The document discusses network visibility solutions from Net Optics and Ixia. It summarizes that Net Optics was acquired by Ixia but will remain a brand name. It then discusses challenges of network growth outpacing monitoring tools, security threats increasing, and the need for improved network performance and visibility. The document promotes Ixia and Net Optics solutions like network taps, packet brokers, and virtual monitoring tools that provide intelligent traffic distribution and filtering to gain complete network visibility without blind spots.
Description of Microsoft Silverlight technology.
Advantages over "standard streaming", download and progressive download methods.
Silverlight session description and analysis using wireshark
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
Enhancing Network Visibility Based On Open Converged Network ApplianceOpen Networking Summit
Â
Dr. Dongheon Lee' and Dr. Junho Suh's presentation from the 2017 Open Networking Summit.
As the mobile traffic carried by cellular networks has been growing rapidly and the networks gets bigger and more complex, network operators have been forced to search for solutions to substantially enhance network visibility. This talk introduces SKT integrated Network Analyzer (TiNA) and Converged Appliance Platform (T-CAP) which help us improving the efficiency of network operation, troubleshooting, and analyzing traffic. TiNA is composed of virtual network packet broker, flow analyzer, high speed packet dump system, connection performance analyzer, and 3D-based network management system. T-CAP is an open architecture of a server-switch type hardware. We will review how to implement those TiNA functions based on open source (e.g., DPDK, Spark Streaming) and T-CAP. Finally, we will also discuss about the use-cases of TiNA and T-CAP for the private cloud & telco network infrastructure.
More details on implementing broadcast/multicast messaging in IoT networking running Haystack + DASH7 networking software. Also implementing CBOR to enable queries over MQTT.
Description of Microsoft Silverlight technology.
Advantages over "standard streaming", download and progressive download methods.
Silverlight session description and analysis using wireshark
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
Enhancing Network Visibility Based On Open Converged Network ApplianceOpen Networking Summit
Â
Dr. Dongheon Lee' and Dr. Junho Suh's presentation from the 2017 Open Networking Summit.
As the mobile traffic carried by cellular networks has been growing rapidly and the networks gets bigger and more complex, network operators have been forced to search for solutions to substantially enhance network visibility. This talk introduces SKT integrated Network Analyzer (TiNA) and Converged Appliance Platform (T-CAP) which help us improving the efficiency of network operation, troubleshooting, and analyzing traffic. TiNA is composed of virtual network packet broker, flow analyzer, high speed packet dump system, connection performance analyzer, and 3D-based network management system. T-CAP is an open architecture of a server-switch type hardware. We will review how to implement those TiNA functions based on open source (e.g., DPDK, Spark Streaming) and T-CAP. Finally, we will also discuss about the use-cases of TiNA and T-CAP for the private cloud & telco network infrastructure.
More details on implementing broadcast/multicast messaging in IoT networking running Haystack + DASH7 networking software. Also implementing CBOR to enable queries over MQTT.
An Introduction and Comparison of Dante, AVB and CobraNet MethodologiesrAVe [PUBS]
Â
Lots of signals, just one cable: Simplify AV installations and lower cost with Audio over IP (AoIP) methods such as Dante, AVB, and CobraNet. This course will serve as an introduction and comparison to three approaches to network-based audio signal distribution. Participants will learn fundamental networking concepts to help cut through marketing lingo and then move into basic system requirements, limitations, and applications of IP distribution so they can better assess suitability within the framework of a given project. Real-world scenarios and applications will be discussed, as well as resources for additional information and assistance in designing and implementing a network-based signal distribution system.
Presented by Steve Alexander
Š Almo Professional AV
Keynote given at DRCN2018, shows that innovation is back in the transport and network layer with a description of Multipath TCP, QUIC and IPv6 Segment Routing.
Challenges and experiences with IPTV from a network point of viewbrouer
Â
OpenSource IPTV MPEG2-TS analyzer.
This presentation was given at OpenSourceDays 2010 (and in earlier stages of the project at Bifrost Workshop 2009 and 2010)
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014Julien Vermillard
Â
M2M is rapidly growing and since its early days different "standard" protocols have emerged (e.g. OMA-DM, TR-069, MQTT, ...) or are emerging (e.g. CoAP or Lightweight M2M).
Understanding which protocol to use for which application can be intimidating, therefore we propose to give an overview of these protocols to help you understand their goals and characteristics. We will give a status of the availaible open source implementations in the Eclipse M2M ecosystem, with projects such as Paho, Mihini and Ponte.
We'll present common M2M use cases and why they usually require more than just one protocol, and discuss whether the current portfolio of available M2M protocols possibly allows to forge "one protocol to rule them all".
Haystack XR Mode radically improves the range of IoT devices using Semtech's LoRa radio. Using the same error correction used in deep space probes along with other techniques, Haystack offers the longest range, lowest power, and lowest latency networking stack for LoRa today.
Frank Brockners' presentation from the 2017 Open Networking Summit.
While troubleshooting or planning, did you ever wish to get full insight into which paths *all* your packets take in your network, understand whether your SLA is really in place, or were you ever asked to prove that your traffic really follows the path you specified by service chaining or traffic engineering? We approach this problem by adding meta-data to *all* packets. In-band OAM adds forwarding path information and other information/stats to every data packet - as opposed to relying on probe packets, which is the traditional method that tools like ping or traceroute use. This session will introduce In-band OAM, explain the technology and outline the reference implementation in FD.io/VPP and OpenDaylight using a example demos.
The Internet of Things if growing, but how can you build your own connected objects?
Together with MQTT, CoAP is one of the popular IoT protocols. It provides answers to the typical IoT constraints: it is bandwidth efficient and fits in constrained embedded environment while providing friendly and discoverable RESTful API.
This tutorial aims at giving you a hands-on experience with CoAP by showing you the power and simplicity of the Eclipse Californium library for developing real world IoT application.
Agenda:
- Introduction to CoAP
- Live discovery of connected CoAP objects using the Copper plugin for Firefox
- Presentation of more advanced CoAP topics (proxy, resource directory, device management with LWM2M)
- Presentation of Eclipse Californium, a CoAP library for Java
- Exercise: complete the provided Java code to create your own Internet of Things... thing!
PLNOG 17 - Marcin Aronowski - Technologie dostÄpowe dla IoT. Jak siÄ w tym ws...PROIDEA
Â
BLE, BT, Wifi, Z-Wave, Zigbee, EnOcean, 802.15.4, NB-IoT, EC-GSM, LoRa, SigFox. Lista jest dĹuga a caĹy czas siÄ jeszcze wydĹuĹźa. KtĂłra technologia bÄdzie najlepsza dla Twojego projektu IoT? Jak siÄ nie pogubiÄ w tej mnogoĹci i szybkoĹci zmian?
Sesja postara siÄ odpowiedzieÄ na te i kilka innych pytaĹ zwiÄ zanych z ĹÄ cznoĹciÄ bezprzewodowÄ w Ĺwiecie Internet of Things.
Founded in 1997 by President and CEO Alastair Hartrup, Network Critical is a UK-based company that has grown into a global leader, developing premier network access solutions for the enterprise security and network management marketplace. A channel-friendly company, Network Critical operations continue to grow world-wide, with new offices in Buffalo, New York and Amsterdam, The Netherlands. Network Critical provides proper enterprise access wherever monitoring is criticalâmaximizing the value of customer monitoring investments, and giving customers the assurance that traffic is always seen and always available.
An Introduction and Comparison of Dante, AVB and CobraNet MethodologiesrAVe [PUBS]
Â
Lots of signals, just one cable: Simplify AV installations and lower cost with Audio over IP (AoIP) methods such as Dante, AVB, and CobraNet. This course will serve as an introduction and comparison to three approaches to network-based audio signal distribution. Participants will learn fundamental networking concepts to help cut through marketing lingo and then move into basic system requirements, limitations, and applications of IP distribution so they can better assess suitability within the framework of a given project. Real-world scenarios and applications will be discussed, as well as resources for additional information and assistance in designing and implementing a network-based signal distribution system.
Presented by Steve Alexander
Š Almo Professional AV
Keynote given at DRCN2018, shows that innovation is back in the transport and network layer with a description of Multipath TCP, QUIC and IPv6 Segment Routing.
Challenges and experiences with IPTV from a network point of viewbrouer
Â
OpenSource IPTV MPEG2-TS analyzer.
This presentation was given at OpenSourceDays 2010 (and in earlier stages of the project at Bifrost Workshop 2009 and 2010)
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014Julien Vermillard
Â
M2M is rapidly growing and since its early days different "standard" protocols have emerged (e.g. OMA-DM, TR-069, MQTT, ...) or are emerging (e.g. CoAP or Lightweight M2M).
Understanding which protocol to use for which application can be intimidating, therefore we propose to give an overview of these protocols to help you understand their goals and characteristics. We will give a status of the availaible open source implementations in the Eclipse M2M ecosystem, with projects such as Paho, Mihini and Ponte.
We'll present common M2M use cases and why they usually require more than just one protocol, and discuss whether the current portfolio of available M2M protocols possibly allows to forge "one protocol to rule them all".
Haystack XR Mode radically improves the range of IoT devices using Semtech's LoRa radio. Using the same error correction used in deep space probes along with other techniques, Haystack offers the longest range, lowest power, and lowest latency networking stack for LoRa today.
Frank Brockners' presentation from the 2017 Open Networking Summit.
While troubleshooting or planning, did you ever wish to get full insight into which paths *all* your packets take in your network, understand whether your SLA is really in place, or were you ever asked to prove that your traffic really follows the path you specified by service chaining or traffic engineering? We approach this problem by adding meta-data to *all* packets. In-band OAM adds forwarding path information and other information/stats to every data packet - as opposed to relying on probe packets, which is the traditional method that tools like ping or traceroute use. This session will introduce In-band OAM, explain the technology and outline the reference implementation in FD.io/VPP and OpenDaylight using a example demos.
The Internet of Things if growing, but how can you build your own connected objects?
Together with MQTT, CoAP is one of the popular IoT protocols. It provides answers to the typical IoT constraints: it is bandwidth efficient and fits in constrained embedded environment while providing friendly and discoverable RESTful API.
This tutorial aims at giving you a hands-on experience with CoAP by showing you the power and simplicity of the Eclipse Californium library for developing real world IoT application.
Agenda:
- Introduction to CoAP
- Live discovery of connected CoAP objects using the Copper plugin for Firefox
- Presentation of more advanced CoAP topics (proxy, resource directory, device management with LWM2M)
- Presentation of Eclipse Californium, a CoAP library for Java
- Exercise: complete the provided Java code to create your own Internet of Things... thing!
PLNOG 17 - Marcin Aronowski - Technologie dostÄpowe dla IoT. Jak siÄ w tym ws...PROIDEA
Â
BLE, BT, Wifi, Z-Wave, Zigbee, EnOcean, 802.15.4, NB-IoT, EC-GSM, LoRa, SigFox. Lista jest dĹuga a caĹy czas siÄ jeszcze wydĹuĹźa. KtĂłra technologia bÄdzie najlepsza dla Twojego projektu IoT? Jak siÄ nie pogubiÄ w tej mnogoĹci i szybkoĹci zmian?
Sesja postara siÄ odpowiedzieÄ na te i kilka innych pytaĹ zwiÄ zanych z ĹÄ cznoĹciÄ bezprzewodowÄ w Ĺwiecie Internet of Things.
Founded in 1997 by President and CEO Alastair Hartrup, Network Critical is a UK-based company that has grown into a global leader, developing premier network access solutions for the enterprise security and network management marketplace. A channel-friendly company, Network Critical operations continue to grow world-wide, with new offices in Buffalo, New York and Amsterdam, The Netherlands. Network Critical provides proper enterprise access wherever monitoring is criticalâmaximizing the value of customer monitoring investments, and giving customers the assurance that traffic is always seen and always available.
IOT and System Platform From Concepts to CodeAndy Robinson
Â
This presentation was delivered at the Wonderware Software Users Conference in 2015. In this presentation I cover fundamental concepts related to IOT as well as specific applications using Wonderware System Platform.
Continuum PCAP
Cost Effective, Open Network Packet Capture
How do you know what is really coming through your network? Without capturing that traffic, you don't have the means of identifying and solving your security and network performance problems.
Though some organizations have the budgets and infrastructure to record network traffic, many current tools either do not capture all necessary packets, are too expensive to implement on a large scale, or don't easily integrate with other applications. And even companies that are capturing their network data are frustrated by these systems' lack of flexibility, or paying for functionality that they don't really use.
Continuum PCAP solves these problems by fusing the best of both worlds. It is a powerful, affordable enterprise-class packet capture appliance that integrates with your favorite 3rd party or open-source tools, or with your own applications via a REST API.
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Â
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
⢠The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
⢠Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
⢠Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
⢠Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Â
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
Â
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Â
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as âpredictable inferenceâ.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĽ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâ˘:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđŤ Andras Palfi, Senior Product Manager, UiPath
đŠâđŤ Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. About Net Optics
⢠Founded in 1996.
⢠HQ: Silicon Valley, USA
⢠Offices: Germany, Netherlands, Australia, China
⢠Manufacured industry 1st TAP ever!
⢠7.500+ global deployments
⢠20+ patents
⢠85% of fortune 100
Awards
Media
5. About Net Optics
⢠Founded in 1996.
⢠HQ: Silicon Valley, USA
⢠Offices: Germany, Netherlands, Australia, China
⢠Manufacured industry 1st TAP ever!
⢠7.500+ global deployments
⢠20+ patents
⢠85% of fortune 100
Awards
Media
6. Service Providers trust IXIA to:
ďź Improve and speed service delivery
ďź Speed roll out of next gen services
ďź Improve network and application visibility
and performance
Equipment Manufacturers trust IXIA to:
ďź Develop next generation devices
ďź Speed time to market
ďź Improve performance and reliability
Enterprises trust IXIA to:
ďź Assess vendor equipment and applications
ďź Improve network security posture
ďź Improve network and application visibility
and performance
Chip Fabricators trust IXIA to:
ďź Validate protocol conformance
ďź Speed time to market
Test
Security
Visibility
The MOST TRUSTED names
in networking trust
8. Network growing faster than tools!
0% 10% 20% 30% 40% 50%
100M
1G
10G
40G
100G
Current Planned in 12 months
* by EMA research
Maximum networking link speeds within data center / core networks
12. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
13. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
14. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
15. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
16. Traditional access methods donât
work!
1. Dropping packets
2. High switch CPU and memory load
3. Doesnât forward L1/L2 errors
4. Needs to be configured
5. Mixing source/destination information
6. Limited number of SPAN ports
7. Compliance issues!!!
8. Distorts packet arrival times
SPAN port
17. Step 1: use Network TAP instead of
SPAN
Benefits
⢠100% visibility, no dropped packets
⢠Doesnât affect switch CPU and memory
⢠Plug-and-play â no configuration required
⢠Permanent access: no need to break the link each
time you need to remove tool
⢠Forwards important L1 and L2 errors
⢠Dual power supplies: keeps the network link up
and running in case of power failure
⢠Doesnât change packet arrival times
SwitchFirewall
Analyzer
Switch
19. New challenge: amount of traffic is
growing!
Walmart collects over 1 million transactions every hour. This
data is streamed into massive data stores currently containing
over 2.5 petabytes of data.
21. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
22. Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitorâ˘
V Switch
vm 1 Vm 2 Vm 3
Director
Aggregation
Visibility Architecture
Advanced Packet Distribution
Aggregation and regeneration
Intelligent Filtering
Bypass switching
Packet Slicing & DeDuplication
Total Network Visibility
23. Ixia â Portfolio
Net Tool OptimizerÂŽ
Network
Visibility
Solutions
Network TAPs Copper and fiber TAPs for passive network access
Bypass Switches Copper and fiber switches for secure inline access
Network Packet Brokers
Intelligent data access with aggregation, filtering,
load balancing, de-duplication and more
Virtualization TAPs Get the full visibility into virtual networks
GTP Session Controller
Intelligent distribution and control of
mobile network traffic
24. Intelligent data access
Network Packet Brokers
Intelligent Traffic Distribution
â Aggregation of traffic from multiple links
â Filtering (by IP, MAC, VLAN, Port, etc.)
â Load-balancing traffic across tools
â Replication of traffic to multiple tools
Network Packet Brokers
Intelligent Packet Processing
â Header stripping (MPLS, VLAN, ...)
â Time-stamping with nano-second precision
â De-duplication for removing duplicated packets
â Packet slicing for removing unnecessary payload
25. Aggregation
⢠Problem: too many network links/segments, expensive to
deploy
⢠Solution: aggregate multiple inputs into few outputs
10 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps
1 Gbps1 Gbps
27. Filtering example
Internet
Web Web App EmailFile File File File
Internet
File Security
Web Security
Email Security
Data Center DMZ
Filter only File
Server traffic Filter only WEB
Server traffic
Filter only
Email traffic
10G 10G
28. Load Balancing
LB Group 2LB Group 1
Switch
IPS 1
Firewall Router
IPS 2 IPS 3 IPS 4 IPS 5 IPS 6
1G 1G 1G 1G 1G 1G
⢠Sharing 10G link to many 1G tools
⢠Link can be tapped with a bypass
switch for additional protection
30. Packet Slicing
Problem:
In many cases only the header is needed for analyzing. Forwarding a 1500byte packet to a probe does consume more
memory at the disk than a 64byte packet. If the data content is not needed this would be wasting recourses beside that it
does consume bandwidth on the downlink to the probe.
Solution:
A Network Monitoring Switch does remove the data content of a packet before the packet will be forwarded to the probe.
The user can define by the GUI what header information will retrain after trimming.
MAC IP Data FCS
MAC IP FCS
31. Port tagging
Network Scenarios
DMZ Segment
Database Farm
Tag 1
Tag 3
Tag 2
Server Array
Problem:
When aggregating packets over multiple TAPs, itâs no more
possible to identify from which TAP they have been
originally taken. Measuring the delay e.g. through a
Firewall would result in the need of an additional probe.
This is costly.
Solution:
By adding a Port TAG to the packet, the Network
Monitoring Switch provides full visibility again and for the
Firewall example one probe would last.
32. Timestamping for precise
measurements
The first four bytes of the timestamp are a 32-bit binary value in seconds.
The second four bytes are a 32-bit binary value representing tenths of microseconds;
The final four bytes are reserved for use when higher-precision timestamping becomes available,
making the timestamp format capable of supporting a resolution of 0.1 picoseconds.
33. Tap and optimize virtual traffic
âPhantom Virtual Tap enables 100% visibility
of east-west, inter-VM, and blade server
mid-plane traffic, with ability to do
aggregation, replication and multilayer L2-L4
filtering inside the virtual environment.âBest throughput results
Extensive L2-L4 Filtering
Minimal resources used
34. Virtual and Physical convergence
ES
X
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantomâ˘
Manager
KV
M
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantomâ˘
Manager
XE
N
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantomâ˘
Manager
Tunnel
IDS
NGFW Protocol
Analyzer
DLP
Net Optics Directorâ˘
Net Optics Phantom⢠HD
Physical Server
Physical Server
LAN/WAN