SR X.25 and RFC1613 XOT C Source Library 1.3.18

SR X.25 and RFC1613 XOT C Source Library 1.3.18

SR X.25 and RFC1613 XOT C Source Library Full Download Summary

User Rating: 0 (0 votes)

  • File size: 847 kB
  • Platform: Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
  • License: Demo
  • Price: $1.00
  • Downloads: Total: 26 | This Month: 2
  • Released: Feb 28, 2020
  • Publisher: Sirius Network Software
  • Publisher URL: http://www.sirius-sys.com

SR X.25 and RFC1613 XOT C Source Library 1.3.18 Full Description

SR X.25 is a software library in C (supplied with full source code) which implements ITU-T recommendation X.25 - Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit. SR X.25 includes RFC1613 Cisco XOT protocol for X.25 over TCP applications. SR X.25 runs on Windows and Unix / Linux / Solaris and other OSes SR X.25 supports SVCs and PVCs SR X.25 internally at a lower layer interfaces to SrDL library. SrDL library is Data Link layer abstraction. When SR X.25 is ported into environment with LAPB or LAPD as data link layer, only SrDL module needs to change. SrDL links directly to SrSock module (also included in this package) - Winsock interface component that provides reliable TCP transport services similar to LAPB / LAPD / HDLC. SrX25 as provided to customer may be used immediately in X.25 over TCP (XOT) solution or it may be used with traditional LAPB or LAPD in which case only SrDL will need to be modified. Main Features: * DTE operation * DCE operation * 4095 VCs * incoming and outgoing SVC supported * Built-in RFC1613 XOT module * X.25 version: ITU-T (formerly CCITT) 10/96 * max packet lenght 1024 * all X.25 timer and counters implemented * interrupt packets supported * VC Statistics * Trace Function * User Facilities * Call User Data * M bit, D bit and Q bit procedures supported * Configurable window and packet sizes * Configurable incoming and outgoing LCN ranges SrX25 as provided to customer may be used immediately in X.25 over TCP (XOT) solution or it may be used with traditional LAPB or LAPD in which case only SrDL will need to be modified.

Requirements:

Windows XP/Vista/7/8/10/Unix/Linux

Release notes:

New Release
new release
[ SR X.25 and RFC1613 XOT C Source Library full changelog ]
free download

SR X.25 and RFC1613 XOT C Source Library 1.3.18 Bookmark

Hyperlink code:
Hyperlink and Intro code:
Hyperlink for Forum code:

SR X.25 and RFC1613 XOT C Source Library 1.3.18 Free Download Notice

Top 4 Download periodically updates software information of SR X.25 and RFC1613 XOT C Source Library 1.3.18 full version from the publisher, but some information may be slightly out-of-date.

Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for SR X.25 and RFC1613 XOT C Source Library 1.3.18 license key is illegal and prevent future development of SR X.25 and RFC1613 XOT C Source Library 1.3.18. Download links are directly from our mirrors or publisher's website, SR X.25 and RFC1613 XOT C Source Library 1.3.18 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, SendSpace, DepositFiles, Letitbit, MailBigFile, DropSend, MediaMax, LeapFile, zUpload, MyOtherDrive, DivShare or MediaFire, are not allowed!

Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for SR X.25 and RFC1613 XOT C Source Library 1.3.18 download. These infections might corrupt your computer installation or breach your privacy. A keygen or key generator might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.

SR X.25 and RFC1613 XOT C Source Library 1.3.18 - Post Your Review