Wide area distributed corporate networks have become widespread among companies with a few local offices, as well as companies with multiple branches throughout the country or all over the world.
At its core, the main purpose of any information network is to deliver data (content) to the recipient (user) with a guaranteed quality of services, including bandwidth, delay and allowable limit of delay variation. However, with the current growth in the number of users, applications and the amount of content they consume (traffic), it is becoming increasingly difficult to ensure the quality of network services. The use of legacy technologies to build connections between autonomous systems with different internal routing, technical and logical segments is a major challenge and drawback of global data networks. The consequences are a decrease in the speed of information transmission, the presence of large non-useful data overhead on packets traversing the networks that lead to inefficient use of network bandwidth, significant increase in network delays, lower quality of end user experience, etc.
A computer network administrator today faces multiple challenges with configuring and operating a computer network. This is true whether the administrator is operating the network to support the business of a corporate office, the production and distribution of rich digital media, the transmission of live content from an event, the operation of a voice-over-internet protocol telephone network, a video conference network or any other network of two or more connected devices. The administrator faces the challenges of connecting and managing devices used to transport traffic across the network in a manner that allows for monitoring of the network operation, avoiding loops in the network, maximizing traffic throughput, minimizing latency, reducing jitter, enhancing security, and efficiently updating the network topology and devices in the network. In the case of enterprise networks, support is also required for a diverse range of digital devices: workstations, stationary computers, tablets, mobile phones, video surveillance systems, information kiosks, etc., working on specialized protocols of radio communication, data transmission, and configuration requirements at the physical network device level. From the network administrator’s perspective, all of these different devices that work on different technologies have to be managed centrally, the information on the network must be transmitted encrypted, and the network must be resilient. This process is expensive and time-consuming to the enterprise.
Various solutions have emerged along the way to these networking problems. The virtual private network (VPN) market has been one of the fastest growing data services due to its relevance to the enterprise market (for collaboration applications, private cloud environments, etc.) and its use in the network operator market (in particular, in the construction of network infrastructure during the deployment of LTE and the organization of high-speed connections to provide connections in the data center). But they drive contradictory objectives: the enterprise user seeks to isolate its VPN from VPNs of other enterprises, whereas the network operators are focused on enabling the maximum connectivity across all network by distributing routing protocols such as BGP, OSPF, IS-IS, RIP over its composite information network.
With this mechanism, each network router creates a routing table that shows the path of packages to each of the networks included in the composite network. The provider can abandon the IP protocol to aggregate an enterprise user’s sites alone, through use of other protocols such as frame relay and ATM. But then the ability to provide IP services to the client is lost, which in modern conditions practically devalues the service provided. Providers can of course support different sets of services using different protocols (as many providers do), but this is not the best solution; a mixture of protocols creates a lot of difficulties for both the client and the provider. Complicating this situation is that a network built with components from different manufacturers and services provided by different providers is harder to monitor and manage centrally.
Another popular approach has been the use of multi-protocol switching by tags (MPLS). This approach is an expensive undertaking for an enterprise. In addition, MPLS introduces challenges when trying to connect remote workplace in another country.
More recently, Software Defined WAN (SD-WAN) technology has been developed for more efficient use of communication channels. It uses software-defined networks (SDN) to find the most efficient way to route and manage traffic. SD-WAN solutions vary from vendor to vendor, but most of them support hybrid global networks-dynamic routing of traffic over private and public networks, such as MPLS. A provider can use existing well-known technologies and protocols to implement SD-WAN. SD-WAN has a huge number of advantages over traditional technologies, but also has a sufficient number of disadvantages. All these disadvantages are primarily related to the use of traditional data transfer protocols. Solutions from different SD- WAN providers are not compatible.
This means that changing them freely when necessary is not an easy task. When a user uses an SD-WAN solution, the operator on whose reference network the user is based has difficulty managing the routing of its own network because the user uses its own tunnel routing table created by the SD-WAN solution. This, in turn, leads to a “bottleneck” on the operator’s nodes, and as a result, data transmission is slowed down for both the user and the operator. In addition, users of network data services suffer when there is inadequate data throughput, too much latency or jitter, or potential data vulnerabilities across a computer network. sers can experience long download times for content files, jumpy streaming media experiences, dropped voice phone calls, blurry video images, re-transmission of dropped or affected data packets, and leakage of data (e.g., data about the websites they visit).
Accordingly, there is a need in the art for a fundamentally new logical networking system and a fundamentally new method of processing data packets that can operate using existing physical communication channels and that can guarantee the quality of services (increased data throughput, reduced latency, limited jitter, enhanced data security, support for all devices attached to the network, simplified true end-to-end network configuration and administration, true centralized network monitoring, and reduced cost of network operation), while also improving users’ data experience.
At the same time, communication and information exchange on strategically important objects is possible only through the Internet and IP technologies.
The HeliX™ network platform based on MSTN technology has a ready-made solution to this problem – the Autonomous Traffic Management System (AS), which allows you to spend network resources efficiently, while having all the necessary tools to manage and monitor, diagnose and control all the processes occurring in the network, both by the user and by the operator or provider.
MSTN technology is designed using a completely new architecture that overcomes all existing shortcomings and limitations of traditional network solutions.
This is a new unique technology for deploying secure distributed data networks that allows you to configure Autonomous Systems that are different in terms of implementation cost (level of investment) but the same in terms of technology and security.
A MSTNT network can be built on top of any data transmission channel, whether it is a dedicated mobile cellular connection or the Internet, abstracting routing technologies and physical devices and encrypting the data packets. MSTNT uses a novel packet header structure and abstracted address details, to route packet traffic across the network independent of the TCP/IP protocol. MSTNT enables the creation of logical tunnel connections with complete flexibility over the flow of data traffic, while ensuring that the order of delivery of isolated packages is maintained. It enables the creation of monolithic communication channels from multiple transport IP channels, summing up the bandwidth of the individual sub-channels.
To transmit useful data, the MSTP protocol can use an arbitrary number of different physical communication channels (up to 255), referred to as transport sub-channels or sub¬channels.
Using the AS, corporate subscriber devices in the remote branch office send traffic to other devices through a tunnel organized by MSTNT protocols over networks from multiple ISPs.
The AS is managed centrally using cloud technologies, which simplifies the delivery of WAN services to remote offices and allows real-time assessment of the quality of tunnels and their load with useful data.
The management and monitoring system allows network administrators to centrally manage the network, configure, and monitor communication channels in real-time.
If the operator’s transport network is overloaded, the AS redirects traffic to less overloaded segments of the network, thus providing widespread access, improved capacity, and lower cost.
In combination with hot redundancy and protection against data corruption in the event of a hardware or channel failure, the AS allows packets to be delivered in another shortest possible way. In doing so, the monitoring system immediately alerts the personnel responsible for the problem network segment and provides the collected data about the failure.
Using the HeliX™ platform makes it possible to avoid a “bottleneck” by using reflectors in your network that dynamically redirect traffic along the best path.
Even when using a loss communication channel, MSTN technology can significantly improve communication quality: remove losses and minimize jitter.