Validation of Encryption Devices over BGAN US Centric Interim Phase C Report (For Distribution at Inmarsat s Discretion)
|
|
|
- Charles French
- 10 years ago
- Views:
Transcription
1 Validation of Encryption Devices over BGAN US Centric Interim Phase C Report (For Distribution at Inmarsat s Discretion) GD KG235 ViaSat KG-250 Taclane KG175 Thales DC2K Prepared by: AOS, Inc. March 23, 2006 Inmarsat Ltd. Proprietary Page 1 of 21
2 Contents 1 Executive Summary 3 2 Introduction Project Objectives 3 3 Selection of Encryption Devices and Deployment Scenarios 6 4 Glossary 7 5 Encryptors Tested 8 6 Equipment Configuration 8 7 Packet Switched Thales DC2k Testing via Thrane BGAN UT 10 8 Packet Switched Taclane KG-175 Testing via Thrane BGAN UT 12 9 Packet Switched ViaSat KG-250 Testing via Thrane BGAN UT Thales DC2K Retest & AOS Performance Enhancing Proxy (PEP) Summary of Test Results 19 Figures Figure 1 AOS-Inmarsat VPN PS Network 4 Figure 2 Thales DC2K BGAN Testing via IOR I-4 Satellite Config 10 Figure 3 Taclane KG175 BGAN Testing via IOR I-4 Satellite Config 12 Figure 4 ViaSat KG250 BGAN testing via IOR I-4 Satellite Config 14 Figure 5 Thales DC2K and AOS PEP Test Configuration 16 Tables Table 1 PS Encryption Test Data via Thales DC2K IP Encryptor 11 Table 2 PS Encryption Test Data via KG175 IP Encryptor 13 Table 3 PS Encryption Test Data via KG250 IP Encryptor 15 Table 4 Testing Data: Linux No PEP vs AOS PEP 17 Table 5 Testing Data: Windows XP Pro No PEP vs AOS PEP 17 Table 6 Testing Data: Windows versus Linux No AOS PEP 18 Table 7 Testing Data: Windows versus Linux With AOS PEP 18 Inmarsat Ltd. Proprietary Page 2 of 21
3 1 Executive Summary The primary objective of this study was to verify that USG Type 1 encryption equipment would function properly over the Inmarsat BGAN satellite network. Since there was no direct BGAN access from America, AOS collaborated with Inmarsat s Engineers to build a VPN network from Dallas, Texas to London, UK that would remote the BGAN UT s network connections. From the extensive testing performed via the AOS-Inmarsat VPN BGAN network there appears to be no impediment for the proper use of the Taclane KG175 (Type 1), ViaSat KG250 (Type 1) and the Thales DC2K IP encryptors on the Inmarsat BGAN network. The L3 KG240 and General Dynamics KG235 encryptors were not available at this time. AOS expects to have both encryptors ready for AOR I-4 testing by the end of March. The report that follows documents the BGAN satellite testing that has been performed via the Thrane Explorer 500 UT and the above IP encryptors. It should be noted that all BGAN testing was performed using background class IP. See Figure 1 for an overview of the AOS-Inmarsat VPN network. This is an Interim Phase-C report. Additional testing will be performed with other BGAN UT variants when the AOR I-4 satellite is available over the US A Linux-based testing platform enabled greater flexibility to adjust queue and window sizes, which helped to improve the consistency of results. These settings required modification in response to the high jitter and increased delay introduced by the ADSLbased VPN tunnel between London and Dallas. Properly adjusting the MTU settings throughout the network (PC, routers and encryptors) was essential to achieve maximum throughput both on Windows and Linux operating systems. The AOS-Inmarsat VPN network provided the most cost effective method of testing, but the high and variable latency produced erratic data transfer rates. Therefore it was agreed that only network connectivity via the encryptors would be documented in the interim Phase-C report. Throughput and encryption overhead values will be documented when AOR I-4 access is available. 2 Introduction Project Objectives AOS, Inc. has been contracted to provide a three-part study to assess the interoperability between BGAN services and a range of existing and future cryptographic equipment typically used by the US Government. The three-part study consists of: Inmarsat Ltd. Proprietary Page 3 of 21
4 2.1 Phase A Prioritization with justification of circuit switch (CS) and packet switch (PS) encryption devices likely to be deployed with BGAN UT s at commercial launch. The study recommended modifications to BGAN UT and core network to ensure long term compatibility with the encryption equipment under test. Relevant peripherals and applications for after BGAN launch were listed in order of importance. 2.2 Phase B A plan was developed to test all packet switched encryptors. Since there was no BGAN direct access from the US an Internet Virtual Private Network (VPN) was constructed between Inmarsat London, UK and AOS Dallas, Texas. The VPN network was required to remote the BGAN network interfaces since only IOR BGAN access was available at this time. The encryptors under test, with necessary Internet routing equipment, was located at AOS Dallas and the BGAN UT, with coordinating Internet routing equipment, was located at Inmarsat London. See the below Figure 1 for a diagram of the VPN PS test network: East Tunnel West Tunnel Figure 1: AOS-Inmarsat VPN PS Test Network Inmarsat Ltd. Proprietary Page 4 of 21
5 2.2.1 The PS testing objective was to ensure that the encryptors under test would operate properly over the BGAN network. A matrix utilizing File Transfer Protocol (FTP) tests, with and without encryption, was constructed to calculate encryption overhead values through the BGAN network. Using Performance Enhancing Proxy (PEP) software was to be implemented to verify if BGAN network speeds would be increased if used No circuit switched testing was performed since there was no economical synchronous serial transmission vehicle between the two test sites. Circuit switched equipment testing will be done at a later date once US BGAN access is available. 2.3 Phase C Once the above PS test network was operational BGAN testing was to be performed using each encryptor through each BGAN UT. All unclassified test setup information will be supplied. Test results were to be summarized and encountered problems and solutions were to be highlighted. The test results were to include: Typical end-to-end connection success rate Typical connection time (if applicable) Observed average throughput (if applicable) Average overhead observed UT interface configuration settings Crypto configurations setting (non-classified settings only) Three reports will be developed; For Distribution at Inmarsat s Discretion For Distribution to Inmarsat Personnel Only For Distribution to US Government Personnel Only Inmarsat Ltd. Proprietary Page 5 of 21
6 3 Selection of Encryption Devices and Deployment Scenarios The proposed encryption equipment was to be evaluated within each of the proposed scenarios. The four scenarios were: Scenario 1: Forward Presence in Theatre (Reconnaissance Operations) Scenario 2: Early Entry and Secondary Comms for Coalition Operations Scenario 3: Communications in Support of Logistics (Land) Scenario 4: Remote Forward Operations After careful review on how AOS US Government clients use their encrypted communications in the field a consolidation of the above scenarios was done. Basically, the encryption users fell into two groups; Group 1: Quickly deployed reconnaissance or remote forward operation groups that need very small and lightweight encryption/communications equipment. Size, weight and equipment power requirements matter for this group. Group 2: More stationary operations. This group would be typical of secondary comms and logistical support groups. For this group equipment size, weight and power requirements is not of primary importance. Therefore, the scenarios to be considered for this study are: Scenario 1: Recon and remote forward operations where small and lightweight encryptors will be primary consideration Scenario 2: Coalition operation and logistics support where greater encryptor size and weight will not be considered a detriment It should be noted that the above scenarios will not have any effect on how the encryptors will be tested. The primary factor on which encryptor will best for one of the above scenarios will be dictated by size, weight and power requirements. Besides these physical characteristics the data throughput and overall and easy of use will be important to the field user. If all other data handling characteristics are equal, experience has proven that the first encryptors to be deployed to the field are the smaller and lighter units. Therefore, the expected IP Type 1 encryptor deployment priority (from first to last) would be in the following order: KG250, KG175, KG235 and KG240. This priority list will continue to change as smaller, lighter and more versatile Type 1 encryptors become available. Inmarsat Ltd. Proprietary Page 6 of 21
7 4 Glossary List of Abbreviations AES BGAN CEF CN COMSEC CS FNBDT FTP IOS HSD IP IPSec ISDN HAIPIS HTTP HTTPS MMI MTU PEP PIX PS POTS RTT STE SBU SDM SOW SP STU TCP UT USG VPN Advanced Encryption Standard Broadband Global Area Network Cisco Express Forwarding Core Network Communications Security Circuit Switched Future Narrow Band Digital Terminal File Transfer Protocol Internetwork Operating System (Cisco) High Speed Data Internet Protocol IP Security Protocols Integrated Services Digital Network High Assurance IP Interoperability Specifications Hyper Text Transfer Protocol HTTP Secure Man Machine Interface Maximum Transmission Unit Performance Enhancing Proxy Private Internet Exchange (Cisco) Packet Switched Plain Old Telephone Service Round Trip Time Secure Terminal Equipment Sensitive but Unclassified System Definition Manual Statement of Work Service Provider Secure Telephone Unit Transmission Control Protocol User Terminal United States Government Virtual Private Network Inmarsat Ltd. Proprietary Page 7 of 21
8 5 Encryptors Tested 5.1 The IP encryptors that have been tested to date via the Inmarsat/AOS BGAN VPN circuit are the Thales DC2K (non Type 1), Taclane KG175 (Type 1) and the ViaSat KG250 (Type 1) 5.2 One of the Taclane KG235 (Type 1) IP encryptors failed during setup and will not be available for retest until mid-march. The KG235 failure was due to an internal clock error. New software and keying materials are en route to repair the defective KG235. The KG235 s failure is not related to the BGAN testing. 5.3 The L3 KG240 IP encryptors (Type 1) will not be available until the end of March. 5.4 The ViaSat KIV21 serial/ip encryptor will be tested when direct AOR I-4 BGAN access is available. 6 Equipment Configuration 6.1 Thrane Explorer 500 UT Software release 1.01 This terminal is currently at the Inmarsat lab in London. The unit has been configured by Inmarsat s Network Engineers. 6.2 The BGAN MMI is not being used in our current configuration. 6.3 The Inmarsat Performance Enhancement Proxy (PEP) software was NOT used during this report s testing. AOS s SkyPipe (PEP) was used exclusively during this interim Phase-C testing. Testing was performed with and without SkyPipe. 6.4 Since there was no BGAN direct access from the US an Internet VPN network was constructed between Inmarsat London, UK and AOS Dallas, Texas. Cisco 1712 and 2620 series routers were used to build the VPN tunnel connections. See Figure 1 for a diagram of the VPN PS test network. The current Cisco IOS in use is See the Appendix for router configurations. 6.5 Linux versus Windows Computer Operating Systems (OS) Linux was selected as the OS for the test PCs, as it could provide fine control of TCP buffers and window sizes. This only became important because of the significant combined latency of the commercial ADSL service used for the VPNs coupled with satellite delay. On this unusual test platform, an optimized Linux platform provided more consistent FTP throughput results. Inmarsat Ltd. Proprietary Page 8 of 21
9 6.6 Encryption equipment configuration: The following reports contain the specified encryptor configuration settings The For Distribution to US Government Personnel Only test report contains all encryptor configuration instructions The For Distribution to Inmarsat Personnel Only test report will provide the Thales DC2K encryptor configuration instructions The For Distribution at Inmarsat s Discretion test report has no encryptor configuration instructions. 6.7 SkyPipe Performance Enhancing Proxy (PEP) Software SkyPipe is a proprietary AOS, Inc. software application optimized for TCP traffic over secure satellite links. SkyPipe features IPSec compliant, 256-bit AES encryption VPNs. SkyPipe can be terminated to a Cisco PIX or security IOS. SkyPipe can be furnished as a software client or as a pocket-sized, USB-powered external hardware device. See Figure 5 on page 16 for a typical implementation of the client/server architecture. SkyPipe substitutes the TCP protocol with a highly efficient and reliable UDPbased protocol that is especially designed to maximize data transfer over highdelay and loss-intensive networks such as satellite and radio links. The SkyPipe Performance Enhancing Proxy (PEP) supports multiple standard application protocols, including HTTP, HTTPS, FTP, SOCKS, and protocol-independent port forwarding. The PEP software assumes that the client/server application software can support a proxy. The PEP can also operate in a transparent mode via an external hardware device, thus eliminating the need for the client/server PEP software. SkyPipe also utilizes HTTP prefetching, further enhancing transfer of HTTPbased data thus drastically increasing web traffic performance and download times for web pages. Basic router functionality, including Network Address Translation (NAT) and on-the-fly compression saves the user bandwidth and money. Since all remote SkyPipe clients need to communicate with a local server, public SkyPipe servers will be available from various satellite service providers. Private servers are also available and can be installed at user facilities. SkyPipe is a particularly timely solution for users of the new Inmarsat BGAN high-speed data service and ideally suited for those who will employ Government encryption devices to secure their mobile networks. US Government/Type 1 hardware encryption devices are afforded an additional layer of security by double wrapping of traffic. Inmarsat Ltd. Proprietary Page 9 of 21
10 7 Packet Switched Encryption Equipment Testing via BGAN I-4 Encryptor: Thales DC2K (non-type 1) BGAN UT: Thrane Explorer 500 at Inmarsat UK The test arrangement will be configured as in Figure 2 below. East Tunnel West Tunnel Figure 2 Thales DC2K BGAN Testing via IOR I-4 Satellite Configuration 7.1 The equipment required for this PS configuration is: 3 each Cisco VPN Routers (1 router supplied by Inmarsat in UK). Cisco IOS ver each Thales DC2K IP Encryptors 2 each Dell Desktop Computers with Linux Fedora Core 4 OS 1 each DSL high speed Internet connection with static IP s 1 each Thrane Explorer 500 BGAN terminal at Inmarsat UK test lab Software version MMI not in use. 1 lot BGAN airtime for UT supplied by Inmarsat Inmarsat Ltd. Proprietary Page 10 of 21
11 7.2 The PS encryption tests to be performed via the BGAN I-4 configuration are described in the below Table 1 BGAN I-4 Tests for Thales DC2K IP Encryptor FTP File Transfer Data Rates - With Encryption (Note 1) No TCP PEP - Linux FC4 PC OS Via Thrane Explore 500 UT Download/Get Download/Get Upload/Put Upload/Put FTP Data= 1MB zipped pkg KB/s Kbps KB/s Kbps FTP Tests on Nov. 17, 2005 Test Test Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 55 to to 200 Network delay (Millisecs)= 1500 to 2000 Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas Table 1 Packet Switched encryption test data via the Thales DC2K IP encryptor and the Thrane Explorer 500 UT over the BGAN IOR I-4 Satellite Inmarsat Ltd. Proprietary Page 11 of 21
12 8 Packet Switched Encryption Equipment Testing via BGAN I-4 Encryptor: Taclane KG175 (Type 1) BGAN UT: Thrane Explorer 500 at Inmarsat UK The test arrangement will be configured as in Figure 3 below: West Tunnel Figure 3 Taclane KG175 BGAN Testing via IOR I-4 Satellite Configuration 8.1 The equipment required for this CS configuration is: 3 each Cisco VPN Routers (1 router supplied by Inmarsat in UK). Cisco IOS ver each Taclane KG175 IP encryptors 2 each Dell Desktop Computers with Linux Fedora Core 4 OS 1 each DSL high speed Internet connection with static IP s 1 each Thrane Explorer 500 BGAN terminal at Inmarsat UK test lab Software version MMI not in use. 1 lot BGAN airtime for UT supplied by Inmarsat Inmarsat Ltd. Proprietary Page 12 of 21
13 8.2 The PS encryption tests to be performed via the BGAN I-4 configuration are described in the below Table 2 BGAN I-4 Tests for Taclane KG175 IP Encryptor No TCP PEP - Linux FC4 PC OS Via Thrane Explore 500 UT Download/Get Download/Get Upload/Put Upload/Put FTP Data= 1MB zipped pkg KB/s Kbps KB/s Kbps FTP Tests on Nov. 17, 2005 Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 51 to to 136 Network delay (Millisecs)= 2013 to 2144 FTP File Transfer Data Rates - With Encryption (Note 1) Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas Table 2 Packet Switched encryption test data via the Taclane KG175 IP encryptor and the Thrane Explorer 500 UT over the BGAN IOR I-4 Satellite Inmarsat Ltd. Proprietary Page 13 of 21
14 9 Packet Switched Encryption Equipment Testing via BGAN I-4 Encryptor: ViaSat KG250 (Type 1) BGAN UT: Thrane Explorer 500 at Inmarsat UK The test arrangement will be configured as in Figure 4 below: Figure 4 ViaSat KG-250 Testing via IOR I-4 Satellite Configuration 9.1 The equipment required for this PS configuration is: 3 each Cisco VPN Routers (1 router supplied by Inmarsat in UK). Cisco IOS ver each ViaSat KG250 IP Encryptors 2 each Dell Desktop Computers with Linux Fedora Core 4 OS 1 each DSL high speed Internet connection with static IP s 1 each Thrane Explorer 500 BGAN terminal at Inmarsat UK test lab Software version MMI not in use. 1 lot BGAN airtime for UT supplied by Inmarsat Inmarsat Ltd. Proprietary Page 14 of 21
15 9.2 The PS encryption tests to be performed via the BGAN I-4 configuration are described in the below Table 3 BGAN I-4 Tests for ViaSat KG250 IP Encryptor No TCP PEP - Linux FC4 PC OS Via Thrane Explore 500 UT Download/Get Download/Get Upload/Put Upload/Put FTP Data= 1MB zipped pkg KB/s Kbps KB/s Kbps FTP Tests on Nov. 21, 2005 Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 96 to to 76 Network delay (Millisecs)= 2000 to 2150 FTP File Trasnfer Times - With Encryption (Note 1) Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas Table 3 Packet Switched encryption test data via the ViaSat KG250 IP encryptor and the Thrane Explorer 500 UT over the BGAN IOR I-4 Satellite Inmarsat Ltd. Proprietary Page 15 of 21
16 10 Thales DC2K Retest and AOS Performance Enhancing Proxy (PEP) The test arrangement will be configured as in Figure 5 below: East Tunnel West Tunnel Figure 5 DC2K and AOS PEP Testing Configuration: 10.1 The equipment required for this PS configuration is: 3 each Cisco VPN Routers (1 router supplied by Inmarsat in UK). Cisco IOS ver each Thales DC2K IP Encryptors 2 each Desktop Server Computers with Linux Fedora Core 4 OS 1 each Laptop Computer with dual boot Windows XP Pro and Fedora Core 4 OS 1 each DSL high speed Internet connection with static IP s 1 each Thrane Explorer 500 BGAN terminal at Inmarsat UK test lab Software version MMI not in use. 1 each AOS EOS SkyPipe hardware client 1 lot BGAN airtime for UT supplied by Inmarsat Inmarsat Ltd. Proprietary Page 16 of 21
17 BGAN I-4 Tests for Thales DC2K IP Encryptor FTP Xfer Rates w/encryption (Note 1) No TCP PEP & Linux OS FTP Xfer Rates w/encryption (Note 1) AOS PEP & Linux OS FTP Gain No PEP vs AOS PEP Via Thrane Explore 500 UT Download/Get Upload/Put Download/Get Upload/Put Download/Get Upload/Put FTP Data= 1MB zipped pkg Kbps Kbps Kbps Kbps % Gain % Gain FTP Tests on Feb. 13, 2006 Test Test Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 96 to to to to 304 Network delay (Millisecs)= 1500 to 2000 Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas 10.2 Table 4 - Linux Client Computer - No PEP versus AOS PEP BGAN I-4 Tests for Thales DC2K IP Encryptor FTP Xfer Rates w/encryption No PEP & Win XP Pro FTP Xfer Rates w/encryption PEP & Win XP Pro PC FTP Gain No PEP vs AOS PEP Via Thrane Explore 500 UT Download/Get Upload/Put Download/Get Upload/Put Download/Get Upload/Put FTP Data= 1MB zipped pkg Kbps Kbps Kbps Kbps % Gain % Gain FTP Tests on Feb. 13, 2006 Test Test Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 128 to to to to 250 Network delay (Millisecs)= 1500 to 2000 Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas 10.3 Table 5 - Windows XP Pro Client Computer No PEP versus AOS PEP Inmarsat Ltd. Proprietary Page 17 of 21
18 BGAN I-4 Tests for Thales DC2K IP Encryptor FTP Xfer Rates w/encryption No PEP & XP Pro Client FTP Xfer Rates w/encryption (Note 1) No PEP & Linux OS FTP Gain No PEP Windows vs Linux Via Thrane Explore 500 UT Download/Get Upload/Put Download/Get Upload/Put Download/Get Upload/Put FTP Data= 1MB zipped pkg Kbps Kbps Kbps Kbps % Gain % Gain FTP Tests on Feb. 13, 2006 Test Test Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 128 to to to to 144 Network delay (Millisecs)= 1500 to 2000 Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas 10.4 Table 6 - Windows versus Linux Client Computer No AOS PEP BGAN I-4 Tests for Thales DC2K IP Encryptor FTP Xfer Rates w/encryption AOS PEP & XP Pro PC FTP Xfer Rates w/encryption AOS PEP & Linux OS FTP Gain With PEP - Window vs Linux Via Thrane Explore 500 UT Download/Get Upload/Put Download/Get Upload/Put Download/Get Upload/Put FTP Data= 1MB zipped pkg Kbps Kbps Kbps Kbps % Gain % Gain FTP Tests on Feb. 13, 2006 Test Test Test Test Test Test Test Test Test Test Average Kbps (Note 2) Range Kbps (Note 2) 96 to to to to 304 Network delay (Millisecs)= 1500 to 2000 Note 1: Please see section 6.5 for Host Operating System selection Note 2: Throughput results impacted by high latency and jitter introduced as a result of ADSL-based VPN tunnel between London and Dallas 10.5 Table 7 - Windows versus Linux Client Computer With AOS PEP Inmarsat Ltd. Proprietary Page 18 of 21
19 11 Summary of Test Results The primary goal of this interim report is to provide some initial feedback to the Inmarsat user community regarding the compatibility of US Centric IP encryptors via the BGAN IOR I-4 satellite. During the course of this report only the Thrane Explorer 500 BGAN UT was available for testing. The only IP encryptors available during the tests were the Thales DC2K, Taclane KG175 and ViaSat KG250. Additional BGAN UTs and encryption equipment will be available for testing in late March/April when BGAN access is available via the AOR I-4 satellite. The BGAN VPN communications link between AOS (Dallas) and Inmarsat (London) provided an economical testing vehicle. However, the VPN link did inject an additional variable delay due to the multiple router hop Internet connections. The asymmetrical (512Kb upload/5mb download) DSL Internet connection at Dallas added yet another variable to our testing. This ADSL line is an unmanaged and unqualified service that had no guaranteed Quality of Service (QoS). These ADSL factors, coupled with a high latency satellite circuit, produced erratic IP throughput measurements. The round trip time (RTT) over the VPN network varied from 1500 to 2200 milliseconds (ms). Due to these variables it was determined to limit the encryption testing to basic continuity measurements rather than trying to establish encryption overhead values. See Figure 1 on page 4 for an overview of VPN test network. Initial BGAN testing enabled us to characterize the impact of the unusually high jitter produced by the VPN test network. Some effects of latency could be counteracted by significantly increasing the queue lengths and window sizes (both send and receive) and it was found these changes could be made more easily on a Linux OS (Fedora Core 4) than Windows (2000 Pro or XP Pro). From a testing perspective, this produced more reliable data transfer at higher speeds and so all testing was performed on Linux computers. It should be noted that this measure was only needed to validate connectivity at such an early stage of the BGAN evolution, and the Windows TCP window sizes are sufficient for local BGAN operation. During the initial BGAN testing via the AOS-Inmarsat VPN we discovered that the Thales DC2K IP encryptors would not pass data traffic. This was due to the encryptors IPSec incompatibility with Cisco s CEF (Cisco Express Forwarding) being enabled. Once this feature was disabled in all three routers the Thales DC2K IP encyrptors properly passed encrypted data traffic. The proper setting of the Maximum Transmission Unit (MTU) was important to insure the highest possible data transfer. Using advanced satellite IP accelerators such as SkyPipe, MTU sizing and packet stuffing techniques are used to enhance performance. While using a network protocol analyzer (Ethereal) the MTU s on the computer, Cisco routers and encryption equipment was adjusted for maximum data transfer. Inmarsat Ltd. Proprietary Page 19 of 21
20 Maximum data transfer would occur when packets were not being split into two packets as they passed through the encryptor, router and computer interfaces. As a general rule all computers, network routers and DC2K IP encryptors MTU s were set to 1280, 1416 and 1400 respectively. These values are documented on the test configuration Figures 2, 3 and 4. The IP encryptor test data throughput measurements are tabulated in Tables 1, 2 and 3. This data validates the DC2K, KG175 and KG250 IP encryptor s capability to pass encrypted data via the BGAN network. The initial data throughput values were disappointing but not unexpected due to the numerous variables and is almost certainly attributable to the high latency in the AOS-Inmarsat VPN circuit. FTP download speeds ranged from an average of 84Kbps to 113Kbps, whereas, FTP uploads averaged from 58Kbps to 139Kbps. Configuring all encryptors was straight forward. After configuring all administrative settings (i.e., red/black setup and handling keying materials) the encryptors would synchronize with each other within a minute. The AOS-Inmarsat VPN BGAN network did not produce any special encryptor configuration requirements. The MTU settings were the primary time consuming adjustment. Various MTU settings were tried before the best possible settings were obtained. All MTU settings will be re-validated when direct AOR I-4 access is available. AOS has previously used Performance Enhancing Proxy (PEP) software over the Inmarsat GAN networks using the Windows OS platform. Initial BGAN tests showed that using AOS PEP (SkyPipe) would obtain improved FTP reliability and data transfer speeds comparable to our non-pep Linux testing. During initial testing our PEP would not function in the Linux environment. However, in a recent development AOS has produced a Linux based PEP called SkyPipe EOS. This Linux based transparent capture solution has produced some remarkable results over the AOS-Inmarsat BGAN VPN. See the recent Thales DC2K test results on pages for actual test configuration and data. The PEP function is to primarily remove the issues of latency and thus get a more accurate estimate of throughput speeds. Additional Thales DC2K IP encryptor tests were performed with and without PEP and between the Windows and Linux platforms. Using SkyPipe with either a Windows or Linux client computer working into a Linux server produced very similar results of approximately 200Kbps download and approximately 242Kbps upload FTP data transfers. SkyPipe s improvement to FTP uploads is impressive. Without SkyPipe the FTP uploads for a Linux client computer averaged 109Kbps, whereas, a Windows client computer only averaged 42Kbps. No testing of Inmarsat s PEP was done during this time period. It is understood that Inmarsat s PEP will also improve upload BGAN characteristics. Inmarsat Ltd. Proprietary Page 20 of 21
21 This concludes this interim report. BGAN Packet Switched encryption testing will resume when AOR I-4 access is available. The AOR I-4 access is expected by mid April, At this time the Hughes 9201 and Nera WorldPro 1000 BGAN UT s should be available for testing. The KG235 and KG240 Type 1 USG encryptors are expected to be available at this same time. Data testing will be done with and without encryption, as well as, with and without PEP. Having direct access to the AOR I-4 BGAN satellite will make encryption IP overhead measurements practical and the results meaningful. When direct AOR I-4 access is available AOS will perform Circuit Switched (CS) testing using USG Type 1 serial link encryptors (i.e., the L3 STE, the SafeNet KIV7, STUIII, L3 OmniXp/Xi, Sectera Wireline and ViaSat KIV21). The Thales DC2K LX non Type 1 serial link encryptor will be tested to compare encryption overhead values. Inmarsat Ltd. Proprietary Page 21 of 21
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Using Innominate mguard over BGAN
Using Innominate mguard over BGAN Version 2 6 June 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy,
Inmarsat TCP Accelerator V2
Inmarsat TCP Accelerator V2 User Guide for WindowsVista, WindowsXP and Windows7 Version 3.0 10 February 2012 inmarsat.com/bgan Whilst the above information has been prepared by Inmarsat in good faith,
Remote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
Cisco SR 520-T1 Secure Router
Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success
Using the SELEX Elsag Intelligent Information Dissemination (I2D) System over Fleet Broadband and BGAN
Using the SELEX Elsag Intelligent Information Dissemination (I2D) System over Fleet Broadband and BGAN Bearer-agnostic data bandwidth reduction and management solution Version 1.0 31.08.11 Contents 1 Overview...
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya [email protected]
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Licenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
White Paper. Accelerating VMware vsphere Replication with Silver Peak
Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Contents Overview...3 The Challenge of Replicating Over Distance...3 VMware vsphere Replication
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Using GlobeCast Content Exchange over BGAN
Using GlobeCast Content Exchange over BGAN Version 1 3 September 2009 inmarsat.com Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Implementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
Best practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Evaluating Bandwidth Optimization Technologies: Bonded Internet
Evaluating Bandwidth Optimization Technologies: Bonded Internet Contents Channel Bonding and MLPPP Load Balancing and BGP Configuring Tunnels Traditional Bonding MetTel s Bonded Internet Service 3 4 5
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment
Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about
Using a Firewall General Configuration Guide
Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services
Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Using DigiGone Sat-Chat over BGAN. Secure Video, VoIP, IM Chat and File Transfer Version 01
Using DigiGone Sat-Chat over BGAN Secure Video, VoIP, IM Chat and File Transfer Version 01 Contents 1 Overview...1 2 Product Range...1 3 Typical Users...1 4 Key Features...1 5 Benefits to BGAN Users...2
Bonded Internet. Bonded is Better! AllCore Communications... Bonded Internet Features: Who is AllCore Communications?
Bonded Internet Increase your connection speed, redundancy and reliability with AllCore Communications proprietary Bonded Internet technology. AllCore Communications... Bonded Internet improves network
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
Vobal Technologies S2 Solution: Optimized VoIP for FBB & BGAN High Quality, Pre-paid Telephony Service using Standard IP Data
Vobal Technologies S2 Solution: Optimized VoIP for FBB & BGAN High Quality, Pre-paid Telephony Service using Standard IP Data Version 01 Contents 1 Overview... 1 2 Hardware... 1 2.1 Vobal VoIP System (S2)...
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
SURF Feed Connection Guide
SURF Feed Connection Guide Tullett Prebon Information Ltd A wholly owned subsidiary of Tullett Prebon Version 6.0 3 rd August 2005 Contents 1. Introduction...3 1.1 General...3 2. Connectivity via the Internet...4
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper
Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper Release 2 October 2003 Copyright Copyright 2003 Mitel Networks Corporation. This document is unpublished and the following
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Broadband Quality Test Plan
Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration
Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration A Dell Technical White Paper Abstract This technical report details the benefits that Silver Peak s replication
Jive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
An Introduction to Dispersive Virtualized Networks
An Introduction to Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the public Internet to help organizations
IVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected]
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected] I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Bandwidth Security and QoS Considerations
This chapter presents some design considerations for provisioning network bandwidth, providing security and access to corporate data stores, and ensuring Quality of Service (QoS) for Unified CCX applications.
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
GregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Key Term Quiz Answers
Key Term Quiz Answers The Internet Use the Key Terms list to complete the sentences that follow. Not all terms will be used. 1. The time it takes for a packet to travel to its destination and back is called
Hosted Voice. Best Practice Recommendations for VoIP Deployments
Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband
IT@Intel. Optimizing WAN Performance for the Global Enterprise
White Paper Intel Information Technology Computer Manufacturing WAN Performance and Optimization Optimizing WAN Performance for the Global Enterprise To improve throughput on Intel wide area network (WAN)
LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS
LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
How Virtual Private Networks Work
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Source-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 [email protected] This document is designed to assist IT/Network
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
WhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
