» Global Velocity Transmission Control Protocol Flow Control
A patented TCP processor that won’t slow down your network.
Network-based cybersecurity devices used to control applications and data traffic can encounter challenges when dealing with Transmission Control Protocol (TCP) packets. For example, if a signature spans multiple packets, it might be difficult to detect when the data flow includes packets that are corrupt, out of order, dropped or interleaved with other packets.
To solve the challenges associated with packet transmissions without undermining network performance, a cybersecurity solution must be able to handle packet reassembly without requiring an enormous amount of information on each data flow.
The GV-2010 addresses this challenge using a patent-pending TCP processor, which maintains a small record of each data flow. When packets arrive from a data flow, the record is checked to determine the flow's status and order.
The TCP processor then informs the application if any packets are not in order – meaning corrupted, lost, ordered incorrectly or interleaved with packets from other users and applications.
If the packets are in order, extra flow-specific information is retrieved to continue processing, while corrupted packets are dropped immediately so they do not confuse the application or clog the network.
- » Reprogrammable Hardware
- » Accurate Pattern Matching
- » Deep Packet Inspection
- » TCP Flow Control
- » MicroTCA™
» White Papers
» Join the Revolution
"“When we spoke with the folks at Global Velocity - the company's corporate headquarters is in Clayton, Mo., with an office in Palo Alto, Calif. - we were impressed with what we termed “DLP on steroids”. This is one hot box … We liked this product and the company for their creative approach to a real problem: deep analysis at very high speeds and reduction of the number of boxes needed to put on our perimeters.”"
Read The Article