Need Assistance?


For a Free Quote...

Advanced Features for Packet Brokers

Packet De-Duplication

When you are trying to troubleshoot and identify points of delay in application performance more capture points is always better, but this along with redundant network architecture leads to duplicate packets being sent and overloading your analytics, security or WAN acceleration tools.

Ixia Net Optics Network Packet-De Duplication

Challenges with Duplicate Packets

  • Duplicate Packets can skew network trending analysis
  • Over-subscribed bandwidth on a ingress port of the monitoring tool
  • Increased resources to inspect packets
  • Some packets not inspected
  • False positive errors – some tools report errors when duplicate arrive
  • Compromised data analytics

Increase Tools Bandwidth

By removing redundant data, most data centers can double or triple tool bandwidth

  • Increase recordable time on the network tool providing greater visibility
  • Increase monitoring tool performance
  • Generate more accurate tool statistics more precise session analysis
  • Inspect packets for duplication, recognizing acceptable differences in MACs / VLANs

Ixia Net Optics Network Packet SlicingPacket Slicing

Traditionally done at the analyzer, packet slicing allows you to truncate the packet at different offsets for each packet or the type of packet to be sliced. This can be useful when the analysis you require is centered on nodes, protocols and flows but no the payload information.

Benefits of using a Packet Broker for Packet Slicing

  • Reduces bandwidth going to your monitoring or security tools
  • Allows you to perform this function at the packet capture level anywhere in the network.
  • Can specify the type of traffic that is being sliced.
  • Reduces the amount of data that is collected and analyzed by the security or network monitoring tools.
  • Reduces the storage required by the security or network analysis tool
  • Greater Security – by removing confidential data like passwords, financial accounts, or media data at the point of capture, reduces your chance for a privacy breach.
  • Regulation Compliance – Hidden confidential information allows you to remain complaint with regulations mandating privacy best practices such as SOX, HIPAA and PCI DSS.

Types of Packet Slicing

  • Fixed slicing: Truncation of frames to a maximum size
  • Dynamic slicing: Truncation of frames to a dynamic size relative to a specified protocol, (e.g IP Payload + 16 bytes).
  • Conditional slicing: Fixed and dynamic slicing with properties based on frame decoding.

Time Stamping

Timestamping packets has long been the key to accurate timing analysis when tuning network performance. Financial institutions running automated trading environments, need to understand the latency and delay as the packet travels over the network Operating these high speed network, we must measure the network latency to prove that you are providing the lowest possible latency.

Ixia Net Optics Network Packet Time Stamping

Time Stamping will record the precise time that the first bit of packet arrives at the input port. Timestamping will lose accuracy if stamped on the outgoing port due to variable delays through the device.

  • A 12-byte timestamp – and new CRC added to each packet
  • Records the precise time that the first bit of the packet arrives at the input port
  • Use of GPS NTP Time source can prevent drift of counter

Load Balancing

Two big challenges in monitoring 10Gig networks is the security gap it creates and the overall performance of the monitoring tools. Existing security tools cannot keep up with the over throughput and bandwidth of the network.

Security attacks are also getting more sophisticated, and as a result the rules in the security devices are getting more complex. This means a lot of resources are being allocated to content inspection.

By adding load balancing at the Packet Broker level is a cost effective way to share the increasing traffic load among multiple inline tools. By load balancing you can deploy two or more appliances in parallel with traffic balanced between them.

Advantages of Load Balancing

  • Tool sharing technology allows you to even traffic distribution maintaining session delivery across multiple tools.
  • Build efficiency of inline appliances by sharing a pool of them across multiple independent network links.
  • Heartbeat and link fault detect ensure that all monitoring devices deployed have high availability and advanced redundancy.
  • Relieve overloaded monitoring tools by distributing traffic, by flow, to multiple replicated tools working in parallel.
  • Prevents oversubscription/packet loss (eg. monitoring 10 GigE traffic with Gigabit tools),

Inline Applications

Using Load Balancing with bypass switching technology we take full-duplex traffic and route it through the bypass bridge before distributing the traffic across multiple inline tools.

Out of Band Application

Traffic from the network flows into the Load Balancer and is aggregated and then load balanced to a number of data recorders and forensic traffic recorders. So when you need to capture specific or confidential information you are able direct traffic in one direction which does not go back to the network being taped.


NTO AFM Data Sheet Pic

Contact Us


Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada


(800) 561-4019



For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)