Page 8 - index
P. 8







utilization issues. Both SNMP and flow-based techniques lack the ability to provide granular
application info, especially metadata about application flows, in real time.

DPI is an essential, packet-based technology that has evolved to enable NPMD solutions
with real-time visibility into application traffic. To accurately classify and identify the complex
mix of traffic flowing across the network, a combination of DPI classification techniques must
be used to achieve the real-time visibility and accuracy required by NPMD tools.

Procera’s embedded DPI engine – the Network Application Visibility Library (NAVL) – takes
a data driven approach to identification of application traffic. It examines the packets of an
application flow via a robust set of classification techniques to provide visibility in real-time by
using: deep protocol dissection, behavioral analysis, future flow awareness and flow
association, surgical pattern matching, conversation semantics, and deep protocol
dissection. The Procera NAVL team also provides proactive coverage of new applications
as they emerge, along with metadata from ongoing application flows. NAVL’s combined use
of these techniques provides the Layer 7, real-time visibility that NPMD solutions need with
the rapidly increasing complexity of today’s networks.

About the author

Scott Robohn is an IP networking professional with over 23
years of experience in Service Provider, Enterprise, and US
Federal Government markets. He delivers solutions and
technology expertise in large-scale IP/MPLS networking,
including Network Function Virtualization (NFV), Mobility
(3G/4G/LTE), SP Edge and Core, Data Center/Cloud, Software-
Defined Networking (SDN), Network Security, and other areas.
Prior to joining Procera Networks, Scott served in a variety of
leadership roles at Cisco and Juniper Networks, leading teams of
highly-experienced pre-sales architects and consulting engineers.
Scott has also served as a Certified Cisco Systems Instructor
(CCSI), an adjunct faculty member at George Mason University, a Network Architect at Bell
Atlantic (Verizon), and a consultant to the Federal government on networking and security
issues. Scott lives with his wife and children in Fairfax City, VA.



















8 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   3   4   5   6   7   8   9   10   11   12   13