By continuing to browse the site you are agreeing to our use of cookies. Agree

Follow Us:
    

Network Automation
Clear Math Model
Declarative Intents
Focus on Services
Network Visibility
High Performance
Programmability
Infrastructure as Code
SLA and QoS Driven
Revenue Assurance
5G Network Slicing
Bare Metal Hardware
Automated Operations
Self Remediation
Real-time Analytics
High Availability
No Vendor Lock-ins
Closed Management Loop
Multilevel Abstraction
Telco Grade SDN
Segment Routing
Historical Big Data
KPI Management
Streaming Telemetry
Service Assurance

Network Automation

Like the spy genre? Then you need agents! The common cornerstone of software defined network architecture consists of SDN controllers, which are your resident spies inside network. They allow your network to accomplish its mission of providing the optimal solution to your business processes. We offer state of the art software, which will do the trick at a low price.

Network Automation

Full Automation

We understand that the main rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. But we also bear in mind that automation applied to an inefficient operation will magnify the inefficiency. And reality lies somewhere in the middle.

Multilevel Abstraction Model

To be or not to be? What to do or how to do it? Declarative network programming is following a new paradigm of intents. Unlike traditional imperative operations, everything happens automatically now, increasing value to the market.

Focus on End-2-End Services

Finally, you can focus on your service, we will do the rest. You no longer have to assemble a mosaic constructor from different suppliers. Vendors will no longer dictate terms to you. Now your service works only on your revenue.

Declarative Rules

We do not program every step, which is very convenient. It is enough to think through the logic of decisions for network elements, and controllers will do the rest themselves.

Intent based networking

Can you control an anthill? The answer is yes if the system controls itself, transforming the private intents of its elements into a common network policy. Applying this principle, we create an individual set of rules, thanks to which your service will take care of itself, automatically restoring performance in case of failures and constantly improving to achieve the best results. In general, nothing special - just optimal solutions. The less the system depends on human intervention, the more it is protected from errors, that's all.

Network Slicing

A photon of light is delivered from the Sun to the Earth in about 8 minutes and 20 seconds. But do you know how long time elapses between pressing the send button at one end and receiving the email at the other end? The Network Slicing concept, a new stage in the evolution of mobile communications, significantly accelerates the exchange of data between the user and the application. It is used not only for 5G, but also for unlocking and unfolding new perspectives for augmented and virtual reality, and even for tactile communication between people.

High Availability

Many hands make light work. High availability cluster consists of several servers, and in the event of a failure of one, other servers quickly and automatically pick up the load, ensuring the continuity of the cluster as a whole. It is such a trivial matter that some even forget to pay attention to it.

Network Visibility

It's easy to understand what we need in general, but how do you know what each wants? Using network segmentation, we aggregate and summarize information, providing insight into every part of the process, as well as overall transparency, ease of management, and timely warning of threats.

Network Visibility

End-to-End Service Visibility

Some have already experienced the benefits of distance medicine. Perhaps right now, the bracelet on your arm helps doctors monitor your health around the clock. The same applies to your services, thanks to End-to-End Network Visibility which monitors performance and prevents crises proactively.

Streaming Telemetry

Information rules the world, right? Not anymore. Systems are becoming more complex, speed is growing, and now only timely information rules the world. Streaming telemetry data and processing it in real-time is called Streaming Telemetry. It may soon be named differently, but so it is named for the time being.

Closed Loop Management

One of the oldest images of mankind is a snake biting its tail. The meaning of this symbol is found in continual rebirth and, as a consequence, eternal life. Closed Loop Management is a closed circle of the automated functioning of a single circuit of your network, parts of which are united not only by a common principle but also by the task of supporting each other.

Automated Recovery of Services

Your customers will not even notice if something goes wrong. When a deterioration in the characteristics of a service is detected, the program runs an automatic re-configuration procedure in accordance with pre-prepared triggers. You might think that your service is looking forward to the call of alarm. In the case of Automated Recovery of Services, this is true.

Real-Time Analytics

Your network analyzes the streaming data of your service, using all previously accumulated information. Whether you call it Real-Time Analytics or Big Brother, nothing better has been invented to date.

Historical Big Data

Where were you from 5pm to 11pm last Friday? Who can confirm this? With Historical Big Data, the elements of your service have a cast-iron alibi at any given time, and you can receive historical data of any depth, allowing you to conduct analytical calculations for the entire volume of selected data.

KPI Management

Any important business requires order and consideration. KPI Management provides the possibility of round-the-clock generation of periodic and operational reporting, including on demand. You can say this is the internal chief accountant of your service.

Infrastructure as Code

A little body doth often harbour a great soul. Even the best hardware is nothing but a pile of metal without declarative definitions that bring your system to live through machine-readable files. Here we activate the hardware to perform the tasks of your services. What would artificial intelligence call it? Surely it would choose something divine for this moment.

Infrastructure as Code

Bare Metal Hardware

Do not read this if the vendor's revenue is more important to you than your own, and you want to use expensive black boxes from the leading vendors. Why not? But if you need interchangeable hardware from less expensive suppliers, we can also install it and develop software to fit your needs exactly. Choose wisely!

Multi-Tbps Performance

Perhaps your services have been working already for so long that network devices are still based on the regular Intel x86 platform. We will help you upgrade the system using special silicon chips that are specifically designed to process network packets. Compared to Intel x86, they are many times more productive, but they are much cheaper. Time does not stand still, follow us!

Open API

Regardless of programming languages, this specification has many useful tools that are collectively used for client, server, and related interface documentation. We take this opportunity to express our gratitude to SmartBear for their significant contribution and a civilized viewpoint on things.

Hardware Agnostic Router OS

Our Linux-based operating system turns bare metal hardware into a full-fledged telecom router. No rocket science, no magic, pure math.

Telco Grade Functionality

A good building is built with good bricks. We use only well-programmable chips of best-of-breed merchant silicon. This allows to ensure the full functionality of the telecom operator, and the data centre gains a powerful supply of future opportunities.

Segment Routing

Network traffic routes for Network Slicing might take either of two ways, SR-MPLS or SRv6. The first might be called a walk to the spaceport; the second, access a spacewalk. Depending on the task at hand, we are ready to lead you along both, but sooner or later your service will receive Unlimited Scalability when the servers scale at your request and create a sense of flying above cloud hosters.

Revenue Assurance

There are always things that do not depend on us, and things that can be changed for the better. Accepting the first as an objective reality, we are pleased to announce that your stability is ensured by our efforts. We will help you control all the holes through which revenue can leak, just set your wallets there!

Revenue Assurance

Simplicity

As we all know, simplicity is the seal of truth. You can call it a cornerstone of Digital Transformation, or note that the trouble with measurement is its seeming simplicity. In any case, we understand what it is.

Business Intents Driven

The intent-based network concept is a giant step into the future when you no longer need to program each action for the elements of your service. They will solve everything themselves, and we will help them.

Focus on End-2-End Services

Finally, you can focus on your service, we will do the rest. You no longer need to assemble a multi-vendor mosaic constructor. Developers will no longer dictate terms to you. Now your service works only on your revenue.

SLA & QoS Oriented

Quality of Service describes a wide range of the quality of our services, and the Service Level Agreement guarantees the integrity of this area. You may work in peace: the border is airtight.

Service Assurance

It is always pleasant to know that there is someone or something that can solve all our problems. Service Assurance is a set of procedures for ensuring the performance of your network, ensuring the quality of service, monitoring this quality, as well as monitoring of the monitoring and control of the control. It is beneficial for us when everything works for you.

No Vendor Lock-ins

Any form of addiction is undesirable, whether the narcotic is alcohol, idealism, or vendor lock-in. We know that the world of Merchant Silicon is diverse and ready to provide you with the choice of any of the manufacturers, whose number is constantly increasing. So we just need to provide you with high-quality programmable off-the-shelf ASICs.

Fully Automated Operations

Fully Automated Operations is a huge turtle on which three elephants stand: productivity, performance and cost cut. The latter will exist until your controllers have their trade union, but this will not happen soon.

Technical Support

Software Defined Network is not a rocket science. But sometimes anyone of us needs help. Here we put public datasheets ans guides of our products. If you need more help please feel free to get in contact with us.

User Manuals

SDN Controller Getting Started Guide    
SDN Controller L2VPN Application User Manual    
SDN Controller FRR Application User Manual    
SDN Controller VPLS Application User Manual    
SDN Controller MCAST Application User Manual    
SDN Controller TAP Application User Manual    

Contact Us

 3A alliance, LLC. Reg.#40103868526

 10-40, Lielezeres str., Riga, Latvia, LV-1007

 +371-20026370

Cookies

What are cookies?

A cookie is a small text file that a website stores on your computer or mobile device when you visit the site.

●  First party cookies are cookies set by the website you’re visiting. Only that website can read them. In addition, a website might potentially use external services, which also set their own cookies, known as third-party cookies.

●  Persistent cookies are cookies saved on your computer and that are not deleted automatically when you quit your browser, unlike a session cookie, which is deleted when you quit your browser.

Every time you visit the our websites, you will be prompted to accept or refuse cookies. Cookies can be used to establish anonymised statistics about the browsing experience on our sites.

How do we use cookies?

Currently our websites do not use "first-party cookies". Only "third-party cookies" are used sometimes.

Third-party cookies

Some of our pages display content from external providers, e.g. Google, Facebook, Linkedin, Telegram. To view this third-party content, you first have to accept their specific terms and conditions. This includes their cookie policies, which we have no control over. But if you do not view this content, no third-party cookies are installed on your device.

How can you manage cookies?

You can manage/delete cookies as you wish – for details, see aboutcookies.org.

You can delete all cookies that are already on your device by clearing the browsing history of your browser. This will remove all cookies from all websites you have visited. Be aware though that you may also lose some saved information (e.g. saved login details, site preferences).

For more detailed control over site-specific cookies, check the privacy and cookie settings in your preferred browser.

You can set most modern browsers to prevent any cookies being placed on your device, but you may then have to manually adjust some preferences every time you visit a site/page. And some services and functionalities may not work properly at all (e.g. profile logging-in).