Multi Service Tunnel Network Technology

is an implemented concept of the intelligent software-defined networks.

MSTNT — a platform transforming global networks

Multi-service tunneling network technology (MSTNT) is a unique technology for building autonomous protected distributed data networks.

Kernel Based Performance

Advantages and functionality

MSTNT networks are built over any channel, be it a dedicated line or the Internet, abstracting routing technologies and physical devices.
MSTN™ technology allows you to create logical connections in which you can control traffic as you want:
to ensure that the order of delivery of isolated packets is kept in line with the checksum.
to create monolithic communication channels from multiple transport IP channels.
to summarize the bandwidth of communication channels, to work through all known types of NATa.
provide the service of an isolated monolithic communication channel from the data-center to connected remote branches.

Use of Bandwidth

MSTN technology is designed using a completely new architecture that overcomes all existing shortcomings and limitations of traditional network solutions.
This is a new unique technology for deploying secure distributed data networks that allows you to configure Autonomous Systems that are different in terms of implementation cost (level of investment) but the same in terms of technology and security.
A MSTNT network can be built on top of any data transmission channel, whether it is a dedicated mobile cellular connection or the Internet, abstracting routing technologies and physical devices and encrypting the data packets. MSTNT uses a novel packet header structure and abstracted address details, to route packet traffic across the network independent of the TCP/IP protocol.
MSTNT enables the creation of logical tunnel connections with complete flexibility over the flow of data traffic, while ensuring that the order of delivery of isolated packages is maintained. It enables the creation of monolithic communication channels from multiple transport IP channels, summing up the bandwidth of the individual sub-channels.
To transmit useful data, the MSTP protocol can use an arbitrary number of different physical communication channels (up to 255), referred to as transport sub-channels or sub¬channels.

The management and monitoring system allows network administrators to centrally manage the network, configure, and monitor communication channels in real-time.
If the operator’s transport network is overloaded, the AS redirects traffic to less overloaded segments of the network, thus providing widespread access, improved capacity, and lower cost.

In combination with hot redundancy and protection against data corruption in the event of a hardware or channel failure, the AS allows packets to be delivered in another shortest possible way. In doing so, the monitoring system immediately alerts the personnel responsible for the problem network segment and provides the collected data about the failure.

The AS is managed centrally using cloud technologies, which simplifies the delivery of WAN services to remote offices and allows real-time assessment of the quality of tunnels and their load with useful data.

operation under emergency situations

Using the MSTNT makes it possible to avoid a “bottleneck” by using reflectors in your network that dynamically redirect traffic along the best path.

PERFORMANCE

It runs in the OS core, which gives much better performance compared to other solutions running on the user space level.

SUMMATION

Ability to combine multiple channels in the capacity summation mode and/or in the backup mode (hot and cold).

DYNAMIC RING

Dynamic port switching in case of UDP session freezing (real WAN networks).

TUNNELS MONITORING

Monitoring the quality of tunnels working in real-time (proprietary designed BTest module).

LOOP PROTECTION

Availability of built-in effective protection against various types of L2 loops.

UDP / ICMP TUNNELING

The tunnel can work over the UDP and ICMP protocols

FRAGMENTATION

The packet fragmentation algorithm is designed to overcome anomalies in the operation of the transport WAN network (Internet).

SECURITY

Own mechanism of network indexes assignment

ENCRYPTION

A proprietary encryption algorithm that allows you to achieve high performance with a low-end processor

INTEGRITY

Guarantee that packets are still in order (in which order the packets went into the tunnel -in the same order the packets left the tunnel)

DUP FILTERING

Filtering DUP (duplicate) packages.

AUTOMATION

Automated deployment and operation of secure networks of any scale.

CONTROL SYSTEM

Monitoring and control based on modern Web 2.0 technologies.

NAT SUPPORT

Works with all types of NAT

Monitoring and Management System

The Monitoring and Management System provides the best in the industry manageability, devicesupport, and networks calability. It includes unique tools for tunnel operation monitoring and network automation elements.

LEARN MORE