https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3392
Guy Harris <guy@xxxxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|Windows XP |All
Platform|x86 |All
--- Comment #2 from Guy Harris <guy@xxxxxxxxxxxx> 2009-04-05 11:19:15 PDT ---
One of the pages on Ximeta's (Flash-heavy) Web site speaks of their technology
as "patented", so perhaps there's a patent that describes the protocol.
There's a Web site for Linux drivers:
http://code.ximeta.com/trac-ndas
it includes *some* source code, but the comment in the beginning of
ndas_core_main.c speaks of "NDAS core binary as a form of "libndas.a."" and
seems to speak of at least some Ximeta software as not being free software.
The page at
http://mvixcommunity.com/showtopic.php?tid/213/
says
After digging on the internet, I belive, that NDAS uses LPX protocol in our
case too.
What is the LPX-protocol? LPX
LPX stands for Lean Packet Exchange. It is a downsized version of TCP/IP.
In comperison to TCP/IP it works more efficient with the availible bandwidth
and spares the host CPU. LPX utilize up to 85% of the bandwidth, while TCP/IP
only uses 65%. This advantage is bought dearly with losing the routing-ability.
Looking into MG35 description (which has NDAS too):
The MG35 talks "NDAS" via emulation. It consists of two parts: The ethernet
protocol (LPX) and the block device translator (NDEMU).
The ndemu.o kernel module talks to the disk and acts like a block device.
It hands over device data to lpx.o which transmits the packets over ethernet.
The remote system also has an LPX protocol driver to receive the packets and
hands those off to a virtual scsi driver.
NDAS's LPX protocol also seems to be encrypted (looks like 128bit). Encryption
and decryption is also handled by the ndemu.o module.
Ximeta's two US patents are 7,457,880 and 7,483,967.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.