Investigating the performance of Endace DAG monitoring hardware and Intel NICs in the context of Lawful Interception

نویسنده

  • Amiel A. Heyde
چکیده

SPLIT is a simple prototype Lawful Interception software system which is used to evaluate the viability of using both standard network cards and specialised monitoring hardware for the purpose. Lawful Interception requires reliable packet capture, filtering and protocol analysis on high bandwidth links. While standard NICs can take on these various roles, their performance is only adequate in certain situations. Further optimisations to SPLIT are required to reveal exact limits of the NICs, but it is clear that Endace DAG 3.7GF high performance monitoring cards improve performance and reliability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Endace DAG 3.7GF Card With FreeBSD 7.0

The Centre for Advanced Internet Architectures (CAIA) recently acquired 4 Endace DAG 3.7GF high performance capture cards. Where possible, the centre’s standard experimental environment utilises the FreeBSD operating system and commodity PC hardware to perform experimental research. This report details how to use DAG 3.7GF capture cards with FreeBSD 7.0 in a variety of commonly required experim...

متن کامل

Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)

Although Sparse matrix-vector multiplication (SPMVs) algorithms are simple, they include important parts of Linear Algebra algorithms in Mathematics and Physics areas. As these algorithms can be run in parallel, Graphics Processing Units (GPUs) has been considered as one of the best candidates to run these algorithms. In the recent years, power consumption has been considered as one of the metr...

متن کامل

Lawful Interception of the Internet

This paper describes the state of Lawful Interception of the Internet and compares it with Lawful Interception of access networks. Lawful Interception is the process of secretly intercepting communications between parties of interest to Law Enforcement agencies. Internet interception is both more difficult and much more immature than access network interception. Refusal by the main standards bo...

متن کامل

Investigating the Effect of Changes of Halogenated Compounds on the Aromaticity Flow (NICS) of Rings 5-fluorophenyl-1, 3, 7, 9-tetra methylpyrido [2,3] [d-5,6 dipyrimidine -2, 4, 6 and 8 tetron

In the combination of 5-fluorophenyl-1, 3, 7, 9-tetra methyl pyrido [2, 3, d, d, 5, 6 di pyrimidine -2, 4, 6, and 8 tetron, there are 4 rings, respectively, ring that is attached to the halogen ring A and, respectively, a ring The lower and the right to the left of the ring A are called C, B, and D. Calculations and studies show that the amount of aromatics in halogen-ring A in all cases has th...

متن کامل

Investigating the Effect of Changes of Halogenated Compounds on the Aromaticity Flow (NICS) of Composite Rings 5-fluorophenyl-1, 3, 7, 9-tetra methylpyrido [2,3-: d [d-5,6 dipyrimidine -2, 4, 6 and 8 tetron

In the combination of 5-fluorophenyl-1, 3, 7, 9-tetra methylpyrido [2, 3, d, d, 5, 6 dipyrimidine -2, 4, 6, and 8 tetron, there are 4 rings, respectively, ring that is attached to the halogen ring A and, respectively, a ring The lower and the right to the left of the ring A are called C, B, and D. Calculations and studies show that the amount of aromatics in halogen-ring A in all cases has the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007