SlideShare una empresa de Scribd logo
1 de 17
Deep Packet Inspection
Technology

Network Application
Visibility Library (NAVL)
Vineyard Networks’ Vision:

To be the global technology leader
        in next-generation
 Deep Packet Inspection (DPI)
             solutions.
What does Vineyard do?
       Vineyard develops and delivers
 Next-Generation Deep Packet Inspection
      OEM solutions for integration into
Network Infrastructure and Telecommunications
              platforms globally.
Vineyard Overview
 Founded:    2008
 HQ:         British Columbia, Canada
 Team:       30 people
 Product:    Network Application Visibility Library
              (NAVL)
 Markets:    Enterprise, Telecommunications
What’s the deal with DPI?
The demand for network bandwidth is increasing
dramatically! Users want access to applications of
all kinds and they want it FAST!

That means…

     More network data
     More money to spend
     More security risks to deal with
     More traffic monitoring, prioritization and
     analysis required

Which is why:
     “DPI is increasingly being
                                                     DPI is the only solution that provides complete
     incorporated into larger
                                                     visibility of your network to determine IF, WHEN
     solutions…creating opportunities for
                                                     and HOW applications and protocols should be
     suppliers that offer DPI technology on
                                                     traversing the network.
     an OEM basis” – Infonetics, April
     2012
Why OEM DPI?
  DPI technology is highly specialized
     It’s expensive to develop and
         maintenance intensive
  Time to market (initial development)
              of 2-3 years
 Very few vendors and engineers have a
      background in DPI technology
Our DPI Solution
     Network Application Visibility Library (NAVL)
        NAVL is …              A real-time, layer-7 classification engine delivered as a
                                                software library / SDK

      Implementation                          User Space Library

       Supported OS             Linux, FreeBSD, Cavium Simple Executive,
                                               Windows
Supported CPU Architectures     Intel x86_32, x86_64, Cavium Octeon II Series

   Application Coverage                 804 application/protocol signatures

Application/Protocol Updates           15+ per month *dynamically loaded

       Performance                      40Gbps + (Intel Xeon 10 HT cores)

        Throughput                               2-4Gbps per core

     Memory Footprint            Library: 5MB Per Thread: 1MB Per Flow: 1KB

   Custom Definition API                                YES

    Metadata Extraction                                 YES
NAVL
Framework
NAVL consists of 2 core
components:

1. The Engine - Contains
classification toolkit, handles IP-
defragmentation & TCP
Reassembly

2. The Plug-ins - Dynamic system
of .plg files containing packet logic
for classification
How does NAVL work?
NAVL receives Packet or Data
streams via API calls to the
engine.

TCP creates Inspection Chain for
each new connection and
provides classification state.

Leverages variety of detection
techniques and extensive plug-in   Features:
set to provides results:           • Thread-safe library
•   Flow ID                        • Zero-Copy interface
•   Application/Protocol Stack     • High performance across
•   Associated Attributes            single or multiple cores
NAVL Classification
Plug-ins push information onto the
application stack as traffic details   Sub-classifications
          are discovered.
                                        provided as well:

   Sample Attributes include:
How does Vineyard deliver DPI
             technology?
1. Technology Alliances are established to drive NAVL DPI
       into the platform to deliver it via the channel
                          OR
       2. NAVL DPI technology is licensed firsthand
      to network infrastructure and telecom vendors
                     around the world
Driving DPI into the Platform
Our technology alliance consists of Strategic Partnerships with industry
leading network vendors who have integrated Vineyard’s DPI engine into
their platform to power next-generation networking solutions:
Licensing our technology
We also establish partnerships with vendors who license our
DPI technology directly for integration into their own solutions:
NAVL
Evaluation
FREE Evaluation of the
NAVL Engine provides:

Sample Code
Integration support
Sample Applications
• Capreader
• Netfilter Queue
• Libpcap
Access to Trace File
Repository
Vineyard AppLabs
             An online resource for Application Intelligence Data


                                                                       Browse our
Filter apps                                                            application &
by                                                                     traffic type
category, ris                                                          database
k
level, produc
tivity level &
application
tags

                                                                    View
                                                                    application
                                                                    details and
                                                                    attributes


                      www.applabs.vineyardnetworks.com
Vineyard’s Value Proposition
         NAVL offers:                    Which means:
• A complete Packet Inspection      • Reduced time to market by
             engine                          1-2 years
• Signature Plug-ins ~ à la carte   • NO in-house development
  • Steady stream of updates          • Minimal staffing needs
   • Ongoing maintenance             • A significant competitive
  • Continued integration and                 advantage
             support
Vineyard Networks Product Overview

Más contenido relacionado

La actualidad más candente

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
An introduction into ip networking
An introduction into ip networkingAn introduction into ip networking
An introduction into ip networking
gthomsontd
 

La actualidad más candente (20)

Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Vpn
Vpn Vpn
Vpn
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
DDS Security
DDS SecurityDDS Security
DDS Security
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
An introduction into ip networking
An introduction into ip networkingAn introduction into ip networking
An introduction into ip networking
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDS
 
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
IRJET-  	  Survey on Mitigation Techniques of Economical Denial of Sustainabi...IRJET-  	  Survey on Mitigation Techniques of Economical Denial of Sustainabi...
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
DPDK & Cloud Native
DPDK & Cloud NativeDPDK & Cloud Native
DPDK & Cloud Native
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 

Destacado

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
Ixia
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Stenio Fernandes
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report Victor
Ng'eno Victor
 

Destacado (20)

Traffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayTraffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload Gateway
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3
 
DPI R&D Service
DPI R&D ServiceDPI R&D Service
DPI R&D Service
 
Intelligent Mobile Broadband
Intelligent Mobile BroadbandIntelligent Mobile Broadband
Intelligent Mobile Broadband
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Nic solution strategy
Nic solution strategyNic solution strategy
Nic solution strategy
 
The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet Inspection
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
 
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report Victor
 
INTERNSHIP REPORT
INTERNSHIP REPORTINTERNSHIP REPORT
INTERNSHIP REPORT
 
Attachment report
Attachment report Attachment report
Attachment report
 
Field attachment report (alie chibwe)
Field attachment report (alie chibwe)Field attachment report (alie chibwe)
Field attachment report (alie chibwe)
 

Similar a Vineyard Networks Product Overview

An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
ManageEngine
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
GeneXus
 

Similar a Vineyard Networks Product Overview (20)

Network Programmability for Developers: Why It's Time to Care
Network Programmability for Developers: Why It's Time to CareNetwork Programmability for Developers: Why It's Time to Care
Network Programmability for Developers: Why It's Time to Care
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Webinar: Synergy turbinado com o SSP1.4: criptografia elíptica, vídeo pela US...
Webinar: Synergy turbinado com o SSP1.4: criptografia elíptica, vídeo pela US...Webinar: Synergy turbinado com o SSP1.4: criptografia elíptica, vídeo pela US...
Webinar: Synergy turbinado com o SSP1.4: criptografia elíptica, vídeo pela US...
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
 
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
EU-Taiwan Workshop on 5G Research, PRISTINE introductionEU-Taiwan Workshop on 5G Research, PRISTINE introduction
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
One pk whitepaper
One pk whitepaperOne pk whitepaper
One pk whitepaper
 
NFV SDN for carriers
NFV SDN for carriersNFV SDN for carriers
NFV SDN for carriers
 
The New Network is Programmable with Junos
The New Network is Programmable with JunosThe New Network is Programmable with Junos
The New Network is Programmable with Junos
 
BYOD Monitoring
BYOD MonitoringBYOD Monitoring
BYOD Monitoring
 
Riverbed Stingray + vFabric Application Director
Riverbed Stingray + vFabric Application DirectorRiverbed Stingray + vFabric Application Director
Riverbed Stingray + vFabric Application Director
 
SDN and NFV Paving the Way for Network Monetization with Value-Added Services
SDN and NFV Paving the Way for Network Monetization with Value-Added ServicesSDN and NFV Paving the Way for Network Monetization with Value-Added Services
SDN and NFV Paving the Way for Network Monetization with Value-Added Services
 
Enabling NFV features in kubernetes
Enabling NFV features in kubernetesEnabling NFV features in kubernetes
Enabling NFV features in kubernetes
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Shifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network ProgrammabilityShifting the Network Paradigm: Network Programmability
Shifting the Network Paradigm: Network Programmability
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
 

Vineyard Networks Product Overview

  • 1. Deep Packet Inspection Technology Network Application Visibility Library (NAVL)
  • 2. Vineyard Networks’ Vision: To be the global technology leader in next-generation Deep Packet Inspection (DPI) solutions.
  • 3. What does Vineyard do? Vineyard develops and delivers Next-Generation Deep Packet Inspection OEM solutions for integration into Network Infrastructure and Telecommunications platforms globally.
  • 4. Vineyard Overview  Founded: 2008  HQ: British Columbia, Canada  Team: 30 people  Product: Network Application Visibility Library (NAVL)  Markets: Enterprise, Telecommunications
  • 5. What’s the deal with DPI? The demand for network bandwidth is increasing dramatically! Users want access to applications of all kinds and they want it FAST! That means… More network data More money to spend More security risks to deal with More traffic monitoring, prioritization and analysis required Which is why: “DPI is increasingly being DPI is the only solution that provides complete incorporated into larger visibility of your network to determine IF, WHEN solutions…creating opportunities for and HOW applications and protocols should be suppliers that offer DPI technology on traversing the network. an OEM basis” – Infonetics, April 2012
  • 6. Why OEM DPI?  DPI technology is highly specialized  It’s expensive to develop and maintenance intensive  Time to market (initial development) of 2-3 years  Very few vendors and engineers have a background in DPI technology
  • 7. Our DPI Solution Network Application Visibility Library (NAVL) NAVL is … A real-time, layer-7 classification engine delivered as a software library / SDK Implementation User Space Library Supported OS Linux, FreeBSD, Cavium Simple Executive, Windows Supported CPU Architectures Intel x86_32, x86_64, Cavium Octeon II Series Application Coverage 804 application/protocol signatures Application/Protocol Updates 15+ per month *dynamically loaded Performance 40Gbps + (Intel Xeon 10 HT cores) Throughput 2-4Gbps per core Memory Footprint Library: 5MB Per Thread: 1MB Per Flow: 1KB Custom Definition API YES Metadata Extraction YES
  • 8. NAVL Framework NAVL consists of 2 core components: 1. The Engine - Contains classification toolkit, handles IP- defragmentation & TCP Reassembly 2. The Plug-ins - Dynamic system of .plg files containing packet logic for classification
  • 9. How does NAVL work? NAVL receives Packet or Data streams via API calls to the engine. TCP creates Inspection Chain for each new connection and provides classification state. Leverages variety of detection techniques and extensive plug-in Features: set to provides results: • Thread-safe library • Flow ID • Zero-Copy interface • Application/Protocol Stack • High performance across • Associated Attributes single or multiple cores
  • 10. NAVL Classification Plug-ins push information onto the application stack as traffic details Sub-classifications are discovered. provided as well: Sample Attributes include:
  • 11. How does Vineyard deliver DPI technology? 1. Technology Alliances are established to drive NAVL DPI into the platform to deliver it via the channel OR 2. NAVL DPI technology is licensed firsthand to network infrastructure and telecom vendors around the world
  • 12. Driving DPI into the Platform Our technology alliance consists of Strategic Partnerships with industry leading network vendors who have integrated Vineyard’s DPI engine into their platform to power next-generation networking solutions:
  • 13. Licensing our technology We also establish partnerships with vendors who license our DPI technology directly for integration into their own solutions:
  • 14. NAVL Evaluation FREE Evaluation of the NAVL Engine provides: Sample Code Integration support Sample Applications • Capreader • Netfilter Queue • Libpcap Access to Trace File Repository
  • 15. Vineyard AppLabs An online resource for Application Intelligence Data Browse our Filter apps application & by traffic type category, ris database k level, produc tivity level & application tags View application details and attributes www.applabs.vineyardnetworks.com
  • 16. Vineyard’s Value Proposition NAVL offers: Which means: • A complete Packet Inspection • Reduced time to market by engine 1-2 years • Signature Plug-ins ~ à la carte • NO in-house development • Steady stream of updates • Minimal staffing needs • Ongoing maintenance • A significant competitive • Continued integration and advantage support