|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|DPI:||Deep Packet Inspection||Visibility:||See Network Traffic And Applications That Are Traveling Across Links|
|Traffic Mapping:||To Various Tools For Analytics, Performance Enhancement And Security||Data Process:||DPI Data Capture And Analysis|
|Applications:||Big Data Center Data Capture And Analysis||DPI Technology:||Can Use Three Kinds Of Detection Methods|
passive network tap,
dpi network monitoring
Next Generation Network Packet Broker Define Future Network DPI Deep Packet Inspection
Introduction to DPI Technology
What is DPI?
DPI(Deep Packet Inspection) technology is based on the traditional IP Packet Inspection technology (detection and analysis of Packet elements contained between OSI l2-l4), which adds application protocol recognition, Packet content detection and depth decoding of application layer data.
By capturing the original packets of network communication, DPI technology can use three kinds of detection methods: "eigenvalue" detection based on application data, recognition detection based on application layer protocol, and data detection based on behavior pattern.According to different detection methods, unpack and analyze the abnormal data that may be contained in the communication packet one by one to dig out the subtle data changes in the macro data flow.
DPI supports the following applications:
• the ability to manage traffic, or control end-user applications such as point-to-point applications
• security, resources, and licensing control
• policy enforcement and service enhancements, such as personalization of content or content filtering
The benefits include increased visibility into network traffic, which allows network operators to understand usage patterns and link network performance information to providing usage base billing and even acceptable usage monitoring.
DPI can also reduce the overall cost of the network by reducing operating expenses (OpEx) and capital expenditures (CapEx) by providing a more complete picture of how the network is operating and the ability to direct or intelligently prioritize traffic.
What's the Matrix Modular Designed Plug-in Network Packet Broker to do?
With the acceleration of carrier broadband construction and the rapid development of 3G, 4G, and 5G networks, and with the popularity and development of big data and cloud computing technologies, data traffic is growing, and the bandwidth requirements for backbone networks and core networks are increasing. Since 2013, the major operators have begun to gradually upgrade the backbone network. The core backbone network transmission link media starts to be expanded from 10GPOS and 40GPOS links to 100G Ethernet links. It will inevitably lead to the continuous updating of big data collection and analysis technology. In the face of 100GE link environment with high bandwidth capacity, how to effectively meet the requirements of various national security, network security monitoring, operator intelligent pipeline DPI data collection and analysis will become a hot spot in the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction of the Internet and develop the MATRIX-TCA-CG Traffic Acquisition(Traffic Capture) Visibility System, and dedicated to the traffic collection and visual analysis application requirements on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG integrates free-steering output functions such as network flow collection/acquisition, aggregation, filtering, forwarding/distribution, and load balancing and provides an efficient solution for the flow analysis.
Matrix-TCA-CG is a network data visualization control device for high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE 40GE and 100GE links distributed intensively in operators mobile Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high carrier-level reliability and strong expansibility which can smoothly configure the functional board CARDS to cope with port demand scenarios of various specifications and sizes.
Large-capacity Network Visibility 10G/40G/100G Capture, Aggregation and Distribution Application
Span deployment the high-performance, high-capacity MATRIX-TCA-CG traffic acquisition visibility system to uniformly collect data traffic of any node location and any link type (10G/40G/100G) on the entire network, and then data traffic can be transmitted through the system. The size, structure, relationship, etc. are collated and analyzed. After the invisible data signal is converted into a visible entity, the user can copy, aggregate, and offload the required target data to each back-end system for depth detection and analysis according to system requirements.
In this configuration, live network traffic passes through the TAP, directly into the active tool and back into the network in real time. This allows the tool to analyze the traffic, manipulate packets, stop suspicious packets and take immediate action on the link to block malicious traffic. These tools include Active Firewall and Intrusion prevention systems (IPS/NGFW). The TAP in the active stack has unique bypass technology that sends a heartbeat to the active tool. If the tool goes off line for any reason, the TAP can bypass the tool keeping live network traffic flowing. When the heartbeat returns, traffic automatically returns to normal operation flowing through the tool. Managing and protecting network infrastructure and information requires focus. Each of these devices specializes on a very tight functional range. The example above is by no means a complete list of network monitoring, management and security tool options. There are many purpose built tools for applications such as Data Loss Protection (DLP), Customer Experience Management (CEM), and Identity Access Management (IAM). A simple web search will turn up a wide variety of devices that can be added to these links based on specific threats or required analysis. Having a multiple port TAP foundation allows tools to easily and safely be added, repurposed or changed depending on the immediate needs of the network. There is a logical step by step flow when developing a visibility strategy; access, capture, analyze, secure and remediate if necessary. Ideally, if the right strategy and tools are in place along with other organizational influences to be discussed later, the remediation step will hopefully not be required. However, as is often said, plan for the best but prepare for the worst.
Network Packet Broker Specification and Module Type
|Component type||Product Model||Basic Parameter||Remarks|
|Chassis||NTCA-CHS-7U7S-DC||Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular||Must choose one|
|NTCA-CHS-7U7S-AC||Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular|
|Service card||NT-TCA-SCG10||100G exchange card,10*QSFP28 interface||Choose according to actual business needs|
|NT-TCA-CG10||100G service card,10*QSFP28 interface|
|NT-TCA-XG24||10G service card,24*SFP+ interface|
|NT-TCA-RTM-CG10||100G RTM card,10*QSFP28 interface|
|NT-TCA-RTM-EXG24||10G RTM card,24*SFP+ interface|
|TCA Visibility Embedded software system||NT-TCA-SOFT-PKG||must|
|Chassis size||NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)|
|NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)|
|NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)|
|NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)|
|Adapter chassis and power||Power supply|
|NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC)|
|NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC)|
|NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W|
|NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W|
|NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W|
|NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W|
|Environment requirement||Working temperature:0℃~50℃|
|Standard Certification||Advanced®specification PICMG® 3.0 R2.0|
|RoHs,Designed for CE,FCC,NEBS Level 3|
Contact Person: Jerry
Network Security management: Such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control
Redundant Power System(RPS): Supported 1+1 Dual Redundant Power System
Network Applications: Network Data Deep Analysis, accurately present the proportion of each Network Application
Network Visibility: NetTAP® Visibility Platform of Matrix-SDN Visual Control Platform Access
Network Packet Broker with Tunneling Protocol Identify Net TAP with Data Deduplication
ACL Access Control List Functionality in NPB Dynamic Packet Filter
Vlan Tagged Untagged In Gigabit Ethernet Tap , Network Tap Vendors
Network Deduplication Virtual Network Tap Optimize Network Speed And Visibility
Net TAP Security Network Packet Generator for Public Cloud Private Cloud and Hybrid Cloud
VXLAN Header Stripping Network Packet Broker With VTEP Message Transfer Via Multicast
Network Packet Broker Http Network Sniffer VXLAN Header Stripping VXLAN Forwarding
480Gbps Network Packet Sniffer With Data Deduplication And Data Slicing Ethernet Packet Sniffer
Wireshark Packet Analysis VS Network Packet Sniffer Capture Analysis And Troubleshooting