How many duplicate packets are weighing down your systems? Packet duplication occurs when multiple tap and aggregation points, deployed throughout the datacenter to acquire necessary traffic, result in redundant copies of packets. Duplicates can also be caused by inter-VLAN communication, incorrect switch policy settings or unavoidable SPAN/mirror port configurations.
Unfortunately, these additional copies can well exceed 80 percent of traffic volume seen on your network. This takes up vital monitoring infrastructure bandwidth and tool computing power. As a result tools get overwhelmed causing them to lose effectiveness, which results in inaccurate analysis.
Problems that arise from duplicated packets include :
Are duplicate packets weighing down your systems? With Gigamon, the problems associated with packet duplication are a thing of the past. Consider GigaSMART® De-duplication - sometimes also called dedup, intelligent compression or single-instance storage - can revolutionize the way your business handles stored data.
What is De-duplication?
Even the most advanced networks have only a finite amount of data storage. And that means if you want your system to run efficiently, you need to make sure that limited storage space isn’t being wasted on maintaining multiple copies of identical data — such as those created during a system backup. Data de-duplication is a process by which unnecessary duplicate data copies can be effectively eliminated from your system. Here’s how:
Unburden your network from the weight of duplicate packets so it can run at hyper speed - packet de-duplication makes it all possible. Take advantage of our new bundled GigaSMART apps to optimize network visibility!
“[We were looking for the ability to do packet de-duplication] to make sure we don't overload the tools. It would’ve taken us a lot of time to set up all the SPAN ports and network TAP, and we wouldn’t have been able to see the same amount of traffic. We’re doing things that we wouldn’t be able to do without Gigamon. There’s definitely a lot of time saved. We have it ready to send to the tools easily so we can compare.”
Data de-duplication allows you to unburden your network from the weight of duplicate packets so it can run at hyper speed. To learn more, check out our GigaSMART packet De-duplication training video.
GigaSMART® offers several essential traffic intelligence services required for deep observability into infrastructure blind spots.
NetFlow Generations
Delivers basic Layer 2–4 network traffic data to analysis tools.
Source Port Labeling
Provides context to packets and identifies behaviors and threats based on network location.
Adaptive Packet Filtering
Identifies patterns across any part of the network packet, including the packet payload.
De-duplication
Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.
Packet Slicing
Truncates packets while preserving the protocol headers required for network analysis.
Advanced Load Balancing
Divides and distributes traffic among multiple tools based on a variety of data points.
Advanced Flow Slicing
Reduces bandwidth usage by slicing payloads and packets from long data flows.
Masking
Provides customizable data protection by overwriting specific packet fields with a set pattern.
Tunneling
Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.
Application Visualization
Provides a complete view of the applications running on your network.
Application Filtering Intelligence
Extends Layer 7 visibility to thousands of common and proprietary applications.
Application Metadata Intelligence
Provides application visibility to identify performance and quality issues, and potential security risks.
GTP Correlation
Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.
FlowVUE Flow Sampling
Provides subscriber IP-based flow sampling.
5G Correlation
Forwards subscriber sessions to specific tools by filtering on subscriber, user device, RAN, or network slice IDs.
SSL/TLS Decryption
Creates a secure channel between the server and the end user's computer or other devices as they exchange information.
We're here to help you find the right solution for your business.
By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.