EBOOK. The Network Comes of Age: Access and Monitoring at the Application Level
|
|
- Geraldine Morris
- 8 years ago
- Views:
Transcription
1 EBOOK The Network Comes of Age: Access and Monitoring at the Application Level Rev. A, January 2014
2 2
3 Table of Contents How Flow Analysis Grows Into Total Application Intelligence... 4 The Secret Life of Packets:... 4 Why application specific metrics are critical to performance monitoring... 4 The Foundation of Network Monitoring: Flows, Applications, Sessions and DPI... 5 Achieving Superior Monitoring and Analysis... 7 Application Specific Metrics: Examples of Web Based Applications
4 How Flow Analysis Grows Into Total Application Intelligence The Secret Life of Packets: Companies need to control or reduce complexity without sacrificing the level of detail that keeps the network running smoothly Why application specific metrics are critical to performance monitoring. Today the explosion of huge numbers of applications, many of which converge on the same port numbers, calls for revolutionary network monitoring architecture. This need goes well beyond traditional performance monitoring to provide a richer set of data than ever before. The growing numbers of applications bring with them a concurrent need for a costeffective application-awareness architecture that delivers full network visibility and availability. It would reveal the deep, application-specific metrics necessary to detect, isolate, diagnose and resolve problems. At the same time, companies need to control or reduce complexity without sacrificing the level of detail that keeps the network running smoothly. Small and medium-size businesses in particular need application metrics so that they can maintain quality of service without major investment in IT personnel. The needs of SMBs vary from those of large corporations: SMB resources are more limited and manpower both management time and financial means are constraints. SMBs need to focus resources on their core business and daily core business operations. They are looking for user friendliness so that they don t have to employ costly on-site engineers. SMBs are also concerned with achieving lowest total cost of ownership (TCO), which includes maintenance and support. 4
5 Thus, SMBs seek to create a total network monitoring and access architecture that extends visibility and control to the critical application layer and enables them to plug visibility holes in their infrastructure. Comprehensive visibility, application intelligence and real-time monitoring can help these companies address critical business needs. Acquiring the ability to look inside a payload and see key performance metrics is critical to achieving true performance management functionality. This feature is unfortunately lacking in many Network Performance Monitoring (NPM) and Application Performance Monitoring (APM) offerings. This ebook, through a thorough explanation of traditional and emerging monitoring techniques explores the sophisticated architecture behind Net Optics network monitoring architecture, a new route to the very capabilities needed to support a wide range of applications. This route leads to true business intelligence, reliability, and optimization of resource use in your network. The Foundation of Network Monitoring: Flows, Applications, Sessions and DPI Today, there is a lot of confusion around the idea of flow monitoring, application monitoring, session analysis and the place of Deep Packet Inspection (DPI). Vendors use these terms prolifically to describe their own product sets but unfortunately they mean different things to different people. So for the purposes of this discussion, let s define some of the terms. Fundamentals Packet Structure For obvious reasons, many flow monitoring vendors today are claiming to be application performance vendors and to some extent it could be argued that they are, as there is no generally accepted definition of APM. To truly clarify the value and power of monitoring applications let s look at flow monitoring as a starting point, in terms of its technology the packets and IP protocol itself. These fundamental concepts are actually quite simple. Today, there is a lot of confusion around the idea of flow monitoring, application monitoring, session analysis and the place of Deep Packet Inspection (DPI). As most are aware, information is transmitted across modern networks as discrete units of information called packets by means of a common protocol called Transmission Control Protocol / Internet Protocol (TCP/IP). Networking used to be a wilderness of literally dozens of protocols, but TCP/IP has emerged as the predominant approach. The term itself is less important than the fact that TCP/IP is actually two different protocols cobbled together. Each packet on the network has an IP portion and TCP portion (there are others, but for the sake of this discussion, we will consider only TCP/IP). Each packet looks like this: The packet is broken into basic parts: an IP header, a TCP header and a payload. The IP header contains the addressing information where to send the packet. This IP header is analogous to the recipient address and return address on a letter, letting the routers and switches know where to direct the packet. The TCP header describes what type of packet it is, using Port Numbers to define different types of packets; for example, Port 80 usually defines a packet to or from a web server. 5
6 The payload contains the data itself; in the web context, it might hold the URL string or the actual data from the web page itself. Let s consider one more item before moving on to flow monitoring; A Brief TCP/IP Primer Vendors often refer to Layer 3 or Layer 4 or even to the ubiquitous Layer 7. These layers originate from a theoretical model of networking called the OSI model. This model defined seven layers for networking: Layer 1 is the physical medium, such as the actual copper or fiber; Layer 7 is the application itself. Although these layers have fallen into common parlance, many people do not actually understand the origins of the OSI model, which is illustrated and explained by the graphic referenced below. Deriving statistical information from packet headers is easy, but packets do not exist in isolation. TCP/IP does not strictly conform to the OSI model, but rather merges some layers together. Again for simplicity, with respect to the layers, the TCP/IP packet looks as follows: In modern networks, there are essentially three layers above the Data Link Layer, i.e. Layer 2. These are Layers 3, 4 and 7. Layer 3 corresponds to the IP header, Layer 4 to the TCP header and Layer 7 to the payload itself. The Importance of Basic Packet Structure to the Flow So now that we have described TCP/IP, let s consider flow monitoring itself. The good news is that both TCP and IP are protocols; that is, they are well defined and documented in Internet documents called Requests for Comments (RFCs), which are openly available for anyone to implement. Protocols themselves are very strict; for example, we know that at a particular byte offset we will see the source or sender s address; at another we will see the destination or recipient s address; and at yet another, the TCP port number. In fact, the protocols define many fields, each at a specific and well-known location. Monitoring the Flow Deriving statistical information from packet headers is easy, but packets do not exist in isolation; most applications rely on a sequence of packets to transfer data. The mechanism that groups together multiple packets associated with an application is commonly referred to as a flow. Each unique flow may be identified by fields contained in the IP and TCP header. Five fields are commonly used to identify a flow (referred to as 5-tuple identification). Grouping multiple packets into flows further reduces the processing and storage overhead on monitoring systems, as we need to collect statistical information only for each flow rather than for each packet. Think of a flow as a telephone conversation: Each telephone call typically has two parties, each of whom can communicate at the same time. In the same way that a phone call is 6
7 bidirectional, an IP flow is typically made up of two unidirectional flows. Monitoring tools perform a process called flow stitching to put the two unidirectional flows back together and form a single bi-directional flow (similar to a phone call). Achieving Superior Monitoring and Analysis Flow monitoring occurs at layer 4; it provides reasonable information about network traffic and can be carried at high speed. Why then do we need to go any further? Historically it has been sufficient to examine network traffic at layer 4, as most applications used a distinct TCP port number (contained in the TCP header). This meant that we could usually identify applications based on information contained in the TCP header alone. However, there are two main problems with this approach: First, many applications use the same, or common, TCP port number for example, many web applications use TCP Port 80, making it impossible to differentiate applications based on port number alone. Secondly and perhaps more importantly the statistical information needed to characterize performance for one application may be different from that used for another, causing confusion and inaccuracy. The only way to really examine application-specific performance is to look beyond the IP and TCP header into the payload; that is, to examine the packet at Layer 7 using deep packet inspection (DPI). After inspecting the header, one would think it is easy to assess the payload as well, but this perceived simplicity is deceptive. Examining the payload is actually very difficult. For one, no standards determine how applications store data in the payload, so every application takes a different approach, often proprietary. This makes the task of identifying individual applications within the payload very difficult indeed. It becomes even more challenging to employ DPI and application identification at wire speed. The only way to really examine application-specific performance is to look beyond the IP and TCP header into the payload. The upside is that if we can inspect and interpret within the payload, this information is a far richer source of performance data. The challenge is large but the rewards are great! Application Specific Metrics: Examples of Web Based Applications To diverge for a moment, let s consider a common and relatively well-understood application of web browsing. Example: Web Browsing The diagram below shows a normal web browsing session as a TCP/IP flow using TCP port 80. However the payload is where it becomes interesting: The payload contains the URL of the website along with a wealth of other statistical data such as web server type, client browser type, server response code, page download time and much more. 7
8 The ability to use DPI to look inside a payload and identify applicationspecific metrics is a cornerstone of Net Optics APM solutions. Example: Yahoo Mail Now let s take another completely different application this time a web-based program such as Yahoo Mail, looking at the diagram again we see that Yahoo Mail shares commonality with web browsing up to and including Layer 4 and even uses the same transport protocol, HTTP. Traditional flow-based tools cannot differentiate between web browsing and Yahoo mail, as they look identical up to layer 4. However, these are clearly different applications; one is browsing, and the other is . Whilst we might be interested in URL, page download and browser type for web browsing, these metrics are meaningless for Yahoo Mail. metrics are more likely to be to and from address, attachment name, subject, and so on. More similarities and differences appear on the diagram below. Note that there are many flow-type attributes in common between Web browsing and Yahoo Mail that are of interest, including source and destination address, bytes transferred, latency and so on. There are also many more disparate application-specific attributes or metrics. The ability to use DPI to look inside a payload and identify application-specific metrics is a cornerstone of Net Optics APM (Application Performance Monitoring) solutions. The concept extends well beyond web browsing and Yahoo Mail, of course. There are literally thousands of applications that need consideration, making the tree diagram very complex indeed. The current Net Optics architecture can support identify well over 1000 applications within the payload, represented as a tree with 1000 branches in the diagram above (from the IP/TCP trunk, as opposed to application-specific metrics, which would be represented as leaves numbering in the tens of thousands). Net Optics has the architecture in place to potentially cover any application solution 8
9 Summary The Net Optics approach to network monitoring is engineered to reach beyond conventional performance monitoring or simple flow monitoring to provide a far deeper and richer set of data. The advantage of such pinpoint accuracy and granularity cannot be overstated. Net Optics monitoring architecture is designed to support and analyze a wide range of applications a full tree this differentiates it profoundly from other offerings. Extracting application-specific metrics tailored to the needs of each application is critical yet many offerings are severely deficient by comparison in this essential capability. Customers must make certain that they are investing in a truly capable solution in order to derive full benefit from the leading edge of this exciting and productive technology. About the Author David Britt, Director of APM Technology, Net Optics Inc. David Britt, Director of APM Technology for Net Optics, is the lead developer behind Net Optics application performance monitoring solutions. Dave helped companies extend network visibility to remote sites and branch offices with the creation of the apptap. This network and application performance monitoring tool provides packet capture, flow analysis and Deep Packet Inspection (DPI) in traditional network blind spots. apptap is ideally suited to working within an entire network topology such as a remote branch or satellite office. Dave brings to Net Optics over 20 years experience in networking building solutions for network performance monitoring, security and lawful interception. 9
10 EBOOK Ixia Worldwide Headquarters Agoura Rd. Calabasas, CA (Toll Free North America) (Outside North America) (Fax) Ixia European Headquarters Ixia Technologies Europe Ltd Clarion House, Norreys Drive Maidenhead SL6 4FL United Kingdom Sales (Fax) Ixia Asia Pacific Headquarters 21 Serangoon North Avenue 5 #04-01 Singapore Sales Fax Rev. A, January 2014
WHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationWHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment
WHITE PAPER Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment www.ixiacom.com 915-6892-01 Rev. A, July 2014 2 Table of Contents The Challenge of the Virtual Environment...
More informationWHITE PAPER. Extending Network Monitoring Tool Performance
WHITE PAPER Extending Network Monitoring Tool Performance www.ixiacom.com 915-6915-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Abstract... 4 Introduction... 4 Understanding Monitoring Tools...
More informationWHITE PAPER. Application Performance Management and Lawful Interception
WHITE PAPER Application Performance Management and Lawful Interception www.ixiacom.com 915-6897-01 Rev. A, July 2014 2 Table of Contents A New Approach Unifies Two Disciplines to Drive Mutual Performance,
More informationWHITE PAPER. Static Load Balancers Implemented with Filters
WHITE PAPER Static Load Balancers Implemented with Filters www.ixiacom.com 915-6911-01 Rev. A, July 2014 2 Table of Contents Load Balancing of Monitoring Systems as a Key Strategy for Availability, Security
More informationWHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
More informationWHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
More informationWHITE PAPER. Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges
WHITE PAPER Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges www.ixiacom.com 915-6914-01 Rev. A, July 2014 2 Table of Contents Load Balancing A
More informationWHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance
WHITE PAPER How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance www.ixiacom.com 915-3132-01 Rev. B, June 2014 2 Table of Contents Network Functions Virtualization (NFV): An
More informationEvaluating Wireless Broadband Gateways for Deployment by Service Provider Customers
Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers Overview A leading provider of voice, video, and data services to the residential and businesses communities designed
More informationIxChariot Virtualization Performance Test Plan
WHITE PAPER IxChariot Virtualization Performance Test Plan Test Methodologies The following test plan gives a brief overview of the trend toward virtualization, and how IxChariot can be used to validate
More informationWHITE PAPER. Net Optics Phantom Virtual Tap Delivers Best-Practice Network Monitoring For Virtualized Server Environs
WHITE PAPER Net Optics Phantom Virtual Tap Delivers Best-Practice Network Monitoring For Virtualized Server Environs www.ixiacom.com 915-6909-01 Rev. A, July 2014 2 Table of Contents Event... 4 Context...
More informationReduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
More informationData Center Automation - A Must For All Service Providers
WHITE PAPER Automation: The Future of Network Visibility www.ixiacom.com 915-6617-01 Rev. A, November 2013 2 Table of Contents Executive Summary... 4 The Need for Monitoring Switch Automation in the Data
More informationTaps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks
WHITE PAPER Taps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks www.ixiacom.com 915-3534-01 Rev. A, September 2015 2 Table of Contents The First Line of Defense: Access... 5 Problem
More informationGuidebook to MEF Certification
WHITE PAPER Guidebook to MEF Certification www.ixiacom.com Rev A September 2012, 915-6015-01 2 Table of Contents Introduction... 4 Benefits of Certification... 7 Overview... 7 Equipment Vendor... 7 Service
More informationWHITE PAPER. Tap Technology Enables Healthcare s Digital Future
WHITE PAPER Tap Technology Enables Healthcare s Digital Future www.ixiacom.com 915-6912-01 Rev. A, July 2014 2 Table of Contents Executive Overview... 4 Introduction... 4 HIT s foundation... 5 Keeping
More informationAn Executive Brief for Network Security Investments
An Executive Brief for Network Security Investments Implementing network security resilience is one of the few things that you can do that will: Protect company brand value Decrease operational costs Preserve
More informationInnovate, Integrate, Lead
Innovate, Integrate, Lead Ixia s Global Solution Provider Partner Program Application Performance and Security Resilience 86 of the Fortune 100 Profitability. Brand reputation. Customer loyalty. 50 of
More informationWHITE PAPER. SDN Controller Testing: Part 1
WHITE PAPER SDN Controller Testing: Part 1 www.ixiacom.com 915-0946-01 Rev. A, April 2014 2 Table of Contents Introduction... 4 Testing SDN... 5 Methodologies... 6 Testing OpenFlow Network Topology Discovery...
More informationEBOOK. Software Defined Networking (SDN)
EBOOK Software Defined Networking (SDN) www.ixiacom.com 915-6885-01 Rev. A, January 2014 2 Table of Contents Your Route to Agility, Accuracy and Availability... 4 SDN Advanced, Next-Generation Networking...
More informationApplication Performance Management and Lawful Interception
Application Performance Management and Lawful Interception A New Approach Unifies Two Disciplines to Drive Mutual Performance, Efficiency and Results New, Internet-Based Applications Bring Change and Challenge
More informationWHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access
WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute
More informationWHITE PAPER. Achieving Total Traffic Visibility in Enterprise and Carrier Grade Optical Networks
WHITE PAPER Achieving Total Traffic Visibility in Enterprise and Carrier Grade Optical Networks www.ixiacom.com 915-6905-01 Rev. A, July 2014 2 Table of Contents Data Access and Reliability In Modern Optical
More informationWHITE PAPER. Best Practices in Deploying Converged Data Centers
WHITE PAPER Best Practices in Deploying Converged Data Centers www.ixiacom.com 915-2505-01 Rev C October 2013 2 Contents Introduction... 4 Converged Data Center... 4 Deployment Best Practices... 6 Testing
More informationEnsuring Success in a Virtual World: Demystifying SDN and NFV Migrations
Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations Get Migration Right the First Time The virtualization of traditional networks promises vast and enduring benefits if the challenges
More informationMail Gateway Testing. Test Plan. 26601 W. Agoura Rd. Calabasas, CA 91302 (Toll Free US) 1.877.FOR.IXIA (Int'l) +1.818.871.1800 (Fax) 818.871.
Mail Gateway Testing 26601 W. Agoura Rd. Calabasas, CA 91302 (Toll Free US) 1.877.FOR.IXIA (Int'l) +1.818.871.1800 (Fax) 818.871.1805 www.ixiacom.com Test Plan Copyright 2006 by Ixia All rights reserved
More informationUNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
More informationFULL SPEED AHEAD THE IXIA CHANNEL XCELERATE PROGRAM LATIN AMERICA
FULL SPEED AHEAD THE IIA CHANNEL CELERATE PROGRAM LATIN AMERICA 1998-2016 Ixia All Rights Reserved. Be Part of the Momentum... Nothing beats playing on a winning team. Joining Ixia s Channel celerate Partner
More informationPerformance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
More informationAppFlow: next-generation application performance monitoring. www.citrix.com
AppFlow White Paper AppFlow: next-generation application performance monitoring www.citrix.com Introduction: monitoring application performance has become more complex In today s always-on and connected
More informationTHE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT
WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical
More informationWHITE PAPER. 50 versus 62.5 micron multimode fiber
WHITE PAPER 50 versus 62.5 micron multimode fiber www.ixiacom.com 915-6919-01 Rev. A, July 2014 2 Table of Contents What are 50μm fiber and 62.5μm fiber?... 4 Why two standards?... 4 Which technology should
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationUnderstanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
More informationSwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationSECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
More informationBandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
More information1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationVirtual Private Networks Solutions for Secure Remote Access. White Paper
Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information
More information11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER
11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationWHITE PAPER. Realizing ROI from Your Network Visibility Investment
WHITE PAPER Realizing ROI from Your Network Visibility Investment www.ixiacom.com 915-6630-01 Rev. A, March 2014 2 Table of Contents Executive Summary... 4 Introduction... 4 Network Visibility ROI... 5
More informationUnderstanding IP Faxing (Fax over IP)
A RICOH COMPANY Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationMonitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
More informationImplementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing
Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing WHITE PAPER Prepared by: Mark Hoffmann Coyote Point Systems Inc. Abstract: This white paper describes
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationdomain is known as the high side, and the less secure domain is the low side. Depending on the application, the
Data diodes refer to unidirectional network links used in some high-security network architectures. This paper explains how data diodes are used to secure information and protect against intrusions; it
More informationApplication-Centric Analysis Helps Maximize the Value of Wireshark
Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and
More informationMicrosoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE
Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationDEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationGetting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationUnified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
More informationINTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security
More informationTesting Packet Switched Network Performance of Mobile Wireless Networks IxChariot
TEST PLAN Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot www.ixiacom.com 915-6649-01, 2006 Contents Testing Packet Switched Network Performance of Mobile Wireless Networks...3
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationNetwork Instruments white paper
Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity
More informationBest Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationCorporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
More informationWHITE PAPER. Best Practices for Network Monitoring Switch Automation
WHITE PAPER Best Practices for Network Monitoring Switch Automation www.ixiacom.com 915-6623-01 Rev. A, December 2013 2 Table of Contents Executive Summary... 4 What Is Adaptive Monitoring?... 4 Adaptive
More informationEnhancing Flow Based Network Monitoring
Enhancing Flow Based Network Monitoring Flow-based technologies such as NetFlow, sflow, J-Flow, and IPFIX are increasingly popular tools used by network operators. The tools leverage the capabilities embedded
More informationQ1 Labs Inc. 15 Piedmont Center, suite 1040 Atlanta, Georgia 30305 USA +1-877-471-5227 info@q1labs.com www.q1labs.com
1. Name of the Technology and the Corporation supporting it Product: Company: RFI Contact: QVISION Q1 Labs Inc. 15 Piedmont Center, suite 1040 Atlanta, Georgia 30305 USA +1-877-471-5227 info@q1labs.com
More informationTesting L7 Traffic Shaping Policies with IxChariot IxChariot
TEST PLAN Testing L7 Traffic Shaping Policies with IxChariot IxChariot www.ixiacom.com 915-6658-01, 2005 Contents 1. Introduction 1 2. Overview of L7 Layer Payload Definition Options in IxChariot 1 2.1
More informationUK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationIP Camera Network Installations are More Difficult than Analog Camera Installations? Not So!
November 2010 IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So! Here Are The Facts. White Paper Table of Contents: Page 1 Overview A Brief History Page 2 A Big
More informationNetwork Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationExecutive summary. Introduction Trade off between user experience and TCO payoff
Virtual desktop White Paper How fast is my virtual desktop? Delivering a high definition desktop experience to branch office users with Citrix Branch Repeater DVI www.citrix.com Executive summary Emerging
More informationHow To Manage A Network From A Single Source Of Power To A Single Network (Networking)
October 2004 Voice over IP Manageability Architecture Matters Comparing the Various Approaches and How They Deliver System Administration In 1996, Gartner Group rocked the IT world with the results of
More informationApplication Delivery Testing at 100Gbps and Beyond
Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
More informationHigh Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationBest Practices for Network Monitoring
Enabling a Converged World Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 915-6509-01 Rev A February 2012 Contents Monitoring Challenges in Today s
More information