overview - SCALABLE Network Technologies

By: Scalable Networks  09-12-2011
Keywords: Network Traffic


SCALABLE offer a comprehensive suite of Model Libraries that cover an enormous list of protocols and waveforms, including WiFi, sensor networks, cellular, MANET, WiMAX, and satellite. Models are written in C/C++ and are customizable.

The standard Libraries that are available include:
  • Developer Library
  • Wireless Library
  • Multimedia and Enterprise Library
  • Advanced Wireless Library
  • Cellular Library
  • Military Radios Library [1]
  • Propagation Library: ALE/ASAPS
  • Propagation Library: TIREM Interface [2]
  • Propagation Library: Urban
  • Satellite Library
  • Sensor Networks Library
  • Standard Interfaces Library
  • UMTS Library

[1] These libraries are subject to export restriction under the International Traffic in Arms Regulations (ITAR) 22 CFR 120-130. International sales of these modules require authorization from the US Department of State.

[2] These libraries require code from a third party

Applications use the Connection Manager to run their network traffic over a SCALABLE software virtual network. Applications need no modification or customization to integrate with the virtual environment.

Connection Manager supports a large variety of applications such as:
  • Internet browsers
  • Tactical communications
  • Situational awareness information
  • Sensor data
  • Instant messengers
  • VoIP
  • Streaming video
  • Multi-player games

SCALABLE can also interface with Semi-Automated Forces (SAF) or Computer Generated Forces (CGF) via HLA or DIS. SAFs provide a rich environment to represent a full range of operations, systems, and control processes from entity up to brigade level.

Using a standard interface like HLA/DIS, SCALABLE can serve as the communications effects server for a SAF, providing realistic communications.

Keywords: Network Traffic

Other products and services from Scalable Networks

09-12-2011

features - SCALABLE Network Technologies

Dynamically launch cyber warfare features on a software virtual network, including eavesdropping, radio jamming attacks, distributed denial of service attacks, and a variety of attacks detectable with 3rd party network intrusion detection software like snort.


09-12-2011

a-pilot - SCALABLE Network Technologies

You will quickly have the actual hands-on experience to appreciate the resources to implement effective simulation solutions and the benefits of the results. If you have never used simulation software before, it is difficult to appreciate the nuances and subtle elements that make SCALABLE solutions so effective.


09-12-2011

integration - SCALABLE Network Technologies

How do you really learn about equipment before you actually have it?With simulation solutions from SCALABLE.SCALABLE software products enable you to create highly realistic models of both the existing communications network and the new technology, enabling technicians and operations personnel to gain hands-on experience.


09-12-2011

warfare - SCALABLE Network Technologies

Software virtual networks integrated with live physical hardware and software deliver highly realistic scenarios.Simulation becomes a platform to ensure communications readiness. Planning for attacks and counter-attacks, spoofing and intrusions, disruption and degradation. If information is compromised or stolen, missions fail. Warfighters and their supporting organizations. Cyber warfare is subtle and devastating.


09-12-2011

BATTLEFIELD OPERATIONS - SCALABLE Network Technologies

SCALABLE software products enable you to create models of entire battlefield communications environments, and then run simulations of every operational scenario as many times as needed to ensure communications readiness. Before any battle, strategies and tactics are planned, equipment is tested, and personnel are trained to ensure they are prepared for any situation and enemy response scenario that might occur.