DAG Technology

From Wikipedia, the free encyclopedia

DAG technology is a combination of hardware design (using field-programmable gate array (FPGA) technology) and software (a software driver layer runs on top of the hardware handling the logic), based on a programmable chip. It uses a uniquely designed memory buffer that allows network packets to be copied into onboard memory at extremely high speeds without dropping any packets. What makes it innovative as a computing hardware design is the way proprietary technology developed by New Zealand company Endace enables the memory buffer/pool to work. Copied packets can be retrieved very quickly from the memory buffer for inspection, recording and reporting, so it provides a platform for building applications for network intrusion detection systems (using tools such as SNORT, an open source IDS toolset), performance monitoring and a range of related networking functions.

It should be noted that DAG is not a protocol and therefore bears little relationship to computing protocols such as NTP. It is more akin to the technology used in Ethernet cards.

From 1995 to 2001, DAG Technology was developed as part of the DAG Project at the School of Computing and Mathematical Sciences at the University of Waikato in Hamilton, New Zealand. Professor Ian Graham[1], then the school Dean (education) led the project team. The aim of the DAG Project was to develop technology to provide:

In 2001, the above aims were fulfilled and DAG technology was commercialised by the New Zealand company Endace in a range of Network Monitoring Interface Cards. DAG technology has continued to be developed and now allows 100 percent packet capture and transfer to host system memory (computers), onboard application processing for CPU-intensive tasks, programmable hardware-based traffic filtering, and CPU load balancing. DAG technology is today deployed[2] in a range of intrusion detection and prevention (IDS/IPS), lawful interception, flow analysis, network monitoring, and protocol analyzer systems in over 25 countries.

[edit] Benefits

  • Prerequisite for any security system is to have access to all information
  • Software applications able to meet line rate speeds
  • Single vendor, ubiquitous, network-wide
  • User-customised real time analysis
  • Focused analysis
  • ‘N times’ application performance
  • ‘N times’ applications
  • Accurate QoS measurement

[edit] References

  1. ^ SCMS > Computer Science: Professors
  2. ^ http://www.endace.com/shared/media/documents/press/CaseStudyTradingMetrics.pdf

[edit] External links