SCALABLE software has been deployed to thousands of users running millions of simulations for over ten years, so the feature set is rich and robust. Some key features are described below, but the best way to appreciate the impact of SCALABLE solutions on communications readiness is to set up a live pilot and run simulations yourself.
SCALABLE software features an easy drag-and-drop GUI to build network topologies, and advanced editors to allow fine-grained design of devices and networks.
A comprehensive library of pre-built device models like routers, switches, hubs, ATM, wireless access points, base stations, and mobile equipment is available, and the Device Model Editor lets you build custom communication devices if desired.
You run simulations with full control in 2D and 3D. Visualization Controls allow you to monitor progress and control per-layer & per-event animation.
The SCALABLE Analyzer has powerful analysis and debugging tools that allow you to get to the bottom of network problems.
You can monitor the values of an important parameter, or view dynamic graphs of critical performance indicators like 'received signal strength' or 'uplink/downlink bandwidth'.
SCALABLE also provides the flexibility to build customized key performance indicators (KPIs).
Dynamically launch cyber warfare features on a software virtual network, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd party network intrusion detection software (NIDS) like snort.
Attacks can be targeted on specialized networks like wireless, wired, mobile ad-hoc (MANET) and tactical networks. Users can then analyze their impact on the network itself, applications and end-users.
A toolkit with models that encrypt, authenticate, manage key distribution and certificates, create wormhole attacks, route securely, and mimic adversaries. A number of models have been created from the latest research in network security.
The library can be extended to develop new attacks, network intrusions and counter measures.
Simulations can run using just virtual devices (in a software virtual network) or can run in mixed mode, integrating the virtual environment with live physical hardware and software.
Applications, with no modification or customization, use Connection Manager to run their network traffic over the software virtual network.