Network Analysis

  1. Network Traffic Capture
    1. Methods of Data Acquisition
      1. Network TAPs
        1. Passive TAPs
          1. Optical TAPs
            1. Copper TAPs
              1. Wireless TAPs
              2. Active TAPs
                1. Regenerating TAPs
                  1. Aggregating TAPs
                    1. Load Balancing TAPs
                    2. Filtering TAPs
                      1. Hardware-based Filtering
                        1. Protocol-specific Filtering
                          1. Selective Traffic Capture
                          2. Bypass TAPs
                            1. Failover Capabilities
                              1. Heartbeat Monitoring
                                1. Automatic Bypass
                              2. Switched Port Analyzer
                                1. Local SPAN
                                  1. Same-switch Mirroring
                                    1. Port Configuration
                                      1. Traffic Direction Options
                                      2. Remote SPAN
                                        1. VLAN-based Mirroring
                                          1. Cross-switch Monitoring
                                            1. RSPAN VLAN Configuration
                                            2. Encapsulated Remote SPAN
                                              1. GRE Tunneling
                                                1. Layer 3 Transport
                                                  1. Scalability Benefits
                                                  2. Limitations and Considerations
                                                    1. Bandwidth Constraints
                                                      1. CPU Impact
                                                        1. Packet Dropping
                                                      2. Agent-based Capture
                                                        1. Host-based Agents
                                                          1. Software Installation
                                                            1. Privilege Requirements
                                                              1. Configuration Management
                                                              2. Network-based Agents
                                                                1. Appliance Deployment
                                                                  1. Virtual Machine Agents
                                                                    1. Container-based Agents
                                                                    2. Resource Impact
                                                                      1. CPU Utilization
                                                                        1. Memory Usage
                                                                          1. Storage Requirements
                                                                      2. Placement of Capture Points
                                                                        1. Core Network Monitoring
                                                                          1. Aggregation Points
                                                                            1. Internet Gateways
                                                                            2. Edge Network Monitoring
                                                                              1. Access Layer Switches
                                                                                1. Wireless Access Points
                                                                                  1. Remote Branch Offices
                                                                                  2. Server-side Monitoring
                                                                                    1. Data Center Traffic
                                                                                      1. Application Server Monitoring
                                                                                        1. Database Server Monitoring
                                                                                        2. Client-side Monitoring
                                                                                          1. End-user Device Monitoring
                                                                                            1. Desktop and Laptop Monitoring
                                                                                              1. Mobile Device Monitoring