For packet analysers to work, a packet capture mechanism is also required for intercepting and

Size: px
Start display at page:

Download "For packet analysers to work, a packet capture mechanism is also required for intercepting and"

Transcription

1

2 Airports Airports one of the busiest places with continuous operations happening round the clock, and one that is heavily dependent on information technology. From ticket reservations, passenger check-in, baggage handling, security screening, to flight control everything that happens at an airport today are completely integrated with the IT systems supporting the operations. Because of the multitude of operational functions at airports, the network infrastructure has to integrate them to facilitate real-time exchange of sensitive data. This results in the IT operations at airports being complex. IT teams at airports work round the clock to ensure that their infrastructure does not face issues causing downtimes. Because downtimes would mean systems becoming unavailable and thus impacting any of the operational functions related to passengers or flights. But issues in such complex setups, either on the network or application level, can still pop up anytime. The key factor on such occasions is how fast you can troubleshoot the issue and how quick the systems are restored.

3 Issues in the IT world are not always black and white. Troubleshooting faults in the network that comprise of up or down status are rather straight forward. It s the performance issue the grey area that consumes the most time as they are hard to diagnose. This is witnessed whenever an end-user at reservation desks, check-in counters, passenger terminals, or departure gates complains of slowness while using IT services. Traditional IT troubleshooting methods are not fit to diagnose root-causes of performance issues in a fast and precise manner. That is because IT teams are accustomed to check the network and systems in their individual scope, i.e. in silos. Ensuring smooth IT operations means early detection, diagnosis, and resolution of performance issues. While looking for a root-cause, IT teams seem to be more concerned with the state of their network: hardware configurations, routing tables, node status, etc. Anything beyond these fundamentals does not seem to be on their priority checklist. What they often miss out is the fact that data communications is not composed of one layer only. The OSI communication stack is comprised of 7 layers. And this is why it is important to think of the data communications happening over the network in the perspective of all 7 layers. This means that IT teams need to have visibility beyond the network layer (Layer- 3), into the Transport layer (Layer-4), and up into the Application layer (Layer-7) as well. They need to think beyond what traffic is flowing on their network to how that traffic is flowing and what is being experienced by that traffic. Traditional NMS platforms are fine when it comes to monitor the network state. But they fall short when the need is to evaluate the network performance with respect to applications. Rather than relying on just the SNMP polled node statuses, IT teams should develop packet analysis skills which are highly valuable at times of hard-to-diagnose performance issues. Packet analysis requires the ability to inspect the raw protocol data inside the packets that are part of the data traffic flowing over the network. This is done by a packet analyser (also known as packet sniffer), which is a tool (a software or hardware) that can log, parse, and analyse traffic passing over a network. As data flows over the network,

4 the packet analyser receives the captured data packets and decodes the packet's raw data revealing the values of various fields in the packet (e.g. TCP header, Session details, etc). An IT engineer can then analyse these values according to the appropriate RFC specifications to deduce whether the packet underwent any abnormal behaviour during its transportation between the network points. For packet analysers to work, a packet capture mechanism is also required for intercepting and Often when an end-user either at reservation desks, check-in counters, passenger terminals, or departure gates complains of slow or intermittent response in any IT service the IT team starts troubleshooting from their network s perspective, not from the end-user s perspective. Instead of digging into the network from the enduser s side, they start checking the higher level hierarchy of their infrastructure. This is the fundamental difference between troubleshooting network outages vs. network performance capturing packets from the live traffic. There are two ways to do that: using port mirroring (SPAN) on a switch, or, using a network TAP. The former is not recommended as using SPAN does not guarantee each and every packet from the mirrored traffic because SPAN ports cannot copy all the traffic streams from all the switch ports without dropping some of the packets (up to 50% in worst cases). This fails the original purpose of the activity that is, to be able to capture & analyse all the packets for troubleshooting. This is why having a network TAP beats the SPAN on any given day, especially on your troubled day. Because a network TAP guarantees full capture of 100% of packets and feeds them to the packet analyser tool. issues. And this must be remembered while troubleshooting for performance issues related to end-user complaints. So, when doing packet analysis it is recommended to shift to the network segment closest to the end-user to diagnose the issue as seen by the end-user. An important point to note here is that for IT infrastructures monitored through a network TAP it would most likely be a rack-mounted chassis deployed in the datacenter. This means that all packet analysis would be done in the datacenter from a top level perspective. This could be a drawback since it limits the flexibility to roam anywhere in the airport s infrastructure and move to the network segment closer to the end-user.

5 TAP technology has evolved rapidly since past few years. Amongst the various types of TAPs available today, portable TAPs are fast gaining popularity due to the flexibility to carry them on the field and deploy them instantly at any location. They easily hook up to your laptop, and with a tool like Wireshark installed, your laptop turns into a portable kit ready to dig into any network problem, especially those nagging performance issues. Using portable network TAPs are also suitable for those IT Managers who are not ready yet to deploy full-scale TAPs permanently in their network and just need an on-demand kit to be used as/when/where needed. Most manufacturers have their own variety of portable TAPs. However, not all of them are as good as they may sound. Some of them are powerful but complex as well to handle without being truly portable. They require a lunch-box PC to connect with additional configurations to be done. Thus they are not truly portable in the first place. While others are easy to deploy, they are not powerful enough to capture the full traffic. They either drop packets while copying to the laptop, or mess with the timing of those packets. This fails the original purpose of the packet analysis activity missed packets or messed timing is never going to help. A portable TAP that is powerful enough to take on the full traffic copies every packet without messing the packet s timing and yet easy to deploy on the field fast enough, is the right tool to have.

6 Meet ProfiShark 1G the world s best, fastest and truly portable network TAP ready to hit the ground running for any kind of packet capture in any field location. ProfiShark1G is pocket-sized and yet power-packed. It works as an all-in-one packet capture tool without the bottleneck of any packet part of the plug-&-play ProfiShark 1G is that it is not dependent on an external power source. Combined with a laptop, you have a truly portable and powerful packet capture & analysis kit ready to use at any location without depending on a power source. drop or time delay. With the 2 x Gigabit network ports, it easily combines the two traffic streams to transport over a single monitoring port. And it does not use a Gigabit NIC as the monitoring port. Instead, it utilises the power of USB 3.0, which can transfer data at up to 5 Gbps. Hence it can easily transport 2 Gbps of aggregated traffic stream (1G from each direction) over a USB 3.0 link. This means that the buffer memory doesn t need to drop any packets and doesn t have to store packets long enough to impact its timing. And because it can easily connect to your laptop s USB port, the best The ProfiShark 1G comes with its own GUI-based configuration software, the ProfiShark Manager, which works in parallel with any network analyser (Wireshark, Omnipeek, Colasoft, etc.) and is compatible with both Windows and Linux platforms. You can easily configure the ProfiShark 1G using the various features shown on the GUI. One of the benefits of the ProfiShark Manager is that it also allows capturing traffic directly on your laptop with 1-click without particularly needing a network analyser to capture traffic. The GUI also has a Counters section displaying the internal counters for both network ports, A and B, which shows number of valid/invalid packets, CRC errors, collisions, and different packet sizes. It s a quick way to see the quality of traffic being received on each port without having to open a network analyser. You can also view these traffic statistics in graph format by switching to the Graphs section within the GUI.

7 Thus you can rely on this handy tool for any kind of on-demand network & application performance analysis job, especially on the network segments closer to the end-user. ProfiShark 1G is your new sidekick to assist in critical IT operations at airports to ensure that passengers and flights reach their destinations on time. If you are interested in meeting your new sidekick and seeing what it can do for you then please contact us or visit our website for further details. High Tech Campus AE Eindhoven The Netherlands sales@profitap.com

As for the requirement of having a USB 3.0 port, you will come to know the reason in the next section.

As for the requirement of having a USB 3.0 port, you will come to know the reason in the next section. Network forensics and cybersecurity teams need to have the ability to intercept network traffic and capture data packets in real-time to thwart threats and live attacks. Corporate organisations may set

More information

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One

More information

THE FUTURE OF PORTABILITY IN NETWORK MONITORING AND PACKET CAPTURE

THE FUTURE OF PORTABILITY IN NETWORK MONITORING AND PACKET CAPTURE THE FUTURE OF PORTABILITY IN NETWORK MONITORING AND PACKET CAPTURE VISIT WWW.PROFITAP.COM Having a network TAP with you is one of the best ways to analyze your network for issues. Having a portable TAP

More information

WHITE PAPER: PROFISHARK PERFORMANCE RESULTS WIRESHARK HEROES SERIES VISIT

WHITE PAPER: PROFISHARK PERFORMANCE RESULTS WIRESHARK HEROES SERIES VISIT WHITE PAPER: PROFISHARK PERFORMANCE WIRESHARK HEROES SERIES VISIT WWW.PROFITAP.COM TABLE OF CONTENT TONY FORTUNATO NETWORK PERFORMANCE SPECIALIST Tony Fortunato is a Senior Network Performance Specialist

More information

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING 2018 PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING FIBER TAPS COPPER TAPS NETWORK PACKET BROKERS PORTABLE TROUBLESHOOTERS IN-DEPTH PACKET ANALYSIS SOFTWARE VISIBILITY PERFORMANCE SECURITY

More information

Ref: C8-1G. The 8-Link Gigabit Copper TAP is a high density solution, providing 8 TAP links in a 1U rack space

Ref: C8-1G. The 8-Link Gigabit Copper TAP is a high density solution, providing 8 TAP links in a 1U rack space Data Center Copper TAPs 100% Visibility PROFITAP Copper TAPs monitor all 7 OSI layers, packets of all sizes and types, and low-level errors. Gigabit Ethernet Network TAPs Comprehensive and Flawless 10/100/1000

More information

SOLUTION BRIEF: TROUBLESHOOTING WITH GEARBIT AND PROFISHARK WIRESHARK HEROES SERIES VISIT

SOLUTION BRIEF: TROUBLESHOOTING WITH GEARBIT AND PROFISHARK WIRESHARK HEROES SERIES VISIT SOLUTION BRIEF: TROUBLESHOOTING WITH GEARBIT AND PROFISHARK WIRESHARK HEROES SERIES VISIT WWW.PROFITAP.COM ISSUE HUNTING I m ashamed to admit it but this one caused issues for several weeks. OK, months.

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

SysTrack 3 Lakeside Software

SysTrack 3 Lakeside Software SysTrack 3 Lakeside Software Written By: Douglas A. Brown dbrown@dabcc.com Introduction Do you know how many users you can fit on a box? Would you like to see trending over a specified period of time?

More information

Application-Centric Analysis Helps Maximize the Value of Wireshark

Application-Centric Analysis Helps Maximize the Value of Wireshark Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and

More information

REVIEW: A LOOK AT A PORTABLE USB3 NETWORK TAP WIRESHARK HEROES SERIES VISIT

REVIEW: A LOOK AT A PORTABLE USB3 NETWORK TAP WIRESHARK HEROES SERIES VISIT REVIEW: A LOOK AT A PORTABLE USB3 NETWORK TAP WIRESHARK HEROES SERIES VISIT WWW.PROFITAP.COM INTRODUCTION JASPER BONGERTZ TECHNICAL CONSULTANT FOR AIRBUS DEFENCE A while ago I wrote a post for LoveMyTool

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

ECE 4400:427/527 - Computer Networks Spring 2017

ECE 4400:427/527 - Computer Networks Spring 2017 ECE 4400:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

More information

CIS 188 CCNP TSHOOT Ch. 2: Troubleshooting Processes for Complex Enterprise Networks

CIS 188 CCNP TSHOOT Ch. 2: Troubleshooting Processes for Complex Enterprise Networks CIS 188 CCNP TSHOOT Ch. 2: Troubleshooting Processes for Complex Enterprise Networks Rick Graziani Cabrillo College graziani@cabrillo.edu Fall 2010 Troubleshooting Principles Troubleshooting is the process

More information

Making Remote Network Visibility Affordable for the Distributed Enterprise

Making Remote Network Visibility Affordable for the Distributed Enterprise TECH BRIEF Making Remote Network Visibility Affordable for the Distributed Enterprise It s not uncommon today for an enterprise network to extend to hundreds or even thousands of remote locations. Every

More information

Observer GigaStor. Post-event analysis and network security forensics

Observer GigaStor. Post-event analysis and network security forensics Observer GigaStor Post-event analysis and network security forensics Rewind. Review. Resolve. Stop Missing Critical IT Service Events Observer GigaStor is instrumental in solving IT service delivery issues

More information

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING 2019 PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING FIBER TAPS COPPER TAPS NETWORK PACKET BROKERS PORTABLE TROUBLESHOOTERS IN-DEPTH PACKET ANALYSIS SOFTWARE VISIBILITY PERFORMANCE SECURITY

More information

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING

PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING 2019 PRODUCT PORTFOLIO NETWORK MONITORING, ANALYSIS AND TROUBLESHOOTING FIBER TAPS COPPER TAPS NETWORK PACKET BROKERS PORTABLE TROUBLESHOOTERS IN-DEPTH PACKET ANALYSIS SOFTWARE VISIBILITY PERFORMANCE SECURITY

More information

Softing PROFINET Diagnostic Tools

Softing PROFINET Diagnostic Tools Industrial Automation Softing PROFINET Diagnostic Tools Written by Dave Tomlin, Automation Specialist, Hitex (UK) Ltd Softing is one of the leading manufacturers of PROFINET diagnosis tools. Their tools

More information

TCP Selective Acknowledgement

TCP Selective Acknowledgement SharkFest 18 ASIA TCP Selective Acknowledgement correctly interpreting this field can help you be a better performance troubleshooter John Pittle Global Architect, Performance Management Services Riverbed

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Latency Analyzer (LANZ)

Latency Analyzer (LANZ) Latency Analyzer (LANZ) A New Dimension in Network Visibility Inside High Performance Monitoring for High Performance Networks Traditional utilization based monitoring does not meet the needs of high performance

More information

WHITE PAPER: PROFISHARK 1G USE CASE ANALYSIS WIRESHARK HEROES SERIES VISIT

WHITE PAPER: PROFISHARK 1G USE CASE ANALYSIS WIRESHARK HEROES SERIES VISIT WHITE PAPER: PROFISHARK 1G USE CASE ANALYSIS WIRESHARK HEROES SERIES VISIT WWW.PROFITAP.COM BACKGROUND BRAD PALM OPERATOR AT BRUTEFORCE LLC Brad is a problem solver and a convergent thinker that looks

More information

CCIE SP Operations Written Exam v1.0

CCIE SP Operations Written Exam v1.0 Cisco 350-060 CCIE SP Operations Written Exam v1.0 Version: 5.0 QUESTION NO: 1 DRAG DROP Cisco 350-060 Exam Answer: Critical Section Loss of Signal (SLOS) Critical Section Loss of Frame (SLOF) Major Alarm

More information

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK DKT 224/3 DATA COMMUNICATION & NETWORK LAB 2 NETWORK PROTOCOL ANALYZER SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK Lab #2 2 Lab #2 : Network Protocol Analyzer (Sniffing and Identify Protocol used

More information

Top 10 Mistakes Network Engineers Make when Troubleshooting

Top 10 Mistakes Network Engineers Make when Troubleshooting WHITE PAPER Top 10 Mistakes Network Engineers Make when Troubleshooting There are several traps that are easy to fall into when troubleshooting network and application problems. This white paper describes

More information

Goliath Technology Overview with MEDITECH Module

Goliath Technology Overview with MEDITECH Module Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.

More information

The Keys to Monitoring Internal Web Applications

The Keys to Monitoring Internal Web Applications WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required

More information

Create a smarter environment where information becomes insight

Create a smarter environment where information becomes insight Create a smarter environment where information becomes insight How a seamless network can turn data into intelligence for your smart city or factory Contents Introduction 3 Smart city surveillance: From

More information

Maximizing visibility for your

Maximizing visibility for your Maximizing visibility for your OptiView Series III Integrated Network Analyzer Network management and security departments have different network access requirements from the end user and server groups.

More information

OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways

OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY This is the second of two white papers that describe how the shift from monolithic, purpose-built, network

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Security Annex for DDoS Additional Terms for DDoS Protection

Security Annex for DDoS Additional Terms for DDoS Protection CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Installation and Service Provision... 2 2.2 Cleaning and Mitigation... 3 2.3 Mitigation Limitations... 3 2.4 DDoS Attack Monitoring...

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Datasheet: Network Time Machine Portable Series - Plug and Play Network Forensic Analysis for Real Time Visibility

Datasheet: Network Time Machine Portable Series - Plug and Play Network Forensic Analysis for Real Time Visibility DATA SHEETS Unpublished Datasheet: Network Time Machine Portable Series - Plug and Play Network Forensic Analysis for Real Time Visibility Highlights All in one, plug and play architecture for quick root

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Gaining End-to-end Visibility of Service Delivery: Making critical decisions and avoiding shortfalls

Gaining End-to-end Visibility of Service Delivery: Making critical decisions and avoiding shortfalls Add Your Logo here Do not use master Gaining End-to-end Visibility of Service Delivery: Making critical decisions and avoiding shortfalls Mike Valladao Senior Product Marketing Managerwww.NetScout.com

More information

Traffic and Performance Visibility for Cisco Live 2010, Barcelona

Traffic and Performance Visibility for Cisco Live 2010, Barcelona Traffic and Performance Visibility for Cisco Live 2010, Barcelona Background Cisco Live is Cisco's annual premier education and training event for IT, networking, and communications professionals. Cisco

More information

OptiView Integrated Network Analyzer. Vision on every level.

OptiView Integrated Network Analyzer. Vision on every level. OptiView Integrated Network Analyzer Vision on every level. What could be more powerful than all of your network test tools put together? Putting them together the way only Fluke Networks has. Meet the

More information

SEVONE END USER EXPERIENCE

SEVONE END USER EXPERIENCE Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

SHAREPOINT HEADACHES EBOOK GSX SOLUTIONS. Project: Microsoft SharePoint Headaches Targeted Product: GSX Monitor & Analyzer

SHAREPOINT HEADACHES EBOOK GSX SOLUTIONS. Project: Microsoft SharePoint Headaches Targeted Product: GSX Monitor & Analyzer SharePoint Headaches ebook January 2012 GSX SOLUTIONS SHAREPOINT HEADACHES EBOOK Project: Microsoft SharePoint Headaches Targeted Product: GSX Monitor & Analyzer [Adresse de la société] Page 0 Content

More information

Introduction to Troubleshooting TCP/IP Networks with Wireshark

Introduction to Troubleshooting TCP/IP Networks with Wireshark Introduction to Troubleshooting TCP/IP Networks with Wireshark Course WIRE-1B 5 Days Instructor-led, Hands-on Introduction In this hands-on, instructor-led, five-day course, you will receive in-depth training

More information

Introduction to Ethernet. Guy Hutchison 8/30/2006

Introduction to Ethernet. Guy Hutchison 8/30/2006 Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original

More information

COMPARATIVE ANALYSIS OF PACKET SNIFFERS : A STUDY

COMPARATIVE ANALYSIS OF PACKET SNIFFERS : A STUDY COMPARATIVE ANALYSIS OF PACKET SNIFFERS : A STUDY ABSTRACT Jyoti Senior Engineer, Bharat Electronics Limited (India) Today everything is being centralized through a common dedicated network to ease its

More information

A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007

A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007 A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007 Is It the Application or the Network? If you re a network engineer in an organization that runs

More information

SINGLEstream Link Aggregation Tap (SS-100)

SINGLEstream Link Aggregation Tap (SS-100) SINGLEstream Link Aggregation Tap (SS-00) Optional 3-Unit Rack Mount Datacom Systems SINGLEstream 0/00 Link Aggregation Tap provides a superior solution for 4x7 monitoring of full-duplex Ethernet links.

More information

Troubleshooting OSI Layers 4-7

Troubleshooting OSI Layers 4-7 Troubleshooting OSI Layers 4-7 In this two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet. The root cause of application

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

The Definitive Guide to ac Packet Capture

The Definitive Guide to ac Packet Capture TM WHITE PAPER The Definitive Guide to 802.11ac Packet Capture The IEEE 802.11ac standard is changing the rules when it comes WLAN troubleshooting based on packet capture and analysis. Packet-based analysis

More information

RUGE. Rugged IP load generator (Ruge) Ruge gives your network a serious beating. Just to make sure it does not fail when it is time to go live.

RUGE. Rugged IP load generator (Ruge) Ruge gives your network a serious beating. Just to make sure it does not fail when it is time to go live. PRODUCT DATA SHEET Rugged IP load generator (Ruge) RUGE Ruge gives your network a serious beating. Just to make sure it does not fail when it is time to go live. Introduction Rugged IP load generator (Ruge)

More information

VirtualWisdom Performance Probes are VirtualWisdom Fibre Channel SAN Performance Probe

VirtualWisdom Performance Probes are VirtualWisdom Fibre Channel SAN Performance Probe Data Sheet VirtualWisdom Performance Probes for line-rate wire data monitoring VirtualWisdom Fibre Channel SAN Performance Probe VirtualWisdom Performance Probes are VirtualWisdom Fibre Channel SAN Performance

More information

IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU

IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU IP Network Troubleshooting Part 3 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU February 2016 Today s Outline: Focused Upon Protocol Analysis with Wireshark Review

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Everything you need to know about cloud. For companies with people in them

Everything you need to know about cloud. For companies with people in them Everything you need to know about cloud For companies with people in them You used to know where you stood with the word cloud. It meant those fluffy things floating above you, bringing shade and rain,

More information

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management Level 3 SM Enhanced Management - FAQs Frequently Asked Questions for Level 3 Enhanced Management 2015 Level 3 Communications, LLC. All rights reserved. 1 LAYER 3: CONVERGED SERVICES 5 Where can I find

More information

DISTRIBUTED EMBEDDED ARCHITECTURES

DISTRIBUTED EMBEDDED ARCHITECTURES DISTRIBUTED EMBEDDED ARCHITECTURES A distributed embedded system can be organized in many different ways, but its basic units are the Processing Elements (PE) and the network as illustrated in Figure.

More information

Availability and the Always-on Enterprise: Why Backup is Dead

Availability and the Always-on Enterprise: Why Backup is Dead Availability and the Always-on Enterprise: Why Backup is Dead Backups certainly fit the bill at one time, but data center needs have evolved and expanded. By Nick Cavalancia Every business has experienced

More information

Keeping Your Network at Peak Performance as You Virtualize the Data Center

Keeping Your Network at Peak Performance as You Virtualize the Data Center Keeping Your Network at Peak Performance as You Virtualize the Data Center Laura Knapp WW Business Consultant Laurak@aesclever.com Applied Expert Systems, Inc. 2011 1 Background The Physical Network Inside

More information

Cubro Packetmaster EX48600

Cubro Packetmaster EX48600 Cubro Packetmaster EX48600 PRODUCT REVIEW Network Packet Broker (NPB) At a glance The Packetmaster EX48600 is a high performance network packet broker up to Layer 4 that aggregates, filters, duplicates,

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

Troubleshooting VoWLAN using OmniPeek

Troubleshooting VoWLAN using OmniPeek CHAPTER 6 Capturing Data for Wireless Analysis To troubleshoot VoWLAN, we must first capture the wireless data carrying the VoWLAN information. Capturing data for wireless analysis can be broken down into

More information

SEVONE DATA APPLIANCE FOR EUE

SEVONE DATA APPLIANCE FOR EUE Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

Independent Solution Review AppEnsure for Citrix Monitoring

Independent Solution Review AppEnsure for Citrix Monitoring Independent Solution Review AppEnsure for Citrix Monitoring Pawel Serwan, organizer of Polish Citrix Users Group Monitoring is always one of the most important topics that you have to define during implementation

More information

Why can t I just do that with a switch? Joseph Magee Chief Security Officer Top Layer Networks

Why can t I just do that with a switch? Joseph Magee Chief Security Officer Top Layer Networks Why can t I just do that with a switch? Joseph Magee Chief Security Officer Top Layer Networks - 1 - Introduction In the field you may come across the following question: Why can t I do what your IDS Balancer

More information

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network Hands-on Networking Fundamentals Chapter 12 Maintaining and Troubleshooting Your Network Objectives Use hardware and software methods to monitor a network Perform backups over a network Solve a broad range

More information

Hands-On Troubleshooting IPTV with WireShark

Hands-On Troubleshooting IPTV with WireShark Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2015 Networking Laboratory 1/56 An Overview of

More information

ProfiShark 1G User manual

ProfiShark 1G User manual ProfiShark 1G User manual Gigabit Ethernet Troubleshooter Page 2 Thank you for purchasing the ProfiShark 1G. Package contents: - 1* ProfiShark 1G main unit - 1* USB key containing drivers, software and

More information

WHITE PAPER. Visibility from Your Network into the Cloud: Today s New Essentials

WHITE PAPER. Visibility from Your Network into the Cloud: Today s New Essentials WHITE PAPER Visibility from Your Network into the Cloud: Today s New Essentials WHEN CLOUD SERVICES FALTER, NETWORK MANAGERS NEED TO KNOW WHY The cloud is supposed to make everything simpler and more cost-effective

More information

NetAnalyst Test Management Software Automated, Centralized Network Testing. NetComplete Service Assurance Solutions Portfolio

NetAnalyst Test Management Software Automated, Centralized Network Testing. NetComplete Service Assurance Solutions Portfolio NetAnalyst Test Management Software Automated, Centralized Network Testing NetComplete Service Assurance Solutions Portfolio Ensure High Quality of Service with NetAnalyst As telecommunications networks

More information

The trend to virtualisation

The trend to virtualisation The trend to virtualisation Key concepts Desktop virtualisation describes the process of separating or abstracting a personal desktop environment (including its operating system, applications, user profile

More information

Modelling direct application to network bandwidth provisioning for high demanding research applications

Modelling direct application to network bandwidth provisioning for high demanding research applications Modelling direct application to network bandwidth provisioning for high demanding research applications H. Wessing, Y. Yan and M. Berger Research Center COM Technical University of Denmark Bldg. 345V,

More information

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420 Based on the book Computer Networking: A Top Down Approach,

More information

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information

INTRODUCTORY COMPUTER

INTRODUCTORY COMPUTER INTRODUCTORY COMPUTER NETWORKS LAYERING Faramarz Hendessi Introductory Computer Networks Lecture 3 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Layering What is it? Building complex

More information

Datasheet: OptiView XG Network Analysis Tablet - Version 11 Software Release and OptiView Performance Test Remote

Datasheet: OptiView XG Network Analysis Tablet - Version 11 Software Release and OptiView Performance Test Remote Unpublished Datasheet: OptiView XG Network Analysis Tablet - Version 11 Software Release and OptiView Performance Test A dedicated tablet for automated network and application analysis, OptiView XG is

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University DEVELOPMENT AND APPLICATION OF A NEW CURRICULUM FOR COMPUTER NETWORKING Presenter Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University Gabriel

More information

Gigabit Networks, VLANs & Wireless LANs

Gigabit Networks, VLANs & Wireless LANs Hands-On Gigabit Networks, VLANs & Wireless LANs ( Advanced Local Area Networks ) Course Description This Hands-On course will discuss traditional Ethernet as it is evolving today and its future. Ethernet

More information

Package contents. 1 x ProfiShark 10G main unit 1 x USB key containing drivers, software and manual 1 x USB 3.0 cable 1 x Carrying pouch

Package contents. 1 x ProfiShark 10G main unit 1 x USB key containing drivers, software and manual 1 x USB 3.0 cable 1 x Carrying pouch 1 Package contents 1 x ProfiShark 10G main unit 1 x USB key containing drivers, software and manual 1 x USB 3.0 cable 1 x Carrying pouch For any questions, technical or otherwise, contact our customer

More information

MANAGING THE HIGH-SPEED CATV DATA NETWORK

MANAGING THE HIGH-SPEED CATV DATA NETWORK MANAGING THE HIGH-SPEED CATV DATA NETWORK Esteban Sandino, P. Eng. Rogers Cablesystems Ltd. Abstract Setting up and running high-speed data services over cable will require changes in the way services

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

Cisco Prime for Enterprise Innovative Network Management

Cisco Prime for Enterprise Innovative Network Management Cisco Prime for Enterprise Innovative Network Management Session ID 1 Agenda Network Management Challenges Cisco Prime for Enterprise Overview Service-Centric Foundation Common Operational Attributes Benefits

More information

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is

More information

Department of Electrical and Information Technology ETSF10 Internet Protocols Home / Laboratory Project II

Department of Electrical and Information Technology ETSF10 Internet Protocols Home / Laboratory Project II Department of Electrical and Information Technology ETSF10 Internet Protocols Home / Laboratory Project II TCP The aim of this lab is to guide you while you familiarise yourselves with some of the basic

More information

BUILDING A NEXT-GENERATION FIREWALL

BUILDING A NEXT-GENERATION FIREWALL How to Add Network Intelligence, Security, and Speed While Getting to Market Faster INNOVATORS START HERE. EXECUTIVE SUMMARY Your clients are on the front line of cyberspace and they need your help. Faced

More information

IBM Tivoli Monitoring (ITM) And AIX. Andre Metelo IBM SWG Competitive Project Office

IBM Tivoli Monitoring (ITM) And AIX. Andre Metelo IBM SWG Competitive Project Office IBM Tivoli Monitoring (ITM) And AIX Andre Metelo metelo@us.ibm.com IBM SWG Competitive Project Office Have You Seen A DataCenter Like This? Complexity drives error rates Reduces responsiveness Increases

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

Two-Tier Oracle Application

Two-Tier Oracle Application Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

Traditional Security Solutions Have Reached Their Limit

Traditional Security Solutions Have Reached Their Limit Traditional Security Solutions Have Reached Their Limit CHALLENGE #1 They are reactive They force you to deal only with symptoms, rather than root causes. CHALLENGE #2 256 DAYS TO IDENTIFY A BREACH TRADITIONAL

More information

TCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim

TCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim TCP Performance EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks

More information

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2014 Networking Laboratory 1/56 An Overview Internet

More information

100GbE S2D Full-rate Packet Capture & Analyzer A result born from the pursuit of high-functionality, high-reliability, and high-availability

100GbE S2D Full-rate Packet Capture & Analyzer A result born from the pursuit of high-functionality, high-reliability, and high-availability A member of TOYO Corporation family 100GbE S2D Full-rate Packet Capture & Analyzer A result born from the pursuit of high-functionality, high-reliability, and high-availability Overview About 30 years

More information

Configuring Tap Aggregation and MPLS Stripping

Configuring Tap Aggregation and MPLS Stripping This chapter contains the following sections: Information About Tap Aggregation, page 1 Information About MPLS Stripping, page 3 Configuring Tap Aggregation, page 4 Verifying the Tap Aggregation Configuration,

More information