Products & ServicesSee also: Categories | Featured Products | Technical Articles | Engineering Web Results
Supplier: Lucent Technologies, Inc.
Description: Motive Network Traffic Management Software (NTM) manages traffic carried by regional, local, private, signaling and intelligent networks. The software optimizes call-carrying capacity when the network is under stress or when there is an overload or failure condition within the network, and assists
Supplier: GE Intelligent Platforms
Description: for AFDX (Avionics Full Duplex Switched Ethernet) traffic monitoring, analysis and simulation. Available for use with our powerful CNIC interface, BusTools-AFDX offers an intuitive interface to view, log, analyze and generate AFDX network traffic at the Adapter, End System, Virtual Link (VL) and Port
Supplier: Motorola Solutions, Inc.
Description: collection of data to remedy issues such as network degradation. The WLAN Analysis tools give you visibility into the 802.11 protocol and higher-level graphical analysis of devices and traffic patterns. An essential security and network management tool that gives IT professionals a holistic view
Supplier: Softchoice Corporation
Description: traffic. It scans traffic for known viruses and can also be configured to use heuristic analysis to detect unknown viruses and provide the maximum level of protection for your business. For comprehensive web protection an organization must ensure that web traffic is free from viruses. The Anti-Virus
Supplier: Data Device Corporation (DDC)
Description: BusTrACEr™ MIL-STD-1553 Data Bus Analyzer and Monitor software is an intuitive and easy-to-use interface providing point-and-click access to the full functionality of DDC`s 1553 devices. In addition, BusTrACEr provides one-click generation of ANSI `C` source code to enable software engineers
Supplier: Softchoice Corporation
Description: and VPN functionality, form the ideal growing business gateway security solution. Given the high performance requirements of scanning latency sensitive Web traffic, incorporating enterprise-grade security software technologies onto traditional all-in-one platforms has been a very difficult task
Supplier: SMC International
Description: , absolutely inocuous operation over the substation's network. APPLICATIONS - Real-time inspection of IEC-61850 dataset lifecycle - GOOSE message contents analysis - Substation's twisted-pair cabling verification CHARACTERISTICS - 54 x 71 mm high definition touch screen - Windows CE operating system
- Network Protocol: Other
- Interface Port: RJ-45
- Indicators: Yes
- Equipment Type: Network / LAN Analyzer
Description: . Networking aspects: architecture and design (including algorithms for network resource allocation, traffic engineering, modeling, and performance analysis), protocols (including formal methods for the verification, testing, and conversion of communication protocols), network software (including
Business Process Management Software (BPM) - Alcatel-Lucent 8917 No7 Central Surveillance System N7CSSSupplier: Lucent Technologies, Inc.
Description: meet SLAs (availability, etc) Easily scalable for network growth, new inter-carrier settlement and roaming traffic growth: N7CSS includes SS7 probes, and a centralized software application. It manages large volume at existing references Network operations and planning: to improve N7 network
Supplier: GE Intelligent Platforms
Description: Replay (or loop) previously captured files and apply message structures to view data Log data simultaneously at Port, VL or All Traffic levels Advanced, multi-level triggering and filtering High-resolution Timestamping Flexible AFDX Frame Analysis with statistics Display message data
- Device Function: Bus Analyzer
- Device Form Factor: Portable Unit
- Control Interfaces: Ethernet
- Host Interface: GUI Support
Find Suppliers by Category Top
Featured Products for Network Traffic Analysis Software Top
Traffic Analyzer IEC-61850; GOOSEMeter One
of the network's topology and wiring integrity at any spot in the substation. The GOOSEMeter One is a READ ONLY instrument, which ensures risk-free, absolutely inocuous operation over the substation's network. APPLICATIONS. - Real-time inspection of IEC-61850 dataset lifecycle. - GOOSE message contents analysis. - Substation's twisted-pair cabling verification. CHARACTERISTICS. - 54 x 71 mm high definition touch screen. - Windows CE operating system. - Internet-based software updates. - RJ-45 female LAN... (read more)
Browse Network Test Equipment Datasheets for SMC International
IEC-61850 Traffic Analyzer: GOOSEMeter One
spot in the substation. The GOOSEMeter One is a READ ONLY instrument, which ensures risk-free, absolutely inocuous operation over the substation's network. APPLICATIONS. - Real-time inspection of IEC-61850 dataset lifecycle. - GOOSE message contents analysis. - Substation's twisted-pair cabling verification. CHARACTERISTICS. - 54 x 71 mm high definition touch screen. - Windows CE operating system. - Internet-based software updates. - RJ-45 female LAN connector. - USB 2.0. - 100-260 Vac 50/60 Hz... (read more)
Browse Network and Protocol Analyzers Datasheets for SMC International
Conduct Research Top
port that acts as a software network tap. Network Tap. (TS250A). Network. Network Switch. Switch. with Mirror Port. Network. Network. Analyzer. Analyzer. Span. To Network. To Network. Network Taps. Mirror Ports. Best for high-speed networks with heavy traffic or for analysis. Best for networks
"Can You See Me Now?" Better Videoconferencing Requires Less Computer Network Jitter, New Software Tools
, a network engineer at OSC. Twenty-five sites in 14 different countries participated in remote videoconferences with Calyam's OSC lab for the study, and more than 500 traffic traces were used for the data analysis. Users rated the quality of their experience on a scale of 1-5 while the researchers inserted
Network taps vs. mirror ports
. To Network. Network Taps. Mirror Ports. Best for high-speed networks with heavy traffic or for analysis. Best for networks with light traffic or for analysis not affected. that requires all network traffic. by dropped packets. Advantages: Advantages: · Capturessendandreceivedatastreamssimultaneously
5 Risky Blind Spots of Industrial Networks (And How to Reveal Them)
. In this article, we will explore five problematic blind spots that network administrators encounter during a network's lifetime. We will also demonstrate how to use industrial network management software to help reveal these blind spots, increase network availability, and improve the productivity
A Test Lab Based Solution to Optimize 3G Networks to Maximize Revenue for Data Services Through Good End User Quality of Experience (.pdf)
. There is a danger that an increase. network: average data rate, peak data rate, latency and residual. in voice minutes as a result of lower prices could lead to packet. error rates. Aeroflex has developed a method to optimize the 3G. data services not realizing their revenue potentials on networks. network
Should Machine to Machine Scare Us?
. There are certainly software solutions or services a vendor would happily sell you to help manage a chaotic situation with M2M traffic. Rather than opening up your wallet a second time, the best solution is to select the right device-level network, which also happens to mean the right Ethernet solution. You can
IBM taps wireless domain with SWAP
search results. More breaking news. /. IBM taps wireless domain with SWAP. By John Cox AND JORIS EVERS. Network World, 11/13/00. Earlier this month, IBM unveiled what it called a breakthrough software technology that lets customers use a Palm OS handheld to manage Internet-based commercial operations
Multi-Service Access: Bundling Solutions That Increase Competitiveness and Promote Differentiation
to such mediums as the Internet. Such devices. as PBX systems, routers, FRADs and CSU/DSUs are required to allow access to the various com-. munications networks. The cost of deploying and maintaining these devices can grow rapidly if the business has many sites. in its corporate network. The cost of deploying
Engineering Web Search: Network Traffic Analysis Software Top
- The Internet Traffic Archive
CERT Advisory CA-2002-03 Multiple Vulnerabilities in Many...
Secure Coding Vulnerability Analysis Cyber Security Engineering Network Situational Awareness
Networks and Mobile Systems
CarTel: a mobile sensor network system developing vehicular network protocols, software, and services.
SANS Information, Network, Computer Security Training,...
Secure Software Development Audit Intrusion Analysis SANS Site Network Current Site Security Training
Network Management Software, Application Server...
Network Monitoring OpManager Traffic Analysis & Bandwidth Monitoring NetFlow Analyzer Network Performance Server & Application
Cisco Systems Network Analysis Module Software 5.0...
Cisco Systems Network Analysis Module Software 5.0 Enterprise-Class Performance Monitoring and Analysis for Modern IP Networks An ENTERPRISE
Cisco Guide to Harden Cisco IOS Devices - Cisco Systems
Log Collection and Monitoring Use Secure Protocols When Possible Gain Traffic Visibility with NetFlow Configuration Management Management Plane
Software Blade Architecture | Check Point Software
capability, Check Point Software Blades deliver lower cost of ownership and cost-efficient protection that meet any network security or endpoint