EXHIBIT A-1 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX. Service Description: PCI Texas South Region Dedicated Burstable/Shared Network

Similar documents
AfriConnect Satellite Technology Overview

Supporting critical IP applications across the enterprise from VoIP and VPN, to streaming media

Simple Satellite Network Solutions. Radyne SkyWire Company Proprietary -- 1

General Tariff Information

Overview of Adaptive TDMA in idx 3.2. May 2015

idirect Satellite Routers

Tooway Grade Of Service

UHP - UNIVERSAL VSAT PLATFORM PRODUCT OVERVIEW

Eight Essentials to Implementing Backhaul over Satellite for Mobile Operators. June 2009

idirect Broadband Router Hub Solutions

EUROPEAN TELEPORT GLOBAL TELESAT STRENGTHS

Satellite Network Design. Robert Girard Customer Solutions Engineering

Satellite-Based Cellular Backhaul in the Era of LTE

Implementing A STAR Network Using Comtech EF Data's IP-Enabled Satellite Modems

Premium Services Using Vipersat Dynamic SCPC (dscpc) With Guaranteed Bandwidth

SYSTEMS ADMINISTRATION USING CISCO (315)

Procurement of a Satellite Service

BANDWIDTH EFFICIENT CELLULAR BACKHAUL SOLUTIONS

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing

SD-WAN Deployment Guide (CVD)

idirect Satellite Routers

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

WhitePaper: XipLink Real-Time Optimizations

The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.

Introduction to Networking

Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router

Recommended Network Configurations

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

ETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Cisco 5921 Embedded Services Router

Basics (cont.) Characteristics of data communication technologies OSI-Model

Network Planning Guide

Network Management System ibuilder User Guide

CSE3213 Computer Network I

HN/HX System Bandwidth Efficiency

Ardmore Telephone Network TRANSPARENCY statement

GLOSSARY. See ACL. access control list.

SatNet AmerHis Mesh Terminals

Advanced VSAT Networking Infrastructures Solutions for Offshore. John Meyers Wavestream Thailand November 20, 2014

Computer Communication Networks

Networking interview questions

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Computer Networks and the internet. Daniel Graham Ph.D

Key Features of the Hughes HN System

Choosing a WAN Solution IP VPN vs. Frame Relay or ATM

end systems, access networks, links 1.3 network core

University of Southern California EE450: Introduction to Computer Networks

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture

Truffle Broadband Bonding Network Appliance

CompTIA Network+ Study Guide Table of Contents

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

Subject: Adhoc Networks

Technology Brief. VeloCloud Dynamic. Multipath Optimization. Page 1 TECHNOLOGY BRIEF

Cisco Group Encrypted Transport VPN

Sonicwall NSA240 / TZ210 Configuration Guide (Firmware: SonicOS Enhanced o & up)

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Network Services Enterprise Broadband

Never Drop a Call With TecInfo SIP Proxy White Paper

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

STATE OF ALASKA RFP NUMBER 2518S032 AMENDMENT NUMBER FOUR (4) MANDATORY RETURN AMENDMENT

Intranets and Virtual Private Networks (VPNs)

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Deployments and Network Topologies

White Paper. SIP Trunking: Deployment Considerations at the Network Edge

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Trafffic Engineering 2015/16 1

Barracuda Link Balancer

Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007

Broadband Internet Access Disclosure

MASERGY S MANAGED SD-WAN

Requirements for a CableHome Residential Gateway

GVF Connectivity 2017 Serving the next generation customers, extending the demarcation Comtech EF Data Corp.

Network Management Policy ( Policy ) 1

Page 2 Skype Connect Requirements Guide

ITU-T. FS-VDSL White Paper. Full-Service VDSL. Focus Group White Paper. FS-VDSL Service Scenarios INTERNATIONAL TELECOMMUNICATION UNION

ENTERPRISE CONNECTIVITY

WHIT E PA PER. HughesON ActiveTechnologies

Network Configuration Guide

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

INTRODUCTION TO ICT.

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

QoS User view From modelling to service class

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

idirect Hubs and Line Cards

idirect Defense Portfolio

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Security SSID Selection: Broadcast SSID:

AT&T SD-WAN Network Based service quick start guide

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices

T H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management

Section 3 - Configuration. Enable Auto Channel Scan:

LevelOne Broadband Routers

Network Management Policy ( Policy ) 1

A Whirlwind Introduction to the Internet Overview

Ingate Firewall & SIParator Product Training. SIP Trunking Focused

Product Technical Specification

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Transcription:

Contract No. EXHIBIT A-1 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX Service Description: PCI Texas South Region Dedicated Burstable/Shared Network Overview PCI South Region Dedicated Burstable/Shared Network supports a customer that has a fleet of sites and wishes to deploy a network solely for their own use. PCI will work with the customer to design, procure, deploy, and manage the network with requisite reporting and management functions ported to the customer. The customer chooses the contention model. The T14 satellite and Mt Jackson teleport will be used for this service to support Texas and the South region of the US. CIR and unique Quality of Service engineering can be applied to support the DIR customer needs. Burstable Satellite Ku Bandwidth is shared bandwidth among the fleet sites customers within a single network. PCI uses the idirect Time Division Multiple Access (TDMA) technology to achieve high performance in reservation-based (ad hoc) networks. PCI s will work with the customer to design a contention ratio that will accommodate day-to-day support for simultaneous VPN tunneling, internet browsing, email, Voice over IP (VoIP) phone service, and selected data applications. Higher contention ratios make Voice telephony virtually impossible and are normally used only for data transfers such as internet browsing. To ensure that our customer s service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. The Service provides 2-way high-speed IP connectivity between a fleet of customer remote locations and the public Internet via a satellite network based upon a hub-spoke (star) topology. The hub topology consists of a Hub and multiple very small aperture terminals ( VSATs ) located at CUSTOMER s remote sites. The platform provides a 2-way broadband network with all traffic on the outroute or downstream broadcast over a Time Division Multiplexed ( TDM ) carrier. The VSATs pass traffic to the Hub on a shared inroute or upstream carrier using a highly efficient bandwidth-efficient proprietary access protocol known as Deterministic-Time Division Multiple Access ( D-TDMA ). This architecture is optimized for networks with traffic patterns that follow a hub-to-spoke model and are bursty in nature. This is typical of packet-based protocols such as TCP/IP. The platform design provides features such as frame structure, turbo product coding, multiple frequency hopping, and automatic uplink power control that enable highly reliable and bandwidth-efficient downstream and upstream links. The highly scalable and flexible broadband Hub has been designed to support multiple, dedicated, private networks. The Hub can be partitioned so that multiple networks (outroute and one or more inroutes) can co-exist within a single Hub chassis. In addition, each network can be connected to up to five different satellites simultaneously. This architecture enables the network operator or service provider to realize cost savings and increased operational efficiencies. Features are supported that optimize IP performance over the large-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration DNS Caching The VSAT CPE provides a highly integrated satellite modem and IP routing device. Such features include: Firewall DHCP NAT 1

RIPv2 (and static routes) VLANs (802.1q) PCI South Region Dedicated Burstable/Shared Network Service Features The Service utilizes resources (satellite, Hub, RFT) that are allocated to a specific CUSTOMER fleet/network. In this Service the provisioning of the resources (e.g. oversubscription, quality of service, dedicated bandwidth) amongst the sites is specified by the CUSTOMER. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Average data rates per VSAT will be subject to overall service level usage. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources across the sites in the network. This allows the network to be configured based upon applications, for example real-time versus nonreal time. These features include: Traffic Engineering: CIR Rate Limiting Quality of Service / Prioritization Network based Site based (Application) CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is designed to be supported by no less than 1.8m reflector and an 4 Watt BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-1 to Appendix D 2

Contract No. EXHIBIT A-2 to Appendix D to DIR Contract No. DIR-TEX-AN-NG-ICXXX Service Description PCI South Region Single Channel Per Carrier (SCPC) Overview SCPC is a dedicated satellite-based transmission circuit that has guaranteed Ku bandwidth sized to meet customer requirements within Texas and the surrounding South region of the US. The bandwidth is not shared with any other network or customer; however, these services are more expensive than Burstable/Shared/Reservation-based Ku Bandwidth networks. PCI will use the T14 satellite with teleport at Mt Jackson, Va. PCI South Region SCPC services should be focused on high-density user nodes, VTC, or other server/applications supporting nodes. The Service provides 2-way high-speed IP connectivity between remote locations and the public Internet via a satellite network based upon a point-to-point topology. Data is transmitted via a customer provided modem (ComTech 570 L), to the satellite to the PCI provided modem (ComTech 570L) at the teleport. PCI then routes the circuit to its dedicated Internet Service. This architecture is optimized for networks with heavy traffic patterns that require dedicated circuit performance. Features are supported that optimize IP performance over the high-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration The Customer VSAT CPE should include features include: Firewall DHCP NAT RIPv2 (and static routes) VLANs (802.1q) PCI South Region Single Channel per Carrier (SCPC) Features The Service utilizes resources (satellite, modem, RFT) that are allocated to a specific CUSTOMER circuit. In this Service the provisioning of the resources (e.g. dedicated bandwidth, quality of service,) is specified by the CUSTOMER. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources at the site. This allows the network to be configured based upon applications, for example real-time versus non-real time. These features include: Traffic Engineering: Rate Limiting Quality of Service / Prioritization CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is initially sized for no less than 1.8m reflector and 4 Watt Ku BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect 1

fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-2 to Appendix D 2

Contract No. EXHIBIT A-3 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX Overview Service Description PCI South Region Burstable/Shared Burstable Satellite Ku Bandwidth is shared bandwidth between customers within a network. PCI uses the idirect Time Division Multiple Access (TDMA) technology to achieve high performance in reservation-based (ad hoc) networks. The geographic region served is Texas and the South region of the US. PCI s model is a 10:1 contention ratio for these services across occasional use customers (1, 5, 10 days per month, with the availability to support 30 days/month). Burstable bandwidth is less expensive than SCPC/Dedicated bandwidth. PCI s contention ratio will accommodate day-today support for simultaneous VPN tunneling, internet browsing, email, Voice over IP (VoIP) phone service, and selected data applications. Higher contention ratios make Voice telephony virtually impossible and are normally used only for data transfers such as internet browsing. To ensure that our customer s business service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. Committed Information Rate (CIR) - CIR is dedicated bandwidth that is purchased to augment Burstable/Shared bandwidth for use with Voice-over-IP telephone services, FTP, VTC, and other bandwidth sensitive programs and applications. Voice over IP uses the UDP protocol and requires dedicated bandwidth in order guarantee a clear phone conversation. CIR is engineered to be used across the customer s link, but can be prioritized to VoIP or VTC when that service is initiated. Quality of Service (QOS) engineering is implemented and offers assurance that Voice telephony data packets receive priority queuing across the idirect segment of the network. Our QOS gives UDP packets priority over the common TCP protocol packets that are used for internet browsing and other protocols. The G25 or T14 satellite and the Mt Jackson teleport provide this service. The Service provides 2-way high-speed IP connectivity between remote locations and the public Internet via a satellite network based upon a hub-spoke (star) topology. Data is transmitted via a PCI hub ( Hub ), to and from the Internet via Internet Service Providers ( ISPs ). The hub topology consists of a Hub and multiple very small aperture terminals ( VSATs ) located at CUSTOMER s remote sites. The platform provides a 2-way broadband network with all traffic on the out route or downstream broadcast over a Time Division Multiplexed ( TDM ) carrier. The VSATs pass traffic to the Hub on a shared in route or upstream carrier using a highly efficient bandwidth-efficient proprietary access protocol known as Deterministic-Time Division Multiple Access ( D-TDMA ). This architecture is optimized for networks with traffic patterns that follow a hub-to-spoke model and are bursty in nature. This is typical of packet-based protocols such as TCP/IP. The platform design provides features such as frame structure, turbo product coding, multiple frequency hopping, and automatic uplink power control that enable highly reliable and bandwidth-efficient downstream and upstream links. The highly scalable and flexible broadband Hub has been designed to support multiple, dedicated, private networks. The Hub can be partitioned so that multiple networks (out route and one or more in routes) can co-exist within a single Hub chassis. In addition, each network can be connected to up to five different satellites simultaneously. This architecture enables the network operator or service provider to realize cost savings and increased operational efficiencies. Features are supported that optimize IP performance over the large-latency satellite link. In summary, these are: TCP Acceleration HTTP Acceleration DNS Caching 1

The VSAT CPE provides a highly integrated satellite modem and IP routing device. Such features include: Firewall DHCP NAT RIPv2 (and static routes) VLANs (802.1q) PCI South Region Burstable/Shared Service Features The Service utilizes resources (satellite, Hub, RFT) that are allocated to a specific CUSTOMER site. In this Service, the provisioning of the resources (e.g. oversubscription, quality of service, dedicated bandwidth) amongst the sites is specified by the PCI to be 5:1. Performance at a remote site will be determined by a number of factors including the aforementioned but also by the specific applications utilizing the network. Average data rates per VSAT will be subject to overall service level usage. Maximum and average data rates per TCP session (i.e. host) will be subject to overall network usage, TCP configuration, application configuration, and quality of service configuration. The platform provides a number of features that allow the CUSTOMER to specify the provisioning of resources across the site(s) in the network. This allows the site(s) to be configured based upon applications, for example real-time versus nonreal time. These features include: Traffic Engineering: CIR Rate Limiting Quality of Service / Prioritization Network based Site based (Application) CUSTOMER may choose to trial certain applications of its own, but PCI will not provide support for these applications under this Agreement. CUSTOMER shall comply with the engineering recommendations made by PCI s technical engineering team, including without limitation antenna size and BUC, for each CUSTOMER VSAT location. In general, the service is designed to be supported by no less than.96m reflector and an 25 Watt BUC. PCI may not provide support if CUSTOMER does not install the recommended antenna size for a location or follow PCI s engineering recommendations. To ensure that our customer s service is responsive, PCI has implemented network appliances to block unauthorized internet traffic and certain protocols that are typically used for peer-to-peer file sharing and sexually explicit web sites. These different types of downloads consume valuable business bandwidth resources and significantly affect fair access to the network for other customers. These types of download patterns introduce viruses, Trojans, and other malicious code onto the customer network that cause business network degradation, slowed response, denial of service attacks, and other problems. Unauthorized downloading of copyright or trademark material can be detected and may result in network blocks. End of Exhibit A-3 to Appendix D 2