Intelligent Filtering of the APRS Internet Gateway Data Streams
|
|
|
- Erin Dalton
- 10 years ago
- Views:
Transcription
1 Intelligent Filtering of the APRS Internet Gateway Data Streams Darryl Smith, B.E., VK2TDS POox 169 Inglebum NSW 1890 Australia Phone: ABSTRACT: APRS is a fast growing mode throughout the Amateur Radio world, thanks to its combination of computers, radio, packet and the Internet. Such popularity has increased the amount of data on the APRS network to a point where many users, especially those outside North America, are overwhelmed by the volume, or in an attempt to reduce the traffic volume do not enjoy the full benefits iflnternet Connected APRS. This paper describes work by the Author intopltering the data stream intelligently to create manageable local networks. Introduction In the past 3 years since Internet gating of APRS packets was started, APRS.NET traffic volumes have increased dramatically. Although I have been unable to find any documentation on past traffic volumes, measurements indicate that a complete stream from APRS.NET in mid-2000 would consume more than Mbytes per day. To gate this volume of traffic to RF would require probably 10 times the transmission rate as provided by the current 1200 bps packet modems given the highly distributed nature of APRS and ALOHA networking. Even the most basic data stream, consisting of only message and related position reports consumes upwards of 4 Mbytes per day, placing a significant load on any transmitting equipment with little benefit to those receiving the transmissions. The number of stations world wide is beginning to take its toll on th.e APRS software. We have recently seen instances where the number of stations on the network caused some APRS software to fail. Redraw times have increased so that only the fastest computers can realistically be used to use APRS. AFilter for instance was written so that end users could filter their own data streams, improving the performance and stability of APRS applications. 126
2 Review of Traffic Volumes Analyzing the APRS.NET traffic stream for about 15 minutes reveals some interesting results. The USA accounts for 79.8% of the packets in this period that I logged the APRS.NET Server. Adding Canada increased the North American trafficto 89.2%. USA Canada Netherlands Australia Switzerland UK Brazil Hungary Portugal New Zealand Honduras sermany [taly South Korea w m 79.; O/ C 9.3% 2.3% 1.6% 1.4% 1.1% 0.8% 0.7% 0.6% 0.5% 0.5% 0.5% 0.4% 0.3% Unfortunately, most of the USA based traffic is of little use for the rest of the world. In fact most of the USA traffic is of little use to most other USA based amateurs. By eliminating most of this data stream, the volume of data is far more manageable, and scalable. In some areas the current trend is to place the entire APRS data stream onto RF. Whilst this is a noble endeavor, it does tend to cause some problems when the data stream contains more information than the channel can support. Data Segregation The solution to the data overload problem is to somehow reduce the volume of data that individual users are required to deal with. Several methods can be used to segregate traffic Originating Callsign (Region) Position in the world Type (Message, Position, etc) Redundancy of data A combination of filters based on these conditions will yield a reduced flow of information, without decreasing the relevant information. The APRSd software already has filters to remove redundant data. Apart from these it has very limited filtering capabilities. Of course, MICE Emergency Packets should be passed unconditionally. Hierarchical Networks Anyone who has researched the history of the Internet will know that in the beginning it was a very flat network, with flat protocols to support the network. Even the naming of machines was done on a single-level structure. As the number of users grew, the old structures were no longer able to support the increased usage. Therefore the intemet has been transformed into a highly distributed hierarchical structure. The APRS IGATE system has similarly grown, and is becoming increasingly fragmented and hierarchical. It is growing thanks to the proliferation of Open Source software, as well as easier to use APRS software allowing an IGATE to be setup without actually knowing what you are doing, at almost zero cost. The haphazard connections between IGATES has caused some problems with APRS messaging. Whilst packets are getting from the extremities of the network to the main APRS server, messages sent to the stations providing these positions will often not get through. 127
3 The cause is due to the fact that many of the IGATE systems only feed data into the network, and do not retrieve data because of the sheer volume of data. Proposed Hierarchy Of Servers I am proposing that APRS IGATE data be filtered by the region, initially by callsign. Once this happens, filtering by region can be added. Those that prefer the present situation where they can see all the world wide stations will still be able to connect to APRSNET.,,- _- -_ \ / \\\ - \ \ \ APRS.NET root server would become the defacto USA server under this plan. As you go further down the chain you would see a structure similar to the one appearing on the next page. This does not however have any advantage over the current structure of IGATE s except the structure of naming. Something else is required before this will give gains required for the whole IGATE system. To obtain any improvements some form of filtering is required. between the levels of the network. t UK Italy Get- many v Aus traii a New Zealand f Canada USA t Japan Korea * Honduras f South Africa Kenya In this proposal, there would be a root APRS server, and a number of regional servers. These regional servers would be permanently connected to the root server exchanging data much as happens with IGATES today. Please note that I have not tried to include any discussions about backup servers in this paper. They are able to operate in a manner similar to the present system with second. aprs. net. Users would be encouraged to connect to a regional server, but there would be no requirement for this. It is anticipated that the Filtering of Data By Callsign Australia and New Zealand have some particular properties that both help and hinder the development of our national APRS networks Australia has a very structured callsign system by state. The Number following the VK in Australian callsigns indicate the STATE that the Amateur lives in. It is rare to find an amateur operating from a state other than what his callsign would indicate, given the size of the each state. 128
4 New Zealand has a similar structure, although because of it s size there is little use breaking down traffic much further. Visitors to Australia must obtain a LOCAL callsign before they may legally operate in Australia, which makes the structure even more viable. However much of the rest of the world does not have such stringent requirements, so another solution is required. Filtering of Data by Position Because of the structure of the Australian and New Zealand callsigns I have only recently attempted to filter based on positions. This is the logical next step so that users with non-local callsigns are able to automatically use the local IGATE system. Development of software to filter the data stream by position has just been completed. The filtering technique being developed is based in Richard Parry s perlaprs software. It takes a list of valid grid squares, and then uses these to validate the position. Rules - Filtering Philosophy Child to Parent IGATE A number of basic rules can be applied to filter data between the IGATE and the parent IGATE. Any packets that do not satisfy one of these rules will be discarded. 1. All packets from VK* 2. All packets from stations inside VK 3. All messages to VK* or stations inside VK 4. All packets from a station who s packets are permitted under points ##3, for 30 minutes after the last permitted packet. Rule 1: Allows concentration of all VK* data even when an alternate IGATE is used. Rule 2: Allows any station that does not have a VK callsign to be treated as if they did have a VK callsign. Rule 3: Any messages to VK stations, or other stations operating inside VK should be allowed in. Rule 4: Allows positions of any stations sending messages to VK to show up on the server. This rule may need to be changed later so that their messages to non-vk stations do not appear - As only one side of the conversation would be heard anyway. The 30 minute limit allows keeps the link open as long as the users continue to converse. Child to Parent IGATE Some IGATE data is not relevant apart from for users of that IGATE. Therefore the following rules are used to filter the data stream. All packets will be passed, except if they match any of these rules. 1. Messages to javamsg and to USERLIST. 2. Packets to FBB 3. Packets to MAIL where the first characters of the payload are BBS 4. Packets that have malformed contents. These rules reduce the amount of data being sent to the parent quite significantly. Users? Having a look at the: diagram below one important question is Where does a user connect?. The answer is basically wherever they want to. Generally the answer would be to 129
5 connect to the server offering country-wide data. However if they were wanting to IGATE their information from other IGATE s in their state only, they might want to connect to their State APRS server. In either case, any packets they receive from RF and place back onto the APRS network would filter back to the root APRS server, as well as down to the State based APRS server. Messages will be delivered regardless of the where the user is connected, provided the connection point is within the filtering range. Messages will be fed up the chain no matter what filtering rules are in place. 2 3 Filtering Software The filtering software I have written has been coded in Per1 running under Linux. I chose Per1 as it is a very quick prototyping language, with the power of C and the flexibility of Basic. As it is basically an interpreted language, it is very quick to modify code and see how the changes work. The software consists of three modules. They are perlfilter.pl perltelnet.pl perlaprs.pl perlfilter is the main filtering program. It contains all the rules, and logic deciding what packets are allowed in either direction. It connects to the up-stream and down-stream APRSd servers, providing all the data communications between the two. perlfilter actually authenticates itself with each server so that the connections are bi-directional. perltelnet is a specialized TELNET program. Whilst most telnet programs quit when the connection is closed, perltelnet then attempts a connection to the next server on the list. If no servers can be contacted, it continues until it finds one that can.. A basic structure of the software appears in the diagram following. In this diagram, the boxes with the partial callsigns ( VK*, ZL* and VK2* ) are the perlfilter programs, with the filter properties listed. In this way, APRS. NET.AU only receives packets from APRSNET that are relevant to it - All VK and ZL packets, as well as packets to those stations. Likewise VK2.APRS.NET.AU only receives packets from APRS.NET.AU that are relevant 130
6 to VK2. This arrangement reduces the load on servers and the underlying communications network. I have also modified Richard Parry s perlaprs software to check if the location of a mobile station is within the location specified by the configuration file. perlfilter does NOT filter packets from stations that connect directly into the IGATE. What would be ideal is for the capability for APRSd to use external filters on all incoming data streams automatically. Operation The software has now been operational for several weeks, and is working well. At times it causes the operation of APRS to become less intuitive - by requiring users to send messages to stations outside the filter range before they will appear on the screen. Until the user appears on the screen, users do not normally send messages. In other words, users must register their locations, or an association with the location (by sending a message to that location) before their data will be passed. This geo-referencing should be an integral part of all wide area AVL systems I found that soon after I started messaging a user in the USA, his position appeared on my map. Also his messages to other users in the USA appeared on the raw data coming from my APRS server. software into APRSd as a hookpoint to improve the filtering. Conclusion Just as the telegraph, telephone and Internet have grown from flat networks to hierarchical networks, APRS networking must also mature in a similar manner. Unlike those other networks, the basic protocols will not need to change for this shift, just the servers, and their interconnections. The work I have done on creating hierarchical servers is just another step in the evolution of APRS towards a scalable network oriented system. The software I have developed allows users to add customized filters to the data stream in line with local requirements. Software Availability The software is available on the following WWW site: http//radio-active.net.au It is written for Redhat LINUX, but should run on almost any platform that supports Per1 and multi-processing. It does not even need to be running on the same machine as the servers it connects. I found that the reduction in data volume was a great advantage in operating this way. I have found that users are generally happier with the reduced volumes, as they were being overloaded with information. I am now looking at how to integrate similar 131
APRSstat An APRS Network Analysis Tool
APRSstat An APRS Network Analysis Tool Richard Parry, P.E., W9IF [email protected] http://people.qualcomm.com/rparry ABSTRACT APRSstat monitors network traffic by connecting to an APRS telnet server
Winlink 2000 An Update
Victor Poor, W5SMM / AAA9WL Winlink Development Team 1282 York Circle Melbourne, FL 32904 [email protected] Winlink 2000 An Update Abstract A lot has happened in the evolution of Winlink 2000 (WL2K) since
Cloud Computing and Business Intelligence
Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania [email protected] The complexity of data
Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
XenData Archive Series Software Technical Overview
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail
SCADA PERFORMANCE COMPARISON MODBUS SIMULATION
SCADA PERFORMANCE COMPARISON MODBUS SIMULATION The objective of these tests is to evaluate and compare the performance of the Aprisa SR+ at QPSK, 16, and 64 QAM versus legacy equipment of a well-known
Data Center. www.datacenter.rdm.com
Cover photo 090.6323 www.datacenter.rdm.com Data Center Headquarters Reichle & De-Massari AG Binzstrasse 32 CHE-8620 Wetzikon/Switzerland Phone +41 (0)44 933 81 11 Fax +41 (0)44 930 49 41 www.rdm.com Your
CaliberRM / LDAP Integration. CaliberRM
CaliberRM / LDAP Integration CaliberRM Borland Software Corporation 100 Enterprise Way Scotts Valley, California 95066-3249 www.borland.com Made in Borland Copyright 2004 Borland Software Corporation.
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Network support for tele-education
Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Broadband Mapping 2013
Broadband Mapping 2013 Broadband Mapping 2013 Summary Publisher: The Danish Business Authority A full Danish edition can be downloaded from the website of the Danish Business Authority: www.erst.dk BROADBAND
Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies
Page 1 Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Introduction This paper explains the concepts of Storage Area Network or SAN, iscsi technology and how
83-10-41 Types of Firewalls E. Eugene Schultz Payoff
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
Oracle 11g is by far the most robust database software on the market
Chapter 1 A Pragmatic Introduction to Oracle In This Chapter Getting familiar with Oracle Implementing grid computing Incorporating Oracle into everyday life Oracle 11g is by far the most robust database
www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro
www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro Table of Contents Abstract... 03 The Emerging Need... 03 SDI Impact for
Wholesale IP Bitstream on a Cable HFC infrastructure
Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities
Implementing a Digital Video Archive Based on XenData Software
Based on XenData Software The Video Edition of XenData Archive Series software manages a digital tape library on a Windows Server 2003 platform to create a digital video archive that is ideal for the demanding
Virtual Office. flexible solutions for your business needs
Virtual Office flexible solutions for your business needs Globalization is the key to successful business. Wherever you are located around the globe, your business can function without the need to pay
SonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
BASIC WINLINK 2000 TRAINING GUIDE
BASIC WINLINK 2000 TRAINING GUIDE Lewis Thompson W5IFQ, AAR6UK June 26, 2009 CONTENTS Introduction... 3 About Winlink 2000... 3 Required Equipment... 3 Setting Up Airmail Step by Step...5 Connecting to
SMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html
Whitepaper Whitepaper AGOSTO 2009 www.iquall.net/mensajeria_smppgateway.html SMPP Introduce yourself in the SMS World without being an expert in the field of telecommunication. Use your actual platforms
It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.
Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...
Private Cloud for Every Organization
white paper Private Cloud for Every Organization Leveraging the community cloud As more organizations today seek to gain benefit from the flexibility and scalability of cloud environments, many struggle
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
Masters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology
SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology Introduction SSL is a well-established, high performing and secure technology for Internet transactions. The strength of
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
VoIP Solutions Guide Everything You Need to Know
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
Deployment Scenarios
Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
D-RATS Training. D-RATS Lesson schedule
D-RATS Training D-RATS Lesson schedule 1. Introduction (need for dedicated email address and a WINLINK address) 2. SFARES Toolkit a. Situation (EOC, SAR, DOH, Skywarn, Public Service) b. Systems (Internet,
Vidi NMs Network Management
VIDI NMS Network Management The VIDI Network Management System VIDI NMS is a comprehensive tool for a centralised network management with graphical frontend. As it is working in real time the user gets
APRS and the Android Smartphone
APRS and the Android Smartphone Sagar Gupta, KC2VSG 11 Cinnamon Court, Holmdel, NJ 07733 [email protected] Abstract This paper discusses a means of using the android smartphone as a Global Positioning
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN
Chapter 12 Topics: Communication links LAN / WAN Internet / WWW A computer network is a set of independent computer systems interconnected by telecommunication links. CMPUT101 Introduction to Computing
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
NETWORK ADMINISTRATION
NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Gateways and Their Roles
Gateways and Their Roles Understanding Gateways This topic describes the role of voice gateways and their application when connecting VoIP to traditional PSTN and telephony equipment. Analog vs. Digital
Deploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
Solving Monitoring Challenges in the Data Center
Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Fact Sheet FOR PHARMA & LIFE SCIENCES
Fact Sheet PATHWAY STUDIO WEB SECURITY OVERVIEW Pathway Studio Web is a comprehensive collection of information with powerful security features to ensure that your research is safe and secure. FOR PHARMA
Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA
MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.
Client/Server Messaging System v3.28 Client User's Guide
Client/Server Messaging System v3.28 Client User's Guide Client/Server Messaging System v3.28 Client User's Guide Page 1 Contents 1 Introduction...3 2 Glossary...3 3 What is the Messaging System?...4 4
Smart. Scalable. Simple.
Thermo Scientific Wireless Monitoring Solution Smart. Scalable. Simple. providing the protection you need with the simplicity you deserve Thermo Scientific Wireless Monitoring Solution Optimized Sample
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN
The next logical evolution in WLAN architecture THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN ZEBRA
Vodafone Traveller and Vodafone World
Vodafone Traveller and Vodafone World A. What Terms and Conditions Apply to my Vodafone Traveller and Vodafone World Product? (a) The terms and conditions that will apply to your Product or Products are:
CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER
PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Cable Access Q&A - Part One
Cable Access Q&A - Part One Accessing the Internet using a Cable Network (and a cable modem) is becoming increasingly more popular due to the much greater speed than is available through telephone-modem
SiteWeb Monitoring System. Real Time Power and Environment Monitoring Platform for Telecom Applications
SiteWeb Monitoring System Real Time Power and Environment Monitoring Platform for Telecom Applications SiteWeb Monitoring System Next Generation Integrated Power and Environment Management Platform Dramatic
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
www.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies
www.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies Table of Contents Abstract... 03 What s new in Cellular Technology?... 03 Device
INSITE. Dimension Data s monitoring offering
Dimension Data s offering What s on your mind? Is your infrastructure management strategy optimal? Are you achieving optimum ROI on your infrastructure management investment? Are you employing the latest
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Avid. inews. Redundancy and Failover in Avid News Management Solutions
Avid Redundancy and Failover in Avid News Management Solutions Table of Contents Introduction............................................................1 Newsroom Computer System (NRCS)....................................2
SonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.8 Copyright Information 2004 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3
Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search
Transport Layer Security (TLS) About TLS
Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
Configuring DHCP for ShoreTel IP Phones
Configuring DHCP for ShoreTel IP Phones Network Requirements and Preparation 3 Configuring DHCP for ShoreTel IP Phones The ShoreTel server provides the latest application software and configuration information
Red Hat Enterprise Linux: The ideal platform for running your Oracle database
Red Hat Enterprise Linux: The ideal platform for running your Oracle database 2 Introduction 2 Scalability 2 Availability 3 Reliability 4 Manageability 5 Red Hat subscriptions 6 Conclusion www.redhat.com
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Micro Focus Database Connectors
data sheet Database Connectors Executive Overview Database Connectors are designed to bridge the worlds of COBOL and Structured Query Language (SQL). There are three Database Connector interfaces: Database
Building Technologies
Building Technologies : simple and secure danger management. Integration increases security! The increasing danger potential for people and assets makes the need for better protection increasingly more
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. [email protected] +1-916-290-9300 http://www.ossera.com
Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded
