Our solution is named ‘JACS’ or ‘Just another Communications Stack’
It aims to change the way data networks currently work.
Unlike the current IPv4 (already exhausted) and IPv6 centralized addresses allocation, constrained to only Service Providers / Carriers, incurring highly maintenance / renewal fees and having lots of security flaws and issues; JACS provides a decentralized Internet address allocation with almost unlimited address abundance, no renewal fees and extremely higher levels of security than IPv4 & IPv6. …
The most important thing about the difference between VPN and remote desktop solution is that they are functionally different. There are other differences, like security vulnerabilities and levels of flexibility and control, but understanding each will help you decide which solution is best.
VPN stands for Virtual Private Network. Essentially, a VPN creates a smaller, private network on top of a larger public network — most commonly the public Internet. The VPN can have specific settings and allow for more shared access among the devices connected to it.
A VPN also allows applications that only work on local networks to…
Intranets and VPN are two technologies that are commonly used in business environments. It is important to note though that while Intranet is just a term that is used to describe an internal network that simulates the Internet while VPN, which stands for Virtual Private Network, is one methodology used to remotely connect to a network as if you are connected locally.
An Intranet is just a local network that utilizes the same technologies that the Internet does (i.e. HTTP, SMTP, FTP) in order to simplify things and make it a lot easier for members of the organization to access…
As a business grows, it might expand to multiple locations nationwide or even worldwide. To keep things running efficiently, people working in the remote locations need a fast, secure and reliable way to share information across computer networks. Telecommuters need an equally secure and reliable way to connect to their main business’s computer network from remote locations. Even while on leisure, people want to keep their computers safe when on an unfamiliar or unsecured network.
One popular technology to accomplish these goals is a VPN or Virtual Private Network. A VPN is a private network that uses a public network…
In BLAN; the idea is that the control plane operation of VxLAN can be achieved via the blockchain technology.
In this mode, the VxLAN VTEPs are also nodes of a public or private blockchain (as in Figure-2 below). Note that there is also the option to replace blockchain with a DAPP (Decentralized Application) that runs over a blockchain platform, but let’s stick to the blockchain option here.
It’s worth noting that a private blockchain — as opposed to a public blockchain — is much faster, cheaper and respects the organization’s privacy.
The local MAC learning technique is still the same…
In this mode; there is no need for the IP Multicast in the underlay transport network; for any traffic that would require to be sent to all VTEPs (like Broadcast or Multicast); the head-end replication will be used instead (as the previous modes)
Dealing with the Unknown Unicast traffic is what really differentiates this mode of operation from the previous modes. In this mode, a ‘Control-Plane’ does exist to distribute the MAC-to-VTEP mapping entries between the different VTEPs, hence no need for any data-plane learning technique (like flood & learn).
This control plane piece could be a Controller (like…
JACS is based on BLAN ‘Blockchain Local Area Network’ as the transport mechanism for the native JACS traffic between the different JACS sites and locations (i.e. Adopters’ sites, JACS public cloud…)
BLAN is the result of integrating blockchain with VxLAN.
As its name indicates, Virtual eXtensible Local Area Network VxLAN is designed to provide the same Ethernet Layer 2 network services as VLAN does, but with greater extensibility and flexibility. Compared to VLAN, VxLAN offers the following benefits:
• Flexible placement of multitenant segments throughout a data center, private or public cloud: It provides a solution to extend Layer 2…
Inside JACS platform; it is going to follow the GOSIP version 2 structure in terms of overall structure as well as treating the last 7 octets of the NSAP address as 6 octets ID and 1 last octet as the NSEL.
This leaves 13 octets prefix that JACS can manipulate for further NSAP addresses allocations.
JACS is starting from a clean slate in terms of NSAP addressing, so the abundance of addresses and the precise allocation scheme will reflect on a state-of-the-art allocation that is perfectly future and depletion proof.
Note: Unlike any previous specification of the NSAP address as…
By looking at the NSAP structure from GOSIP Version 2, we find that the AFI, IDI, DFI and AA fields provide for administrative decentralization. The AFI/IDI pair of values 47.0005 identify the US Government as the authority responsible for defining the DSP structure and allocating values within it
In addition to GOSIP Version 2 authority under 47.0005, there also existed the ANSI format under the Data Country Code for the US (DCC=840) as well as formats assigned to other countries and ISO members.
There were some cases, where an entity would prefer to use a country- or area- specific format…
The NSAP Address is formally defined in ISO/IEC 8348. It is the name of a Network Service Access Point (NSAP) located in an End System, and uniquely identifies that NSAP.
From a routing perspective (as in ISIS ‘Intermediate System to Intermediate System’ routing protocol for instance); ISO addresses are generally subdivided into:
• Area address
• System identifier (ID)
• NSAP selector (SEL)
The area address identifies both the routing domain and the area within the routing domain. Generally, the area address corresponds to the IDP plus a high-order part of the DSP (HO-DSP) as detailed below:
The ID field…
JACS ‘Just Another Communications Stack’ aims to change the way data networks currently work.