Are Duplicate Packets Interfering with Network Monitoring? White Paper
|
|
|
- Bruno Beasley
- 10 years ago
- Views:
Transcription
1 Are Duplicate Packets Interfering with Network Monitoring? White Paper A network monitoring switch allows IT teams to simultaneously connect a wide array of monitoring tools. The best-in-class network monitoring switches do more than solve connection problems; they also aggregate and filter data according to the type of monitoring tool. Some network monitoring switches include advanced functions to enhance and automate network monitoring activities, functions like extended burst protection and packet de-duplication at line rate. When duplicate packets get transmitted to monitoring tools, they hinder effective network monitoring. Eliminating duplicate packets is a critical step to achieve monitoring goals and improve network performance.
2 Overview A normally configured SPAN port, frequently used to connect monitoring tools to the network, can generate multiple copies of the same packet (see Figure 1). Since SPAN ports on a network switch are usually configured to copy ingress and egress data from every switch data port, the SPAN port output to a network monitoring tool includes duplicate copies of every packet that goes into and then out of the switch. That means multiple copies of packets are being sent to the SPAN port for every data port being used on that network switch. These copies are exact duplicates of the original packet. Note repeating packet lengths and source addresses. Figure 1 Examples of Duplicate Network Traffic Even when optimally configured, a SPAN port may generate between one and four copies of a packet. The duplicate packets can represent as much as 50% of the network traffic being sent to a monitoring tool. These duplicate packets create two major problems. They prevent your tools from working at their peak efficiency, and they keep you from reaching your ultimate network goals improved network performance and better network management. IT professionals sometimes accept the duplicate packets produced by SPAN ports as a necessary byproduct of using the device, even though they clearly cause several problems that prevent effective network monitoring. Page 1 of 6
3 Duplicate Packets Diminish Monitoring Port Bandwidth If a significant number of the packets sent to a monitoring tool are duplicates, then the effective bandwidth capability of the monitoring tool link is severely decreased. Let s say your monitoring tool has a 1 gigabit (1G) Ethernet interface. If one-half of the bandwidth is used to send duplicate packets, then the monitoring tool has an effective bandwidth of only 500 megabytes. Every duplicate packet transmitted reduces the bandwidth capability of the monitoring tools. Compounding this problem is the fact that monitoring tools have struggled to keep pace with the increasing speed and capability of other network devices. Now add the additional burden of reduced effective bandwidth because a significant amount of traffic is duplicate packets. The monitoring tool simply cannot keep up with the amount of traffic arriving from the network. Slower tools and duplicate packets reduce effective bandwidth capability, which causes data jams that result in dropped packets and lost data. Monitoring tools are not as effective as they should be if they cannot keep up with network traffic. Duplicate Packets Reduce Packet Capture Storage Capability A packet capture device records and stores the network traffic for a number of uses: regular performance analysis, forensic analysis after a network event or anomaly, security, and compliance. If the network traffic sent to the capture device contains a large number of duplicate packets, then the amount of useful information these data recorders can hold is drastically reduced (see Figure 2). Half of the data being stored may be duplicate packets that provide no real benefit for analysis or other uses. At an average packet capture cost of $30,000 per terabyte (TB), duplicate packets waste large amounts of money. Figure 2 Before and After a network monitoring switch Page 2 of 6
4 By eliminating duplicate packets, you can store more useful data, which allows you to better analyze your data and improve your network security. Plus, with fewer duplicates taking up storage space, the captured network traffic can be stored longer, giving your IT department a larger data window for analysis and for tracking network events. A few packet capture devices have limited filtering ability for eliminating duplicate packets. Frequently, however, implementing filtering capabilities can increase set-up time and complexity. Plus, an improper filtering set-up introduces the possibility of filtering out wanted packets or slowing the capture rate. Also, it doesn t address the issue of reduced bandwidth caused by duplicate packets being sent to the packet capture device in the first place. Duplicate Packets Decrease Processing Power of Analyzer Tools Most network analyzer tools do more than just capture and store data. They have to process the incoming data stream to analyze the data and prepare it for future analysis. Many tools have a difficult time keeping pace with regular network traffic. Just the regular 10G data stream sent to a monitoring tool can overrun the capacity of the tool, especially when a 10G monitoring device is attached to a 40G network. This problem is exacerbated by the extra effort required for network analyzing tools to process duplicate packets. Original packets have to be queued while they wait for unnecessary duplicate packets to be processed. Once again, data bottlenecks, and as a result, overflows the tool s buffer. This data traffic back-up can force the monitoring tool port into premature overload. Packets may be dropped altogether, never even received or processed by the monitoring tool. Even worse, network engineers may never be aware that there are lost packets or how much data was lost. It is difficult to perform effective network monitoring and analysis under these conditions. Duplicate Packets Interfere with Network Analysis and Troubleshooting Duplicate packets are equivalent to false data when it comes to analyzing network performance or troubleshooting. Network statistics can be significantly skewed when a large percentage of the traffic being analyzed is duplicate information. The problems created by duplicate packets can hinder proper analysis for performance improvement, impede the ability to pinpoint problem areas, or even worse, delay the ability to restore service if a network is down. All IT departments want to exceed their MTTR objectives, and duplicate packets can create a major obstacle in meeting uptime goals. Page 3 of 6
5 Finding a Remedy for Duplicate Packets All of these issues caused by duplicate packets being sent to monitoring tools by SPAN ports lead to one overarching result inefficient monitoring that reduces the return on your investment in monitoring tools. Ineffective monitoring can cause problems that ripple through the data center. It leads to more man-hours spent addressing network problems and performance, more network downtime, more risks associated with losing IT capability, and less return on IT investments due to lower productivity and capability. When a SPAN port produces duplicate packets that interfere with a monitoring tool s ability to function properly, it creates a major obstacle to using monitoring tools to achieve higher network performance. Proactive IT departments are looking for ways to eliminate the negative impact of these duplicate packets. Some monitoring tool vendors have introduced a de-duplication feature in an attempt to deal with the problem of duplicate packets interfering with their tool s functionality. The trouble with this approach is that most tools already have difficulty keeping up with network traffic. The additional burden of removing duplicate packets added to the tool s processing requirements only increases their inability to keep up. It is not an ideal solution. Plus, this approach doesn t address the issue of duplicate packets reducing the effective bandwidth of network traffic to the monitoring tool or the issue of wasting capture storage space. A better method is available that addresses all the issues associated with duplicate packets. A Network Monitoring Switch: The Best Solution to Duplicate Packets Network monitoring switches capable of advanced functions are the best solution to the problem of duplicate packets sent to a monitoring tool from a SPAN port. Besides resolving the issue of connectivity by allowing multiple monitoring tools of all types to connect to a single TAP or SPAN port, a network monitoring switch with advanced features is capable of removing duplicate packets at full line rate before forwarding traffic to the monitoring tools. This means network monitoring tools, from packet analyzers to packet capture devices, no longer have to deal with the problems associated with duplicate packets, like reduced bandwidth, overwhelmed tools, dropped packets, and wasted storage capacity. The most important characteristic of de-duplication capabilities in network monitoring switches is the size of the de-duplication window. This is the amount of time, after having seen the first copy of a packet, that a duplicate packet can be detected and removed. A large de-duplication window and the ability to configure the window size make the de-duplication feature extremely powerful. Now you can use the tools as you intended, and get the performance and efficiency benefits from network monitoring you intended as well. But the benefits of advanced network monitoring switches don t end with packet de-duplication. They can also provide high-speed network optimization of data, voice, and video when you use the following features: Load balancing Centralized control of traffic Data filtering Traffic prioritizing Packet trimming MPLS stripping Automated IT response to monitoring alerts Page 4 of 6
6 With features like these, it is easy to see how integrating an advanced network monitoring switch technology can increase the performance of your network monitoring tools. Summary Duplicate packets commonly created by SPAN ports create problems for the network monitoring tools connected to the port. The duplicate packets reduce effective tool bandwidth, waste tool processing power, and consume tool storage capacity, reducing their effectiveness. Some solutions to the duplicate packet problem, like duplicate packet removal at the monitoring tool, have been less than ideal. Monitoring tools are already over-taxed in handling and processing network traffic, and they usually do not have the processing resources to handle an additional task that is processing intensive. Eliminating duplicate packets with a network monitoring switch can reduce network monitoring tool processing load by 50% (see Figure 3). Performing de-duplication with a network monitoring switch means duplicate packets no longer reduce the effective bandwidth of traffic flow to the network monitoring tool. This method also eliminates data clutter. Monitoring tools can process and store twice as much useful data without the unneeded duplicates being transmitted to them. Control traffic without packet de-duplication* With Anue Network Tool Optimizer * Duplicate 64 Byte packets transmitted at full 1Gpbs line rate through Anue NTO. Measured using a Spirent Test Center. Figure 3 Example of IMproved Network Monitoring Tool Load If you are investing time and money in network monitoring tools to improve network performance and efficiency, don t hamper their effectiveness with streams of duplicate packets. Advanced network monitoring switch technology can help you gain greater value from your network monitoring tools, making them more effective, improving their performance, and increasing their uptime. Page 5 of 6
7 The Anue Solution The Anue Systems 5200 Series Net Tool Optimizer (NTO) combines the capabilities and benefits of a basic network monitoring switch with the robust features of three level filtering, automation and packet duplication. The NTO s industry-leading drag-and-drop control panel makes it the easiest to use network monitoring switch in the industry. For More Information about the Anue NTO Visit For More Information about Intelligent Load Balancing Visit For More Information or to Ask Additional Questions us directly: [email protected] Call Us at: (512) Anue, Anue Systems, and the Anue logo are trademarks or registered trademarks of Anue Systems and/or its affiliates in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partner- ship relationship between Anue Systems and any other company. Page 6 of 6
WHITE PAPER. Best Practices for Eliminating Duplicate Packets
WHITE PAPER Best Practices for Eliminating Duplicate Packets 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6501-01 Rev. B, July 2013 Table of Contents
Solving Monitoring Challenges in the Data Center
Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate
Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive
White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com
Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer
Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer Purpose: Overview on how to use Ixia s Anue Network Tool Optimizer (NTO) to provide the CA Application
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
Best Practices for Network Monitoring
Enabling a Converged World Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 915-6509-01 Rev A February 2012 Contents Monitoring Challenges in Today s
How To Use A Network Instrument Ntap
ntap Product Family Provides monitoring and security devices with complete visibility into full-duplex networks Network Instruments ntaps let you monitor and analyze full-duplex links. ntaps are critical
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
WHITE PAPER. Realizing ROI from Your Network Visibility Investment
WHITE PAPER Realizing ROI from Your Network Visibility Investment www.ixiacom.com 915-6630-01 Rev. A, March 2014 2 Table of Contents Executive Summary... 4 Introduction... 4 Network Visibility ROI... 5
Multi Stage Filtering
Multi Stage Filtering Technical Brief With the increasing traffic volume in modern data centers, largely driven by e-business and mobile devices, network and application performance monitoring has become
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
Network Monitoring Fabrics Are Key to Scaling IT
Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º
Any-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
Efficient Network Monitoring Access
Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.
Best Practices in Gigabit Capture
Network Instruments White Paper Best Practices in Gigabit Capture How to obtain accurate, line-rate captures with your gigabit investment Analysis is a necessary component of network management. Understanding
4G Aggregation Network Monitoring (ANM) Switch
Creating the best Shaping future communications 4G Aggregation Network Monitoring (ANM) Switch Mobile data and IP networks are constantly flooded with enormous amounts of data traffic. As technology advances
A SENSIBLE GUIDE TO LATENCY MANAGEMENT
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
Improving. Summary. gathered from. research, and. Burnout of. Whitepaper
Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Quality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
WHITE PAPER Guide to 50% Faster VMs No Hardware Required
WHITE PAPER Guide to 50% Faster VMs No Hardware Required WP_v03_20140618 Visit us at Condusiv.com GUIDE TO 50% FASTER VMS NO HARDWARE REQUIRED 2 Executive Summary As much as everyone has bought into the
Installation Guide for. 10/100 to Triple-speed Port Aggregator. Model TPA-CU. 800-0045-001 Doc. PUBTPACUU Rev. 1, 12/08. In-Line
Installation Guide for 10/100 to Triple-speed Port Aggregator Model TPA-CU In-Line 800-0045-001 Doc. PUBTPACUU Rev. 1, 12/08 Contents Introduction.....................................................
How To Manage A Network With Ccomtechnique
SOLUTION BRIEF CA Technologies Application-driven Network Performance Management How do you gain the network-level visibility you need to optimize the performance of your mission-critical applications?
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Network Forensics Buyer s Guide
TM Network Forensics Buyer s Guide Network forensics the recording and analysis of network traffic is a powerful tool for finding proof of security attacks, and it has become an essential capability for
Cisco engaged Miercom to conduct an independent verification of
Key findings and conclusions: Cisco Catalyst switches with custom ASICs provide superior performance in egress buffering Lab Testing Summary Report September 2010 Report 100827 Using frame sizes of 64
WHITE PAPER Guide to 50% Faster VMs No Hardware Required
WHITE PAPER Guide to 50% Faster VMs No Hardware Required Think Faster. Visit us at Condusiv.com GUIDE TO 50% FASTER VMS NO HARDWARE REQUIRED 2 Executive Summary As much as everyone has bought into the
WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider.
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Is Your School Network Ready? Network readiness is an important factor in any new
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Windows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
Backup and Recovery: The Benefits of Multiple Deduplication Policies
Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change
Configuring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks
Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager [email protected] Introduction Gigabit network applications are becoming more and more popular in the modern networking
IBM Tivoli Netcool network management solutions for SMB
IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Installation Guide for. 10/100BaseT Port Aggregator Tap with Active Response. Models PA-CU-AR, PAD-CU-AR. Doc. PUBPACUARU Rev.
Installation Guide for /0BaseT Port Aggregator Tap with Active Response Models PA-CU-AR, PAD-CU-AR Doc. PUBPACUARU Rev. 1, 06/06 /0 Port Aggregator Tap Contents Introduction.....................................................
Best practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
The Next Generation of Wide Area Networking
The Next Generation of Wide Area Networking Introduction As pointed out in The 2014 State of the WAN Report 1, the vast majority of WAN traffic currently uses either the Internet or MPLS. Since the Internet
Out-of-Band Security Solution // Solutions Overview
Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of
Technical Bulletin. Arista LANZ Overview. Overview
Technical Bulletin Arista LANZ Overview Overview Highlights: LANZ provides unparalleled visibility into congestion hotspots LANZ time stamping provides for precision historical trending for congestion
Chapter 5 Configuring QoS
Chapter 5 Configuring QoS Configuring the Basic and Advanced QoS Settings The navigation pane at the top of the web browser interface contains a QoS tab that enables you to manage your FS700TS Smart Switch
Net Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network
Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Enhanced Visibility, Improved ROI
Abstract Enhanced Visibility, Improved ROI The IT Security/Network Infrastructure Management departments within an organization have access to some of the richest and most useful enterprise data. Because
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
BI and ETL Process Management Pain Points
BI and ETL Process Management Pain Points Understanding frequently encountered data workflow processing pain points and new strategies for addressing them What You Will Learn Business Intelligence (BI)
How To Solve A Network Communication Problem
A White Paper by NEC Unified Solutions, Inc. What VoIP Requires From a Data Network Introduction Here is a very common story. A customer has a data network based on TCP/IP that is working well. He can
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
TECHNICAL NOTE. FortiGate Traffic Shaping Version 2.80. www.fortinet.com
TECHNICAL NOTE FortiGate Traffic Shaping Version 2.80 www.fortinet.com FortiGate Traffic Shaping Technical Note Version 2.80 March 10, 2006 01-28000-0304-20060310 Copyright 2005 Fortinet, Inc. All rights
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
Gigabit to the edge. HP ProCurve Networking Solutions
Gigabit to the edge HP ProCurve Networking Solutions Performance to the edge taking high-speed Gigabit to the edge of your network When it comes to your network, the faster you want something, the slower
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
Best Practices for Security Monitoring
White Paper Best Practices for Security Monitoring...You Can t Monitor What You Can t See 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6508-01 Rev. B,
agility made possible
SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible
A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions
A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions 2015/7/22 ZyXEL Communications Corporation Barney Gregorio Overview: This article contains guidelines on how to introduce IP cameras
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000
Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000 Dot Hill Systems introduction 1 INTRODUCTION Dot Hill Systems offers high performance network storage products
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
a Unified Home Gateway Series Introduction: Market Drivers and Tech Challenges Carol Ansley, Sr. Director Advanced Architecture, ARRIS
Managing Improving Cable Home TV Migration Networking to Satisfaction IP Part 1 with a Unified Home Gateway Series Introduction: Market Drivers and Tech Challenges Carol Ansley, Sr. Director Advanced Architecture,
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
How To. Achieve Quality of Service over a low-speed WAN that has a non-qos capable gateway device. Introduction
How To Achieve Quality of Service over a low-speed WAN that has a non-qos capable gateway device Introduction Firstly, to set the scene, let s review a few well-known facts of networking life. Wide Area
White Paper. Best Practices for 40 Gigabit Implementation in the Enterprise
White Paper Best Practices for 40 Gigabit Implementation in the Enterprise 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6506-01 Rev. B, June 2013 2 Table
IBM Tivoli Netcool network management solutions for VoIP
IBM Netcool network management solutions for VoIP Putting service providers on the path to fulfilling the promises of VoIP Highlights Proactively manage the VoIP infrastructure to help avoid problems and
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
Product Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
Hidden Costs of Virtualization Backup Solutions, Revealed
Hidden Costs of Virtualization Backup Solutions, Revealed 5 WAYS VIRTUAL BACKUP PRODUCTS CAN SURPRISE YOU LATER Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner
