What you network is missing
A Traffic Access Point, or network TAP, is an oft-confused or even unknown technological hardware device. It provides a simple, secure and cost-effective solution for connecting different monitoring and security tools to your network.
E2E SDN solutions
SDN is a new approach to designing, building and managing networks that decouples the network's data plane from the control plane.
Build networks in seconds
Emulate enables you to quickly build networks in seconds. Whether you are interested in emulating point to point links with latency and bandwidth throttles, or simulating complex data-centres with multiple gateways and interconnecting links. Build these emulations through a visual design process.
It’s very important to be able to identify and target certain streams of data on an emulated network. JAR:Emulate provides a host of built-in filters to identify packets for impairment or analysis.
RFC 6349 based TCP Testing
Enterprises will typically sign a Service Level Agreement (SLA) with a service provider for their communication path through a network. The SLA contains worst case values for parameters like bandwidth, latency, packet jitter, frame loss ratio and availability. The service provider can conduct RFC 2544 and Y.1564 tests to verify that the requirements in the SLA are met. However, even if the tests show that all criteria are fulfilled, the enterprises may complain that they get less bandwidth than expected or that they experience long response times from the applications they use.
Evaluating Ethernet Ring Protection Switching (ERPS) Performance
Outlines scenarios for verifying the performance of Ethernet Ring Protection Switching (ERPS) in Mobile backhaul networks.
Best Practices for 10G and 40G Network Forensics
On highly utilized 10G and 40G networks, capturing network traffic from individual SPAN ports on switches and routers typically results in spotty visibility, compromising an IT team’s ability to respond to network outages, performance degradations, and security threats. How should IT organizations re-think their network forensics strategies, now that 10G and faster networks are becoming the norm? Read this paper to learn about best practices for recording, storing, and analyzing network data.