JRE Overview and Discussion 30 January, 2008 RAF High Wycombe

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "JRE Overview and Discussion 30 January, 2008 RAF High Wycombe"

Transcription

1 JRE Overview and Discussion 30 January, 2008 RAF High Wycombe 1

2 What is it? JRE - Joint Range Extension Some commercial products called JRE JREAP Joint Range Extension Application Protocol Thirty-Eleven JRE Processor A piece of equipment or software which interfaces JRE data to other data We will use JRE to mean a JRE system employing JREAP. 2

3 History US-led creation Originally a Beyond Line of Sight solution Original requirement: To exchange tactical data beyond line of sight in such a manner that the data can be used for situational awareness, planning and limited decision making. 3

4 Traditional J-Series BLOS 4

5 JREAP Standard Created New standard written and largely developed by engineers Designed to be Generic standard to enable communication over various media Focus on J-Series messages but with support for additional TDL data types Released as a MIL-STD in

6 Today Current version is MIL-STD-3011 First update - MIL-STD-3011A due soon Seen as a key enabler for network based operations. 6

7 Today continued JRE best thought of as Tactical Data over unintended bearers JRE can now be used to: Extend range of existing TDLs Connect Distant Nodes/Systems Join Disparate TDL Networks Provide Backup Link Capability Reduce network load Provide cost-effective connection to non-tdl platform Provide remote picture. 7

8 Today continued Message type candidates for JRE include: J-Series Messages Free Text Messages VMF Messages Link 22 Messages Common Message Format (CMF) Integrated Broadcast Service (IBS) Messages. 8

9 JRE System Benefits TDL information available to a wider audience Increases network capacity Records data age Modification of data during transit Provides open, non-proprietary format Industry-standard model lowers development cost. 9

10 International Usage Usage of JRE now outside the US Many European nations considering JRE system procurement Viewed as more than a BLOS Solution Other nations watching UK and US. 10

11 Challenges Standard Maturity System Interoperability Social Engineering Network Architecture Maturity. 11

12 MIL-STD

13 More Terminology JREAP is often discussed in context as JREAP-A or JREAP-C etc This denotes the specific appendix of MIL-STD-3011 being utilised. 13

14 MIL-STD-3011 Structure 14

15 Document Structure 15

16 Documented Message Types Only message headers and rules which MIL- STD-3011 documents are: JREAP Management Messages JREAP J-Series JTIDS/MIDS JREAP Free Text For Variable Message Format, MIL-STD-3011 refers to MIL-STD , the application layer standard for VMF. 16

17 Management Messages JREAP management messages are used to keep the JRE Link active and notify the JRE processors of their peers JREAP Management Messages include: Round-Trip-Time Delay Message Operator-to-Operator Messages Filter Messages Latency Threshold Messages Acknowledgement Messages Echo Messages. 17

18 Filters The Filter management message contains many different subtypes: Category/ID Label/Sub-label Point Type/Point Amplification Ellipse/Rectangle Geographic Closed Polygon Geographic Source Track Number Special Processing Indicator J28.2(x) Data Age Simulation. 18

19 Processing Rules Additionally, processing rules which help engineers plan their coding are included. These cover specific situations such as: Spare fields Retransmission timeouts J2.0 PPLI (Indirect PPLI). 19

20 JRE Interoperability 20

21 JRE Interoperability The release of MIL-STD-3011 has increased interoperability by reducing the construction of additional legacy point-to-point, satellite and IPbased data link systems However, quality control did not match up to that applied to many other TDL standards Much the same as VMF, JRE systems can combine other standards to produce interoperability issues. 21

22 MIL-STD-3011 Issues The document avoids hard decisions and is ambiguous! Many should statements rather than shall statements Many options for different interpretation by different solution providers. 22

23 MIL-STD-3011 Issues Some example interpretation problems with MIL- STD-3011 include: Data that crosses byte boundaries Suppliers can use echo messages or RTT messages to keep link alive Source Track number does not specify base Recurrence rates rarely specified. 23

24 MIL-STD-3011 Issues Major issues with document include: No minimum implementation beyond basic T/R for management messages Many should statements vice normative statements. Few examples shown No test cases No released updates since 2002 No NATO equivalent. 24

25 MIL-STD-3011 Issues Further technical issues include: No ability to limit/control the data rate No network management messages or control No guidance on picture management Limited time sync specification No integration natively with simulation systems Standard not backed up by any concept of operation catch all standard. 25

26 MIL-STD-3011 Appendix A&B Fairly well detailed Evolved from well understood technologies. 26

27 MIL-STD-3011 Appendix C Appendix C discusses the recommended way of establishing an IP connection through either UDP or TCP and the rules required to keep messages consistent over IP networks Few pages of detail Lack of operational/management context (port numbers, methods, etc). 27

28 Existing JRE Systems Many JRE systems already exist based on MIL- STD-3011 Few are fully compatible with each other More systems are being built with 3011-compliant interfaces, particularly JREAP-C MIDS LVT(2) and (11) have JRE processors built into their systems. 28

29 MIL-STD-3011 Procurement Any MIL-STD-3011 system will likely need documentation in addition to the standard Documentation should enhance requirements within standard, removing should statements and creating a minimum implementation Potential development of national 3011 interface requirement. 29

30 System Testing Interoperability assured (or not!) largely through post-engineering tests Large 3011 user groups exist to test interoperability through exercises Largely a peer-review situation based on trust Limited capability exists to fully test management messages and JRE functionality no correct answer! Most tests compare systems rather than certify. 30

31 System Testing Many 3011 systems have been tested and do not interoperate Problems are found throughout the entire stack Problems also commonly found due to network architectures Accurate test logs vital for offline test analysis Sharing of information on tests important for new 3011 users but information is scarce. 31

32 JRE Future Discussion 32

Multilink Processors (Link 11/16/22) and Integration Architectures

Multilink Processors (Link 11/16/22) and Integration Architectures Multilink Processors (Link 11/16/22) and Integration Architectures Authors: Serdar ÖZTÜRK, Emine ESEN TAŞDEMİR, Murat ŞAHİN MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06531 ODTU Ankara / TURKEY Mailto:sozturk@milsoft.com.tr,

More information

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1. Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended

More information

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III Electric Drives and Controls Hydraulics Linear Motion and Assembly Technologies Pneumatics Service profile Drive & Control Industrial Ethernet: The key advantages of SERCOS III SERCOS III is the open,

More information

CA CPT CICS Programmers Toolkit for TCP/IP r6.1

CA CPT CICS Programmers Toolkit for TCP/IP r6.1 PRODUCT BRIEF: CA CPT CICS PROGRAMMERS TOOLKIT FOR TCP/IP CA CPT CICS Programmers Toolkit for TCP/IP r6.1 CA CPT CICS PROGRAMMERS' TOOLKIT FOR TCP/IP PROVIDES CICS PROGRAMMERS WITH AN EASY TO USE SET OF

More information

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,

More information

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

ICTTEN8194A Investigate the application of cloud networks in telecommunications switching

ICTTEN8194A Investigate the application of cloud networks in telecommunications switching ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Release: 1 ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Modification

More information

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1 The OSI Model and the TCP/IP Protocol Suite Pritee Parwekar ANITS 1 To study To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss

More information

GCSE Computing A451 Unit 6.1 Networks

GCSE Computing A451 Unit 6.1 Networks Candidates should be able to: a. Explain the advantages of networking stand-alone computers into a LAN b. Describe H/W needed to connect stand-alone computers into a LAN, including hub/switches, wireless

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

THE SPACEWIRE INTERNET TUNNEL AND THE ADVANTAGES IT PROVIDES FOR SPACECRAFT INTEGRATION

THE SPACEWIRE INTERNET TUNNEL AND THE ADVANTAGES IT PROVIDES FOR SPACECRAFT INTEGRATION THE SPACEWIRE INTERNET TUNNEL AND THE ADVANTAGES IT PROVIDES FOR SPACECRAFT INTEGRATION Session: SpaceWire Test and Verification Long Paper Stuart Mills, Steve Parkes University of Dundee, School of Computing,

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

DNS Architecture Case Study: Resiliency and Disaster Recovery

DNS Architecture Case Study: Resiliency and Disaster Recovery DNS Architecture Case Study: Resiliency and Disaster Recovery Cricket Liu VP, Architecture Infoblox Company Background Large U.S.-based company, Company Co. (company.com) Three categories of sites Headquarters

More information

Intercom over IP The Communications Engineer s Guide to Integrate IP into Comms

Intercom over IP The Communications Engineer s Guide to Integrate IP into Comms Intercom over IP The Communications Engineer s Guide to Integrate IP into Comms Convergence is one of the biggest topics in multimedia applications. Moving from analog production to a fully integrated

More information

A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard

A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard Table of Contents Introduction/Purpose... 2 SSM User

More information

ECE 333: Introduction to Communication Networks Fall Lecture 2: Network Architectures

ECE 333: Introduction to Communication Networks Fall Lecture 2: Network Architectures ECE 333: Introduction to Communication Networks Fall 2001 Lecture 2: Network Architectures Layering Motivation Terminology Examples 1 Many issues to address in networks: Addressing, connection setup, code

More information

SOLA - Oslo Børs Derivatives market. SOLA Production and Test Connections

SOLA - Oslo Børs Derivatives market. SOLA Production and Test Connections SOLA - Oslo Børs Derivatives market SOLA Production and Test Connections Issue 2.0 16 November 2015 Important note This document has been produced by Oslo Børs to assist customers in the use of the SOLA

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

London Stock Exchange Derivatives Market

London Stock Exchange Derivatives Market London Stock Exchange Derivatives Market LSEDM102 - Connectivity Guide Issue 2.0 14 December 2015 Contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Readership 4 1.3 Document Series 4 1.4 Document History

More information

TCP/IP: An overview. Syed A. Rizvi

TCP/IP: An overview. Syed A. Rizvi TCP/IP: An overview Syed A. Rizvi TCP/IP The Internet uses TCP/IP protocol suite to establish a connection between two computers. TCP/IP suite includes two protocols (1) Transmission Control Protocol or

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols IP Version 4 The most commonly used network layer protocol is IP, or the Internet Protocol. As its name would indicate, IP is the protocol used on

More information

Table of Contents. About the Author Wendy Wong, Senior Software Architect CA Network and Systems Management R&D Lab. Print Edition: WW210510

Table of Contents. About the Author Wendy Wong, Senior Software Architect CA Network and Systems Management R&D Lab. Print Edition: WW210510 Table of Contents Mainframe Network Management 1 SECTION 1: SECURITY 2 NetMaster and Mainframe IP Network Security 2 IPSec Monitoring and Management 2 Secured Connection Management 3 SECTION 2: APPLICATIONS

More information

Communications Standards for Electronic Data Communication Facilities and Automatic Logging Devices

Communications Standards for Electronic Data Communication Facilities and Automatic Logging Devices for Electronic Data Communication Facilities and Automatic Logging Devices Page 1 of 12 Contents 1 References... 3 2 Definitions... 3 3 Introduction and Overview of Responsibilities... 4 4 Registering

More information

London Stock Exchange Derivatives Market

London Stock Exchange Derivatives Market London Stock Exchange Derivatives Market LSEDM102 - Connectivity Guide Issue 4.0 08 June 2016 Contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Readership 4 1.3 Document Series 4 1.4 Document History 4 1.5

More information

Transport-Layer Support for Interactive Multimedia Applications. Stephen McQuistin Colin Perkins

Transport-Layer Support for Interactive Multimedia Applications. Stephen McQuistin Colin Perkins Transport-Layer Support for Interactive Multimedia Applications Stephen McQuistin Colin Perkins Interactive Multimedia Applications Multimedia traffic comprises the majority of Internet traffic: 57% in

More information

White Paper On Using the Ground Tactical Data Link System. Document No: TCG WP February 2015

White Paper On Using the Ground Tactical Data Link System. Document No: TCG WP February 2015 White Paper On Using the Ground Tactical Data Link System Document No: TCG WP-20150217-01092611-02 February 2015 Prepared by: Tactical Communications Group, LLC 2 Highwood Dr. Tewksbury, MA 01876 http://www.g2tcg.com

More information

LONWORKS : Defining and Specifying Open Systems

LONWORKS : Defining and Specifying Open Systems 2005 Echelon LONWORKS : Defining and Specifying Open Systems Ron Bernstein Echelon Open Systems Defined Open building systems are created using the products and systems from multiple vendors that in the

More information

London Stock Exchange Derivatives Market

London Stock Exchange Derivatives Market London Stock Exchange Derivatives Market LSEDM102 - Connectivity Guide Issue 1.0 30 September 2013 Contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Readership 4 1.3 Document Series 5 1.4 Document History

More information

RoCE vs. iwarp Competitive Analysis

RoCE vs. iwarp Competitive Analysis WHITE PAPER August 21 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...4 Summary...

More information

Institute of Computer Technology - Vienna University of Technology. L30 - IP Technology Basics

Institute of Computer Technology - Vienna University of Technology. L30 - IP Technology Basics IP Technology Basics TCP/IP Protocol Suite, RFC, IP Addresses, IP Forwarding Agenda Introduction IP Address Address Classes Subnetting IP Forwarding Routing Basics Forwarding and ARP Forwarding and ICMP

More information

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567. The tutorial questions illustrate the style of examination questions for EG/ES 3567. The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim

More information

Integrating Avaya Aura Presence Services with Microsoft OCS

Integrating Avaya Aura Presence Services with Microsoft OCS Integrating Avaya Aura Presence Services with Microsoft OCS 6.1 Service Pack 5 December 2012 Contents Chapter 1: Introduction... 5 Overview - OCS/Lync integration... 5 The Presence Services server and

More information

CS 520: Network Architecture I Winter Lecture 12: The Internet Control Message Protocol and Layering.

CS 520: Network Architecture I Winter Lecture 12: The Internet Control Message Protocol and Layering. CS 520: Network Architecture I Winter 2007 Lecture 12: The Internet Control Message Protocol and Layering. The previous lecture completed a discussion of the IP address space and the latest attempts to

More information

z/os V1R11 Communications Server system management and monitoring

z/os V1R11 Communications Server system management and monitoring IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

IPTV roll-out & verification

IPTV roll-out & verification WHITEPAPER Joan d Austria, 112 - Barcelona - SP - 08018 Chalfont St Peter - Bucks - UK - SL9 9TR www.albedotelecom.com IPTV roll-out & verification 1. ABOUT IPTV AND VIDEO QUALITY Consumers demand high

More information

SDN Architecture Overview. Version 1.1 November, 2014 ONF TR-504

SDN Architecture Overview. Version 1.1 November, 2014 ONF TR-504 SDN Architecture Overview Version 1.1 November, 2014 ONF TR-504 ONF Document Type: TR ONF Document Name: TR_SDN ARCH Overview 1.1 11112014 Disclaimer THIS SPECIFICATION IS PROVIDED AS IS WITH NO WARRANTIES

More information

Ethernet Fault Tolerance and Redundancy

Ethernet Fault Tolerance and Redundancy March 07 Page 1 This document discusses implementing a fault-tolerant Ethernet network and the DeltaV approach. Emerson Process Management 1996 2007 All rights reserved. DeltaV, the DeltaV design, SureService,

More information

ExpertNet Lite Assessment Tool

ExpertNet Lite Assessment Tool WHITE PAPER ExpertNet Lite Assessment Tool February 2008 Table of Contents Section 1: Executive Summary... 1 1.1 ELAT Reports... 1 Section 2: Installation Planning... 1 2.1 Network Impact... 2 Section

More information

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase, Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology

More information

An Internet for the Blue Planet. David Wigglesworth Vice President & General Manager Global M2M Services Iridium Satellite LLC

An Internet for the Blue Planet. David Wigglesworth Vice President & General Manager Global M2M Services Iridium Satellite LLC An Internet for the Blue Planet David Wigglesworth Vice President & General Manager Global M2M Services Iridium Satellite LLC 1 Agenda Iridium Overview Satellite communications M2M Security The Future

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Asymmetric Routing. Abstract. 1 Introduction. Jani Lakkakorpi

Asymmetric Routing. Abstract. 1 Introduction. Jani Lakkakorpi Asymmetric Routing Jani Lakkakorpi jani.lakkakorpi@nokia.com Abstract New transmission media have been proposed to provide higher bandwidth to the Internet satellite links offer unidirectional and asymmetric

More information

i LCDR Peter Duffley Third Party Sales Officer / CAN Rep

i LCDR Peter Duffley Third Party Sales Officer / CAN Rep Familiarization i LCDR Peter Duffley Third Party Sales Officer / CAN Rep Mr. Vincenzo Sferra Northrop Grumman INFORMATION NOT RELEASEABLE FOR COMMERCIAL USE OR BEYOND IMMEDIATE AUDIENCE WITHOUT PRIOR PERMISSION

More information

Implementing Network Monitoring Tools

Implementing Network Monitoring Tools Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Introduction to etom. White Paper. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Introduction to etom. White Paper. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. . Introduction to etom White Paper 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 13 Contents Introduction... 3 What Is NGOSS?... 3 History and Context

More information

What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.

What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4

More information

LOHU 4951L Outdoor Wireless Access Point / Bridge

LOHU 4951L Outdoor Wireless Access Point / Bridge LOHU 4951L Outdoor Wireless Access Point / Bridge Version 2.3 ------------------------------------------------------------------------------------------------------- -1- Software setup and configuration

More information

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web

More information

BYOD Guidance: Architectural Approaches

BYOD Guidance: Architectural Approaches GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Net-Centric Naval Warfare through modern Tactical Data Links. Commercial in Confidence

Net-Centric Naval Warfare through modern Tactical Data Links. Commercial in Confidence Net-Centric Naval Warfare through modern Tactical Data Links 1 Presentation Outline Corporate presentation Net-Centric Naval Warfare through modern TDLs National Tactical Data Link network Achieving Net-Centric

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

SOA Design, Development and Deployment Methods, Processes and Tools

SOA Design, Development and Deployment Methods, Processes and Tools SOA Design, Development and Deployment Methods, Processes and Tools Hard Problems in SOA Workshop January 30, 2008 Pittsburgh, PA 43 attended Lively discussion! 1 Methodology for system lifecycle with

More information

White Paper. Desktop Management Interface 1

White Paper. Desktop Management Interface 1 White Paper Toshiba is a member of the Desktop Management Task Force (DMTF), a cooperative, industry-wide effort to make personal computers easier to use and manage. The goal of DMTF is to provide a common

More information

IP SAN Fundamentals: An Introduction to IP SANs and iscsi

IP SAN Fundamentals: An Introduction to IP SANs and iscsi IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This

More information

QoS in Axis Video Products

QoS in Axis Video Products Table of contents 1 Quality of Service...3 1.1 What is QoS?...3 1.2 Requirements for QoS...3 1.3 A QoS network scenario...3 2 QoS models...4 2.1 The IntServ model...4 2.2 The DiffServ model...5 2.3 The

More information

Technology Evolution Framework for 3GPP2 Networks

Technology Evolution Framework for 3GPP2 Networks SC.R00-0 v.0 Evolution of GPP Networks GPP SC.R00-0 v.0 Date: October 00 Technology Evolution Framework for GPP Networks A White Paper COPYRIGHT 00, GPP GPP and its Organizational Partners claim copyright

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

The Snare Agents Commercial or Open Source? - White Paper -

The Snare Agents Commercial or Open Source? - White Paper - The Snare Agents Commercial or Open Source? - White Paper - A Prophecy International Company Introduction to Agents The SNARE agent is the industry standard for logging security events and is used with

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter

More information

The H.323 NAT/FW Traversal Solution

The H.323 NAT/FW Traversal Solution Open Community Specification The H.323 NAT/FW Traversal Solution January 2014 International Multimedia Communications Consortium Summary This document describes the NAT/FW traversal solution defined by

More information

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011 Transmission Security (TRANSEC) in an IP-based VSAT Architecture February 2011 As the ability to monitor satellite transmissions grows more sophisticated, the need to implement increased levels of security

More information

Tasmanian Government

Tasmanian Government Tasmanian Government IPv6 Procurement and Audit Standard Version 1.1 7 January 2010 Department of Premier and Cabinet 1 Introduction The Tasmanian Government IPv6 Procurement and Audit Standard is to assist

More information

Avaya Port Matrix: Avaya Diagnostic Server 2.5

Avaya Port Matrix: Avaya Diagnostic Server 2.5 Avaya Matrix: Avaya Diagnostic Server 2.5 Issue 1.1 March 2015 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER

More information

White Paper: PostgreSQL and SunGuide Software Cloud Analysis. PostgreSQL

White Paper: PostgreSQL and SunGuide Software Cloud Analysis. PostgreSQL White Paper: PostgreSQL and SunGuide Software Cloud Analysis PostgreSQL As the Florida Department of Transportation (FDOT) SunGuide software deployments and licensors continue to grow, the need for the

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Succeeding with SMS Today Competition Demands Proven Components

Succeeding with SMS Today Competition Demands Proven Components White Paper Signaling Short Message Service (SMS) Succeeding with SMS Today Competition Demands Proven Components White Paper Succeeding with SMS Today Executive Summary The expansion of mobile network

More information

By: Chunyan Fu, PhD, Ericsson Canada

By: Chunyan Fu, PhD, Ericsson Canada TCP/UDP Basics By: Chunyan Fu, PhD, Ericsson Canada Internet Model Application TCP/UDP IP Link layer Physical layer Transport Service Overview Provide service to application layer by using the service

More information

Chapter 8 Monitoring and Logging

Chapter 8 Monitoring and Logging Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event

More information

Alcatel-Lucent 9500 Microwave Packet Radio (North American Markets) Streamlined, cost-effective microwave IP transformation

Alcatel-Lucent 9500 Microwave Packet Radio (North American Markets) Streamlined, cost-effective microwave IP transformation Alcatel-Lucent 9500 Microwave Packet Radio (North American Markets) Streamlined, cost-effective microwave IP transformation The Alcatel-Lucent 9500 Microwave Packet Radio (MPR) enables smooth transformation

More information

TRANSITIONING YOUR DIS SIMULATOR TO HLA

TRANSITIONING YOUR DIS SIMULATOR TO HLA TRANSITIONING YOUR DIS SIMULATOR TO HLA by Deb Fullford Ben Lubetsky 617.876.8085 www.mak.com Soldiers haven t always been able to train like they fight. In its early days simulation was used only in training

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

PRODUCTS & TECHNOLOGY

PRODUCTS & TECHNOLOGY PRODUCTS & TECHNOLOGY DATA CENTER CLASS WAN OPTIMIZATION Today s major IT initiatives all have one thing in common: they require a well performing Wide Area Network (WAN). However, many enterprise WANs

More information

Internet Transport Protocols

Internet Transport Protocols Internet Transport Protocols Transmission Control Protocol (TCP): TCP Socket Primitives. The TCP Segment Header. Establishing & Terminating TCP Connections: TCP Three-way Handshake. TCP Connection Management

More information

Object Storage Performance Validation

Object Storage Performance Validation Object Storage Performance Validation Tim Van Ash VP, Products, Load DynamiX Twitter: @tvanash Email: tvanash@loaddynamix.com Sept 2014 1 Agenda State of Object Testing Things to consider when testing

More information

Whitepaper. NVIDIA Miracast Wireless Display Architecture

Whitepaper. NVIDIA Miracast Wireless Display Architecture Whitepaper NVIDIA Miracast Wireless Display Architecture 1 Table of Content Miracast Wireless Display Background... 3 NVIDIA Miracast Architecture... 4 Benefits of NVIDIA Miracast Architecture... 5 Summary...

More information

The Effect and Technique of System Coherence in ARM Multicore Technology

The Effect and Technique of System Coherence in ARM Multicore Technology The Effect and Technique of System Coherence in ARM Multicore Technology John Goodacre Senior Program Manager ARM Division Cambridge, UK Cortex -A9 Microarchitecture (single core variant) Coresight / JTAG

More information

TCP/IP: ICMP, UDP. Network Security Lecture 5

TCP/IP: ICMP, UDP. Network Security Lecture 5 TCP/IP: ICMP, UDP Network Security Lecture 5 Recap and overview Looking at security of TCP/IP IP, Ethernet, ARP Sniffing the network and forging packets tcpdump, wireshark Today: ICMP and UDP Eike Ritter

More information

Network Management Systems Today

Network Management Systems Today White Paper Telecom Network Management AdvancedTCA Network Management Systems Today Meeting the Challenges of Complexity, Flexibility, and Customer Assurance with AdvancedTCA Technology Executive Summary

More information

Some issues in Cross-Layer Architecture in Mobile Ad Hoc Networks

Some issues in Cross-Layer Architecture in Mobile Ad Hoc Networks Some issues in Cross-Layer Architecture in Mobile Ad Hoc Networks Navid Nikaein and Rolf Winter Institut Eurecom Freie Universität Berlin http://manet.eurecom.fr June 31, 2005 1 Importance of a Good Architectural

More information

Network Monitoring and Traffic CSTNET, CNIC

Network Monitoring and Traffic CSTNET, CNIC Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring

More information

BT Unified Trading communication. The Future Delivered

BT Unified Trading communication. The Future Delivered BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

More information

Genexis FTTH Network Architecture

Genexis FTTH Network Architecture Genexis FTTH Network Architecture An introduction to the Genexis FTTH Network Architecture This document contains general information about the Genexis FTTH Network Architecture. Contents 1. Introduction...2

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments INTERNET PROTOCOLS http://www.tutorialspoint.com/internet_technologies/internet_protocols.htm Copyright tutorialspoint.com Transmission Control Protocol TCP TCP is a connection oriented protocol and offers

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

SIP Trunking: A new voice in communications service

SIP Trunking: A new voice in communications service Charter Business : White paper SIP Trunking: A new voice in communications service WHITE PAPER With the rise of next-generation technology, business customers have more options than ever from providers

More information

Internet Security ECOM 5347 Lab 1 Sniffing. Sniffing. Become aware of a class of vulnerabilities known as sniffing. Learn how to use a sniffer tool.

Internet Security ECOM 5347 Lab 1 Sniffing. Sniffing. Become aware of a class of vulnerabilities known as sniffing. Learn how to use a sniffer tool. Objectives Sniffing Become aware of a class of vulnerabilities known as sniffing. Learn how to use a sniffer tool. What is a packet sniffer? Sniffing is eavesdropping on the network and A packet sniffer

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of

More information

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview 2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014

More information