Download and try now free trail DataClone file transfer.
Reliability over WAN
RMDT provides fully reliable data transfer for one or many receivers, even over Wide Area Networks. Most Internet Service Providers prohibit multicast traffic in their networks due to its security vulnerability. Even worse, most multicast protocols do not have any built-in reliability, while the few protocols that do show very limited performance. RMDT solves all these problems by treating every receiver as a reliable point-to-point connection. This effectively eliminates the problem of slow and unreliable data transmission, even when using trans-continental links over the public Internet.
End-to-end 10 G (1x10)
RMDT supports multigigabit data rates of up to 10 Gbps. If multiple receivers are involved in the transmission process, the bandwidth is shared among them. Data can be sent in point-to-point mode with a rate of up to 10 Gbps, or in point-to-multipoint mode from 1 sender to 5 receivers with a rate of up to 2 Gbps to each of them. RMDT provides much higher data rates compared to a conventional data transfer. For example, a transfer of 10 Gigabytes of data from New York to Amsterdam will take up to 2,5 hours on a conventional TCP-based connection.* With RMDT, this transfer is completed in no more than 10 seconds.
*This example assumes a 10Gbps connection with a delay of 100ms.
Efficient usage of resources
RMDT makes the most efficient use of modern hardware architectures. Today, servers tend to evenly distribute their computational resources among several CPU cores, rather than concentrating them on a few high-frequency cores. This tendency allows RMDT to use the multi-core advantages of servers to handle the network streams even faster.
No infrastructure changes are required to benefit from all advantages of multigigabit data transfer with RMDT. Since RMDT is UDP-based, every network device is able to handle RMDT traffic. Even better, most firewalls don’t require any adjustment to support RMDT. The protocol’s predictable behavior makes it easy to set up any firewall rules and thus makes it suitable for even the most security-critical application.