Bringing Value to the Network: Powerful and Reliable DPI Engine for Competitive Network Equipment Vendors

Bringing Value to the Network: Powerful and Reliable DPI Engine for Competitive Network Equipment Vendors

View the Q&A

 

Many network equipment vendors are facing increasingly complex challenges with the constantly growing number of applications and protocols they must account for. Meanwhile, improving end user QoS and QoE, comprehensive subscriber analytics, targeted content optimization and reliable policy enforcement are key drivers for future network operators.

To ensure high levels of quality and security for all network elements, products need to be enhanced with powerful and proven Layer 7 protocol network management and visibility capabilities.

There is a need to move to consolidated network elements that can be optimized for a wide range of infrastructure applications and use of content-aware technologies to create differentiated service offerings. In line with the increases in internet traffic, the number of applications and protocols, subscribers and use cases have also increased, placing strain on networking equipment hardware and software that requires a platform that is all-encompassing, powerful, scalable, and adaptable.

This webinar discusses how cutting-edge DPI capabilities can be used to implement application aware, adaptable and software configurable network elements for next generation networks. It provides network equipment vendors with insights into a new, ready-to-use framework that will accelerate the development of next generation platforms for network security and analytics.

Join us for this free webinar from telecoms.com in association with IPOQUE as we address the following:

  • - How to efficiently overcome network challenges with DPI capabilities?
  • - How to handle the individualized needs of different customers and use cases?
  • - How to balance the costs with a reliable and efficient outsourcing solution?

 

Meet IPOQUE at events worldwide!


Dubai: 14 – 18 October 2012 (Stand: #Z-H16)


Amsterdam: 16 – 18 October 2012 (Stand: #G36)


London: 6-8 November 2012


Cape Town: 13-15 November 2012

 

Tags; Archive, deep packet inspection, DPI, Featured, ipoque, telecoms.com
Q&A
  • Paul Waite October 25, 2012 at 2:51 pm

    Thank you for all your questions, this Q&A is now closed. You can email your questions directly to Eias by sending them to eias.daka@ipoque.com

  • Dannyk October 25, 2012 at 2:45 pm

    do you perform the traffic divert to VASes based on L7?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:47 pm

      Hi,

      The reroute function is done by the PCEF solution, PACE provides the classification based on the L7 information

  • Dannyk October 25, 2012 at 2:38 pm

    with regards to interfaces, do you support the 3GPP Gx,Gy,Gz, Sd, Sy?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:41 pm

      PACE is a SW library which is integrated in solutions like PCEF, which might be 3GPP compliant

  • Yangcheng Huang October 25, 2012 at 2:36 pm

    Further questions on the capacity, how many DPI rules do you configure when achiving 4.2Gbps per core? What traffic was used in the tests? Is it a real IP traffic being inspected?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:39 pm

      Hi,

      we did the test on a real IP traffic capture. With all protocols and applications enabled which do contain more than 10000 DPI rules.

  • Yangcheng Huang October 25, 2012 at 2:31 pm

    Just want your confirmation: …the performance of 4.2Gbps per core… Is this capacity based on layer 7 inspection?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:33 pm

      Yes

  • Ale October 25, 2012 at 2:29 pm

    Hi Eias,

    what is your experience with Wirelinw SPs? Other than those who want to understand what applications use their broadband lines is there any SP really thinking of DPI helping to enhance their service offer? if yes can you provide an example?
    thanks!
    Alessandro Salesi

    • Eias Daka
      Eias Daka October 25, 2012 at 2:35 pm

      Hi Alessandro,

      Yes, it is used by Traffic Management/WAN Optimization/PCEF and GGSN to optimize the traffic and offer SLA’s

      Thanks,
      Eias

  • Dannyk October 25, 2012 at 2:24 pm

    What is the solution you offer with regards to Lawful Intercept?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:28 pm

      It is the DPX and PADE, you can find them on our website

  • Jim Burke October 25, 2012 at 2:23 pm

    Which GGSN vendors have implemented your solution?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:24 pm

      unfortunately we can’t disclose the name, due to NDA

  • Dannyk October 25, 2012 at 2:21 pm

    On how many cores can we install the SW? can the various cores be synchronized?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:26 pm

      We support any number of cores. The cores don’t have to be synchronized. The performance increases almost linearly with the number of cores

  • Michael October 25, 2012 at 2:20 pm

    Even if you are 100% HW independent, is there any HW recommended (e.g. a HW that you have specifically tested and that is recommended from ipoque to guarantee the throughput values)

    • Eias Daka
      Eias Daka October 25, 2012 at 2:23 pm

      Hello Michael,

      We recommend x86 platform to guarantee the best performance, This is our preferred and tested HW platform

  • Erich Baumeier October 25, 2012 at 2:18 pm

    Is it possible to get a copy of the slides ?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:36 pm

      Sure, please send me your contact details.

      Thanks,
      Eias

  • Charbel Khneisser October 25, 2012 at 2:11 pm

    Hello Eias,

    what about the Heuristic and Behavioral analysis. Does this help in classifying Encrypted Traffic?

    Regards,
    Charbel Khneisser,

    • Eias Daka
      Eias Daka October 25, 2012 at 2:21 pm

      Hi Charbel,

      we use the heuristic and behavioral analysis to classify encryted protocols like Skype and Bittorrrent.

      Cheers,
      Eias

      • Charbel Khneisser October 25, 2012 at 2:22 pm

        Hi Eias,

        thanks for the slides. can we use this to classify in any mathematical methods to detect Encrypted VoIP?

        • Eias Daka
          Eias Daka October 25, 2012 at 2:30 pm

          Yes, PACE is using those mathematical methods to detect encrypted VoIP.

  • Jim Dev October 25, 2012 at 8:05 am

    You mentioned a regular signature updates, how is it done? Does the customer have to reboot the system?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:08 pm

      Hello,

      PACE includes the dynamic update feature, enabling you to update without rebooting the system.

      Thanks,
      Eias

  • Jim Dev October 25, 2012 at 8:04 am

    Are your customers able to influence you Roadmap planing?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:10 pm

      Hello,

      Sure, customer requests and feedback is highly appreciated and taken into our plannings.

      Thanks,
      Eias

  • Jim Dev October 25, 2012 at 8:04 am

    How does the evaluation work? Do you have an evaluation SW?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:13 pm

      Yes we do. There is an evaluation version which contains all features as the regular software does.

  • Jim Dev October 25, 2012 at 8:04 am

    The performance of 4.2Gbps per core, does it include all protocols and applications? Which HW platform did you use for the test?

    • Eias Daka
      Eias Daka October 25, 2012 at 2:16 pm

      Yes, it included all applications and protocols. Intel i3-2100 CPU@3.10GHZ