ATV Data Link Simulator: A Development based on a CCSDS Layers Framework

Size: px
Start display at page:

Download "ATV Data Link Simulator: A Development based on a CCSDS Layers Framework"

Transcription

1 SpaceOps 2010 Conference<br><b><i>Delivering on the Dream</b></i><br><i>Hosted by NASA Mars April 2010, Huntsville, Alabama AIAA ATV Data Link Simulator: A Development based on a CCSDS Layers Framework Javier Peña 1 and Nick Priborsky 2 LSE Space Engineering and Operations AG, Münchner Str 20, Wessling, 82234, Germany Fabio Sintoni 3 KIBB GbR, David-Gilly-Str 1, Berlin, 14469, Germany and Jean-Christophe Ronnet 4 ESA, 18 Ave Edouard Belin, Toulouse, 31401, France I. Introduction Following the first ATV mission ( Jules Verne ), ESA identified the need to procure a data flow simulator that is capable of supporting the test of the complete TM and TC chain including the RF links. The main objectives of the simulator are to Help troubleshooting activities in case of anomalies Verify correct configuration and operation of Ground Segment Equipment Test the configuration and operation of Ground Segment Equipment prior to tests with the spacecraft such as System Validation Tests As the physical layer of the ATV mission uses the SQPN (Staggered Quadrature Pseudo-random Noise) modulation format, it is not possible to use existing ESA simulators since they do not support SQPN modulation. In order to reduce costs, it was proposed to use an existing spare TM/TC baseband unit to simulate the RF part of the ATV spacecraft. The TM/TC Baseband Unit is normally used to receive TM and transmit TC. In this case however, it is used to transmit TM and receive TC thereby mimicking the behavior of the ATV spacecraft. Unfortunately, the baseband unit is not capable of supporting all required functions of the coding layer in such a setup. Therefore a solution had to be found that is capable of adding the missing functions to the system. LSE Space Engineering and Operations AG was able to propose a cost efficient solution based on a development framework that had already been developed for another project. The name of the framework is CCSDS Layer Framework and was part of the development of GSAT. GSAT is a generic satellite simulator that fully implements the relevant CCSDS protocols. It is used by LSE Space as a generic spacecraft simulator to test ground segment equipment and to train staff. The CCSDS Layer Framework is a Java library that encapsulates the following CCSDS Recommendations: CCSDS B-1 TM Synchronisation and Channel Coding CCSDS B-1 TM Space Data Link Protocol CCSDS B-1 Space Packet CCSDS B-1 TC Synchronisation and Channel Coding 1 Senior Software/Ground Systems Engineer, Javier.pena[at]lsespace.com 2 Ground Systems Engineering Manager, Nick.priborsky[at]lsespace.com 3 ATV Ground Segment Engineer, sintoni[at]kibb-space.com 4 Head of the ATV Ground Segment Section, Jean-Christophe.Ronnet[at]esa.int 1 Copyright 2010 by the, Inc. All rights reserved.

2 CCSDS B-1 TC Space Data Link Protocol CCSDS B-1 Communications Operation Procedure-1 It allows a software developer to efficiently implement the CCSDS layers of a given spacecraft mission and perform mission specific adaptations. This paper presents the design and implementation of the CCSDS Layers Framework and the advantages of using such a framework on the basis of the development of the ATV Data Link Simulator. II. Architecture of the CCSDS Layers Framework The architecture of the CCSDS Layers Framework is best described with the help of an example. This example will use the CCSDS TM Coding Layer. A. Example of CCSDS TM Coding Layer The CCSDS recommendations not only define the protocols that are going to be used but also which services shall be provided by each layer. Following figure gives an outline of the functionalities that the Space Telemetry Coding Layer provides: Figure 1: CCSDS Coding Layer 2

3 As can be seen in Figure 1, only the attachment of the Attached Sync Marker is a mandatory function that must be performed by the Coding Layer. It is up to the mission designers to define which other functions need to be used due to mission constraints. The fact that some services are mandatory and some are optional needs to be reflected by the framework in order to enable the developer to easily configure the mandatory and optional parts of the layer. Additionally, the CCSDS Recommendation defines two service primitives for the coding layer: 1) ChannelAccess.request (frame): The upper layer (master channel layer) requests the codification of a frame to the Coding Layer. 2) ChannelAccess.indication: Primitive used by the coding layer to send the coded frame to the lower layer (physical layer). B. Modeling of the TM Coding Layer The layers defined by the CCSDS Recommendations are modeled as Java Interfaces thereby only defining their behavior but not specifying a concrete implementation. The sending side of the TM Coding Layer is named ISpaceTmCodingLayer. The relevant interfaces of the sending TM Coding Layer side are outlined in the UML Class Diagram Figure 2 below. Figure 2: ISpaceTmCodingLayer UML Diagram The Coding Layer interface defines the method codeframe(tmframe) that is used to forward transfer frames from the Transfer Layer to the Coding Layer. This method represents the ChannelAcces.request primitive as defined by the CCSDS Recommendation. The Coding Layer interface provides a Set & Get method to associate a physical layer with the coding layer. This association will be used by the Coding layer to call the ChannelAccess.indication primitive to forward the output of the coding layer to the Physical Layer. An advantage of using interfaces becomes apparent here. The coding layer does not need to know anything about the specific implementation of the physical layer. The actual implementation of the physical layer could be a network connection to a TM/TC baseband unit, a physical connection to RF equipment or it could connect directly to a Mission Control System or Control Center using the relevant network protocols. 3

4 The remaining setter and getter methods are used to configure the functions of the TM coding layer. A function worth mentioning is frame encoding. Here again, interfaces provide additional decoupling of concerns. To achieve this, an interface named IEncoder is defined in the framework. This interface must be implemented by all encoders thereby ensuring that the actual encoding implementation remains transparent to the TM coding layer. In case a mission would like to use a custom encoding algorithm, it is as simple as implementing the IEncoder interface and the coding layer would then be able to use the new algorithm without having to change any internal code of the layer. C. Default implementation and Hook Methods Every layer has a set of common functionalities that are mission independent (for example attachment of the Attached Sync Marker). The default implementation of the layer extracts the common functionalities and implements these so that they can be reused by the mission specific implementation. Additionally, some functionality related to low level development can be added here thereby making it available to the specific implementation (i.e. Property listeners to make easier the GUI development, or multithreading). This way the actual implementation of the layers for a specific mission will not have to rewrite any common code. Moreover, the default implementation needs to be extendable. This can be achieved by the use of so called Hook Methods. These are empty methods placed strategically in the default implementation code. This way the classes that derive from the default implementation only need to rewrite these extension points. Thus the code defining the basic common functionality of the layer is not affected. Figure 3: codeframehook Method Diagram Figure 3 shows how the hook method concept is applied to the codeframe Method of the TM coding Layer. The codeframe(etmframe) method implements a multithreading strategy to decide whether an additional thread is required to code the Frame or not. Then it will call the hook method codeframehook(etmframe) which will do the actual coding of the TM frame. In case the default implementation needs to be adapted only the 4

5 codeframehook(etmframe) method would have to be rewritten in the subclass. The codeframe(etmframe) method with the multithreading support will remain untouched and will be inherited by the mission specific implementation of the Coding Layer. The two approaches (default implementation and hook methods) are used in order to maximize the reusability of the code within the Framework with all the advantages that it brings. As explained, the default implementations are used as the base for the implementations of all the layers that either come with the framework or are derived from the framework. This, however, does not exclude the possibility of creating an implementation outside of the framework by implementing the layer interface directly. In addition, the default layers can be used out-of-the-box as they contain the common functionality of the layer. D. Intercepting filter pattern Thanks to previous experience in space-related software development, it was realized that there are still some cases that are not properly handled by the design. For example, it may be required to dump the output of the coding layer to the local file system or to a central logging facility. This information can be used for troubleshooting activities or to fulfill logging requirements. It would be possible to add this functionality by using hook methods. But this would result in having to use a series of conditional checks. Unfortunately, this would make the code less readable and maintainable as the flow of the layer and the processing of the data would be compiled into the layer itself. The key to solve this common problem in a flexible and unobtrusive manner is to have a simple mechanism for adding and removing processing components. This software design pattern is known as the Intercepting Filter Pattern. This pattern is frequently used in the CCSDS Layers Framework. The use of this pattern forces: Reusability of common processing components. Centralization of common logic. Components can be easily added or removed without affecting existing components, so that they can be used in a variety of combinations. Interceptor Client Filter Filter 1 Chain.. Filter N intercept dointerception Some processing dointerception Some processing Figure 4. Intercepting Filter Sequence Diagram 5

6 Figure 4 gives an overview of the flow of the Intercepting Filter Pattern. The use of the Intercepting Filter Pattern ensures that the Space Telemetry Coding Layer not only follows the CCSDS recommendation but is flexible enough to cope with mission specific requirements without interfering with the rest of the framework. Figure 5. DefaultSpaceTmCodingLayer UML Diagram The UML Diagram in Figure 5 shows how the interceptor pattern was added to the ISpaceTmCodingLayer interface. The methods setbeforetmframecodinginterceptorchain and setaftertmframecodinginterceptorchain enable the developer to unobtrusively add processing components that may be required by mission specific constraints. III. Development of ADLS with the CCSDS Layers Framework It was decided to break the work to be performed down into two main areas of expertise: Capability and configuration of TM/TC Baseband Unit Development of ATV TM/TC chain customization A. Capability and configuration of TM/TC Baseband Unit As already stated in the introduction, TM/TC baseband units are normally used to receive TM and transmit TC. But due to cost constraints, it was proposed to use a spare TM/TC baseband unit as the RF component of the ATV Data Link Simulator. An analysis of the capabilities of the TM/TC baseband unit revealed that it was not capable of supporting all required functions of the coding layer. 6

7 TM TC Transfer Layer CLCW Transfer Layer TM Transfer Frame TC Transfer Frame Reed Solomon encoding Attachment of Attached Sync Marker Convolutional encoding Codeblocks CADU Channel Symbols Coding Layer BCH Decoding CLTU CLTU sync and extraction Bit stream Convolutional decoding Channel Symbols Physical Layer Physical Layer Figure 6: Coding Layer Functional Block Diagram As detailed in Figure 6, the red boxes identify tasks that are not supported by the TM/TC Baseband Unit but will have to be implemented in software instead. These tasks are: Reed Solomon Encoding Attachment of Attached Sync Marker Detection and extraction of CLTU from the bit stream BCH Decoding of CLTU All of these tasks are supported out-of-the-box by the CCSDS Layers Framework. Therefore, it was possible to quickly assemble an ADLS prototype for testing the TM/TC baseband unit configuration and the interface to the ADLS. Moreover, the CCSDS Layers Framework provided most of the code needed for the development of an MCS simulator. With these tools it was possible to carry out a test to prove that the proposed solution was viable. This was a very important step as it enabled the verification of the proposed set-up. Thereby the overall project risk was greatly minimized. 7

8 TCP/IP Intermediate Frequency TCP/IP MCS Simulator Main TM/TC Baseband Unit Spare TM/TC Baseband Unit Simulator Notebook Redu Ground Station Figure 7: TM/TC Baseband Equipment Test Diagram Figure 7 gives an overview of the preliminary test set-up that enabled the stakeholders to gain confidence in the proposed solution. The TM/TC Baseband Unit experts were no longer needed for the ADLS development and the resources could be freed for other projects. B. ATV TM/TC Chain Customization The next step was to implement the customization of the TM and TC Chain for ATV. Following specializations had to be performed Verification of ATV TC packets Generation of ATV Telecommand Acknowledgment TM packets Update of the time field of archived TM packets to simulate real-time TM Specific TM frame data field for the ATV TM Archiving of TM and TC stream The rest of the TM /TC Chain functionalities were already provided by the CCSDS Layers Framework such as FARM part of COP-1 protocol (AD Mode support) Check of TC Frame, check of TC Segment and the extraction of the TC packet TM flow control The integration of the customizations for ATV, thanks to the CCSDS Layer Framework design explained in the previous sections, was performed seamlessly. For example, the TM hexadecimal file archive was efficiently implemented by the use of the Interceptor pattern in the TM Coding layer. The Telecommand Verification task was added by implementing the ISpaceTcSpacePacketVerificationService interface. None of these customizations required any change to the Framework. Therefore, the ADLS reuses a large part of the CCSDS Layers Framework that has already been tested and used by other projects. This has facilitated the testing and the debugging of the ATV TM/TC Chain customizations, as it was easier to isolate bugs. 8

9 IV. Conclusion Using the CCSDS Layers Framework provides benefits in following domains: A. Technical Domain Robust Software: Thanks to the high level of reusability that the framework provides both in code and testing. Maintainable, scalable and extendable: The decoupling of concerns through the use of interfaces and the adoption of software design patterns such as the Intercepting Filter Pattern makes it easier to cope with future requirements and to integrate them with the existing framework. Debugging/Troubleshooting: As the amount of code that is prone to change is concentrated in certain points it is easier to focus the debugging and troubleshooting on known areas. Increase Productivity: The framework promotes loose coupling between modules and layers of the development thereby encouraging and promoting parallel development. Agile Development: As the framework provides default implementations it enables the use of agile development techniques and facilitates rapid prototyping. B. Management Domain Human Resources: New team members can become productive quickly as they only need to know the part of the framework that they are working on. Risk Management: Allows the developers to concentrate on the critical parts of the development at a very early stage, thereby decreasing the project risks. 9

5.2 Telemetry System Concept

5.2 Telemetry System Concept 126 Chapter 5 Traditionally, telemetry transmitted from spacecraft was formatted with a time-division multiplexing (TDM) scheme, where data items were multiplexed into a continuous stream of fixed-length

More information

FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS. Christian POULIQUEN

FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS. Christian POULIQUEN FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS Christian POULIQUEN 1 SOMMAIRE INTRODUCTION NEEDS AND OPS CONCEPT STANDARDS OVERVIEW CNES MISSION STATUS OPEN POINTS 2 FILES IN SPACE - SHORT INTRODUCTION Many

More information

Architectures for Fleet Management. B. L. Kizzort. Harris Corporation, Melbourne, Florida, USA.

Architectures for Fleet Management. B. L. Kizzort. Harris Corporation, Melbourne, Florida, USA. Architectures for Fleet Management B. L. Kizzort Harris Corporation, Melbourne, Florida, USA. Abstract With the increasing reliance on space systems for communications, the number of multi-satellite, multimission

More information

IOAG SERVICE CATALOG #1 IOAG. document title/ titre du document. prepared by/préparé par. Gian Paolo Calzolari (Editor)

IOAG SERVICE CATALOG #1 IOAG. document title/ titre du document. prepared by/préparé par. Gian Paolo Calzolari (Editor) D O C U M E N T document title/ titre du document IOAG SERVICE CATALOG #1 prepared by/préparé par Gian Paolo Calzolari (Editor) issue/édition 1 revision/révision 4 date of issue/date d édition 18/06/2013

More information

On-board Software Reference Architecture for Payloads

On-board Software Reference Architecture for Payloads On-board Software Reference Architecture for Payloads Presenters Victor Bos, phone: +358 400897907, email: victor.bos@ssf.fi Adam Trcka, phone: +420 736650822, email: adam.trcka@evolvsys.cz Introduction

More information

USE OF PYTHON AS A SATELLITE OPERATIONS AND TESTING AUTOMATION LANGUAGE

USE OF PYTHON AS A SATELLITE OPERATIONS AND TESTING AUTOMATION LANGUAGE USE OF PYTHON AS A SATELLITE OPERATIONS AND TESTING AUTOMATION LANGUAGE Gonzalo Garcia VP of Operations, USA Property of GMV All rights reserved INTRODUCTION Property of GMV All rights reserved INTRODUCTION

More information

Development Plan for Turbo Encoder Core and Devices Implementing the Updated CCSDS Telemetry Channel Coding Standard

Development Plan for Turbo Encoder Core and Devices Implementing the Updated CCSDS Telemetry Channel Coding Standard Development Plan for Turbo Encoder Core and Devices Implementing the Updated CCSDS Telemetry Channel Coding Standard Sandi Habinc 1, Gian Paolo Calzolari 2, Enrico Vassallo 3 European Space Research and

More information

Patterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering

Patterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 2 GoF Design Patterns Creational 1 GoF Design Patterns Principles Emphasis on flexibility and reuse through decoupling of classes. The underlying

More information

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE

Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE CCSDS 200.0-G-6 GREEN BOOK JANUARY 1987 AUTHORITY * * * * * * *

More information

BENEFITS OF USING MULTIPLE PLP IN DVB-T2

BENEFITS OF USING MULTIPLE PLP IN DVB-T2 BENEFITS OF USING MULTIPLE PLP IN DVB-T2 ENENSYS Technologies, France : http://www.enensys.com DVB-T2 has already achieved incredible success for delivering digital terrestrial television. More than 28

More information

SIMERO Software System Design and Implementation

SIMERO Software System Design and Implementation SIMERO Software System Design and Implementation AG Eingebettete Systeme und Robotik (RESY),, http://resy.informatik.uni-kl.de/ 1. Motivation and Introduction 2. Basic Design Decisions 3. Major System

More information

ASTERIX Format Analysis and Monitoring Tool

ASTERIX Format Analysis and Monitoring Tool ASTERIX Format Analysis and Monitoring Tool Reference: SUR/STFRDE/APAT-SRS Status: Released Edition: 1.0 Date: 27 August 1998 Authors: Bruno Lambin, Tarkan Sevim Table of Contents 1. Introduction 1.1.

More information

Binonymizer A Two-Way Web-Browsing Anonymizer

Binonymizer A Two-Way Web-Browsing Anonymizer Binonymizer A Two-Way Web-Browsing Anonymizer Tim Wellhausen Gerrit Imsieke (Tim.Wellhausen, Gerrit.Imsieke)@GfM-AG.de 12 August 1999 Abstract This paper presents a method that enables Web users to surf

More information

Hummingbird. A Service Based Open Source Ground Segment for Small Satellites

Hummingbird. A Service Based Open Source Ground Segment for Small Satellites Hummingbird A Service Based Open Source Ground Segment for Small Satellites Mark Doyle 1, Johannes Klug 2 mark.doyle@logica.com, johannes.klug@logica.com Logica Deutschland GmbH & Co. KG, Darmstadt, Hessen,

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Adding Web 2.0 features to a Fleet Monitoring Dashboard

Adding Web 2.0 features to a Fleet Monitoring Dashboard SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2249 Adding Web 2.0 features to a Fleet Monitoring Dashboard

More information

Introduction to Automated Testing

Introduction to Automated Testing Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases

More information

SCADE Suite in Space Applications

SCADE Suite in Space Applications SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations

Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Simon R. Chudley and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of

More information

Using IPSec in Windows 2000 and XP, Part 2

Using IPSec in Windows 2000 and XP, Part 2 Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing SDR Architecture Contributed by Lee Pucker, Spectrum Signal Processing Introduction Software defined radio (SDR) is an enabling technology, applicable across a wide range of areas within the wireless industry,

More information

USE OF SCILAB FOR SPACE MISSION ANALYSIS AND FLIGHT DYNAMICS ACTIVITIES

USE OF SCILAB FOR SPACE MISSION ANALYSIS AND FLIGHT DYNAMICS ACTIVITIES USE OF SCILAB FOR SPACE MISSION ANALYSIS AND FLIGHT DYNAMICS ACTIVITIES Thierry Martin CNES Scilabtec 09 Use of Scilab for space mission analysis Page 1 Use of Scilab in CNES Scilab is now widely used

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Software Defined Radio Architecture for NASA s Space Communications

Software Defined Radio Architecture for NASA s Space Communications From July 2007 High Frequency Electronics Copyright 2007 Summit Technical Media Software Defined Radio Architecture for NASA s Space Communications By Maximilian C. Scardelletti, Richard C. Reinhart, Monty

More information

Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus

Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus Level: Advanced Jean-Louis Maréchaux (jlmarech@ca.ibm.com), IT Architect, IBM 28 Mar 2006 Today's business

More information

Chapter 13: Program Development and Programming Languages

Chapter 13: Program Development and Programming Languages Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented

More information

COL- CC and ESA Ground Segment. Page 1

COL- CC and ESA Ground Segment. Page 1 COL- CC and ESA Ground Segment Page 1 M&C Antenna Ground Station SpACE DLR has implemented a new antenna ground station M&C Framework for the Weilheim antennas. It will be the M&C software for the existing

More information

VIRTUAL LABORATORY: MULTI-STYLE CODE EDITOR

VIRTUAL LABORATORY: MULTI-STYLE CODE EDITOR VIRTUAL LABORATORY: MULTI-STYLE CODE EDITOR Andrey V.Lyamin, State University of IT, Mechanics and Optics St. Petersburg, Russia Oleg E.Vashenkov, State University of IT, Mechanics and Optics, St.Petersburg,

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Development of AUTOSAR Software Components within Model-Based Design

Development of AUTOSAR Software Components within Model-Based Design 2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior

More information

I2C PRESSURE MONITORING THROUGH USB PROTOCOL.

I2C PRESSURE MONITORING THROUGH USB PROTOCOL. I2C PRESSURE MONITORING THROUGH USB PROTOCOL. Product Details: To eradicate human error while taking readings such as upper precision or lower precision Embedded with JAVA Application: Technology Used:

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

1-04-10 Configuration Management: An Object-Based Method Barbara Dumas

1-04-10 Configuration Management: An Object-Based Method Barbara Dumas 1-04-10 Configuration Management: An Object-Based Method Barbara Dumas Payoff Configuration management (CM) helps an organization maintain an inventory of its software assets. In traditional CM systems,

More information

The PACS Software System. (A high level overview) Prepared by : E. Wieprecht, J.Schreiber, U.Klaas November,5 2007 Issue 1.

The PACS Software System. (A high level overview) Prepared by : E. Wieprecht, J.Schreiber, U.Klaas November,5 2007 Issue 1. The PACS Software System (A high level overview) Prepared by : E. Wieprecht, J.Schreiber, U.Klaas November,5 2007 Issue 1.0 PICC-ME-DS-003 1. Introduction The PCSS, the PACS ICC Software System, is the

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

WS_FTP Pro. Addendum to User s Guide. Software Version 6.6. Ipswitch, Inc.

WS_FTP Pro. Addendum to User s Guide. Software Version 6.6. Ipswitch, Inc. WS_FTP Pro Addendum to User s Guide Software Version 6.6 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Fax: 781-676-5710 Lexington, MA 02421-3127 Web: http://www.ipswitch.com The information

More information

Autonomy for SOHO Ground Operations

Autonomy for SOHO Ground Operations From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. Autonomy for SOHO Ground Operations Walt Truszkowski, NASA Goddard Space Flight Center (GSFC) Walt.Truszkowski@gsfc.nasa.gov

More information

Integrated Development of Distributed Real-Time Applications with Asynchronous Communication

Integrated Development of Distributed Real-Time Applications with Asynchronous Communication Integrated Development of Distributed Real-Time Applications with Asynchronous Communication Marc Schanne International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES) 26-28 September

More information

Testing automation of projects in telecommunication domain

Testing automation of projects in telecommunication domain Testing automation of projects in telecommunication domain Alexey Veselov, Vsevolod Kotlyarov Saint-Petersburg State Polytechnic University, Saint-Petersburg, Russia a.veselov@ics2.ecd.spbstu.ru, vpk@ics2.ecd.spbstu.ru

More information

inet Enterprise Features Fact Sheet

inet Enterprise Features Fact Sheet 2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880

More information

The IBM Cognos Platform for Enterprise Business Intelligence

The IBM Cognos Platform for Enterprise Business Intelligence The IBM Cognos Platform for Enterprise Business Intelligence Highlights Optimize performance with in-memory processing and architecture enhancements Maximize the benefits of deploying business analytics

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

Software Development Kit

Software Development Kit Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice

More information

IEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption

IEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption IEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems Tata Consultancy Services

More information

GSAW 2010. C2 System Advantages Sought, Lessons Learned, and Product Philosophies. Ryan Telkamp. Presenter name Presenter Title

GSAW 2010. C2 System Advantages Sought, Lessons Learned, and Product Philosophies. Ryan Telkamp. Presenter name Presenter Title GSAW 2010 Evolution of a Service Oriented Architecture t (SOA) C2 System Advantages Sought, Lessons Learned, and Product Philosophies Ryan Telkamp Presenter name Presenter Title BOEING is a trademark of

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

SaaS Analytics. Analyzing usage data to improve software. Bart Schaap - 1308297 Tim Castelein - 1512277. February 10, 2014

SaaS Analytics. Analyzing usage data to improve software. Bart Schaap - 1308297 Tim Castelein - 1512277. February 10, 2014 SaaS Analytics Analyzing usage data to improve software Bart Schaap - 1308297 Tim Castelein - 1512277 February 10, 2014 Summary TOPdesk is a company that develops a software product, also called TOPdesk,

More information

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...

More information

Best Practices for Verification, Validation, and Test in Model- Based Design

Best Practices for Verification, Validation, and Test in Model- Based Design 2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Database Administration for Spacecraft Operations The Integral Experience

Database Administration for Spacecraft Operations The Integral Experience r bulletin 103 august 2000 Database Administration for Spacecraft Operations The Integral Experience J. Houser & M Pecchioli Mission Operations Department, ESA Directorate of Technical and Operational

More information

Sybase Unwired Platform 2.0

Sybase Unwired Platform 2.0 white paper Sybase Unwired Platform 2.0 Development Paradigm www.sybase.com TABLE OF CONTENTS 1 Sybase Unwired Platform 1 Mobile Application Development 2 Mobile Business Object (MBO) Development 4 Mobile

More information

Model-Driven Software Development for Robotics: an overview

Model-Driven Software Development for Robotics: an overview Model-Driven Software Development for Robotics: an overview IEEE-ICRA2011 Workshop on Software Development and Integration in Robotics Jan F. Broenink, Maarten M. Bezemer Control Engineering, University

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

First Application of the Generic Emulated Test Software, GETS, in the LISA Pathfinder Operational Simulator SESP 2008, 8 th October 2008, ESTEC

First Application of the Generic Emulated Test Software, GETS, in the LISA Pathfinder Operational Simulator SESP 2008, 8 th October 2008, ESTEC First Application of the Generic Emulated Test Software,, in the LISA Pathfinder Operational Simulator SESP 2008, 8 th October 2008, ESTEC Joachim Ochs Michael Irvine Mehran Sarkarati Mariella Spada VEGA

More information

September 18, 2014. Modular development in Magento 2. Igor Miniailo Magento

September 18, 2014. Modular development in Magento 2. Igor Miniailo Magento September 18, 2014 Modular development in Magento 2 Igor Miniailo Magento Agenda 1 Magento 2 goals 2 Magento 1 modules 3 Decoupling techniques 4 Magento 2 is it getting better? 5 Modularity examples Magento

More information

Analysis of Open Source Drivers for IEEE 802.11 WLANs

Analysis of Open Source Drivers for IEEE 802.11 WLANs Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,

More information

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark 1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,

More information

Satellite Control Software (SCS) Mission Data Client Extensibility User Guide

Satellite Control Software (SCS) Mission Data Client Extensibility User Guide Page : 1 of 16 Satellite Control Software (SCS) Mission Data Client Extensibility User Guide Prepared by: Florian George Stéphane Billeter Space Center EPFL Lausanne Switzerland 06 November 2013 Page :

More information

Patterns in Software Engineering

Patterns in Software Engineering Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture

More information

The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao.

The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. Logging makes sense for testbench debug The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. SystemVerilog provides

More information

ESTRACK Management System Support for the CCSDS Space Communication Cross Support Service Management

ESTRACK Management System Support for the CCSDS Space Communication Cross Support Service Management ESTRACK Management System Support for the CCSDS Space Communication Cross Support Service Management Alexander Hoffmann 1 VEGA Space GmbH, Europaplatz 5, D-64293 Darmstadt, Germany Holger Dreihahn 2 and

More information

How To Build A Financial Messaging And Enterprise Service Bus (Esb)

How To Build A Financial Messaging And Enterprise Service Bus (Esb) Simplifying SWIFT Connectivity Introduction to Financial Messaging Services Bus A White Paper by Microsoft and SAGA Version 1.0 August 2009 Applies to: Financial Services Architecture BizTalk Server BizTalk

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

LRIT TRANSMITTER SPECIFICATION

LRIT TRANSMITTER SPECIFICATION LRIT TRANSMITTER SPECIFICATION 1.0 Introduction The National Oceanic and Atmospheric Administration (NOAA) Low Rate Information System (LRIT broadcast system is an imagery and environmental products delivery

More information

Embedded Critical Software Testing for Aerospace Applications based on PUS

Embedded Critical Software Testing for Aerospace Applications based on PUS XI Workshop de Testes e Tolerância a Falhas 119 Embedded Critical Software Testing for Aerospace Applications based on PUS Rodrigo P. Pontes 1, Eliane Martins 2, Ana M. Ambrósio 3, Emília Villani 1 1 Instituto

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer

EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction

More information

VisuSniff: A Tool For The Visualization Of Network Traffic

VisuSniff: A Tool For The Visualization Of Network Traffic VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University

More information

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute

More information

Improve business agility with WebSphere Message Broker

Improve business agility with WebSphere Message Broker Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching

More information

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

Sybase Unwired Platform 2.1.x

Sybase Unwired Platform 2.1.x white paper Sybase Unwired Platform 2.1.x Development Paradigm www.sybase.com Table of Contents 1 Sybase Unwired Platform 2 Mobile Application Development 3 Mobile Business Object (MBO) Development 5 Mobile

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

Testing WiMAX receiver performance in a multipath propagation environment using Agilent s E6651A with an EB Propsim C8 radio channel emulator

Testing WiMAX receiver performance in a multipath propagation environment using Agilent s E6651A with an EB Propsim C8 radio channel emulator Testing WiMAX receiver performance in a multipath propagation environment using Agilent s E6651A with an EB Propsim C8 radio channel emulator Application Note 1 Summary Introduction As a part of the certification

More information

The K 2 System: Lisp at the Core of the ISP Business

The K 2 System: Lisp at the Core of the ISP Business The K 2 System: Lisp at the Core of the ISP Business Espen J. Vestre Nextra AS 1 Introduction The Nextra Group, a subsidiary of Telenor (the norwegian Telecom), is Norway s largest ISP, with over 400.000

More information

EE984 Laboratory Experiment 2: Protocol Analysis

EE984 Laboratory Experiment 2: Protocol Analysis EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a

More information

ESA s Data Management System for the Russian Segment of the International Space Station

ESA s Data Management System for the Russian Segment of the International Space Station iss data management system ESA s Data Management System for the Russian Segment of the International Space Station J. Graf, C. Reimers & A. Errington ESA Directorate of Manned Spaceflight and Microgravity,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Aspect-Oriented Programming

Aspect-Oriented Programming Aspect-Oriented Programming An Introduction to Aspect-Oriented Programming and AspectJ Niklas Påhlsson Department of Technology University of Kalmar S 391 82 Kalmar SWEDEN Topic Report for Software Engineering

More information

Oracle Data Integrator 12c: Integration and Administration

Oracle Data Integrator 12c: Integration and Administration Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration

More information

Lezione 6 Communications Blockset

Lezione 6 Communications Blockset Corso di Tecniche CAD per le Telecomunicazioni A.A. 2007-2008 Lezione 6 Communications Blockset Ing. Marco GALEAZZI 1 What Is Communications Blockset? Communications Blockset extends Simulink with a comprehensive

More information

Design with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1

Design with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Design with Reuse Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Objectives To explain the benefits of software reuse and some reuse

More information

PIE. Internal Structure

PIE. Internal Structure PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution

More information

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

Verification and Validation of Software Components and Component Based Software Systems

Verification and Validation of Software Components and Component Based Software Systems Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se

More information

SEMS: The SIP Express Media Server. FRAFOS GmbH

SEMS: The SIP Express Media Server. FRAFOS GmbH SEMS: The SIP Express Media Server FRAFOS GmbH Introduction The SIP Express Media Server (SEMS) is a VoIP media and application platform for SIP based VoIP services. SEMS offers a wide selection of media

More information

Application Integration: The Future of Technology in Business

Application Integration: The Future of Technology in Business Application Integration: The Future of Technology in Business ISLANDS OF DATA Over the last twenty years, the trend for businesses has been to base application development on need a new application is

More information