ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

What is a Network Packet Broker? | Tech Tips With Packet Boi

Автор: Keysight

Загружено: 2020-06-01

Просмотров: 7958

Описание: What is a network packet broker? It might be the most important tool in your data center! Learn more at ► https://www.ixiacom.com/resources/5-w... ◄ and ► https://www.ixiacom.com/resources/def... ◄

Other helpful links:
Network Visibility portfolio: https://www.ixiacom.com/products/visi...
Vision Network Packet Brokers: https://www.ixiacom.com/products/netw...

So, what is a network packet broker (NPB) anyways? Well, aside from being a tool that a lot of IT engineers are unfamiliar with, a network packet broker, also known as a packet broker or NPB, is a device that lets you manipulate network data to make your monitoring solution more efficient and reduce your costs.

When it comes to monitoring, a lot of people think that all you need to do is buy a special tool - like a performance monitoring or security appliance - and insert it into your network. But it’s not that simple. Some tools need data from various parts of the network, while others only want specific types of data, which can be very difficult to capture.

But if your tools are only as good as the data you feed them, how do you make sure they’re all getting the right information? Well, there is an easy solution for that: a visibility architecture.

At its core, a visibility architecture is an end-to-end infrastructure that captures data across the entirety of your network — enabling physical and virtual network, application, and security visibility.

To create a visibility architecture, first you need to deploy taps or SPAN ports so that you can access monitoring data. Of the two, I always recommend going with taps, because you can place them anywhere in the network you want.

Now, while you could just send that data directly to your monitoring tools, too much data can impair their performance. This is the point of a network packet broker. By deploying it between your taps and your tools, you can reduce tool strain by sending your tools only the data they need, and nothing extra.

Finally, the third part of a visibility architecture are your tools themselves, which provides your data insights.

Now, it is worth noting that there are two types of visibility architectures: inline architectures and out-of-band architectures. The architecture I’m describing today is out-of-band — which means that your packet broker is not directly in the line of your production traffic. Ergo, if you take the packet broker out of service, it will not affect your production network.

There are a number of situations where this kind of architecture is useful – in fact, off the top of my head I can think of more than 70! But in the interest of time, here are the seven most valuable use cases for an out-of-band packet broker.

First off, there’s aggregation — and it’s an extremely popular use case. This is where an NPB combines data from multiple taps or SPAN ports throughout your network and sends a single stream of data to the monitoring tool. No duplicates, no missing packets.

Next up, there’s replication. This is where an NPB makes multiple copies of the same data and sends it to multiple tools at the same time.

Then there’s filtering. With layer 2 to layer 4 IP packet filtering, you can use your NPB to remove unwanted data so that only specific data is sent on for analysis. This is especially useful for tools like WireShark or a DLP.

At the other end of the spectrum, Layer 7 filtering gives you application level filtering. For instance, you can screen in HTTPS data or screen out Netflix data – based solely on the application type.

With deduplication, you can make your tools more efficient by removing unnecessary duplicate packets, which are caused by things like Cisco ACI architectures, SPAN ports, or the use of too many taps.

In a similar vein, load balancing enables you to spread the data analysis load across multiple monitoring tools. Should one device fail, data is efficiently distributed to the remaining tools.

And finally, there’s faster troubleshooting. Once you pair a tap and packet broker together, you have fast access to the data you need, when you need it. This means you will almost never need to schedule maintenance windows to collect monitoring data. In fact, several of our clients have reduced their troubleshooting times by almost 80% just because of this one capability.

So hopefully today’s video gave you a little more insight as to what a network packet broker really is. But if you’re hungry for more information, check out a couple of our ebooks, Definitive Guide to Network Visibility Use Cases (https://www.ixiacom.com/resources/def...) and 5 Ways to Improve ROI with Network Packet Brokers (https://www.ixiacom.com/resources/5-w....

#NetworkPacketBroker #NPB #NetworkMonitoring #DataCenter #NetworkVisibility #NetworkMonitoringBestPractices #NetworkTap #VisibilityArchitecture #Ixia #PacketBoi

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
What is a Network Packet Broker? | Tech Tips With Packet Boi

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

MikroTik для начинающих: стоит ли изучать в 2026 году

MikroTik для начинающих: стоит ли изучать в 2026 году

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Introduction to Gigamon

Introduction to Gigamon

Объяснение промышленных протоколов связи | Eaton PSEC

Объяснение промышленных протоколов связи | Eaton PSEC

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

IP-адресация для начинающих: IP-адрес, маска сети, подсеть и NAT

IP-адресация для начинающих: IP-адрес, маска сети, подсеть и NAT

Как сжимаются изображения? [46 МБ ↘↘ 4,07 МБ] JPEG в деталях

Как сжимаются изображения? [46 МБ ↘↘ 4,07 МБ] JPEG в деталях

What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela

What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela

Tech Talk: What is Public Key Infrastructure (PKI)?

Tech Talk: What is Public Key Infrastructure (PKI)?

ПЛОХИЕ АРАНЖИРОВКИ: НАУТИЛУС ПОМПИЛИУС - ПРОГУЛКИ ПО ВОДЕ

ПЛОХИЕ АРАНЖИРОВКИ: НАУТИЛУС ПОМПИЛИУС - ПРОГУЛКИ ПО ВОДЕ

The 90-Degree Torque Problem

The 90-Degree Torque Problem

What does Keysight do?

What does Keysight do?

FieldFox HandHeld RF & Microwave Analyzers

FieldFox HandHeld RF & Microwave Analyzers

Taps Vs. SPAN: Taps Provide Full Visibility into Network Data

Taps Vs. SPAN: Taps Provide Full Visibility into Network Data

VLANs, Tagging, Trunking, VxLAN, & Native VLAN

VLANs, Tagging, Trunking, VxLAN, & Native VLAN

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Что такое IP-адрес? // Ты полный ноль в подсетях // Эпизод 1

Что такое IP-адрес? // Ты полный ноль в подсетях // Эпизод 1

10 лучших фильтров Wireshark // Фильтрация с помощью Wireshark

10 лучших фильтров Wireshark // Фильтрация с помощью Wireshark

Объяснение связи по шине CAN (часть 1)

Объяснение связи по шине CAN (часть 1)

Как производятся микрочипы? 🖥️🛠️ Этапы производства процессоров

Как производятся микрочипы? 🖥️🛠️ Этапы производства процессоров

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]