features - SCALABLE Network Technologies

By: Scalable Networks  09-12-2011
Keywords: Network Traffic

SCALABLE software has been deployed to thousands of users running millions of simulations for over ten years, so the feature set is rich and robust. Some key features are described below, but the best way to appreciate the impact of SCALABLE solutions on communications readiness is to set up a live pilot and run simulations yourself.


SCALABLE software features an easy drag-and-drop GUI to build network topologies, and advanced editors to allow fine-grained design of devices and networks.

A comprehensive library of pre-built device models like routers, switches, hubs, ATM, wireless access points, base stations, and mobile equipment is available, and the Device Model Editor lets you build custom communication devices if desired.

You run simulations with full control in 2D and 3D. Visualization Controls allow you to monitor progress and control per-layer & per-event animation.



The SCALABLE Analyzer has powerful analysis and debugging tools that allow you to get to the bottom of network problems.

You can monitor the values of an important parameter, or view dynamic graphs of critical performance indicators like 'received signal strength' or 'uplink/downlink bandwidth'.
SCALABLE also provides the flexibility to build customized key performance indicators (KPIs).

Dynamically launch cyber warfare features on a software virtual network, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd party network intrusion detection software (NIDS) like snort.

Attacks can be targeted on specialized networks like wireless, wired, mobile ad-hoc (MANET) and tactical networks. Users can then analyze their impact on the network itself, applications and end-users.


A toolkit with models that encrypt, authenticate, manage key distribution and certificates, create wormhole attacks, route securely, and mimic adversaries. A number of models have been created from the latest research in network security.

The library can be extended to develop new attacks, network intrusions and counter measures.


Simulations can run using just virtual devices (in a software virtual network) or can run in mixed mode, integrating the virtual environment with live physical hardware and software.

Applications, with no modification or customization, use Connection Manager to run their network traffic over the software virtual network.

Keywords: Network Traffic

Other products and services from Scalable Networks

09-12-2011

overview - SCALABLE Network Technologies

SCALABLE offer a comprehensive suite of Model Libraries that cover an enormous list of protocols and waveforms, including WiFi, sensor networks, cellular, MANET, WiMAX, and satellite. Using a standard interface like HLA/DIS, SCALABLE can serve as the communications effects server for a SAF, providing realistic communications. Applications use the Connection Manager to run their network traffic over a SCALABLE software virtual network.


09-12-2011

a-pilot - SCALABLE Network Technologies

You will quickly have the actual hands-on experience to appreciate the resources to implement effective simulation solutions and the benefits of the results. If you have never used simulation software before, it is difficult to appreciate the nuances and subtle elements that make SCALABLE solutions so effective.


09-12-2011

integration - SCALABLE Network Technologies

How do you really learn about equipment before you actually have it?With simulation solutions from SCALABLE.SCALABLE software products enable you to create highly realistic models of both the existing communications network and the new technology, enabling technicians and operations personnel to gain hands-on experience.


09-12-2011

warfare - SCALABLE Network Technologies

Software virtual networks integrated with live physical hardware and software deliver highly realistic scenarios.Simulation becomes a platform to ensure communications readiness. Planning for attacks and counter-attacks, spoofing and intrusions, disruption and degradation. If information is compromised or stolen, missions fail. Warfighters and their supporting organizations. Cyber warfare is subtle and devastating.


09-12-2011

BATTLEFIELD OPERATIONS - SCALABLE Network Technologies

SCALABLE software products enable you to create models of entire battlefield communications environments, and then run simulations of every operational scenario as many times as needed to ensure communications readiness. Before any battle, strategies and tactics are planned, equipment is tested, and personnel are trained to ensure they are prepared for any situation and enemy response scenario that might occur.