<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Garland Technology to Attend Sharkfest ’14

May 14, 2014

Garland Technology, a leading network visibility solutions company based in Buffalo, NY and Richardson, TX, will be attending the Sharkfest ’14 Wireshark Developer and User Conference from June 16 to 20 at the Dominican University of California. The educational conference, held by Wireshark members and user communities, will teach attendees and industry leaders how to make best use of the platform, as well as strengthen their packet analyses skills, IT and network security platforms, and more.

2014_SharkfestBuffalo, NY (PRWEB) May 14, 2014 -- Garland Technology will be attending the Sharkfest ’14Wireshark Developer and User Conference, to be held from June 16 to June 20 at the Dominican University of California in San Rafael. During the four-day conference, members of Wireshark and user communities will learn how to use and implement the free data packet analyzer designed for network security use, troubleshooting procedures, and data analysis.

In addition, Garland’s portable and aggregating TAPs have proven as a superior choice for use with Wireshark.

Vinton Cerf, who boasts accolades including the National Medal of Technology, Turning Award, and Presidential Medal of Freedom, will be the 2014 Sharkfest keynote speaker and will present on Tuesday, June 17. Cerf was the co-designer of TCP/IP protocols and is considered to be one of the main architects of the Internet, commonly referred to as one of the original fathers of the web.

Tim O’Neill, Chief Contributing and Technology Editor for LoveMyTool, as well as a contributor to Garland Technology’s blog, white papers, and technical resources. O’Neill will discuss the past and present trends of the Internet and associated security features (or lack thereof) on Wednesday, June 18. O’Neill is a Senior IEEE member and has more than 45 years of experience in test and analyses markets, such as RF, WAN, Analog, ISDN, ATM, and more.

Co-Owner and CEO Chris Bihary, who will be attending the event and available for meetings, said “Technology platforms are always changing, as are new threats to network security, which is why the meeting of the minds is crucial for sharing tweaked processes, problem-solving procedures, and other adaptive issues. Stay tuned – we’ll be sharing our new knowledge within our team and with our clients to ensure an even stronger network TAP security system. That being said, the opportunity to learn from the two keynote speakers is a great one and we hope many take advantage of it.”

Additional topics to be covered will include processes for implementing and using the Wireshark platform, best practices for aggregating data packets, troubleshooting performance applications, Wi-Fi threats and counter measures, and tricks for troubleshooting.

Wireshark is a network protocol analyzer that works on a global scale. It is a three-pane packet browser and allows the live capture and offline analysis of data, which can be run on multi-platforms such as Linux, OS X, Windows, Solaris, NetBSD, and FreeBSD.

For more information about Wireshark and Garland’s attendance, please visit http://www.garlandtechnology.com to stay up-to-date with blog posts.

About Garland Technology 
Garland Technology guarantees precise data monitoring capabilities for enterprise networks with no added point of failure. Garland's line of Test Access Points (TAPs) are the foundation to all network monitoring by delivering access to all data for security, network visualization, network performance monitoring, forensics, deep packet capture, data leakage, and compliance.

Garland Technology’s full line of Network, Aggregation, Bypass, and Regenerating TAPs, as well as the Filtering Aggregation Load Balancing (FAB) product line, is the leading Network Access Solution. Garland's Network Access Products are available for 10/100/1000, 1 Gigabit, 10 Gigabit, 40 Gigabit, and 100 Gigabit local and wide area networks.

For more information, visit http://www.garlandtechnology.com.

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES