being directly connected. Less error detection

Reduces latency and buffer overhead. Messaging occurs at a speed close to the processors being directly connected. Less error detection Switching Operational modes: Store-and-forward: Each switch receives an entire packet before it forwards it onto the next switch - useful in a general purpose network (I.e. a LAN). usually, there is a

More information

White Paper. Implementing an IP Architecture Using Layer 2-Based Traffic Management. 17 October 2009

White Paper. Implementing an IP Architecture Using Layer 2-Based Traffic Management. 17 October 2009 White Paper Implementing an IP Architecture Using Layer 2-Based Traffic Management 17 October 2009 Implementing an IP architecture involves a number of challenges. The foremost challenge is that in most

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

UDP Traffic Management

UDP Traffic Management Packeteer Technical White Paper Series UDP Traffic Management May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product names

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR x25 remote-red x25 remote-red This command is no longer supported. WR-553 x25 retry x25 retry To activate a secondary route while also retrying a failed primary route, use the x25 retry interface configuration

More information

TACLINK. Tactical Communications System. Complete Communications Management System

TACLINK. Tactical Communications System. Complete Communications Management System TACLINK Tactical Communications System Complete Communications Management System TACLINK : Tactical Communications System Integration, Control, Adaptation and Routing Currently, the biggest challenge with

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2016 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

NEXIUM THEATRE. Tactical networks for defence and security forces

NEXIUM THEATRE. Tactical networks for defence and security forces w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Contents. Configuring GRE 1

Contents. Configuring GRE 1 Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4 tunnel 4 Configuration guidelines

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

NETAPP SNAPMIRROR. Proving the concept of accelerated replication with PORTrockIT

NETAPP SNAPMIRROR. Proving the concept of accelerated replication with PORTrockIT NETAPP SNAPMIRROR Proving the concept of accelerated replication with PORTrockIT EXECUTIVE SUMMARY For one major US healthcare provider, the need to protect large volumes of clinical image files by replicating

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

OPEN BASE STATION ARCHITECTURE INITIATIVE

OPEN BASE STATION ARCHITECTURE INITIATIVE OPEN BASE STATION ARCHITECTURE INITIATIVE Conformance Test Specification Appendix H UDPCP Test Cases Version.00 Issue.00 (38) FOREWORD OBSAI description and specification documents are developed within

More information

Version 2.1 User Guide 08/2003

Version 2.1 User Guide 08/2003 UDP TEST TOOL TM Version 2.1 User Guide 08/2003 SimpleComTools, LLC 1 OVERVIEW Introduction................................... UDP vs. TCP................................... 3 3 SOFTWARE INSTALLATION..........................

More information

Wide area networks: packet switching and congestion

Wide area networks: packet switching and congestion Wide area networks: packet switching and congestion Packet switching ATM and Frame Relay Congestion Circuit and Packet Switching Circuit switching designed for voice Resources dedicated to a particular

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

IBM MQ Appliance Performance Report Version June 2015

IBM MQ Appliance Performance Report Version June 2015 IBM MQ Appliance Performance Report Version 1. - June 215 Sam Massey IBM MQ Performance IBM UK Laboratories Hursley Park Winchester Hampshire 1 Notices Please take Note! Before using this report, please

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE

More information

White Paper. Nexenta Replicast

White Paper. Nexenta Replicast White Paper Nexenta Replicast By Caitlin Bestler, September 2013 Table of Contents Overview... 3 Nexenta Replicast Description... 3 Send Once, Receive Many... 4 Distributed Storage Basics... 7 Nexenta

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Using Switches with a PS Series Group

Using Switches with a PS Series Group Cisco Catalyst 3750 and 2970 Switches Using Switches with a PS Series Group Abstract This Technical Report describes how to use Cisco Catalyst 3750 and 2970 switches with a PS Series group to create a

More information

Technology Overview. Gallery SIENNA London, England T

Technology Overview. Gallery SIENNA London, England T Technology Overview Gallery SIENNA London, England T +44 208 340 5677 sales@sienna.tv www.sienna.tv http://ndi.newtek.com SIENNA Cloud for NDI An IP Video Protocol which works today NDI Protocol The NDI

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Data Transport over IP Networks

Data Transport over IP Networks Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA

More information

Distributed Systems. 02. Networking. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 02. Networking. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 02. Networking Paul Krzyzanowski Rutgers University Fall 2017 1 Inter-computer communication Without shared memory, computers need to communicate Direct link Direct links aren't practical

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Bandwidth Overview. Rev Whitepaper

Bandwidth Overview. Rev Whitepaper Rev. 1.03 Whitepaper About the Arel ICP Platform Arel s Integrated Conferencing Platform TM (ICP) is an advanced platform that combines the critical aspects of verbal and visual communication video and

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : TB0-106 Title : Tibco Rendezvous 7 Certification Exam Vendors : Tibco Version : DEMO Get Latest &

More information

VEEAM. Accelerating virtual machine replication with PORTrockIT

VEEAM. Accelerating virtual machine replication with PORTrockIT VEEAM Accelerating virtual machine replication with PORTrockIT EXECUTIVE SUMMARY Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of

More information