Net Optics
Encyclopedia
Net Optics, Inc. is a manufacturer of telecommunications equipment. The company was established in 1996 by Eldad Matityahu. It is headquartered in Santa Clara, California and maintains a worldwide market presence through partners and reseller networks. Net Optics is a private company and supports approximately 6,300 customers, including Fortune 500 companies, global governments, and network labs.
Net Optics’ line of passive network monitoring access devices includes taps, bypass switches, regeneration taps, aggregators, data monitoring switches, and media converters. Products are designed and manufactured in the United States.
, F5 Networks
, TippingPoint
, and Oracle
s are passive devices that enable tools such as protocol analyzers and security systems to monitor the data on a network link. Taps pass data transparently through their two network ports, while making copies of the data available on one or more monitoring ports. Conventional network Taps provide two monitoring ports, each receiving the half-duplex traffic flowing in one direction on the network link.
es provide fail-safe access ports for in-line monitoring appliances such as intrusion prevention systems (IPS) and firewalls. The bypass switch is connected in-line in a network link, and the monitoring appliance is connected to two monitoring ports on the byapss switch. During normal operation, link traffic flows into the bypass switch, through the monitoring appliance, and back out the bypass switch, completing the link. If the monitoring appliance loses power, is disconnected, or otherwise fails, the bypass switch passes traffic directly between its network ports, bypassing the monitoring tool, and ensuring that traffic continues to flow on the network link.
The bypass switch is a passive appliance, so link traffic continues to flow even if the bypass switch itself loses power.
Some bypass switches send a Heartbeat packet through the monitoring appliance in order to ensure that the monitoring appliance is passing traffic; if the Heartbeat packet does not return to the bypass switch, the monitoring appliance is assumed to be down, and the switch goes into bypass mode, excluding the monitoring appliance from the traffic path.
If the aggregated traffic in a port aggregator or link aggregator exceeds the bandwidth of the monitoring port, packets are dropped. However, some aggregators include buffering to temporarily store bursts of high-bandwidth traffic so packets are not dropped (unless the capacity of the buffer is exceeded).
Aggregators may also incorporate a regeneration function, making duplicate copies of the aggregated traffic available simultaneously on multiple monitoring ports.
es enable a pool of monitoring tools to access traffic from a large number of network links. They provide a combination of functionality including aggregating monitoring traffic from multiple links, regenerating traffic to multiple tools, pre-filtering traffic to offload tools, and directing traffic according to one-to-one and many-to-many port mappings. Data monitoring switches enable organizations to use their monitoring tools more efficiently, to centralize traffic monitoring functions, and to share tools and traffic access among groups.
traffic statistics including port utilization, peak utilization, packet count, oversize packet count, CRC error count, and other metrics. Programmable threshold-based utilization alarms are also supported.
Net Optics’ line of passive network monitoring access devices includes taps, bypass switches, regeneration taps, aggregators, data monitoring switches, and media converters. Products are designed and manufactured in the United States.
Partners
Net Optics works together with various companies to produce compatible products for their respective industries. Net Optics is currently working with Cisco SystemsCisco Systems
Cisco Systems, Inc. is an American multinational corporation headquartered in San Jose, California, United States, that designs and sells consumer electronics, networking, voice, and communications technology and services. Cisco has more than 70,000 employees and annual revenue of US$...
, F5 Networks
F5 Networks
F5 Networks, Inc. is a networking appliances company. It is headquartered in Seattle, Washington and has development and marketing offices worldwide. It originally manufactured and sold some of the very first load balancing products...
, TippingPoint
Tippingpoint
TippingPoint was an American software company with roots back to 1999 focused on network security products, particularly intrusion prevention systems for networks. TippingPoint was acquired by 3Com Corporation in 2005, and was run as an autonomous security-focused division from 2005 to 2010. On...
, and Oracle
Oracle Corporation
Oracle Corporation is an American multinational computer technology corporation that specializes in developing and marketing hardware systems and enterprise software products – particularly database management systems...
Taps
Test access ports or network tapNetwork tap
A network tap is a hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network. If the network between points A and B consists of a physical cable, a "network...
s are passive devices that enable tools such as protocol analyzers and security systems to monitor the data on a network link. Taps pass data transparently through their two network ports, while making copies of the data available on one or more monitoring ports. Conventional network Taps provide two monitoring ports, each receiving the half-duplex traffic flowing in one direction on the network link.
Bypass switches
Bypass switchBypass switch
A bypass switch is a hardware device that provides a fail-safe access port for an in-line monitoring appliance such as an intrusion prevention system , firewall, WAN optimization device or unified threat management system...
es provide fail-safe access ports for in-line monitoring appliances such as intrusion prevention systems (IPS) and firewalls. The bypass switch is connected in-line in a network link, and the monitoring appliance is connected to two monitoring ports on the byapss switch. During normal operation, link traffic flows into the bypass switch, through the monitoring appliance, and back out the bypass switch, completing the link. If the monitoring appliance loses power, is disconnected, or otherwise fails, the bypass switch passes traffic directly between its network ports, bypassing the monitoring tool, and ensuring that traffic continues to flow on the network link.
The bypass switch is a passive appliance, so link traffic continues to flow even if the bypass switch itself loses power.
Some bypass switches send a Heartbeat packet through the monitoring appliance in order to ensure that the monitoring appliance is passing traffic; if the Heartbeat packet does not return to the bypass switch, the monitoring appliance is assumed to be down, and the switch goes into bypass mode, excluding the monitoring appliance from the traffic path.
Regeneration taps
Regeneration taps make multiple copies of traffic on a network link so multiple monitoring tools can observe the traffic simultaneously. Regeneration taps enable identical tools to be connected redundantly for increased availability. Or, different types of tools can be connected so traffic can be monitored simultaneously by groups with different charters. For example, a network security engineer can monitor traffic at the same time a system administrator does performance tuning.Aggregators
Aggregators are taps that copy multiple traffic streams to a single monitoring port. Port aggregators combine the traffic flowing in both directions on a network link into a single stream that is copied to the monitoring port. Link aggregators combine traffic from multiple network links or Span ports into a single stream that is copied to the monitoring port.If the aggregated traffic in a port aggregator or link aggregator exceeds the bandwidth of the monitoring port, packets are dropped. However, some aggregators include buffering to temporarily store bursts of high-bandwidth traffic so packets are not dropped (unless the capacity of the buffer is exceeded).
Aggregators may also incorporate a regeneration function, making duplicate copies of the aggregated traffic available simultaneously on multiple monitoring ports.
Data monitoring switches
Data monitoring switchData monitoring switch
A data monitoring switch is a networking hardware appliance that provides a pool of monitoring tools with access to traffic from a large number of network links...
es enable a pool of monitoring tools to access traffic from a large number of network links. They provide a combination of functionality including aggregating monitoring traffic from multiple links, regenerating traffic to multiple tools, pre-filtering traffic to offload tools, and directing traffic according to one-to-one and many-to-many port mappings. Data monitoring switches enable organizations to use their monitoring tools more efficiently, to centralize traffic monitoring functions, and to share tools and traffic access among groups.
Media converters
Media converters are devices that pass network traffic between different types of network ports. Port types may include copper, multimode fiber, and singlemode fiber. For example, Net Optics media converters include 10 Gigabit SR to LR, 1 Gigabit LX to SX, SX to TX, and SX to FX. Media conversion functionality may be integrated with different models of Taps and Bypass Switches as well, enabling network links to be monitored by tools with different interfaces. For example, a Converter Tap may enable a fiber network link to be monitored by tools with copper interfaces.iTap Technology
Some Net Optics products include iTap technology, which provides the ability to remotely manage devices through SNMP and Web-based interfaces. iTap-enabled devices generate RMONRMON
The Remote Network MONitoring MIB was developed by the IETF to support monitoring and protocol analysis of LANs. The original version focused on OSI Layer 1 and Layer 2 information in Ethernet and Token Ring networks...
traffic statistics including port utilization, peak utilization, packet count, oversize packet count, CRC error count, and other metrics. Programmable threshold-based utilization alarms are also supported.
See also
- Network tapNetwork tapA network tap is a hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network. If the network between points A and B consists of a physical cable, a "network...
- Bypass switchBypass switchA bypass switch is a hardware device that provides a fail-safe access port for an in-line monitoring appliance such as an intrusion prevention system , firewall, WAN optimization device or unified threat management system...
- Link aggregationLink aggregationLink aggregation or trunking or link bundling or Ethernet/network/NIC bonding or NIC teaming are computer networking umbrella terms to describe various methods of combining multiple network connections in parallel to increase throughput beyond what a single connection could sustain, and to provide...
- Data monitoring switchData monitoring switchA data monitoring switch is a networking hardware appliance that provides a pool of monitoring tools with access to traffic from a large number of network links...
- Fiber media converterFiber media converterFiber media converters are simple networking devices that make it possible to connect two dissimilar media types such as twisted pair with fiber optic cabling. They were introduced to the industry nearly two decades ago, and are important in interconnecting fiber optic cabling-based systems with...