Technology & Services

NAT/Firewall:

In the field of computer networking, NAT stands for Network Address Translation. In simplest terms, NAT allows many devices on a private network to share a single gateway to the internet. In turn, all of those devices will have the same public IP address—that of the gateway—and unique private IP addresses. These gateways are commonly found on wifi routers and some VPN services. For example, all of the devices connected to a NAT-enabled wifi router have different private IP addresses, but share the router’s public IP address.

A firewall is a layer of protection that prevents unwanted communications between devices on a network, such as the internet.

A NAT firewall works by only allowing internet traffic to pass through the gateway if a device on the private network requested it. Any unsolicited requests or data packets are discarded, preventing communication with potentially dangerous devices on the internet. If inbound internet traffic does not have a private IP address to forward to beyond the gateway, the NAT firewall knows the traffic is unsolicited and should be discarded.

We provide quality services & development of:

- Router, NAT Firewall, STUN, Port Forwarding, DHCP, PPPoE

Secure Communication:

Secure communications is a critical requirement in many sensor network missions, especially in ones that are military related. Toward this end several challenges are present. First, since the nature of communication messages is wireless, some information leakage through the transmission of wireless signal is unavoidable. Secondly, the energy constraints of sensors imply that computationally expensive techniques like public key cryptography are infeasible for WSNs. Simply provisioning a unique key for each sensor to communicate with the base station prevents sensors from communicating with each other. On the other hand, distributing the same key to all sensors exposes all communications under node capture attacks. When sensors are randomly deployed, it is not possible to predict where nodes are likely fall in the network. Hence pre-distributing same keys to those nodes that are within communication range of each other is not possible.

Secure communication protocols which we develop and implement for our customers: 

SRTP, HTTPS, SSLv3/TLSv1

Optimized Encryption Libraries:

An extensive component library allowing you to encrypt and decrypt files, emails, documents, and messages through major cryptographic standards, including AES, DES, 3-DES, CCMP, RC4, SHA1, RSA

ITU and ETSI Vocoders:

Selectable Mode Vocoder (SMV) is variable bitrate speech coding standard used in CDMA2000 networks. SMV provides multiple modes of operation that are selected based on input speech characteristics. Software implementation include: G.711 I & II, G.722, G.722A, G.722B, G.723A, G.726, G.728, G.729AB, GSM-HR, GSM-FR, GSM-EFR, GSM-AMR, iLBC, MELP, MELPe

Video:

Video Gateway is a video streaming server designed for large-scale video surveillance deployments. It can receive up to 256 IP cameras from various IP video devices. In addition, it can simultaneously distribute up to 600 channels to its clients which include: Gateway, Coders/Decoders

Acoustic and Line Echo Cancellers:

Echo suppression and echo cancellation are methods used in telephony to improve voice quality by preventing echo from being created or removing it after it is already present. In addition to improving subjective audio quality, echo suppression increases the capacity achieved through silence suppression by preventing echo from traveling across a telecommunications network. Implementation of protocols: G.165, G.168

Speech Processing:

Speech processing is the study of speech signals and the processing methods of signals. The signals are usually processed in a digital representation, so speech processing can be regarded as a special case of digital signal processing, applied to speech signals. Technology: VAD, DTX, PLC, AGC

Client and Server Side Scripting / Coding

Server-side scripting is a technique used in web development which involves employing scripts on a web server which produce a response customized for each user's (client's) request to the website. The alternative is for the web server itself to deliver a static web page. Technology: CSS, JavaScript, Ajax, ASP, ASP.NET

Web Application Testing

- Quality Assurance and Bug Testing
- Application Security
- Performance - Load and Stress Testing

© Copyright Castletown Global Limited 2023. All Rights Reserved.
This site owned and managed by Castletown Global Limited