|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|Network Traffic:||Need To Be Controlled, Monitored||Hunting Threat:||Keep A Network Running Smoothly|
|Monitoring System:||Through Simple Network Management Protocol (SNMP)||Reliability:||PEM Module Power, Good Heat Dissipation Channel|
|Applications:||Data Center Of Telecom, Broadcasting, Government, Etc||SDN Makes:||Network And All IT Systems Better|
internet traffic monitor,
web traffic monitor
Network Monitoring Packet Broker A Data Center Network Manager Hunting Threat
For example, if the network like the digital highway, the traffic is made up of data. Just like a traffic jam isn’t good for anyone. It’s worse for those on the highway. That means there’s less coming into businesses. And the problems on networks are trouble for both your consumers and your business. Finding a way to ensure your data can pass to routers, switches, servers easily is necessary for keeping things running smoothly.
But, How Does Network Monitoring Work?
How does the network monitoring system manage to finish these works? Simply, the system poll network devices like routers, switches and servers for performance data using several standard protocols. The first is through Simple Network Management Protocol (SNMP), an internet standard protocol that involves collecting data on devices connected to a network, like routers and printers. This data is organized in a management information base (MIB), which can be accessed by the network administrators. Then, it’s important to note that not all devices will use the same systems. For instance, if you’re working with Windows machines, you will want to use a Windows Machine Interface (WMI) to monitor applications and servers. If you’re on a Unix or Linux server, you’ll want to utilize Secure Shell (SSH) instead. The perk of these specified systems is they are better suited to devices than the broad SNMP, but this increase of information also means they’re often slower than SNMP as well.
What's the Matrix Modular Designed Plug-in Network Packet Broker to do in Network Monitoring Application?
With the acceleration of carrier broadband construction and the rapid development of 3G, 4G, and 5G networks, and with the popularity and development of big data and cloud computing technologies, data traffic is growing, and the bandwidth requirements for backbone networks and core networks are increasing. Since 2013, the major operators have begun to gradually upgrade the backbone network. The core backbone network transmission link media starts to be expanded from 10GPOS and 40GPOS links to 100G Ethernet links. It will inevitably lead to the continuous updating of big data collection and analysis technology. In the face of 100GE link environment with high bandwidth capacity, how to effectively meet the requirements of various national security, network security monitoring, operator intelligent pipeline DPI data collection and analysis will become a hot spot in the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction of the Internet and develop the MATRIX-TCA-CG Traffic Acquisition(Traffic Capture) Visibility System, and dedicated to the traffic collection and visual analysis application requirements on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG integrates free-steering output functions such as network flow collection/acquisition, aggregation, filtering, forwarding/distribution, and load balancing and provides an efficient solution for the flow analysis.
Matrix-TCA-CG is a network data visualization control device for high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE 40GE and 100GE links distributed intensively in operators mobile Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high carrier-level reliability and strong expansibility which can smoothly configure the functional board CARDS to cope with port demand scenarios of various specifications and sizes.
Unified Visibility Modules Source Management
The MATRIX-TCA traffic acquisition visibility system is the industry's first to use graphical-based centralized visual resource management to provide a WYSIWYG-based board resource management interface based on the Web interface on the main control card of the whole machine. The user can visually view the current chassis view, all inserted card views in the chassis, and the working status view of each board on the resource management panel to provide a simple management mechanism for complex board management.
Unified Traffic Visibility Policy View Management
The MATRIX-TCA traffic acquisition visibility system implements unified visual management of traffic collection and distribution strategies for all cards of the whole machine, and determines the master control based on certain master election rules. All slot card policies in the chassis will be completed in the main control card set. Do not manually switch to other cards.
Unified card port resources and configuration views. The unified interface is used to address the service interface of each board through the unified port type, slot number, sub-slot number, or port number. The port configuration and subsequent policies are implemented. Port naming can be visually referenced in the management configuration view, which greatly facilitates the user's management configuration.
Backplane topology hides data auto-routing. The whole machine provides centralized data automatic cross-board routing technology. Users only need to pay attention to the service interfaces of the front and rear panels without paying attention to the backplane connection topology. The visual management software will automatically calculate the cross-board data routing based on the actual board connection for policy application. Configuration coordination greatly simplifies user configuration.
A unified policy management configuration view. The device provides a centralized traffic distribution policy configuration management view. Users can flexibly define data acquisition and output policies in the board. They can also flexibly define cross-board load balancing, cross-board data collection, and offload output policies.
Convenient cards software version maintenance management. All boards use the same software version, and can be upgraded in various ways (based on WEB/TFTP/FTP, etc.) to simplify user maintenance and upgrade operations.
Network Packet Broker Specification and Module Type
|Component type||Product Model||Basic Parameter||Remarks|
|Chassis||NTCA-CHS-7U7S-DC||Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular||Must choose one|
|NTCA-CHS-7U7S-AC||Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular|
|Service card||NT-TCA-SCG10||100G exchange card,10*QSFP28 interface||Choose according to actual business needs|
|NT-TCA-CG10||100G service card,10*QSFP28 interface|
|NT-TCA-XG24||10G service card,24*SFP+ interface|
|NT-TCA-RTM-CG10||100G RTM card,10*QSFP28 interface|
|NT-TCA-RTM-EXG24||10G RTM card,24*SFP+ interface|
|TCA Visibility Embedded software system||NT-TCA-SOFT-PKG||must|
|Chassis size||NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)|
|NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)|
|NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)|
|NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)|
|Adapter chassis and power||Power supply|
|NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC)|
|NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC)|
|NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W|
|NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W|
|NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W|
|NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W|
|Environment requirement||Working temperature:0℃~50℃|
|Standard Certification||Advanced®specification PICMG® 3.0 R2.0|
|RoHs,Designed for CE,FCC,NEBS Level 3|
Contact Person: Jerry
Medical Industry Network Security Services: Hospital Infomation Data Center Monitoring
Anti-ddos Solution: Nanosecond response, separation of inspection and control, flexible management
Hospital Data Center: Typically deployed with a variety of toll servers, case management servers, and pharmacy management servers
Medical Industry Network Security: hospital network isolation and information exchange construction needs. Internal networks can easily be attacked by malicious intruders from external networks
Network Monitor Visibility: The whole visual data collection, data unified scheduling management, pretreatment and redistribution
Network Elements Identify: can realize different location, different exchange routing node link centralized collection of data receiving, processing engine, through the analysis
Internet P2P era: The security management of P2P has become the most urgent problem of Network management.
NetTAP Mangement: Supported NetTAP® Matrix-SDN Visual Control Platform Access