Advantages and functionality
MSTNT networks are built over any channel, be it a dedicated line or the Internet, abstracting routing technologies and physical devices.
MSTN™ technology allows you to create logical connections in which you can control traffic as you want:
to ensure that the order of delivery of isolated packets is kept in line with the checksum.
to create monolithic communication channels from multiple transport IP channels.
to summarize the bandwidth of communication channels, to work through all known types of NATa.
provide the service of an isolated monolithic communication channel from the data-center to connected remote branches.
MSTN technology is designed using a completely new architecture that overcomes all existing shortcomings and limitations of traditional network solutions.
This is a new unique technology for deploying secure distributed data networks that allows you to configure Autonomous Systems that are different in terms of implementation cost (level of investment) but the same in terms of technology and security.
A MSTNT network can be built on top of any data transmission channel, whether it is a dedicated mobile cellular connection or the Internet, abstracting routing technologies and physical devices and encrypting the data packets. MSTNT uses a novel packet header structure and abstracted address details, to route packet traffic across the network independent of the TCP/IP protocol.
MSTNT enables the creation of logical tunnel connections with complete flexibility over the flow of data traffic, while ensuring that the order of delivery of isolated packages is maintained. It enables the creation of monolithic communication channels from multiple transport IP channels, summing up the bandwidth of the individual sub-channels.
To transmit useful data, the MSTP protocol can use an arbitrary number of different physical communication channels (up to 255), referred to as transport sub-channels or sub¬channels.
It runs in the OS core, which gives much better performance compared to other solutions running on the user space level.
Ability to combine multiple channels in the capacity summation mode and/or in the backup mode (hot and cold).
Dynamic port switching in case of UDP session freezing (real WAN networks).
Monitoring the quality of tunnels working in real-time (proprietary designed BTest module).
Availability of built-in effective protection against various types of L2 loops.
UDP / ICMP TUNNELING
The tunnel can work over the UDP and ICMP protocols
The packet fragmentation algorithm is designed to overcome anomalies in the operation of the transport WAN network (Internet).
Own mechanism of network indexes assignment
A proprietary encryption algorithm that allows you to achieve high performance with a low-end processor
Guarantee that packets are still in order (in which order the packets went into the tunnel -in the same order the packets left the tunnel)
Filtering DUP (duplicate) packages.
Automated deployment and operation of secure networks of any scale.
Monitoring and control based on modern Web 2.0 technologies.
Works with all types of NAT