XIPLink User Guide XIP OS
XIPLink User Guide XIP OS
User Manual
Table of Contents
1. XipLink Optimization Technology Overview ....................................................................... 1
1.1. Introduction ......................................................................................................... 1
1.2. Background ......................................................................................................... 2
1.3. The XipLink Advantage ........................................................................................ 2
1.3.1. Protocol Acceleration .................................................................................. 3
1.3.2. Advanced Compression ............................................................................... 3
1.3.3. Internet Optimization .................................................................................. 3
1.3.4. Security .................................................................................................... 4
1.3.5. Quality of Service ...................................................................................... 4
1.3.6. XipOS ..................................................................................................... 4
1.4. Supported Capabilities ........................................................................................... 4
1.4.1. TCP Acceleration Techniques ...................................................................... 4
1.4.2. UDP Acceleration Techniques ...................................................................... 4
1.4.3. Compression and Application Acceleration ..................................................... 5
1.4.4. Tunnelling Options ..................................................................................... 5
1.4.5. Network Appliance Benefits ........................................................................ 5
1.4.6. Standards Support and Interoperability ........................................................... 5
1.4.7. RFC and TCP Enhancements Support ............................................................ 6
1.5. Document Overview ............................................................................................. 6
1.5.1. Conventions used in this Manual .................................................................. 7
2. Quick Start - XA Series ................................................................................................... 8
2.1. Unpacking and Box Contents ................................................................................. 8
2.2. Placing the Optimizer in the Network ...................................................................... 8
2.2.1. Physical Connections .................................................................................. 9
2.3. Accessing the XipOS Web User Interface ............................................................... 10
2.4. Login ................................................................................................................ 10
2.5. XipLink Setup Wizard ......................................................................................... 11
2.5.1. Welcome ................................................................................................ 11
2.5.2. Select Deployment Options ........................................................................ 12
2.5.3. Configure Network Interfaces ..................................................................... 13
2.5.4. Configure DNS ........................................................................................ 15
2.5.5. Configure Networks .................................................................................. 15
2.5.6. Set Password ........................................................................................... 17
2.5.7. Apply Changes To Device Configuration ...................................................... 17
3. Understanding XipLink Optimization ................................................................................ 18
3.1. Dynamic Transparent Negotiation of Optimization Capabilities ................................... 18
3.2. SCPS Protocol Acceleration .................................................................................. 19
3.3. XipLink Transport Control (XTC) Modes ............................................................... 20
3.3.1. XTC - Fixed Rate Control Mode ................................................................. 20
3.3.2. XTC - Dynamic Rate Control Mode ............................................................ 21
3.3.3. XTC - Programmable Fixed Rate Control Mode ............................................. 22
3.3.4. XTC - Enhanced TCP Mode ...................................................................... 22
3.4. Additional TCP Protocol Acceleration Techniques .................................................... 22
3.4.1. TCP Connection Fast Start ......................................................................... 22
3.4.2. Acknowledgement Frequency Reduction (AFR) ............................................. 23
3.4.3. Selective Negative Acknowledgments .......................................................... 23
3.4.4. Quality of Service .................................................................................... 24
3.4.5. Streaming Data Compression ...................................................................... 26
3.4.6. XipOS Tunnelling .................................................................................... 28
3.5. XipLink Hub Optimizations .................................................................................. 28
3.5.1. XiPix Image Compression ......................................................................... 29
3.5.2. HTTP Compression .................................................................................. 29
iii
XipOS
iv
29
31
31
31
32
32
33
34
40
40
40
41
41
42
42
42
42
42
43
43
43
44
45
45
47
48
50
51
52
53
54
55
57
59
62
62
64
70
73
76
79
80
83
83
83
84
85
86
87
88
91
92
94
95
XipOS
List of Figures
1.1. XipLink Interoperability between devices ......................................................................... 1
1.2. XipOS ........................................................................................................................ 2
2.1. Placement of the Optimizer ............................................................................................ 8
2.2. XA-500 ...................................................................................................................... 9
2.3. XA-2000 ..................................................................................................................... 9
2.4. XA-4000 | XA-10K ..................................................................................................... 9
2.5. XA-30K ...................................................................................................................... 9
3.1. Dynamically negotiated optimization .............................................................................. 18
3.2. Unoptimized connections using standard TCP .................................................................. 19
3.3. XTC Fixed Rate Control ........................................................................................... 20
3.4. XTC - Dynamic Rate Control Mode .............................................................................. 21
3.5. XTC - Programmable Fixed Rate Control Mode ............................................................... 22
3.6. TCP Connection Fast Start ........................................................................................... 23
3.7. AFR and Selective Negative Acknowledgments ............................................................... 24
3.8. QoS Re-Prioritizes Traffic ............................................................................................ 25
3.9. Streaming Data Compression ........................................................................................ 27
3.10. Compression Samples ................................................................................................ 28
3.11. XRT Packet Coalescing .............................................................................................. 30
3.12. Basic Single Interface Mode WCCP Deployment ............................................................ 33
3.13. Basic Router Mode WCCP Deployment ........................................................................ 33
3.14. WCCP Hub Deployment ............................................................................................ 34
3.15. WCCP Service Groups ............................................................................................... 35
3.16. Bridge at remote - Router at hub ................................................................................. 41
4.1. Router Mode Redundancy Setup ................................................................................... 60
5.1. Router Mode Redundancy Setup ................................................................................... 96
5.2. Bridge Mode Redundancy Setup ................................................................................... 97
5.3. Fail-to-wire Diagram ................................................................................................... 97
vi
List of Tables
1.1. SCPS-TP Capabilities .................................................................................................... 5
1.2. HTTP RFC's ................................................................................................................ 5
2.1. Factory default IP addresses ......................................................................................... 10
3.1. XRT: Benefit of Coalescing Multiple Streams .................................................................. 30
3.2. XRT: Effect of Different Capture Window Sizes .............................................................. 30
4.1. Differences Between Router, Bridge and Single Interface Modes ......................................... 46
4.2. XipOS SNMP Traps .................................................................................................... 56
11.1. XipLink XA Product Matrix ...................................................................................... 118
vii
List of Examples
4.1.
9.1.
9.2.
9.3.
9.4.
viii
The challenges of wireless optimization for satellite and terrestrial communication links are significantly
different from traditional WAN optimization controllers or application accelerators:
Wireless is a medium that experiences much higher latency and loss.
The price per bit on wireless links, especially over satellites, is much higher.
The ROI on improved use of the capacity is short, often measured in months.
XipLink Optimization
Technology Overview
1.2. Background
XipLink Optimization Software algorithms originate with aerospace research originally intended to
increase the communications throughput between spacecraft and the Earth. It was quickly recognized that
these same techniques work equally well when optimizing the complete end-to-end wireless link from
ground station to ground station. Researchers were also pleasantly surprised by the fact that the techniques
had virtually no negative effects on traditional TCP-based applications.
This pioneering work resulted in standards from NASA and other space agencies collectively
called the Space Communications Protocol Specification (SCPS) and, subsequently a standard named
Interoperable Performance Enhancing Proxy (I-PEP). The SCPS (pronounced skips) specification
combines recommendations for the use of several standard IETF TCP enhancements as well as methods
for the dynamic and transparent negotiation of options like special TCP acknowledgement schemes
and data compression. The I-PEP standard, which builds on SCPS, is designed specifically for satellite
communication profiles but also enables the negotiation of innovative vendor proprietary algorithms. This
was a primary intention of the standard, and remains a key to its continued use and recent compliance
mandates by the U.S. Department of Defense.
While the IETF has introduced some standards for TCP improvement over the years, the SCPS based
protocol, along with specialized wireless optimization algorithms originally designed by vendors for
space communications, continue to deliver the most advanced wireless optimization capabilities available
today. These same algorithms continue to find greater and greater use in commercial and military VSAT
applications and function equally well over space segments and terrestrial wireless links.
XipLink Optimization
Technology Overview
XipLink Optimization
Technology Overview
additional remote units although deploying a SCPS enable remote will provide further acceleration and
optimization benefits.
1.3.4. Security
XipOS includes a basic firewall to protect your network from possible attacks, allowing you to specify
port and/or address ranges that you want to allow or block. The network behind a XipOS device can also
be protected via NAT.
1.3.6. XipOS
XipOS encapsulates all the above components and offers multiple forms of management and monitoring
through a secure web interface, SSH and SNMP.1
XipOS is the foundation of all XipLink products, ensuring transparency and interoperability between
XipLink devices or with any other SCPS-compliant I-PEP device.
XipLink Optimization
Technology Overview
Title
RFC 1945
XipLink Optimization
Technology Overview
RFC
Title
RFC 2616
XipLinks HTTP Acceleration and data compression are proprietary algorithms. Refer to the Whitepaper
Internet Over Satellite Optimization with XipLink for further information.
Title
RFC 793
RFC 1122
RFC 1191
RFC 1323
RFC 1644
RFC 2018
RFC 2338
RFC 2488
RFC 2581
RFC 2582
RFC 2988
RFC 3135
RFC 3390
RFC 3782
Chapter 9 Support.
Explains how to contact XipLink's support department, or return a defective
device. Also contains a list of frequently asked questions.
XipLink Optimization
Technology Overview
An important note contains critical information that must be followed in order for your XipLink
device to function.
Failure to heed a warning could result in a severe disruption in your network.
Unaccelerated passing through the optimizer from the LAN is proxied, compressed and accelerated then
forwarded over Wireless interface. Any accelerated traffic arriving on the Wireless side is decompressed
and then passed back to the LAN. It is important to ensure that the LAN side is always connected to either
the Router or Bridge interfaces, and that the wireless equipment is connected to the Wireless interface,
otherwise network throughput will be degraded or disrupted.
Other deployment options, including out-of-path configurations, are possible. See the section on Web
Cache Communication Protocol for scenarios that rely on certain Cisco routers, or contact XipLink for
other possibilities.
IP
Netmask
Management
172.16.1.200
255.255.255.0
Wireless
10.0.0.200
255.255.255.0
Bridged
Not Configured
Router
192.168.1.200
255.255.255.0
It is recommended that you initially connect to the device through the Management interface. This will
allow you to configure the device's main network settings without having to reset your PC's IP address. To
allow for minimum downtime, you may configure the device prior to installing it in-line on your network.
Steps to take
Connect your PC to the management interface, either via a network or direct LAN cable.
Reconfigure your PC/Laptop to any IP address on the 172.16.1.0/24 subnet (except 172.16.1.200, which
is the device's default IP address). For example, use IP address 172.16.1.1 and netmask 255.255.255.0.
Please refer to your PC operating system's instructions on how to configure your PC's IP address.
Open your web browser and point it to http://172.16.1.200/
For Crypto versions you will need to connect via a secure https connection on using
https://172.16.1.200.
2.4. Login
Use the factory default user name and password to log in.
User Name: admin
Password: xiplink
If the login is successful you will be presented with the Quick Config Wizard welcome screen.
10
2.5.1. Welcome
Welcome and thank you for purchasing our XipLink product. Here you will be able to view and accept
the license agreement. Please complete the required registration information before accepting the license
agreement.
Agreement accepted by
Supply the name of the user who has accepted this license.
From organization
Supply the name of the organization to which this license is granted.
11
Serial number
This is the software serial number of your XipOS installation. It is different than the hardware serial number
of the device.
On-Line Registration
Only Visible once agreement is accepted
Please register this unit as on-line registration assists us in supporting your device and enables us to send
you notification of any future software updates.
Should you not have Internet access when first configuring the device, you may register the device any
time by returning to this page and selecting On-Line Registration.
The deployment options specify the network topology in which this device is going to be used. To complete
this section, you will need to know where and how this device will form part of your network: which
IP addresses to use and preferably some form of network diagram. Please see the section Installation
Flexibility for detailed information on this topic.
12
Management Interface
The Management interface on the device can be configured to act either as a management interface or as
a hybrid RX/TX interface. The selection here depends on your particular deployment requirements:
Select the "Use as additional (management) interface" option when the Management interface will be used
to manage the device. Typically this is used for out-of-band management, to ensure that management
traffic is separate from routed traffic for security reasons. SNMP monitoring and traps are often sent via
this interface to a central Network Monitoring System.
Select the "Hybrid" option when you have two separate wireless channels, one for transmitting (TX) and
once for receiving (RX). This is typically used for a remote deployment where you will have a dedicated
SCPC transmission channel and a broadband shared downlink DVB channel. Terminating both channels
in a single XipOS device does away with any requirement for an additional upstream router.
Hub or Remote
Is the unit deployed at a hub site that communicates with many remote XipLink devices, or is it deployed
at a remote end point and only communicates with one other XipLink device? If XipLink devices are
deployed on both sides of this device, you need to select Hub/Mesh.
Device name
For ease of reference and administration, you should configure a unique name for this device. This name
is displayed in the web UI, allowing visual confirmation of the device being configured.
The name of the device must consist solely of alphanumeric characters without spaces or punctuation.
13
Wireless interface. This interface always faces your wireless equipment. Accelerated/compressed
traffic arrives on this interface to be de-compressed and forwarded to its final destination on the Routed
interface.
Routed interface.
Wireless interface.
Management interface. This interface is primarily used for out-of-band management of the device.
It allows you to reconfigure the primary interfaces without having to concern yourself with losing your
connection to the device. Should you use a separate management network, you can reconfigure this
interface to use a specific IP address on the management subnet. This allows you to manage and monitor the
device through this interface without interfering with the core routed traffic. Firewall configurations can
also prevent any management traffic through the main Wireless or Routed interfaces, thereby providing
an additional level of security to the device.
Address Type
Static.
DHCP.
None.
Assign a fixed IP address to this interface. You also need to supply the netmask.
Obtain an IP address from a DHCP server on this interface's network.
Assign no IP address to this interface. This is only useful when the device is in Bridge mode.
Media
Defines the type of media that is connected to the Ethernet interface. The default is autoselect, which
should work in most environments. If you connect the device to any network equipment that is manually
configured, the auto-detection may not always work. It is then best to manually configure the media type
to avoid conflicts.
VLAN
This setting allows you to bind this interface to a particular VLAN
14
Default gateway
The default gateway is the exit and entry point in a particular network subnet. All traffic that is destined
for another network will be routed via this Gateway IP address.
The Domain Name System (DNS) translates domain names meaningful to humans into IP addresses that
can be routed across the network. It is an IP address directory, similar to a telephone directory, that holds
all the domain name to IP address translations.
DNS Servers
Here you need to configure the primary and secondary DNS server IP's that are reachable from this
particular device.
Domain
You can also supply a default domain name. The device will use this domain to resolve "unqualified" host
names (i.e. names without a '.' in them). This setting is optional and rarely needed.
15
This section allows you to configure the device with the basic characteristics of the Wireless interface's
link. Please see the section on the Networks tab to fine tune the configuration for your environment.
Link Properties
Click the Edit Link Properties button to configure your wireless link's properties. You can also edit the
properties of the "Unassigned" link, which is a catch-all for traffic that the optimizer does not accelerate.
Normally the "Unassigned" link has the same properties as the wireless link.
The Maximum Transmit Bandwidth is the maximum speed at which the device will transmit data over
the link, while the Maximum Receive Bandwidth is the expected maximum speed that the device will
receive data from the link.
Bandwidth and rate values must be specified with a unit:
Mb = 1,000,000 bits per second
Kb = 1,000 bits per second
b = 1 bit per second
These values can only be integer numbers (without commas); decimal points are ignored.
The Link Round Trip Time is the total amount of time (in milliseconds) it takes for a packet to travel
over the link in both directions. This critical value is used by the Rate Control algorithms and also ensures
that sufficient buffer space is allocated to manage inflight data.
Network Properties
Select Standalone hub deployment if your optimizer is to be deployed as a pure XHO hub (i.e. without a
remote XipOS device). Selecting this option disables SCPS acceleration and TCP-level compression. The
optimizer still proxies all TCP connections, but only applies XHO optimizations to HTTP connections.
If you have a hub where some sites have a remote XipOS device and others do not, you can override this
setting on a per-site basis using a QoS queue for each site and configuring specific TCP optimizations on
the Service Assignment tab.
If your optimizer is a pure XHO hub, only select Adjust settings for an external Optimizer/PEP if
you have an upstream Performance Enhancing Proxy (PEP) installed between this optimizer's Wireless
interface and the wireless transmission equipment. This is required for any PEP that creates spoofed
connections, such as a web cache.
The 'Wireless' ethernet max speed setting controls the maximum speed of traffic on the Wireless
interface. This is typically the speed at which the interface syncs to its switch. For example, set this to
1000Mb for 1000BaseTX Ethernet media.
16
17
The SCPS TCP options underlying optimization negotiation can be routed over any Layer 3 IP network.
This is a key underlying principle in the XipLink system architecture, and allows XipLink to deliver
optimization to users across any network topology without the need for awkward network configuration
such as tunnels:
TDMA satellite networks
Point-to-point and point to multi-point networks
Hub and Spoke networks
Mesh networks
18
19
Dynamic window scaling. Algorithms that scale TCP windows with network load, removing any
artificial limits on communication capacity.
Large windows. Uses buffers that are larger than those of other devices in the network, ensuring that
additional latency is not introduced.
Fixed Rate Control mode is perfectly suited to both ends of a dedicated link like Single Channel Per Carrier
(SCPC) space segments, but can also be used on both ends of stable TDMA or even DVB-RCS networks.
20
In licensed or unlicensed terrestrial networks this algorithm is always recommended at the hub site and
can often be used at remote sites in stable point-to-point networks such as those served by a CPE device
and good antenna.
Fixed Rate Control mode is infrequently used in mobile devices due to the constantly changing signal-tonoise ratio (SNR) these devices encounter as they roam. Even when operating in a licensed spectrum, the
very nature of a roaming mobile device and their limited RF power budgets make the bandwidth appear
dynamic.
Dynamic Rate Control mode is recommended when the available bandwidth is unknown or varies widely,
often on dynamic TDMA or DVB-RCS networks, particularly at the remote sites. While not as effective
at completely filling a stable link, in many wireless devices it is more important to constantly and quickly
adjust the transmission rate for maximum capacity.
Dynamic Rate Control mode is also an alternative for links where a traffic shaper may exist in the path
between two XipLink optimizers. The traffic shaper's policing would work against Fixed Rate Control
mode, dropping optimized traffic that may appear on the network as an aggressive TCP sender holding
a very high data rate.
21
Full performance on dynamic bandwidth links can be achieved using this mode, but Programmable Fixed
Rate Control mode requires software integration within an embedded system or external integration using
the XipLink API. As such, this mode is only available with specific devices that support this capability.
Programmable Fixed Rate Control mode can operate both at coarse intervals, as when a ship changes
satellites as it moves across an ocean, and also very rapidly (sub-second) when tightly coupled with a
device that aggressively monitors the available bandwidth.
22
Without TCP fast start, an application has to wait for setup request and acknowledgement to traverse the
slow wireless link before sending any data.
A typical Internet user with a standard web browser may open several connections to many servers for
each web page viewed. TCP fast start can significantly decrease the time needed for a page to load, and
will also greatly reduce the amount of contention on the wireless network by decreasing the number of
packets sent and reducing the overall bandwidth consumed.
XipLinks fast start is based on our efficient implementation of IETF RFC 1644. Traditional TCP uses
a 3-way handshake before data transmission can begin. If we consider a minimum second delay in
each direction, just establishing a TCP connection to a server could require over a second, even before
requesting the first bits of data. The benefits of TCP fast start are most apparent when multiple connections
are used together in sequence, such as with HTTP and other client-server applications.
23
efficient than Selective Acknowledgement (SACK) and is more effective against the multiple losses that
are common with wireless interference.
SNACK is an important component of TCP protocol optimization in satellite and terrestrial wireless
networks because the higher error rates experienced over wireless links magnify the effects of high latency
on retransmissions.
24
hungry applications such as P2P or bulk file downloads to overwhelm the link and prevent the timely
delivery of streaming or interactive protocols. These problems are compounded on links with high roundtrip times.
QoS also helps a hub site deal fairly with multiple remote "spoke" sites when each remote site can have its
own downlink rate that differs from the hub site's uplink rate. With QoS you can configure the hub with
a fixed maximum transmission rate for each remote site. This in turn allows each remote site to apply its
respective downlink rate without causing congestion and limiting bandwidth to other remote sites.
QoS only applies priorities and shaping to traffic transmitted over the wireless link from the
XipLink optimizer. The device has no way to control the rates at which it receives data (aside
from standard TCP congestion control mechanisms, which do not differentiate types of traffic).
QoS is therefore normally applied on both devices on either side of the wireless link to control
how each device transmits data.
The parent-child relationships between queues define how bandwidth is allocated among the queues. A
queue cannot reserve more bandwidth that what has been reserved by its parent.
Each childless (or "leaf") QoS queue is associated with a firewall rule that defines what kind of traffic
the queue controls.
The order of firewall rules is critical to successfully applying QoS.
One of the childless queues must be designated as the default queue. The default queue shapes all traffic
that does not match any other queue. The default queue is the only leaf queue not explicitly associated
with a firewall rule.
25
26
continuous compression on the entire stream of data for each on-going connection, taking advantage of
the streaming nature of TCP.
Stream-based compression is superior to other payload compression strategies that compress data within
individual IP packets. These older per-packet compression algorithms yield lower compression ratios and
do not reduce the overall number of packets needed to send the compressed information.
XipOS stream compression algorithms are tuned to ensure that additional latency is not introduced
through the buffering required for optimal data compression, which might lead to lower overall bandwidth
utilization. Data compression is most effective when performed on larger data sets, because more patterns
inside the data can be found and removed. However, if only a few hundred bytes of data are transmitted
at a time, the data is briefly buffered before automatically being forwarded out the wireless port without
waiting for more data - maintaining very low latency. The timers that ensure this balance between waiting
time and data volume are based on years of real-world deployment and simulation experience.
A XipLink wireless optimizer will compress only the TCP payload, leaving the TCP headers in the
clear. This allows TCP acceleration algorithms to operate on, and XTC rate controls to be applied to, the
compressed data stream. This enables the wireless optimizer to transmit at the maximum output rate, as
prescribed by the rate control settings, even as the compression ratio varies from packet to packet.
Other compression strategies that can yield higher compression ratios but typically operate by putting all
traffic into a common compressed tunnel. Such systems require end-to-end or tunnel based configurations,
and are not well suited to wireless links because they limit network scalability and add packet overhead,
all detrimental to maximizing capacity at low capital cost.
The compression ratio of a particular data stream is completely dependent on the nature of the data itself.
Text - as found in web pages, email, etc. - is highly compressible while random data is not compressible
at all. Internet video streams are generally very compressible while video from modern video surveillance
systems is so well encoded by the camera there is not much left that can be compressed. It never hurts to
run these streams through the compression module, but user expectations for compression ratios must be
realistic based on the type of traffic being transmitted.
27
Most XipLink customers see between a 40% and 300% compression ratio depending on the data itself and
the usage patterns. In general, compression ratios average about 2:1, but this is an area of rapid technology
innovation and improvements which will continue to yield higher and higher ratios on traffic that is not
already pre-compressed.
28
Packet Coalescing
Packet coalescing is a technique that combines the payloads of many small network packets into a single
large packet that can be transmitted and processed more efficiently. The following figure illustrates how
XRT packet coalescing reduces the effective packet-per-second rate of real-time traffic.
29
Packet coalescing is not merely applied on each connection between a client and server, but on multiple
data streams between various hosts offering a greater benefit. The benefit is proportional to the number
of data streams available for coalescing.
The table below illustrates the benefit of coalescing multiple VoIP streams.
Bandwidth
Savings
G.729 (8 Kbps)
20 ms
8%
G.729 (8 Kbps)
20 ms
33%
G.729 (8 Kbps)
20 ms
47%
G.729 (8 Kbps)
20 ms
10
52%
10
G.729 (8 Kbps)
20 ms
20
54%
20
G.729 (8 Kbps)
20 ms
50
56%
50
G.729 (8 Kbps)
20 ms
100
57%
70
G.729 (8 Kbps)
20 ms
200
57%
70
These results were obtained under laboratory conditions. Actual results will vary based on the
individual packet sizes in the data stream, the capture window size, and the maximum coalesced
packet size.
Note the convergence towards a 57% bandwidth savings as more streams are coalesced.
The next table shows the impact of the capture window size on packet coalescing. Increasing the capture
window size would increase the benefit, although it may also increase jitter if not enough UDP traffic is
present.
Bandwidth
Savings
G.729 (8 Kbps)
5 ms
10
37%
G.729 (8 Kbps)
10 ms
10
47%
G.729 (8 Kbps)
15 ms
10
50%
G.729 (8 Kbps)
20 ms
10
52%
10
30
The bandwidth savings and packet-per-second benefit both increase as the capture window increases,
although the effect flattens out with larger window sizes.
Header Compression
XRT can also apply standard Robust Header Compression (RoHC) to UDP streams, where uncompressed
headers can account for as much as 60% of the network traffic.
Header compression applies to IP and UDP headers, and can also apply to Real-time Transport Protocol
(RTP) headers. Since many RTP-based protocols use non-standard UDP port numbers, it is necessary to
explicitly tell the optimizer which traffic should be considered for RTP header compression.
31
among cellular service providers, the main payload is nested inside multiple layers of encapsulation. These
multiple embedded protocol headers overwhelm individual packet compression.
ACC leverages the data from one packet to help compress those that follow. This allows it to efficiently
compress the embedded headers, resulting in significant savings over simple single-packet compression.
ACC is a separately licensed capability, and can only be enabled with a valid activation code.
Please contact XipLink to obtain an activation code.
http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/fcf018_ps1835_TSD_Products_Configuration_Guide_Chapter.html,
for example.
32
Figure 3.12 depicts the simplest WCCP deployment. The optimizer's Wireless interface is connected to a
WCCPv2-capable router that lies between the local network and the wireless uplink. In this example the
optimizer is configured in Single Interface mode so all redirected traffic is sent to the optimizer's Wireless
interface.
The optimizer can also connect to the WCCP router in Router mode, as shown in figure 3.13. This requires
two network ports on the router, one to send redirected traffic to the optimizer and another to receive
traffic from the optimizer. The router redirects traffic to the optimizer's Routed interface, and the optimizer
returns traffic from its Wireless interface, which the router routes normally.
The rest of this section discusses WCCP deployments with the optimizer in Single Interface mode, but all
the deployments are also applicable when the optimizer in is Router mode.
33
34
addresses it had when it arrived at the optimizer. So if the router is already correctly handling traffic on
the network, then it should also be able to handle that traffic when it passes through the optimizer.
In order to forward traffic to the optimizer, the router must be configured with a service group and that
service group must be enabled on the interface that receives the traffic to be forwarded. For the purposes
of WCCP, a service group is a definition of what kind of traffic to forward. That definition is actually
specified by the XipLink optimizer (see below), but the service group itself must be created on the router
and assigned to an interface.
Each service group is identified by a number. The convention for WCCP forwarding is to use service
groups 61 and 62, though any number from 1 to 255 is valid (and your router may already have some
service groups defined).
XipLink's WCCP implementation uses dynamic service groups. Do not use a well-known
service group (such as group 0).
Whatever service group numbers you use, the group numbers you configure in the XipLink
optimizer must match the groups you define on the WCCP router.
When a WCCP service group is enabled on one of the router's interfaces, the router's configuration only
specifies that redirection should occur. Where that traffic gets redirected to is determined as part of the
WCCP negotiation with the optimizer: The optimizer tells the router which service group it uses, and the
router then knows to forward that service group's traffic onto the interface connected to the optimizer.
WCCP redirection always requires two service groups. This is because network traffic is (almost)
always bi-directional requests usually expect replies. Part of a service group's definition specifies either
source or destination protocol port numbers, but not both. Thus two service groups are needed: One
to redirect requests (using destination port numbers), and another to redirect replies (using source port
numbers).
This requirement is illustrated in figure 3.15. Requests from clients (green path) arrive at the WCCP router
on the client-side interface and are redirected to the optimizer by service group 61. Replies from servers
(magenta path) arrive on the wireless-side interface and are redirected by service group 62. (Note that the
requests and replies forwarded by the optimizer are not redirected by a service group.)
Here are some general recommendations for configuring service groups on a WCCP router. These
guidelines may not apply to your situation, or they may be incompatible with your router. Please consult
your router's documentation and consider your network's particular setup when defining your WCCP
service groups.
Use ingress redirection ("redirect in") rules. The router processes these more efficiently than
egress rules. Also, some routers require the use of ingress rules for Layer 2 forwarding.
35
36
37
WCCP load balancing requires all the optimizers to use the exact same service group parameters.
An optimizer that defines a service group differently in any way will be ignored by the WCCP
router.
This setup uses three optimizers to share all TCP traffic:
The WCCP router's client-side interface is associated with service group 61.
The WCCP router's server-side interface is associated with service group 62.
All three optimizers define service groups 61 and 62 to redirect all TCP traffic.
38
The service groups here make use of WCCP's priority parameter. In WCCP the priority is a number
between 0 and 255 that specifies the order in which the router will evaluate service groups when matching
network traffic. Service groups with a higher priority number are evaluated before those with a lower
number (in other words, the groups are sorted by descending priority number before being evaluated).
This setup uses three pairs of service groups. Each pair specifies the redirection of a different type of
traffic, and each pair also has a different evaluation priority.
Optimizer A uses groups 61 and 62 to redirect HTTP traffic with a priority level of 20.
Optimizer B uses groups 98 and 99 to redirect all (other) TCP traffic with a priority level of 10. Since
their priority level is lower than the priority of groups 61 and 62, groups 98 and 99 will be evaluated
after groups 61 and 62. This makes the HTTP redirection take precedence. (If the priority of groups 98
and 99 was higher than that of groups 61 and 62, then no HTTP redirection would occur because the
all-TCP redirection would match first.)
Optimizer C uses groups 75 and 76 to redirect all UDP traffic with a priority level of 50. In truth any
priority value would work, since the other service groups don't deal with UDP traffic. However, giving
groups 75 and 76 a higher priority means that UDP traffic redirection will occur slightly faster than TCP
redirection (since the router doesn't need to match UDP traffic against the TCP service groups).
This example could also use more than one optimizer to handle a single traffic type, using the
method described in the section called Distributing Traffic Load Among Several Optimizers.
39
Optimizer A's service groups (61 and 62) have priority level 20, while Optimizer B's service groups (81
and 82) have priority level 10. This means that the WCCP router will evaluate groups 61 and 62 before
groups 81 and 82, and so TCP traffic will normally be redirected to Optimizer A.
If Optimizer A goes offline, then the WCCP router will redirect TCP traffic to Optimizer B.
The optimizers in this configuration can not share their Quality-of-Service (QoS) states, and this
may lead to inaccurate traffic shaping when Optimizer 2 takes over from Optimizer 1. Please
contact XipLink Support for details.
40
can handle well over 2000 new connections per second and over 30,000 sessions at any one instance. Any
traffic arriving once memory is full will follow a fast path through the XipOS kernel. Those sessions use
standard TCP, but they are still subject to the configured XTC rate control mode.
Remote site and embedded software optimizers typically operate in Layer 2 bridge mode, while most hub
sites deploy the optimizer as a Layer 3 router in a fully redundant configuration.
41
4.1. Dashboard
The dashboard area at the top of the screen shows you a quick status of the XipLink optimizer.
42
The load average is not based just on CPU load but on the culmination of the current processor
load and the CPU run-queue length. A value of 1 generally indicates that a single-CPU system
is under heavy load. Throughput performance may be degraded during periods of heavy load.
If you continuously run on high load, you should consider upgrading to a more powerful unit.
Uptime:
Software Version:
Model: Shows the device's product model. Crypto enabled units would always indicate -Crypto in the
model name.
43
The Apply Changes screen lets you save either to just the device's running settings, or to both the running
and startup settings at one time. If changes are made to the device configuration, the Apply Changes Menu
option is highlighted in red and the number of changes not yet applied will be indicated on this page.
The Make changes permanent checkbox controls whether configuration information is written to the
startup settings. If the box is checked, the device's startup settings are updated, and the device will use the
new settings "permanently" even after rebooting. If the box is unchecked, only the running settings are
changed and the device will revert to its startup settings the next time it reboots.
To save your settings, check or un-check the Make changes permanent checkbox and click the Apply
Changes button.
1
The few exceptions to this rule include the device backup, upgrade and reboot actions, as well as changing the administrative passwords.
44
The text box below the Apply Changes button shows the progress of the configuration update. If you
are making "permanent" changes, the system will first update its running settings. If those new running
settings are valid, the device will save them to its startup settings.
Should an error occur while applying the new settings, the system will roll back any changes it has made
so that the device is restored to the state it was in before the reconfiguration attempt. The UI will display
an error message indicating the nature of the failure. Refer to the troubleshooting section for advice.
XipOS does not require a reboot to use updated settings. This allows for minimal reconfiguration
downtime.
4.4.1. Mode
Settings under the Mode tab determine how the XipLink optimizer integrates with your network.
45
Router mode requires there to be two separate subnets on either side of the optimizer, while bridge mode
allows the device to transparently optimize traffic within a single subnet.
Single Interface mode uses only the Wireless network interface. This mode requires either lightweight
tunnelling or an external router to redirect traffic to and from the optimizer. Redirection can be achieved
using either Policy-Based Routing or Webcache Communication protocol Web Cache Communication
Protocol.
The following table summarizes the differences between the three modes.
Table 4.1. Differences Between Router, Bridge and Single Interface Modes
Aspect
Router Mode
Routing influences
Redundancy
Network
Translation
Bridge Mode
Address Supported
Not available
Single Interface
Not available
Dynamic
routing Supported
protocols (RIP, OSPF,
BGP)
Can use RIP for route Can use RIP for route
discovery only
discovery only
Not available
VLANS
Not available
Fail-to-wire is only available on selected models. Please review the product matrix for details.
When enabling Light Weight Tunneling, only the active VLAN assigned can be tunneled
46
4.4.2. Interfaces
The Interfaces tab allows you to configure the device's network interfaces.
The optimizer cannot participate in your network unless its interfaces are properly configured.
Please refer to the Redundancy setup section for a description of this page once redundancy
has been enabled.
47
The Wireless interface is always the interface that connects (directly or indirectly) to the wireless link.
All traffic passing through this interface is optimized for transmission over any wireless or high latency
network. The Routed (or Bridged) interface is always connected to the low latency, high bandwidth
network. The Management interface can either connect to an out-of-band management network, or it can
be part of a hybrid networking setup.
The MTU (Maximum Transmission Unit) setting defines the maximum size of an IP packet that can be
transmitted without fragmentation. Values can range from 576 to 1500.
The Media type defines the type of cable that is connected to the Ethernet interface. The default is
'autoselect' which should work in most environments. Auto-detection may not work if you connect to any
network equipment that uses a manually configured media type. In this case it is best to also manually
configure the optimizer interface's media type, to avoid conflicts.
The VLAN setting allows you to associate the interface with a particular VLAN. The default value is 1,
which turns off explicit VLAN tagging on the interface.
You have the following options for assigning an IP address to the device.
Static: Assign a fixed IP address to this interface. You also need to supply the netmask.
DHCP: Obtain an IP address from a DHCP server on this interface's network.
None: Assign no IP address to this interface. This is only useful when the device is in Bridge mode.
More IPs button will popup a window as below that would allow you to assign additional alias IP's to
the interface
4.4.3. DNS
The DNS tab allows you to configure Domain Name System support on the optimizer.
48
The Domain Name System (DNS) translates domain names meaningful to humans into IP addresses that
can be routed across the network. It is an IP address directory, similar to a telephone directory, that holds
domain name to IP address translations.
On this tab you can specify the IP address of your primary DNS server and, optionally, the address of
a secondary/backup DNS server. You may also specify a doman name for the optimizer, although this
is not normally required.
If you have configured one of the optimizer's network interfaces to obtain its IP address from a DHCP
server, you may select Use DNS information obtained from DHCP here to make the optimizer use the
DNS settings provided by the DHCP server. Selecting this overrides any static DNS settings you might
specify on this tab.
If you configure the optimizer to also be a DHCP server (see the DHCP tab), the optimizer will
provide DHCP clients with whatever DNS information you configure here. If the optimizer is
configured as a DHCP client on one of its interfaces and as a DHCP server on another, selecting
Use DNS information obtained from DHCP will make the optimizer serve its DHCP-obtained
DNS settings to its DHCP clients.
Transparent DNS caching is only applied to requests that arrive via the network interface shown.
Which interface that is depends on how the optimizer is configured.
49
The cache lifetime of a DNS reply is controlled by the upstream DNS server. Some servers on
the Internet use very short lifetimes in their replies, and for these domains the caching benefit
may be difficult to measure.
The DNS cache's status is visible in the dashboard:
When you move you mouse cursor over the DNS cache status box in the dashboard, the status text is
replaced by a button that allows you to clear the DNS cache:
4.4.4. Routes
The Routes tab allows you to configure static routes for the optimizer. (Dynamic routes for optimizers in
Router mode can be configured through the RIP, OSPF, or BGP tabs.)
Static routes override dynamic routes. The order of precedence for routing is:
1. Static routes are matched first.
2. Dynamic routes are matched second.
3. The static default gateway is the route of last resort.
The optimizer routes all traffic for subnets that are not in the static or dynamic routing tables through the
default gateway.
The default gateway is normally the device's access point for upstream network connectivity. For a
"remote" device, this is usually the IP address of the wireless link's router or modem. For a "hub" device,
this is usually the IP address of the hub site's Internet router or modem.
50
When one of the device's interfaces is configured to use DHCP, the default gateway text box is
disabled, and "(DHCP)" appears next to the box. This indicates that the default gateway will
be configured via DHCP.
Click the Add button to add a static route.
Each static route requires a subnet, mask and gateway. If any of these values is syntactically incorrect,
its field will turn red. If the value is correct but otherwise invalid, an error code will appear to the right
of the route's settings. Hover the mouse pointer over the error code to see an explanation of the problem.
The error codes are:
S -- invalid subnet. The subnet must complement the mask: all unmasked bits must be 0.
M -- invalid mask. All the 1 bits in the mask must be contiguous.
G -- invalid gateway. A static route's gateway must be in the same local subnet as one of the device's
interfaces.
To delete a static route, select it and click the Del button.
When there are multiple subnets that are reachable through a non-default gateway, each subnet
must be added to the static routing table.
When using only static routing, if you wish to manage the optimizer via telnet or SSH or the web
UI from a PC that is not connected to one of the device's local subnets, then you must ensure
that one of the static routes (or the default gateway) will provide access to that PC's subnet.
4.4.5. RIP
The RIP tab contains settings that allow the optimizer to participate in the Routing Information Protocol.
RIP is a dynamic routing protocol that calculates the next forward address to a destination using a distancevector routing algorithm. The distance to a destination is measured as the number of routers between the
optimizer and the destination (this is called the "hop count").
Once RIP is enabled on the device, you can select which interfaces will advertise subnets, and also
configure which subnets to advertise.
RIP subnet masks must be a CIDR-style number of significant bits. A dot-style mask (e.g.
255.255.255.0) will not work.
51
4.4.6. OSPF
The OSPF tab contains settings that allow the optimizer to participate in the Open Shortest Path First
routing protocol. OSPF is an interior gateway protocol that routes IP packets solely within a single routing
domain (autonomous system). It gathers link state information from available routers and constructs a
topology map of the network. The topology determines the routing table presented to the IP layer, which
makes routing decisions based solely on the destination IP address found in IP datagrams.
OSPF detects changes in the topology, such as link failures, very quickly and converges on a new loop-free
routing structure within seconds. It computes the shortest path tree for each route using a method based
on Dijkstra's algorithm, a shortest path first algorithm.
The OSPF routing policies used to construct a route table are governed by cost factors (external metrics)
associated with each routing interface. Cost factors may be the distance of a router (round-trip time),
network throughput of a link, or link availability and reliability, expressed as simple unitless numbers.
An OSPF network may be structured, or subdivided, into routing areas to simplify administration and
optimize traffic and resource utilization. Stub areas are identified by 32-bit numbers, expressed either
simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address notation. By
convention, area 0 (zero) or 0.0.0.0 represents the core or backbone region of an OSPF network. The
identifications of other areas may be chosen arbitrarily. Often, administrators select the IP address of a main
router in an area as the area's identification. Each additional area must have a direct or virtual connection
to the backbone OSPF area. Such connections are maintained by an interconnecting router, known as an
Area Border Router (ABR). An ABR maintains separate link state databases for each area it serves and
maintains summarized routes for all areas in the network.
52
Once OSPF is enabled on the device, you can specify the device's Stub Area and also configure which
networks and areas to advertise.
The Route redistribution settings control what additional routing information is advertised:
Connected.
Kernel.
Static.
4.4.7. BGP
The BGP tab contains settings that allow the optimizer to participate in the Border Gateway Protocol.
BGP is an exterior routing protocol used to connect various autonomous systems (ASes) together. This is
the core routing protocol of the Internet. It maintains a table of IP networks or 'prefixes' which designate
network reachability among autonomous systems. It is a path vector protocol. BGP does not use traditional
IGP metrics, but makes routing decisions based on path, network policies and/or rulesets.
53
Once BGP is enabled on the device, you can specify the device's AS Number, Network and Netmask,
and also configure neighbor ASes.
The Route redistribution settings control what additional routing information is advertised:
Connected.
Kernel.
Static.
4.4.8. DHCP
The DHCP tab controls the device's built-in Dynamic Host Control Protocol server. Manually assigning
IP addresses on a network can quickly become cumbersome and error-prone. DHCP eases IP address
management, as client workstations are automatically assigned a IP address when connecting to the
network.
54
Once enabled, the DHCP server will issue an IP address to any DHCP client that requests one.
You can specify which Interfaces will provide the DHCP service.
There can only be one DHCP server within a network segment.
For each interface, you can specify the range of IP addresses that should be assigned by the DHCP server.
Make sure that the specified ranges do not overlap with any statically-assigned IP addresses.
The lease durations can be specified in hours, minutes or seconds. Once a client's lease expires, the client
has to renew the lease or request a new IP address. This process helps keep the DHCP server's IP address
tables clean of invalid IP leases. If your network does not change frequently, you can supply a larger value
for the DHCP lease time.
4.4.9. SNMP
The SNMP tab controls the device's support for the Simple Network Management Protocol. SNMP is
a popular protocol for network management. It is used for configuring and collecting information from
network devices such as servers, printers, hubs, switches, and routers.
The XipOS SNMP service replies to SNMP status requests. It can also transmit critical status messages
(traps) to one or more SNMP management systems. Device configuration via SNMP is not supported at
this time.
55
After enabling the SNMP service you must specify either SNMPv1/v2 or SNMPv3 and supply
the appropriate authentication credentials. SNMPv1 and SNMPv2 both use a Community String for
authentication. SNMPv3 uses a user ID and password. XipOS supports SNMPv3 message authentication
using the SHA authentication protocol and the "authentication and no encryption" (auth/noPriv) security
level.
Enable SNMP Traps in order to set critical status alerts to one or more SNMP management systems. A
comma-separated list of IP addresses identifies which hosts should receive traps. You can also specify a
minimum time interval to wait between sending traps.
XipOS includes additional XipOS-specific MIBs. To make this information available to your SNMP
monitoring system, you will need to import the XIPLINK.txt MIB file into your SNMP application.
This file is stored on the XipOS device as /share/snmp/mibs/XIPLINK.txt. You can use scp to
copy the file locally (on Windows, use an scp application such as WinSCP.
Description
EXEC_FAILED
MISSED_HEARTBEAT
The XipOS monitoring system did not receive a regular signal from
a critical process.
PROCESS_EXITED
56
4.4.10. WCCP
WCCP settings must be applied to both the WCCP router and the XipLink optimizer. Please
see Section 3.10, Web Cache Communication Protocol for more information.
The WCCP tab configures the device to participate in the Web Cache Communication Protocol with a
WCCP-compatible router.
The XipLink device must specify one or more pairs of WCCP redirection service groups. Each service
group in a pair is assigned to a network interface, and specifies the traffic that the WCCP router should
redirect to that interface. The service groups in the pair should match each other, except that each has a
different ID and specifies a different direction (requests or responses) for the redirected traffic. (In Single
Interface mode the pair of service groups both configure the single interface). The WCCP tab automatically
displays which interfaces are available for configuration, depending on the device's mode.
Please refer to Section 3.10, Web Cache Communication Protocol for an overview of WCCP
configuration.
After enabling WCCP, you may specify one or more redirection services on each available interface. A
redirection service identifies:
How to redirect traffic (GRE or layer 2).
The load-balancing method (mask or hash) the router should use to share the redirected traffic among
multiple optimizers. See below for more information.
What traffic to redirect (protocol and port numbers).
Which direction of traffic to redirect (requests or responses).
When using GRE redirection in WCCP, it is not necessary to set up GRE tunnelling on the
XipLink optimizer.
When the device is configured in Router mode each redirection service specified on one
interface must have a mirror redirection specified on the other interface. For example, if one
interface specifies GRE redirection of HTTP request traffic, the other interface must specify
GRE redirection of HTTP response traffic.
57
When the device is in Single Interface mode, both the request and response redirection services
must be specified on the single interface.
Use the dropdown box to select a redirection service, then press the Add Service button to add the service
to the interface. Each service has the following properties:
The optimizer's membership in the redirection service group can be enabled or disabled.
The ID field is the service group number.
The Priority field is the service group's priority compared to other service groups on the WCCP router.
See the section called Prioritizing Traffic Across Multiple Optimizers for details.
The Ports list is a comma-separated list of port numbers. These ports identify which type of traffic
the service group redirects. An empty list means the service should redirect all traffic for the specified
protocol (TCP or UDP).
WCCP only allows the ports list to contain up to 8 port numbers.
The Router list is a comma-separated list of WCCP router IP addresses. These are the WCCP routers
that the optimizer will attempt to register with for WCCP redirection.
To delete a service from an interface, select it in the table then press the Delete Service button.
The optimizers in a WCCP group can not share quality-of-service (QoS) states, meaning that
they may not be able to properly shape network traffic. If you need to use QoS with your WCCP
deployment, please contact XipLink Support for assistance.
WCCP Status
When WCCP is enabled, the optimizer's WCCP status is displayed in the dashboard:
58
The detailed WCCP status report shows the state of the WCCP-specific GRE tunnels (if the WCCP setup
uses GRE forwarding).
The report also contains a Services table showing which routers and optimizers are visible on each
interface. The table contains the following columns:
I/F:
The interface to which the service group (or groups) is (are) assigned.
ID:
Fwd:
Assgn: The load-balancing method (mask or hash) the service group uses to assign traffic to different
optimizers.
Routers:
Caches: The IP addresses of optimizers visible in the WCCP service group (including the current
optimizer's own IP address).
4.4.11. Redundancy
The Redundancy tab allows a device in Router mode to be configured for redundant operation. Redundancy
requires a second XipOS device to be on hot standby, ready to take over should the primary device fail.
Each device is configured with a single virtual IP address that is used for routing traffic. The standby
device will take over if the primary device's Ethernet MAC address stops responding. Failover normally
happens in a fraction of a second, with little to no packets being dropped while the standby device becomes
available.
A switch must also be deployed on either side of the redundant pair. See the Router Mode Redundancy
Setup figure below.
Redundancy configuration is only applicable for devices setup in router mode. Redundancy for
devices in bridge mode is supported through the use of STP (Spanning Tree Protocol). Some
XipLink optimizer models have a fail-to-wire feature that is compatible with Bridge mode and
ensures connectivity if the device fails.
59
Enable Clustering.
checkbox'.
To complete this setup, you must configure the device's network interfaces on the Interfaces tab.
Connect your XipLink optimizers and switches as shown in the figure above.
2.
3.
Under the Networking setup -> Redundancy tab, select the Enable clustering checkbox.
60
4.
Select the Preferred master checkbox. The preferred master always routes the traffic whenever both
devices are available.
5.
Specify a unique password that will be common between the two cluster members.
6.
7.
Select the Interfaces tab and configure the virtual IP address of this device (A) and also the real IP
addresses of both devices (see screenshot below).
8.
9.
10. Under the Networking setup -> Redundancy tab, select the Enable clustering checkbox.
11. As this is the cluster's secondary device, make sure that the Preferred master checkbox is unselected.
12. Specify the same password you configured for device A.
13. Choose cluster member ID B.
14. Select the Interfaces tab and configure the virtual IP address of this device (B) and also the real IP
addresses of both devices (see screenshot above).
15. Apply the changes, and make them permanent.
Most other settings on the two units should be identical, particularly the routing tables and DNS
setups.
When configuring the networks on either side of the redundant cluster, use the virtual IP
addresses as the gateways for routing traffic.
You cannot configure a device for redundancy if it is also configured as a database master for
configuring remote devices.
61
4.5. Optimization
This section explains how to configure the XipOS optimization settings.
4.5.1. Optimization
The Optimization tab allows you to configure the optimizer's optimization settings.
The Enable Optimization checkbox allows you turn all optimization on or off. When optimization is off
the device will act as a standard router bridge, passing traffic through without any acceleration. When
optimization is enabled traffic is transparently proxied and optimizations are applied according to the
settings found on this tab and also on the Service Assignment tab.
The Enable QoS checkbox controls the use of quality-of-service (QoS) on the optimizer. QoS is used
not only for traffic shaping but also for classifying traffic for optimization. Therefore, disabling QoS also
disable Optimization.
Optimization parameters
Select the XipLink Transport Control (XTC) mode best suited for your wireless environment. Refer to
the section on XipLink Transport Control (XTC) Modes for a detailed description on these options.
Fixed Rate Control Mode.
This mode is ideally suited for dedicated fixed-rate links where the
available bandwidth is not shared with other users. Best-effort throughput is maintained at the rates
defined in the Service Assignment tab.
Dynamic Rate Control Mode.
This is ideally suited for dynamic rate links where the available
bandwidth is dependant on how many other users are currently using the network. For example on
TDMA networks.
Enhanced TCP Mode. This is a less aggressive mode where QoS may be implemented on external
networks and the above modes may then restrict the throughput performance.
The Use Compression checkbox enables or disables TCP data compression on the optimizer.
62
Enable Black-hole Detection to have the optimizer suppress ICMP Destination Unreachable error
messages. These messages are normally sent in response to an attempt to connect to a non-existing host
or a closed TCP port. Suppressing them can help prevent some denial-of-service attacks.
SCPS-TP Options
These options modify the behavior of the SCPS protocol. Please refer to the section on SCPS Acceleration
for more information.
Acknowledgement Frequency Reduction (AFR) Enabling AFR will reduce the number of
acknowledgements the receiver will send back as data is received. This feature can reduce packet overhead
by 33% or more while sustaining maximum throughput across the wireless link.
AFR should be only selected if the gateway at the other end is configured to use either Fixed
or Dynamic Rate Control.
AFR only applies to traffic received by the device. That is, it controls how the device
acknowledges the receipt of traffic.
The ACK ratio can be specified with the selection box as the number of packets per ACK (PPA). On highly
asymmetrical links (e.g. 10Mb upstream and 1Mb downstream), enabling AFR on the remote device (the
one with the 1Mb uplink) will improve performance.
Use the DupAck checkbox to enable AFR for duplicate ACK packets.
Always enable Selective Negative ACKs (SNACKs) unless the wireless return channel suffers from
high packet loss. XipLink optimizers auto-negotiate this setting between devices: If both have SNACKs
enabled, then they'll use it. Otherwise, if one or both have SNACKs disabled, the devices will use
selective acknowledgements (SACKs) instead. In high-loss conditions, the overhead of using SACKs is
less detrimental than the problems caused by losing a SNACK.
Select Enable Fast Start to allow the optimizer to include request data in the connection establishment
handshake.
Hub-only Optimization
Some XipLink optimizer models support hub-only optimizations. See the XipLink Hub Optimizations
section for details.
Hub optimizations only provide benefits if they are enabled on the "upstream" or "Internet" side
of a wireless link.
63
XiPix: Once XiPix is enabled, you can specify Minimum threshold and Maximum threshold image
sizes, in bytes. XiPix ignores any images that are smaller than the minimum or larger than the maximum.
You can also specify a Quality level using the slider control. The sample image shows you the visual
impact of a particular quality setting. The percentage value shown below the slider is an estimate of the
reduction in image size for the selected quality level.
In order to enable XiPix you must provide a valid activation code. Please contact XipLink to
obtain a code.
HTTP Compression:
4.5.2. Networks
The Networks tab allows you to define the various IP networks connected this device. These definitions
form the basis of the service assignments that control how the device handles all the traffic that it sees.
64
The primary purpose of the Networks tab is to help you easily define the links and sites that make up your
network. While you can also manipulate links and sites on the Service Assignment tab, the tools available
from the Networks tab are designed for convenience and to alleviate the tedium of creating many links
or sites at one time. The first tool is the Link Editor, which lets you specify the properties of the link(s)
connected to the optimizer. The second tool, the Links and Sites Wizard allows you to add new links and
add sites that share a link. These tools are described in detail below. You can access either tool by clicking
its button.
The Networks tab also has a secondary purpose, which is represented by the controls found at the bottom
of the tab:
Select Standalone hub deployment if your optimizer is to be deployed as a pure XHO hub (i.e. without a
remote XipOS device). Selecting this option disables SCPS acceleration and TCP-level compression. The
optimizer still proxies all TCP connections, but only applies XHO optimizations to HTTP connections.
If you have a hub where some sites have a remote XipOS device and others do not, you can override this
setting on a per-site basis using a QoS queue for each site and configuring specific TCP optimizations on
the Service Assignment tab.
If your optimizer is a pure XHO hub, only select Adjust settings for an external Optimizer/PEP if
you have an upstream Performance Enhancing Proxy (PEP) installed between this optimizer's Wireless
interface and the wireless transmission equipment. This is required for any PEP that creates spoofed
connections, such as a web cache.
The 'Wireless' ethernet max speed setting controls the maximum speed of traffic on the Wireless
interface. This is typically the speed at which the interface syncs to its switch. For example, set this to
1000Mb for 1000BaseTX Ethernet media.
65
A helpful tool for configuring your optimizer is a network diagram showing the links connected to the
optimizer and the sites that share them. A sample network diagram appears below. It depicts a hub
optimizer (on the left) connected to two links, and each link is shared by more than one site. Later sections
will refer to this example.
Link 2
Site 1:
Site 4:
Site 2:
Site 5:
Site 3:
5Mb maximum transmission speed
8Mb maximum receive speed
6Mb priority receive speed
66
Use the dropdown to select the link you wish to edit. Any changes you make are automatically saved
(though not applied to the optimizer until you apply changes). Click the Close button to close the link
editor.
The Maximum Transmit Bandwidth is the maximum speed at which the device will transmit data over
the link, while the Maximum Receive Bandwidth is the expected maximum speed that the device will
receive data from the link.
Bandwidth and rate values must be specified with a unit:
Mb = 1,000,000 bits per second
Kb = 1,000 bits per second
b = 1 bit per second
These values can only be integer numbers (without commas); decimal points are ignored.
The Link Round Trip Time is the total amount of time (in milliseconds) it takes for a packet to travel
over the link in both directions. This critical value is used by the Rate Control algorithms and also ensures
that sufficient buffer space is allocated to manage inflight data.
If you have created more than one link on your device, a Delete all others button appears in the link
editor. This button allows you to easily reset the device's configuration to contain only a single link and
site. Clicking it deletes all other links except the selected link, including their sites, and it also deletes all
but one of the selected link's sites.
Please note that this button only resets the configuration you are editing in the UI. As usual, the
update is not recorded on the device until you apply changes. If you mistakenly press this button
(and have not applied the change), you can recover the original configuration by reloading the
UI in your browser.
67
Use the controls in the Link information area to specify which link you want to contain the new sites.
You can either add new sites to an existing link, or create a new link and its sites at the same time.
The Define new Sites area provides two methods for adding new sites to a link. You can either Populate
the site list using a formula or Paste a site list.
The values shown in the screen shot include Site{x} for the Site Name Template, and
10.1.{x}.0/24 for the IP Address Template. These will generate 3 sites as follows:
Site1 and 10.1.1.0/24
Site2 and 10.1.2.0/24
Site3 and 10.1.3.0/24
68
The IP Address Template and the Site Name Template both let you specify a starting value for {x}. This
example used a starting value of 1 in both templates.
You can edit the site names and subnets here before adding them to the configuration. When you are ready,
click the Add site(s) to configuration button to add the sites to the link.
This format is applied automatically if you copy and paste cells from an Excel spreadsheet into
the text box.
The following screen shot shows the Wizard about to create Link2 from Example 4.1 with its two sites, after
pasting in the site list from an Excel spreadsheet. The tab characters are replaced with the string {tab}.
You can also type the site list directly into the text box. Instead of pressing the Tab key to enter
a tab character, use the {tab} string instead.
The screen shot also shows that the Wizard will add Link2 as a new link. The Wizard lets you edit the
new link's name and properties.
69
Click the Populate Site List button to preview the new sites and then create them, as described above.
70
The QoS queues on this tab are arranged according to the links and sites that were initially configured in
the device with the Networks tab. From here you can create new top-level queues or child queues, and
edit or delete any queue.
The tab is divided in two sections. The main part is a table containing all the QoS queues on the device.
The lower part is a firewall rule editor you use to associate traffic with a particular queue. When you select
a leaf queue in the upper table, the queue's associated firewall rules appear in the rule editor. The firewall
rule editor is described in the Traffic Assignment tab section.
Only bottom-most (leaf) queues have associated firewall rules.
Select a QoS queue by clicking on its name in the blue Queue Name column on the left. The selected queue
is highlighted in red. If a queue has child queues, you can view (or hide) the children by first selecting the
parent queue, then clicking on the parent queue's name a second time.
When you select a queue, a context menu button appears to the left of the queue's name. Click on this
button to open a context menu for the selected queue.
71
Add child queue: Creates a new queue as a child of the selected queue.
Clone queue: Creates a new queue as a sibling of the selected queue, and copies the selected queue's
properties into its new sibling.
Delete queue: Removes the selected queue (and its associated firewall rules) from the system.
Add filter rule: Adds a new firewall rule associated with the selected queue.
The maximum speed at which the optimizer will transmit traffic in this queue.
Gtd TX: The guaranteed transmission speed that the optimizer will use for this queue when the link
is congested.
Pri TX: The priority transmission speed that the optimizer will both guarantee and prioritize to service
real-time protocols. Use this in conjunction with the maximum queue delay (Max Q Dly) value to ensure
sufficient response rates for traffic such as voice, streaming media or gaming. The optimizer will still make
priority bandwidth available to other traffic if this queue does not need it. The priority speeds of a queue's
children can not together exceed 80% of the queue's maximum speed.
RTT: The round trip time, in milliseconds. This value is only used in top-level queues (which usually
represent network links).
Max RX: The expected maximum rate for traffic received in this queue. This value controls how many
buffers the optimizer allocates to receive the queue's traffic. For optimum performance, the value here
should match the corresponding Max TX value on the device sending traffic in this queue to this optimizer
(or the sum of those values if more than one device is sending such traffic).
Setting Max RX too low can reduce the rate at which the queue will receive traffic.
Max Q Dly: The queue's maximum packet latency, in milliseconds. Packets will not be held in this
queue for longer than this time. Always use Auto here for TCP traffic.
Enc Budgt: The encapsulation budget for packets in this queue. If you are using an external system that
adds a per-packet overhead, enter the number of bytes that system adds to each packet here. Note that the
optimizer automatically takes into account the encapsulation overhead of its own features (like XipLink's
own Lightweight tunnelling), so you do not need to account for those here.
Sess Rate:
The maximum transmission speed for TCP sessions associated with this queue.
72
Per-class TCP Optimizations: Leaf queues associated with TCP traffic can override various systemwide TCP optimization settings. This allows you to apply different optimizations to different links in your
network.
To configure class-specific TCP optimizations, select the TCP class in the Service Assignment table then
click the context menu button on the right. The TCP optimizations you can override are:
The transport control algorithm.
The use of SCPS.
Slow-reader detection.
Acknowledgement frequency reduction (AFR).
To create a new firewall rule, click on either the Add First button (to insert a new rule at the top of the
list) or the Add Last button (to add a new rule to the bottom of the list). At any time you can use the rule's
number (in green) on the left to drag-and-drop the rule to where you want it in the overall list.
When you move the mouse cursor over a rule, it is highlighted. Clicking on a rule's highlighted area selects
the rule. You can also shift-click and control-click to select more than one rule.
73
With one or more rules selected, you can remove and/or duplicate them with the Cut, Copy and Paste
buttons. Pasted rules are inserted above the topmost currently selected rule.
The Del button allows you to delete the selected rule(s).
Firewall rule fields are described below. Editable fields have a control such as a dropdown box, a context
button, or a check box.
Network Objects
Network Objects provide a convenient method for naming and referring to various network entities, such
as site subnets or protocol port numbers.
With Network Objects you can use names to represent a value (or a list of values) in a firewall rule. For
example, the name NET:Site3 can represent a subnet address such as 10.1.3.0/24. You can use
the NET:Site3 name in firewall fields instead of the numeric subnet. This makes it easier to understand
the firewall rules.
If you later change the value of the NET:Site3 name, the new value will be applied wherever the name
is used. This simplifies updating the optimizer's configuration as your network evolves.
There are 2 types of Network Object:
NET objects represent a network, either as a subnet in CIDR notation or as a list of IP addresses.
PORT objects represent one or more protocol port numbers.
Access to the Network Objects is through the context button associated with particular firewall fields.
Clicking that button opens the Network Object window:
The Network Object window provides different methods for entering information in a firewall rule field:
Enter text allows you to edit the field directly.
Select Network Object allows you choose a network object you've already defined, such as when you
create links and sites on the Networks tab. Double-click an entry in the list to edit it. You can also add
new objects here or delete existing ones.
74
When you select one of the items here, its name appears in the selected firewall rule's field.
Select Port Object allows you to choose a named protocol port number, such as http for port 80.
Double-click an entry in the list to edit it. You can also add new port objects here or delete existing ones.
^v:
Rule number and position bar. Drag-and-drop this green number to move the rule within the list.
Enbl: A checkbox indicating whether the rule is enabled or disabled. For testing or debugging, you can
switch rules on or off without having to delete the them.
Prot: Match the rule against a specific protocol. For more information on these protocols, refer to http://
www.protocols.com/.
Source Addr: Match the rule against traffic arriving from a particular IP address or subnet. Click on
the context button to specify a value via the Network Objects window.
Src Port: Match the rule against traffic arriving from a particular protocol port number. (Note that some
protocols don't use port numbers. Port number matching is typically useful with TCP or UDP.) Click on
the context button to specify a value via the Network Objects window.
Dest Addr: Match the rule against traffic going to a particular IP address or subnet. Click on the context
button to specify a value via the Network Objects window.
Dst Port: Match the rule against traffic going to a particular protocol port number. (Note that some
protocols don't use port numbers. Port number matching is typically useful with TCP or UDP.) Click on
the context button to specify a value via the Network Objects window.
VLAN: (Only available in Bridge mode when VLAN Transparency is enabled.) Match the rule against
traffic in a specific VLAN.
Action: Allow or Deny traffic that matches the rule. Denied traffic is dropped. Rules that deny traffic
are particularly useful when you want to prevent that traffic from passing through the device, or if you
wish to reject connections to the device's web UI or SSH server2 from specific hosts or networks.
Opt-TCP: (For TCP rules only.) Select this to apply TCP optimizations to the traffic that matches this
rule. You may wish to disable TCP optimization for internal traffic that is not destined to go over the
wireless link.
QoS Queue: The fully-qualified name of the QoS queue associated with the rule. Traffic that matches
the rule will be put into this QoS queue. This field can not be changed here; use the Service Assignment
tab to associate rules with QoS queues. Note that this field is resizeable.
DSCP In:
value.
Match the rule against traffic marked with the specified Differentiated Services Code Point
75
DSCP out: This is not a traffic-matching field. Rather, this field allows you to specify that traffic
matching the rule should be marked with the specified Differentiated Services Code Point value. This is
useful if there are upstream devices that can prioritize traffic based on a DSCP value.
76
An optimizer can be either a Tunnel Server or a Tunnel Client, but not both. The above screen shot depicts
an optimizer with all lightweight tunnelling disabled (i.e. the optimizer is neither a Tunnel Server nor a
Tunnel Client). Check Enable Tunnel Server to configure the optimizer as a Tunnel Server, or Enable
Tunnel Client to configure the optimizer as a Tunnel Client. Enabling one form of tunnelling removes
the controls for the other form from the UI. Simply uncheck the selected tunnelling form to once again
see both sets of controls.
A Tunnel Server can support many Clients, but a Client can only have one Server.
All lightweight tunnels are protected by a Password. The Tunnel Server and all of its Clients must share
the same tunnel password.
Packet Coalescing
Tunnelling, whether as a Client or a Server, also allows for Packet Coalescing, a XipLink Real Time
(XRT) optimization. Packets are coalesced as the optimizer sends them out via the tunnel. The coalescence
settings on either end of the tunnel are independent: The Tunnel Server and its Clients can all have different
packet coalescence settings.
Global settings for packet coalescing are configured here in the Lightweight Tunnels tab. Furthermore,
you can configure different levels of coalescing for different types of traffic in the Traffic Assignment tab.
The Max capture delay is the maximum time the packet processing engine will spend accumulating UDP
packets into a single coalesced packet before sending a coalesced packet through the tunnel. The higher
the capture delay the higher the coalescence benefit, but delay also introduces jitter in the UDP streams.
The default setting is 40ms. A smaller delay can be appropriate under light UDP load and/or with traffic
that is especially sensitive to jitter. Larger values are better suited to heavy UDP loads, depending on the
packet fill level setting.
The Packet fill level specifies the maximum amount of bytes that can be coalesced into a single packet.
Higher values reduce the packet-per-second rate of the UDP streams while maximizing throughput.
77
After enabling Advanced Cellular Compression, you must also apply it to specific traffic on the
Traffic Assignment tab. ACC is only applied to traffic that has its Opt-IP field set to Max.
The only setting required for a Tunnel Server is the tunnel Password.
The number of tunnels a Tunnel Server can support is limited by the resources available on
the optimizer. For example, an XA-4000 can accommodate about 50 Tunnel Clients, but this
depends on the current number of active TCP connections and also on the available bandwidth.
If you enable both RIP and the Tunnel Server, do not advertise any routes from this optimizer.
A Tunnel Server should only use RIP to receive routing updates.
78
You must specify the Tunnel Server Address and also the Tunnel Server's tunnelling Password.
The Tunnel Client tunnels all incoming traffic. However, in order for the tunnel traffic to reach
its destination it is necessary to configure routes as if the traffic was not tunnelled. That is, the
Tunnel Client must have the correct routes for the traffic that is being tunnelled.
There are two ways to configure routing through the tunnel: explicitly by specifying tunnel subnets, or
implicitly with network address translation (NAT).
To use explicit tunnel routing, you must specify the subnets to route through the tunnel. Check Tunnel the
Routed subnet (in Bridge or Single Interface mode, this option is called Tunnel the Wireless subnet)
to automatically configure tunnel routing for whatever subnet is on the Routed (or Wireless) interface.
You can also click the Add button to add a subnet to the tunnel routing table, and edit its IP address and
netmask. Click the Del button to remove a selected subnet from the table.
When using explicit tunnel routing you must also configure the correct routes on the hosts
outside the tunnel at both ends.
To use implicit tunnel routing, check Enable NAT in tunnel. This will make the optimizer translate
source IP addresses into the Tunnel Client's tunnel IP address. You must also configure NAT on the Routed
interface of the Tunnel Server. This method allows traffic to be tunnelled without the need to correctly
configure routing throughout the network.
Implicit tunnel routing with NAT will also let your Tunnel Server handle Clients with
overlapping subnets. Otherwise, attempting to tunnel the same subnet through different Tunnel
Clients will cause a routing conflict in the Tunnel Server.
Although the Tunnel Client normally sends all the LAN-side traffic it receives through the tunnel, on the
Traffic Assignment tab you can exclude traffic from the tunnel, based on the destination IP address and
TCP or UDP port number. This can be useful, for example, when your subnets need to access a device
that is on the wireless side of the optimizer.
79
Select Enable Link Balancing to activate link balancing. Specify the balancing Algorithm and the
algorithm's Config parameters.
XipLink appliances ship with a single link balancing algorithm named default. The default
balancing algorithm has several different configurations. Please contact XipLink Support for
help configuring link balancing on your network.
Specify the QoS Class for balancing to identify which traffic should be link-balanced.
Link-balancing lightweight tunnel servers must specify the Number of tunnels to provision, which is the
number of lightweight tunnel clients that will connect to the server.
The Max TX specifies the aggregate bandwidth of a single tunnel over both links.
Link-balancing tunnel clients must also specify the Gateway and bandwidth (TX B/W) of each physical
link.
80
The optimizer may take a few minutes to implement updates to these settings after you apply
them.
Use the Enable cache option to enable or disable the web cache.
Once you apply your changes it may take a few minutes to initialize the cache store on the
internal hard drive. This process must complete before the optimizer can begin to cache web
objects.
When disabling the cache, wait a few minutes before enabling it again to allow the cache to
close its store properly.
Use the Enable URL control option to allow access only to specific web sites, or to deny access to specific
web sites.
Enter the list of sites to control in the text box. Each line is a string that matches some or all of a
URL you wish to control. For example, a line with example.com will control any URL that contains
"example.com" anywhere inside it, including:
http://www.example.com/
http://places.example.com/
http://this-example.com/
http://company.com/example.com.html
This option only controls access to HTTP (port 80) web sites. Access to secure web sites
(HTTPS) or sites that use other ports cannot be controlled with this option.
To control access to such sites, you can block their DNS names or IP addresses directly on the
firewall tab. Refer to the firewall section for further details.
The Access denied URL is the web page which is displayed to the end user should a site be blocked. You
can specify any web page here. Typically this page is hosted on one of your own web servers.
81
Make sure that the Access denied URL is accessible to your users.
In particular, when allowing access only to specific sites, make sure the Access denied URL
matches an entry on the list on allowed sites.
Use the Show a welcome page option to present the Welcome Page URL to a user the first time she
accesses the web. As with the Access denied URL, the Welcome page can be any web page and is usually
hosted on one of your own web servers.
Make sure that the Welcome page URL is accessible to your users.
In particular, if you are also configuring the web cache to allow access only to specific sites,
make sure the Welcome page URL matches an entry on the list of allowed sites.
The welcome page is redisplayed to users regularly. Use the Welcome timeout setting to control how
many hours should elapse before a user sees the page again. Use a decimal value to enter fractions of an
hour, down to a minimum of 0.02 hours.
You can also specify exceptions to the welcome page mechanism. A user whose browsing session matches
one of these exceptions will not see the welcome page, even if this is the first time the user is browsing
the web.
Use the Destination URL Exceptions text box to enter a list of sites (one per line). Users accessing one
of these sites will not be shown the welcome page (but they will still be shown the welcome page the first
time they access any site that is not on the list).
Sites are matched to URLs in the same way as the URL control sites. For example, the screenshot above
shows a destination URL exception for xiplink.com, meaning that there is a welcome page exception
for any users accessing any URL containing "xiplink.com".
Use the Source IP Exceptions text box to enter the IP addresses (one per line) of users who should never
see the welcome page. You can use the * character as a wildcard for any of the octets in the IP address.
For example:
10.11.12.13 matches the user(s) with IP address 10.11.12.13.
10.11.12.* matches any user(s) on the 10.11.12.0/24 subnet.
10.11.*.* matches any user(s) on the 10.11.0.0/16 subnet.
10.*.12.13 matches any users on the 10.0.0.0/8 subnet whose IP address also ends with 12.13.
Only use the * wildcard character to represent an entire octet of an IP address. Using the
wildcard to match part of an octet (for example, 10.2*3.4.5) is not supported and will have
unpredictable results.
82
4.6. System
This section describes device settings unrelated to networking or optimization.
You can click on the Open User Guide button to download a copy of the XipOS User Manual.
The Display Support Report button reveals a large amount of diagnostic information that XipLink can
use to assist you.
The Download Support Package will generate a compressed support file that can be analysed by support
personnel.
The Support package will contain all current configurations of the unit, including all IP
addresses and any tunnel passwords. Care should be taken as to who has access to these files
4.6.2. Logs
The Logs tab allows you to configure the device to act as a syslog server or client (or both). It also displays
the last 10 lines of the device's system log (including log messages received from syslog clients). This is a
prime resource for diagnosing problems. Use the troubleshooting guide to address any errors you see here.
If errors persist, please provide the error information to XipLink's support department.
83
4.6.3. Stats
The Stats tab configures the data monitoring service on the optimizer.
Select Collect additional statistics for QoS queues to record statistics for all the individual QoS classes.
Enabling this option adds a "QoS queues" category to the main menu of the Optimizer Montoring Tool.
Collecting QoS statistics can require a significant amount of disk space. XipLink recommends
only enabling this option if your device has a small number of QoS classes, or if your device is
equipped with a hard drive (such as a web cache enabled device).
If collecting additional statistics for QoS queues is enabled, you can also select Collect additional DSB
statistics for QoS queues to include Dynamic Socket Buffer statistics for each QoS queue.
84
QoS statistics are only gathered for the bottom-most (leaf) queues.
Select Act as a server to collect statistics from other devices to allow this device to receive statistic data
from other XipLink optimizers. Enabling this option affects the main menu of the Optimizer Montoring
Tool.
Collecting statistics from other devices can require a significant amount of disk space. XipLink
recommends only enabling this option if your device will receive data from a small number of
other optimizers, or if your device is equipped with a hard drive (such as a web cache enabled
device).
Select Save stats to this device to have this device record its own statistics.
Automatically delete statistics after a specified amount of days in order to automatically remove statistics
files that have become inactive. This is useful when collecting statistics from other devices, and some
those devices have come and gone over time (perhaps as your network topology has changed).
Select Send stats to to have this device send its statistics to another XipLink optimizer at the specified
IP address.
You can configure a device to not save its own statistics locally but still send them to another
optimizer.
Make sure the optimizer receiving the statistics is configured to act as a server to collect
statistics, as described above.
When gathering statistics in a central optimizer, please ensure that each device sending statistics
has a unique name. If two or more devices share the same name, the statistics gathered in the
central optimizer for those devices will be invalid.
4.6.4. Users
The Users tab allows you to change the system administration password.
If this device is accessible from a public network, please ensure that you supply a secure
password. The factory default password is insecure.
85
To change the system password, supply the current password and the new password. The new password
must be entered twice to confirm that it is correct.
The password can contain any combination of uppercase and lowercase characters, numbers, and special
characters.
The new password's score reflects the password's complexity and is a rough guide to the password's level
of security. A score of at least 50 is recommended for safe password practices. A password's score increases
when it uses a mix of numbers, uppercase and lowercase letters, and punctuation.
With the current and new passwords entered, click the Update Password button to change the system
administration password.
Should you forget the device's password, you must perform a factory reset via the serial port
to restore the default password.
4.6.5. Time
The Time tab allows you to configure the device's system clock.
Changing the device's time can sometimes close active connections passing through the device.
It can also cause your browser's session with the web UI to time out. You may need to reload
the web UI after changing the time.
The device's current date, time and time zone are displayed in the blue section at the top of the tab.
The time displayed updates according to the sampling rate setting in the dashboard.
Select Synchronize time using NTP to configure the device to set its time using the Network Time
Protocol. Specify the NTP Server(s) as a comma-separated list of IP addresses and/or DNS names.
When the device is not using NTP, you can set the date and time manually by entering the desired values
and clicking the Set Date and Time button.
86
Manual time configuration is performed instantaneously when you click the Set Date and Time
button. There is no need to "Apply Changes" to set the time manually.
You can change the device's time zone by selecting the desired zone in the dropdown and clicking the
Change Time Zone button.
The time zone is set instantaneously when you click the Change Time Zone button. There is
no need to "Apply Changes" to set the time zone.
4.6.6. Backup
The Backup tab allows you to collectively manage the device's configuration settings. Here you can save
the device's current settings as a named configuration profile. Profiles can be downloaded for backup,
uploaded, and restored (made active).
Always backup and download the device's latest configuration profile to ensure minimum
downtime in case of device failure or misconfiguration.
87
To apply a configuration profile, select it and click Install selected profile. This replaces the device's
current and permanent configuration with the profile's settings.
Once the profile is installed, the device is rebooted for the new profile to take effect.
Installing a profile replaces the device's current configuration. To easily recover the current
configuration, save it as a new profile before installing a different profile.
4.6.7. Upgrade
The Upgrade tab allows you to update the device's XipOS version, undo an upgrade by reverting to the
previous XipOS image, or reset the device to its factory defaults.
XipLink is continuously improving its products, and regularly releases XipOS updates. You can obtain
XipOS updates from your XipLink distributor or from the XipLink customer support portal on our web
site at http://www.xiplink.com/.
Upgrading the device requires a significant amount of memory. If your device is particularly
busy, you may not be able to upload the upgrade package to the device. To reduce the device's
RAM usage, go to the Optimization tab in the Optimization settings and turn off compression.
Allow a few minutes after applying this change for active connections to terminate, and the
device's RAM usage should decrease. Once the upgrade is complete, you can turn compression
back on.
88
Click on Browse... to specify a XipOS upgrade package file on your browser's PC. Then click on Upload
to upload the package.
On slow links it may take a few minutes to upload the upgrade package. Please do not close the upgrade
window until you see the following window, confirming that the upload succeeded.
Here you can choose to use the new XipOS version's factory default configuration instead of carrying over
the device's current configuration.
Using the new XipOS version's factory defaults will overwrite all of the device's settings,
including IP addresses.
Click on the Upgrade now button to begin the upgrade. The upgrades progress is displayed as the process
proceeds. The device will automatically reboot when the upgrade is complete.
When the device reboots, you may receive a timeout error from the web UI. Simply reload the
web page to reconnect the UI.
Upgrade Troubleshooting
In rare cases an upgrade may fail. When this happens, the device will reboot itself to revert back to its preupgrade configuration. After a failed upgrade, a red "UPGRADE FAILED" message appears in dashboard:
89
Click the "UPGRADE FAILED" message in the dashboard to open the Upgrade Failure window.
This window displays the Upgrade Failure Log, which records any problems that may have occurred
while migrating your device's configuration during the upgrade.
You can also click Download All Logs to download an archive of all the system logs taken during the
upgrade. Please report any upgrade failures to XipLink Support, and include the log archive so that we
may assist you as quickly as possible.
Click Clear Upgrade Failure to remove the "UPGRADE FAILED" message from the dashboard.
Please note that alternate boot partition may not contain the same system settings as currently
set due to changes being applied to the current partition
It is recommended that you do a system backup prior to proceeding so that these setting may
be restored again once the alternate partition has booted.
90
4.6.8. Reboot
The Reboot tab allows you to reboot or halt the device.
You should halt the device before shutting off its power, to ensure that the system is shut down
in a clean state.
You can reboot (or halt) the device immediately, or specify a number of minutes to wait before rebooting
(or halting). This is useful if you wish to schedule the reboot (or shutdown) for a particular time.
Rebooting the device reloads its last saved permanent configuration. Any settings that were only
saved to the running configuration will be lost.
91
4.6.9. Files
The Files tab allows you to transfer files to and from the appliance. This provides an alternative to using
the command-line interface's scp utility (which is only available on "Crypto" product models). XipLink
appliances also provide an FTP client in the command-line interface, but you may find the facilities in the
Files tab more convenient to use.
To upload a file, click Upload file. This opens the Upload File window.
92
Use your web browser to Specify a file to upload, then Specify a directory to upload the file into.
To download a file, click Download file. This opens the Download File window.
93
4.6.10. Diagnostics
The Diagnostics tab provides valuable information on the current state of the device. Click the Update
Diagnostics Info button to view the current diagnostics.
94
Refer to the diagnostics tools section of the manual for further explanation.
4.6.11. Debugging
The Debugging tab is an aid for verifying communication between the browser and the device. It displays
the messages the UI receives from the device.
95
Redundancy requires a second XipOS device to be on hot standby (referred too in above diagram as
'Cluster ID B'), ready to take over should the primary device fail. Each device then shares the same Virtual
IP addresses on each side of the unit. The Virtual IP addresses are then to be used as the Gateway addresses
for the adjacent equipment for proper routing to be take place. The Preferred master will continue doing a
CARP broadcast for as long as it is available. The standby device will take over if the primary device stops
broadcasting that is still available. CARP operates in preemptive mode whereby both sides interfaces will
be promoted to Master or demoted as any status change is detected, thereby ensuring that traffic will flow
bi-directionally through a particular unit. Failover normally happens in a fraction of a second, with little
to no packets being dropped while the standby device becomes available.
The redundancy current state of each devices is shown in the Dashboard section of the UI for quick
reference
It is important that a multicast capable switch is deployed on either side of the XipOS based
devices.
96
provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for
manual enabling/disabling of these backup links.
The key in this topology are the STP capable switches. The backup route will have the switch port shutdown
in order to prevent a bridging loop. Once the Primary route fails, A STP election takes place whereby the
backup route will be activated.
As the primary switch port will be shutdown, the only way to manage the device is through the management
LAN port
There is no UI configuration currently required for STP mode as this is enabled by default.
Fail-to-wire is achieved through a hardware relay between the physical Bridge and wireless ethernet ports.
The default state when the unit is powered off is to allow traffic to pass directly between the Bridge and
Wireless interfaces.
97
The statistics tool renders graphics as SVG files. Modern browsers such as Firefox and Opera
can display SVG files natively. Should you wish to view the statistical graphs in Internet
Explorer, you will need to install an SVG viewer plug-in such as Adobe's SVG Viewer.
The Optimizer Monitoring Tool contains a menu on the left for selecting graphs to view. The menu is
divided into different categories. Clicking on a category's heading reveals the names of the graphs available
within that category.
Clicking on a graph's name in the menu displays the graph at the top of the page. Any other graphs that
were already on the page are shifted down. The tool will only display as many graphs at one time as will
fit in the browser window. If the browser window is full, adding a new graph will remove the oldest one
(at the bottom) from the display.
98
If you resize your browser's window, you must reload the page to have the tool recalculate the
new display area.
If your optimizer is configured to collect statistics from other devices, then the menu's top level
lets you select which device's statistics you wish to view, with the available categories and
graphs for that device below the device's menu entry.
These statistics show the benefits derived from packet coalescing and header
IP-Optimization statistics:
These statistics show the benefits of packet compression and byte caching.
99
Cache statistics:
(Cache enabled products only) These statistics cover HTTP traffic and the web cache.
LAN network statistics: These statistics show network traffic coming and going on the LAN side of
the device (i.e. through the Routed or Bridged interface).
Wireless network statistics:
device's Wireless interface.
These statistics show network traffic coming and going through the
QoS queue statistics: (Only available if the device is configured to collect QoS statistics) This category
contains a sub-category for each QoS queue configured on the device. Each queue's statistics show how
much traffic is passing through the queue.
QoS statistics are only gathered directly for the bottom-most (leaf) queues. These data are
aggregated into statistics for parent queues.
System statistics:
Advanced statistics: This category contains statistics for low-level internal subsystems. This data is
mainly used by XipLink support staff to help analyze problems.
LWT statistics:
100
101
-----
102
Obtain the latest version of the XipOS via the downloads section of the XipLink customer portal.
2.
Copy the new image to the device. From a *nix host you can use the scp command:
scp upgrade.image.pkg root@{device_ip}:/upgrade.image.pkg
3.
4.
103
If you are still within your maintenance period or have extended your maintenance contract, you are entitled
to a free upgrade to the latest XipOS release. Please contact XipLink with your details and the serial number
of your unit, and we will ship you the latest version of XipOS on a CF card.
8.2.2. Procedure
Before replacing the CF card, make sure that the device is switched off and that the power and
network cables are disconnected (unplugged).
1.
2.
104
Remove the CF card from the CF card slot on the motherboard by sliding it out.
4.
5.
105
The upgrade is now complete. Switch on the device and verify that it is working correctly.
106
This example shows an error that occurred while applying changes to the device. One of the settings
contained an invalid IP address. The error messages show the invalid value, that the netconf Interface
module failed to apply the bad value, and that the reconfiguration operation was aborted and successfully
rolled back.
Click on the Show detail button to see internal details of the error:
107
The following example shows an error that occurred when trying to apply a configuration with an invalid
gateway address. The address is not reachable via the currently configured subnets.
Netconf error messages are designed to provide you the information you need to resolve misconfiguration
issues.
However, netconf will return a "Null" error message when it encounters an error condition it does not
know how to describe. Should you receive such an error, we kindly request that you forward to XipLink
the details and steps you took to produce the error. Please refer to the Support section of the manual for
XipLink contact information.
108
Each netconf request is clearly identified by a log entry. All netconf log entries show:
A log level (DEBUG, ERROR, etc.) for the entry.
A source code file name and line number indicating where the entry was generated.
Particulars relating to the specific netconf session.
By default netconf only logs messages with an ERROR level. If you wish netconf to record log entries for
other levels, log into the device and create a file named /management/cgi-bin/netconf.dbg.
The file should contain a single line with the desired logging level: error, warn, info, or debug.
Here's a quick command that create the file with the debug logging level:
echo debug > /management/cgi-bin/netconf.dbg
The debug logging level records a lot of information. Be sure to restore regular logging
(by deleting the /management/cgi-bin/netconf.dbg file) once you have finished
working with the netconf logs.
At the default (error) logging level, aside from error messages netconf also logs some bookkeeping
information about the requests it receives, which modules it invokes and skips while processing the request,
the result of each module's invocation, and whether netconf successfully created a reply.
Some parts of the UI (the dashboard, the statistics tool) regularly poll the netconf system
for their data. These requests can quickly create several irrelevant netconf log entries. While
troubleshooting we recommend closing any statistics windows and turning off sampling in the
web UI's dashboard.
9.3.1. netstat
The netstat tool displays network connections (both incoming and outgoing), routing tables and
network interface statistics. The XipOS version understands the SCPS protocol and can display SCPS
statistics. The standard netstat options are documented in the FreeBSD netstat(1) manual page
[http://www.freebsd.org/cgi/man.cgi?query=netstat&manpath=FreeBSD+7.1-RELEASE].
The XipOS netstat has been extended in several ways.
Active Connections
When displaying active connections, the XipOS netstat shows two sockets per connection: one
representing the TCP side on the Routed (or Bridged) interface, and the other representing the SCPS side
on the Wireless interface. The two sockets are used to proxy each connection through the device.
109
servers)
Foreign Address
10.244.128.11.135
10.246.76.73.64496
10.244.128.11.135
10.246.76.73.59796
10.244.0.62.1149
10.246.76.77.56199
10.244.128.11.135
10.246.76.73.60730
(state)
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
Note the full port spoofing: The Local and Foreign addresses and ports are the same for both TCP and
SCPS, but tuples are reversed.
dsb snd
DISABLED+ENABLED--DISABLED+ENABLED--DISABLED+ENABLED--DISABLED+ENABLED---
The Recv-Q, Send-Q and (state) columns were removed in this example to improve
legibility. The -e parameter adds the dsb rcv, dsb snd, session and eff cwnd
columns.
Each socket either has DSB ENABLED or DISABLED. Sockets with DSB disabled have two flags that
explain why:
DISABLED+- The first + means DSB is disabled because the session is suspended.
DISABLED-+ The second + means DSB is disabled as part of the XipOS kernel's event suppression
mechanism.
Note how linked TCP and SCPS sockets are linked by a common session number.
The eff cwnd column shows the size of each socket's current effective congestion window.
displays statistics for all SCPS connections and packets on the Wireless interface alongside TCP statistics
for the Routed (or Bridged) interface.
110
This can highlight discrepancies between the TCP and SCPS traffic.
This example shows only the additional SCPS-related statistics that netstat displays.
Here we can see an unusually high number of duplicate ACKs. Further investigation is required into the
routing configuration and the wireless link's latency.
queue root.BasicOpt on rl0 bandwidth 100 b qlimit 208 qdlimit 42 rtt 1000ms hfsc( upperlimit 2.50Mb )
[ pkts:
2847961 bytes: 1028853040 dropped pkts:
0 bytes:
0 ]
[ qstate:
PUSH tokens:
208 qlimit:
208 qdlimit
42 ]
[ sessions:
1 active (scps:
0 tcp:
0) queued (scps:
0 tcp: 0 ]
[ css:
0 tss: 312440 rss:
0 ctr:
0 ttr: 624880 ]
[ cts:
0 tts:
64240 rts:
0 csr:
42 tsr: 128480 ]
[ pigs:
87 cpm:
0 tpm: 624880 ]
[ qlength:
0/209 ]
[ measured:
2.9 packets/s, 3.47Kb/s ]
queue root.Default on rl0 bandwidth 100 b priority 7 qdlimit 34 rtt 800ms hfsc( default upperlimit 2.5
[ pkts:
1075488 bytes: 434356797 dropped pkts:
0 bytes:
0 ]
[ qstate:
PUSH tokens:
50 qlimit:
50 qdlimit
34 ]
[ sessions:
0 active (scps:
0 tcp:
0) queued (scps:
0 tcp: 0 ]
[ css:
0 tss:
75920 rss:
0 ctr:
0 ttr: 151840 ]
[ cts:
0 tts:
51100 rts:
0 csr:
0 tsr: 102200 ]
[ pigs:
0 cpm:
0 tpm: 151840 ]
[ qlength:
0/ 50 ]
[ measured:
1.5 packets/s, 5.37Kb/s ]
111
The important parameters for each queue are its qstate, the number of sessions and, if acceleration is
enabled, the number of SCPS connections in the queue.
Each queue's buffer status is indicated by the css, tss, ctr and ttr flags.
Any sessions that are inactive and suspended for a long period of time are moved to the pigs buffer to
make more memory available to the current active sessions.
An excess number of pig sessions could indicate that a denial of service attack is underway.
112
113
Support
The Customer Portal login link is available on our website at www.xiplink.com [http://www.xiplink.com/].
The Client Login link is at the top of the page.
2.
3.
Once a XipLink support engineer confirms that the device is faulty, the support case number becomes
your RMA number. Return the device to your nearest XipLink distribution centre. (Contact your
XipLink representative to determine the XipLink distribution centre closest to you.)
Although you must bear the expense of shipping the unit to XipLink, we will bear the expense of
shipping you the replacement unit.
4.
If the unit is still under warranty, it will be repaired or replaced as per the warranty terms and
conditions.
Should the unit no longer be under warranty, a quote for repair is issued needs to be accepted prior
to commencing any repairs.
In some cases XipLink may return the unit to its original manufacturer for repairs.
5.
Once the unit is repaired (or replaced), the RMA case is marked "resolved" and the unit is shipped
back to you at XipLink's expense.
6.
The RMA case is only closed once you have received the repaired (or replaced) equipment.
114
Support
XipLink continually monitors its RMA process. Any cases that take an inordinate amount of
time to complete are automatically escalated to our Directory of Operations.
A:
A hub-side optimizer can support multiple logical wireless networks, decreasing the capital costs
to support remote users that may be using different RF access technologies. Any combination of
wireless networks can be defined on a single hub: TDMA, SCPC, Point to Multi-point, Mesh, Swift,
BGAN, etc.
By defining logical wireless networks, CPU and memory resources are fairly allocated across the
wireless optimizer and under the policy control of the operator. Queues for various traffic types can
be established and priorities assigned for each remote wireless network.
XipOS rate control algorithms drive each individual logical wireless network to the maximum
capacity without overdriving a downstream link or creating side effects to other networks and users.
Q:
Can remote devices running older (2.x) versions of XipOS operate with the new (3.x) software
installed at the hub-site?
A:
Yes. One benefit to basing our wireless optimization solutions on the SCPS protocol is that the
optimizers on each side of a wireless connection negotiate the strongest common set of functions
they can support. So, while new devices gain access to new features, older devices will always
continue to optimize based on the capabilities available to them.
Even in partially built networks, optimized users experience better connection speeds and wireless
network utilization while users from unoptimized sites continue to operate normally. Wireless
optimization is completely transparent to all users.
Q:
A:
No. There is no functional distinction between optimizers installed at hub site versus remote
gateways, so the solution works well on meshed networks as long as they are sized appropriately.
Q:
A:
XipLink was the first and remains the highest-performance implementation of SCPS-TP. It was
implemented purely from the specification without any of the reference software. As a result of
careful engineering, it has performance and capabilities far beyond the reference implementation or
any derivative. The reference implementation is suited more for experimental purposes and is used
by those trying to understand the SCPS-TP protocol.
Q:
How does XipLink software deal with SYN attacks or similar forms of denial of service
attempts?
A:
A XipLink device operate as a split-connection TCP proxy. It implements SYN caching to protect
the CPU from interrupt overloads, but is still vulnerable to some forms of SYN attacks. When an
attack occurs, the maximum number of accelerated connections may be reached, at which point new
connections bypass optimization, but continue using standard TCP communications, assuming the
link itself is not denied.
Once the source of an attack is determined, an optimizer can selectively bypass the optimization
function according to operator-defined rules based using TCP ports and/or IP addresses.
115
Support
Q:
What are the maximum number of optimized sessions per unit, and what happens when that
maximum is exceeded?
A:
The maximum number of sessions a XipLink wireless optimizer can handle is fundamentally
determined by the CPU and memory available. XipLinks XA-Series of scalable appliances range
from the very low end of 2 Mbps and 50 simultaneous optimized TCP sessions to the XA-30K which
can operate at 155 Mbps and supports 30,000 optimized TCP sessions.
An embedded system using XipLink optimization may choose to restrict the amount of memory and
processing cycles available to XipOS, thereby reducing the maximum number of optimized sessions
the device can support.
Once a unit reaches its maximum number of optimized sessions, and additional sessions are
processed without optimization, and the unit acts as a standard router or bridge.
Q:
How many new sessions per second can the hardware appliances process?
A:
The XA-Series of appliances matches the CPU and memory with the anticipated network load and
can easily handle over 500 TCP connection requests per second.
Q:
What happens when the network exceeds the bandwidth limitations on an optimizer?
A:
The XipLink wireless optimization software has been designed from the ground up to operate in a
wide variety of networking environments. A key underlying capability of the software is to rapidly
and fairly process as many connection requests as possible, up to a specified memory boundary. In
some cases, the number of requests transiting an appliance (or transiting the software as it resides
in a remote device) will exceed the available memory. When this happens the overflow sessions
simply bypass the optimization function and pass transparently through the device, so these users
will momentarily experience standard throughput until some memory again becomes available.
Q:
Is there a limit to the number XipLink Accelerators that can be deployed in a network?
A:
One of the key benefits of a XipLink deployment is that once the headquarters earth station
or terrestrial hub site optimizers are deployed, any user that initiates sessions from a network
(or a device containing the XipLink software) immediately gets the benefit of optimization. Full
functionality is available over any topology and during partially completed deployments. Because
there is no end-to-end configuration required in the XipLink architecture there are no technical limits
to the number of sites that can communicate with one another or with a central site. There remains
a need to properly identify the anticipated maximum TCP session count for each site, based on the
aggregate load to and from each site.
Q:
The names of the congestion control schemes have changed after XipOS 2.x. Are there any
underlying differences in how the schemes are implemented?
A:
There is indeed a significant difference between the current and 2.x congestion control schemes.
Current XipOS does rate control per QoS queue at the device driver layer, so all congestion control
mechanisms can benefit from the rate control mechanism embedded in QoS. Even with Enhanced
TCP, in current XipOS the packets are still rate controlled. This means that the device will do
standard TCP slow start, fast-retransmit / fast-recovery and congestion avoidance. But if the queue
the packets are going through is set to a specific rate, then the device will not send faster than that.
This also means that you now must create a QoS queue specifically for UDP (or other non-TCP
protocols) if you want that traffic to get a non-default level of rate control, because every packet
passing through a post-2.x XA goes through a QoS queue that does rate control.
This is a significant departure from XipOS 2.x, where rate control was applied at the transport layer
and if you selected Enhanced TCP the actual packets on the wire could go faster than their configured
rate. They would in fact be sent at the link speed (e.g. 100Mbps for 100baseTX), which could cause
116
Support
bursts that other devices in the network would detect and tamper down through standard TCP rate
control mechanisms.
XipOS 2.x rate control would respect the configured rate on average, but if you looked closely (at
a millisecond resolution) you would see those bursts. XipOS now has finer-grained rate control.
Fixed rate control is close to XipOS 2.x's rate control, except that it falls back to standard TCP
whenever it starts losing packets. Fixed rate control is roughly akin to replacing TCP's slow-start
with rate control but with the standard congestion avoidance mechanism.
Dynamic rate control in does the same thing as Fixed, but it also avoids "forcing" packets to a
receiver with a small window.
You can use Fixed rate control to defeat some packet shapers that shape based on advertised window
size, or to gain better performance when there is no XA device on the other side of the link.
117
Application
SME
XA-4000
(-C)
SME
4 Mbps
8 Mbps
16 Mbps
45 Mbps
Concurrent
Connections
200
500
2,000
4,000
10,000
30,000
30,000
Fail to Wire
No
No
Yes
Yes
Yes
No
Yes
Web Cache
No
No
No
Interactive LCD No
No
No
Yes
Yes
Yes
Profile
Set-Top
Set-top
Set-top
1u
1u
2u
1u
Rackmount Rackmount Rackmount Rackmount
Height
35mm
38mm
35mm
44mm
44mm
88mm
44mm
Width
115mm
290mm
156mm
430mm
430mm
430mm
442mm
Depth
115mm
170mm
225mm
393mm
393mm
393mm
520mm
Network
Interfaces
10/100
Mbps
10/100/100010/100/100010/100/100010/100/100010/100/1000
Mbps
Mbps
Mbps
Mbps
Mbps
0.9kg
1.8kg
Network
speed
Weight
IF 10/100
Mbps
0.5Kg
6kg
Yes
6kg
13kg
12.2Kg
10W
14W
60W
350W
350W
500W
400W
118
Appendixes
DNS cache
Accelerates all TCP/IP applications
I-PEP (Satlabs) standard compatible
Anti-denial of service tools
119
Glossary of Terms
This section contains definitions of terms found in this manual.
Autonomous System
This is a field in the header of IP packets for defined packet classification purposes.
This refers to a graphical user interface that can be navigated by means of a mouse
or directional keys.
OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets
solely within a single routing domain (autonomous system). It gathers link state
information from available routers and constructs a topology map of the network.
The topology determines the routing table presented to the Internet Layer which
makes routing decisions based solely on the destination IP address found in IP
datagrams.
120
Glossary of Terms
The Real-time Transport Protocol (RTP) defines a standardized packet format for
delivering audio and video over the Internet. It was developed by the Audio-Video
Transport Working Group of the IETF and first published in 1996 as RFC 1889,
and superseded by RFC 3550 in 2003.
Secure Shell
Selective
Acknowledgment
Negative
The receiver explicitly lists which packets, messages, or segments in a stream are
not acknowledged.
Service Group
In a WCCP deployment, service groups identify which traffic the WCCP router
should forward to the optimizer.
SNACK
Space
Communications
Protocol Specifications
The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free
topology for any bridged Ethernet local area network. The basic function of STP is
to prevent bridge loops and ensuing broadcast radiation. Spanning tree also allows
a network design to include spare (redundant) links to provide automatic backup
paths if an active link fails, without the danger of bridge loops, or the need for
manual enabling/disabling of these backup links.
STP is a Data Link Layer protocol. It is standardized as IEEE 802.1D. As the name
suggests, it creates a spanning tree within a mesh network of connected layer-2
bridges (typically Ethernet switches), and disables those links that are not part of
the spanning tree, leaving a single active path between any two network nodes.
SYN Flood
A channel access method for shared medium networks. It allows several users to
share the same frequency channel by dividing the signal into different time slots.
The users transmit in rapid succession, one after the other, each using his own time
slot. This allows multiple stations to share the same transmission medium (e.g.
radio frequency channel) while using only a part of its channel capacity.
One of the core protocols of the Internet Protocol Suite. TCP is one of the two
original components of the suite (the other being Internet Protocol, or IP), so the
entire suite is commonly referred to as TCP/IP. Whereas IP handles lower-level
transmissions from computer to computer as a message makes its way across the
121
Glossary of Terms
Internet, TCP operates at a higher level, concerned only with the two end systems,
for example a web browser and a web server.
Very Small Aperture Terminal
A Virtual Local Area Network (VLAN) separates a single physical network into
logically isolated virtual networks. The separation is implemented in layer 2 of the
networking stack (i.e. Ethernet), and so is independent of Internet Protocol (layer
3) network partitioning.
Window scaling
The TCP window size field controls the flow of data, and its value is limited to
between 2 and 65,535 bytes. Since the size field cannot be expanded, a scaling
factor is used. The TCP window scale option, as defined in RFC 1323, is used to
increase the maximum window size from 65,535 bytes to 1 Gigabyte. Scaling up
to larger window sizes is a part of tuning TCP for high-latency wireless links.
122