INITIAL SAS DEPLOYMENTS CASE 1: Ultra320 SCSI Replacement CASE 2: "Super-sized" SATA Investment Protection Improved Reliability * Legacy SCSI Compatibility * Signal Integrity SATA Compatibility Improved Scalability * SATA Tunneling Protocol
* Addressability Improved Scalability Out-of-box Expansion * Addressing/Cabling * External Cabling Improved Performance Multi-Initiator Support * Bandwidth & Wide Links * SATA Tunneling Investment Availability Failover Support * Dual-porting * Dual Porting Improved Reliability Improved Availability * Point-to-point * (RAID 6)
It combines the best of Cisco's Layer 2 Forwarding protocol and Microsoft's Point-to-Point Tunneling Protocol
Stealth uses a Unisys-developed storage virtualisation technology and tunneling protocol
that supports information sharing among different user communities, while permitting data to be accessed only by users authorised to see it, the company said.
Serial ATA Tunneling Protocol
(STP) supports half duplex connections to the SATA devices attached to expanders.
Meanwhile, flaws discovered in the GSM digital cellular decryption algorithm and in Microsoft's point to point tunneling protocol
made it clear that closed groups working on proprietary technology are at a serious disadvantage compared to their open, peer-reviewed rivals like the far more robust IPSec.
SATA commands are transmitted over SAS connections as a "tunneling" protocol called SATA Tunneling Protocol
Other alternatives include Microsoft's Point-to-Point Tunneling Protocol
(PPTP), and L2TP, which combines PPTP with the similar Cisco Systems' Layer 2 Forwarding Protocol.
Cisco Systems have launched solutions to allow service providers to deliver Access VPNs, Intranet VPNs and Extranet VPNs and also released the Layer 2 Tunneling Protocol
(L2TP) within Cisco's IOS software.
The Serial Management Protocol (SMP) is used simply for managing the new serial point-to-point topology, while the SATA Tunneling Protocol
(STP) allows Serial-Attached SCSI to interface seamlessly with SATA devices.
Microsoft's point-to-point tunneling protocol
(PPTP) creates tunnels for transporting multiprotocol traffic over the Internet, but its capabilities are more limited than IPSec's.
Efficient's VPN solution uses Layer 2 tunneling protocol
to create a LAN-to-LAN communications link called a tunnel (a virtual path).