Microtel Innovation’s solutions for efficient GTP offloading

Preview Image

Mobile data traffic continues to grow exponentially, primarily driven by mobile video and over-the-top (OTT) services. While 5G has been widely introduced, its global deployment continues to expand, with existing LTE networks still handling a substantial portion of this traffic, and this demand is only increasing.

For operators, monitoring such high-volumes of traffic is critical for troubleshooting and ensuring optimal user experience. However, traditional solutions, such as adding probes or increasing their capacity, are costly and often impractical.

An alternative approach is to optimize the amount of User Plane traffic sent to monitoring tools. By reducing unnecessary traffic, operators can prevent infrastructure overload and ensure efficient resource utilization.

The Role of GTP in LTE Networks

The GTP (GPRS Tunneling Protocol) is a key technology in 2G, 3G, and 4G/LTE networks. It carries both control-plane (GTP-C) and user-plane (GTP-U) data, enabling mobile data transfer across networks.

Addressing traffic challenges requires innovative solutions that filter and manage GTP-U traffic effectively without impacting performance.

Fig. 1 GTP protocol in 4G networks

The Solution

Microtel Innovation provides advanced Network Packet Brokers (NPBs) designed to reduce GTP User Plane traffic while maintaining optimal monitoring. Unlike traditional NPBs, which often lack sufficient computational power, Microtel’s solutions are built for high-performance demands.

The main techniques to reduce GTP User traffic are Inner IP filtering and filtering data based on different GTP-C parameters, both of which are described in detail in the following sections.

#1 | Inner IP Filtering for GTP-U Traffic Reduction

Inner IP filtering helps operators reduce traffic by targeting specific IPs within GTP tunnels. This technique requires hardware-based support to meet performance demands efficiently.

Fig. 2 Inner IP in GTP frame (User IP=IP packet sent by the phone)

This technique can be effectively used in various use cases, represented in the table below.

USE CASE How Notes
GTP User Plane traffic statistical sampling Traffic is coherently reduced using inner IP filtering In this case all traffic related to a specific inner IP is sent to the tools, but the number of inner IPs is sampled in order to reduce the traffic. Several reduction percentage may be configured, based on Operator specific needs
GTP User Plane traffic reduction by sending to the tools only the subscribers belonging to a specific list (IMSI - Inner IP dynamic correlation) Use NPB Rest API to real time configure NPB Inner IP White List Inner IP address is dynamic, can change in each PDP context message and is typically managed by the network itself. Operators which are able to real time trace the correlation between IMSI (unique identifier of the subscriber) and inner IP may real time configure NPB Inner IP White List using NPB REST API.
GTP User Plane traffic reduction by sending to the tools only the subscribers belonging to a specific list (IMSI - Inner IP static correlation) Configure NPB Inner IP White List directly on the NPB In some specific cases Inner IP and IMSI correlation does not change over the time. This is the case for example of mobile Set Top Box: they take advantage from the high bandwidth provided by LTE, maybe in an area where it is not easy to provide fibre connection to the home, but they are not moving. Connection is always on and IP address in this case usually does not change, depending on Operator policies. Operator usually have the list of Set Top Box inner IPs in their Data Base, so they can easily configure NPB to filter them. Also in this case REST API may be an interesting tool for the NPB to integrate with the Operator Data Base.

Microtel Innovation’s Aster A-640 and Aster A-648e appliances are specifically designed for these scenarios, offering hardware-based inner IP filtering and REST API support for integration with operator systems. This approach is also effective in architectures like CUPS and 5G, where GTP-C and GTP-U functionalities are geographically separated.

GTP User Plane Image
Fig. 3 Using Inner IP to filter S1-U (GTP User Plane)​

Optimize mobile traffic with innovative solutions for smarter, high-performance monitoring

#2 | Filtering Based on GTP-C Parameters

Another effective strategy for reducing GTP User Plane traffic is filtering based on control-plane parameters, such as IMSI, IMEI, APN and geolocation data. These parameters are available in GTP-C packets, requiring correlation between GTP-C and GTP-U trafficMicrotel Innovation’s Aster A-XFE DEDUP appliances support this correlation at speeds from 1G to 100G, ensuring precise traffic management and subscriber-level granularity.

Filter: mobile phone's IDS How it works
IMSI (International Mobile Subscriber Identity) User and/or Control plane traffic generated by IMSIs which are listed in the White/Black Lists is forwarded to the tools or blocked
MSISDN (Mobile Station International Subscriber Directory Number) User and/or Control plane traffic generated by MSISDNs which are listed in the White/Black Lists is forwarded to the tools or blocked
IMEI (International Mobile Equipment Identity) User and/or Control plane traffic generated by IMEIs which are listed in the White/Black Lists is forwarded to the tools or blocked
FIlter: Geographical location HOW IT WORKS
User Location Information: ULI-CGI, ULI-SAI, ULI-RAI, ULI-TAI, ULI-LAI, ULI-ECG User and/or Control plane traffic coming from geographical areas identified by the ULI-CGI, ULI-SAI, ULI-RAI, ULI-TAI, ULI-LAI, ULI-ECG which are listed in the White/Black Lists is forwarded to the tools or blocked
Filter: Network type HOW IT WORKS
APN (Access Point Name) User and/or Control plane traffic belonging to APNs which are listed in the White/Black Lists is forwarded to the tools or blocked
VoLTE (Voice over LTE) User and/or Control plane traffic belonging to subscribers using VoLTE service is forwarded to the tools or blocked
RAT (Radio Access Technology) User and/or Control plane traffic belonging to RATs which are listed in the White/Black Lists is forwarded to the tools or blocked
SER-NET (Serving Network) User and/or Control plane traffic belonging to SER-NETs which are listed in the White/Black Lists is forwarded to the tools or blocked
QCI (QoS Class Identifier) User and/or Control plane traffic which QCI is set with the values listed in the White/Black Lists is forwarded to the tools or blocked

By correlating GTP-C and GTP-U traffic, these filters can dynamically ensure that only relevant traffic is sent to monitoring tools.

Using GTP-C parameters Image
Fig.4 Using GTP-C parameters to filter GTP User Plane​

Conclusion

Efficiently managing GTP User Plane traffic is essential for operators facing increasing data demands. Microtel Innovation’s Aster Network Packet Brokers provide tailored, high-performance solutions to optimize monitoring and infrastructure usage. These advanced appliances address the evolving challenges of modern networks, ensuring cost-effective and scalable traffic management.

Related products:

Enhancing cyber-threat defense: the role of Aster A-640 in critical infrastructures

Preview

As cyber threats increasingly jeopardize national security, government agencies tasked with overseeing critical infrastructure require cutting-edge solutions to ensure both robust defense and operational efficiency.

These agencies must not only detect and mitigate threats but also ensure the protection of sensitive data. The Aster A-640 from Microtel Innovation provides a sophisticated, high-performance network visibility appliance capable of delivering precise traffic filtering and optimal resource utilization.

The Role of Aster A-640 in Network Monitoring

The Aster A-640 is engineered to manage high-throughput networks, enabling the secure and efficient processing of large data volumes; at its core, the device focuses on filtering network traffic based on predefined criteria.  

A standout feature of the A-640 is its on-the-fly adjustment capability, which allows instantaneous reconfiguration of packet distribution with no downtime. This functionality is essential for dynamic network environments where agility and uptime are essential. The A-640 excels in providing deep traffic analysis through user plane-level processing, enabling the evaluation of encapsulated packets.

These capabilities, combined with robust load balancing, optimize the utilization of SOC resources by ensuring that only the most relevant data is examined. This approach improves operational efficiency and enhances the accuracy of threat detection systems.

Aster A-640 enhances network security through high-throughput monitoring, dynamic traffic filtering, and seamless integration with advanced cybersecurity tools.

Integration and Cybersecurity Applications

Designed to integrate seamlessly into existing infrastructures, the A-640 serves as a critical component in government and enterprise cybersecurity frameworks. It supports multi-rate configurations (10/25/40/100 Gb/s), is compatible with a wide range of optical transceivers and offers 32×100 Gb/s interfaces, making it ideal for dense, high-performance networks.

 

When deployed inline at network gateways, the A-640 intercepts and processes traffic at scale. In combination with systems such as SIEM (Security Information and Event Management) platforms, IPS (Intrusion Prevention Systems), and anomaly detection tools leveraging AI/ML routines, it forms a robust first line of defense against sophisticated cyber threats. The A-640 amplifies the effectiveness of these systems, enhancing threat detection capabilities and enabling faster, more accurate responses to potential security incidents, strengthening the overall cybersecurity posture.

Scalable and Future-Ready

The Aster A-640 is designed for scalability, making it ideal for evolving network infrastructures. Its architecture supports seamless adaptation to increasing traffic volumes and expanded deployments, ensuring consistent performance. The on-the-fly adjustment capability enables real-time optimization to meet changing requirements.

In modern and future networks, the A-640 enhances the effectiveness of cybersecurity systems like SIEM, IPS and anomaly detection tools. By efficiently processing and filtering traffic, it amplifies the performance of these systems, enabling faster, more accurate threat detection and response.

As network demands grow and cyber threats evolve, the A-640 provides a future-ready solution that strengthens overall network security.

Related products:

Migration from Legacy TDM to Modern IP Networks

Preview Migration from Legacy TDM to Modern IP Networks

Migrating from legacy TDM (Time-Division Multiplexing) systems to modern IP-based networks has become a critical step for telecom operators. This shift is driven by the need for more flexible, high-performance communication services, along with the cost savings that come from upgrading outdated infrastructure. While the transition to IP offers many advantages, it also presents technical challenges, especially when trying to integrate older systems with new IP networks.

Why Transitioning to IP Networks is Critical

Switching to IP-based networks is essential for telecom operators looking to stay competitive in an increasingly digital world. As manufacturers phase out support for old TDM equipment, operators face rising costs and the risk of system failures if they don’t upgrade. The transition is especially important for industries like public safety, healthcare, and transportation, where reliable communication is vital. These issues arise in several key areas:

 End-of-life of TDM systems: many telecom operators are at a point where relying on legacy TDM infrastructure is no longer sustainable. As manufacturers discontinue support, the pressure to upgrade increases. This is particularly crucial for sectors that require uninterrupted service

 Improved efficiency and reduced costs: moving to IP networks allows operators to run their networks more efficiently, saving on maintenance costs. IP networks offer better network management tools, making it easier to handle increasing data traffic and demands

 Seamless coexistence of TDM and IP: solutions like the E-315B Ethernizer allow operators to manage both TDM and IP systems at the same time, ensuring that no service interruptions occur during the transition

 Enhanced security and resilience: modern IP networks offer better security features than older TDM systems. By migrating, operators can protect their networks from cyber threats and improve their ability to respond to disruptions

Challenges of Legacy TDM Systems in an IP World

One of the biggest challenges in moving from TDM to IP networks is that legacy TDM systems often don’t work well with modern IP architectures. Traditional TDM networks, which carry both SS7 signaling and voice traffic, struggle to keep up with real-time performance monitoring. Conventional IP probes can’t always interpret TDM traffic, creating blind spots that make it harder to ensure high quality service for critical voice applications.

Using IP probes for monitoring instead of relying on TDM probes is a solution to this issue. IP probes allow operators to monitor traffic more effectively and improve network visibility.

E-315B: A Seamless Solution for TDM to IP Conversion

The E-315B Ethernizer is a powerful solution that solves these challenges. It provides a smooth conversion from TDM to IP, without disrupting services. The device converts SS7 signaling from MTP-2 to SIGTRAN (M2UA) and encapsulates TDM voice data into RTP (Real-Time Transport Protocol) while supporting STM-1 interfaces. This enables telecom operators to keep their important SS7 signaling in place while benefiting from the flexibility of IP networks.

By facilitating this conversion with minimal service interruptions, the E-315B allows TDM and IP systems to work together during the transition, avoiding expensive infrastructure overhauls. 

The E-315B ensures seamless TDM-to-IP conversion for IP Probe to monitor voice quality

Key Benefits of E-315B for Telecom Operators

The E-315B provides several key benefits to telecom operators:

1. Enhanced network visibility: The device enables real-time monitoring of both signaling and voice traffic, giving operators full control over their networks and helping them manage traffic efficiently

2. Cost efficiency: Operators can upgrade to modern IP infrastructure without replacing all of their legacy systems, saving on capital expenses

3. Scalability: As traffic demands grow, the E-315B can handle more IP traffic without sacrificing performance

4. Advanced tunneling technologies: The device supports L2GRE and NVGRE tunneling, which helps operators route IP traffic from different TDM links to centralized monitoring systems, improving operational efficiency

E-315B as a Key Enabler of Telecom Modernization

The E-315B Ethernizer is a key tool for telecom operators looking to modernize their networks while maintaining the essential functionalities of legacy systems. Its ability to convert TDM to IP in real-time, while minimizing service disruptions, makes it an ideal solution for network transitions.

With its scalability, reliability, and smooth integration of legacy systems into modern networks, the E-315B offers a cost-effective and future-proof solution to the challenges of migrating from TDM to IP. As IP networks become more common, the E-315B helps operators maintain control, deliver uninterrupted services, and prepare their infrastructure for future demands.

Related products:

Improving Network Visibility Performance with Aster A-640

Communication service providers and data centers are increasingly challenged in managing high-speed networks due to the rapid growth of data volumes, complex traffic patterns, and the rise of encapsulated data streams. These factors result in limited network visibility, inefficient traffic management, overloaded monitoring tools, and security risks. Traditional network monitoring solutions often fall short, particularly in inspecting encapsulated traffic, leaving potential security vulnerabilities unaddressed.

Solution with Aster A-640

The Aster A-640 by Microtel Innovation is a high-performance tool designed for network visibility and optimization in complex, high-speed environments. With 32×100 Gb/s interfaces, configurable as 100 Gb/s, 40 Gb/s, 25 Gb/s, or 10 Gb/s, the A-640 offers unparalleled flexibility to meet diverse network traffic requirements. Its advanced capabilities allow for precise traffic filtering and load balancing based on both inner and outer parameters, including IP addresses, ports, and VLAN tags. This ensures that only relevant traffic reaches monitoring and security tools, reducing system overload and improving operational efficiency.

Supporting L2GRE, L3GRE, VXLAN and GTP encapsulation-decapsulation, the A-640 uncovers hidden traffic within tunnels, which is crucial for securing virtualized and cloud environments. Additional features, such as header stripping, slicing, and VLAN tagging, optimize data processing, reducing unnecessary data loads and enhancing the performance of security tools.

Case Study: Transforming Network Visibility for a Leading Telco operator

A leading telecommunications operator faced significant challenges managing its high-speed 100 Gb/s network links. A surge in encapsulated traffic, particularly within GTP tunnels, combined with increasingly complex traffic patterns, resulted in frequent security blind spots and overwhelmed monitoring tools. Traditional monitoring solutions struggled to handle hidden data streams within encapsulated traffic, increasing the risk of security breaches.

To address these issues, the telecom operator deployed the Aster A-640 across its network infrastructure. With its versatile 32×100 Gb/s interfaces, the device was configured to meet specific traffic requirements, efficiently managing the high-speed links. The A-640’s traffic filtering features streamlined data flows, directing only relevant traffic to monitoring and security tools, thereby reducing operational strain.

The A-640’s decapsulation capabilities enabled the operator to inspect encapsulated traffic, such as VXLAN, revealing previously hidden data streams. This enhanced the operator’s threat detection and network visibility. Moreover, the A-640’s traffic aggregation and replication functionalities allowed the operator to distribute traffic across multiple monitoring tools, preventing system overload.

A-640 delivers visibility and security for high-speed networks, optimizing traffic management and uncovering hidden threats

User-Friendly GUI Enhances Network Operations

A key aspect of the solution’s success was the user-friendly GUI developed by Microtel Innovation’s R&D team. This intuitive interface facilitated easier management of traffic configurations, monitoring, and decapsulation processes, enabling the operator’s network engineers to quickly adapt to changing traffic patterns. This streamlined workflow significantly improved operational efficiency and reduced the time needed to manage network changes.

Results and impact

Deploying the Aster A-640 led to several critical improvements for the telco operator:

Enhanced Network Visibility: By exposing previously hidden traffic within GTP and other tunnels, the A-640 provided a more comprehensive view of the network.
○ Optimized Traffic Management: Intelligent traffic filtering and load balancing ensured that only relevant data reached monitoring and security tools, reducing operational strain.
Strengthened Security Posture: The ability to inspect encapsulated traffic improved threat detection capabilities, mitigating security risks.
Operational Efficiency: Traffic aggregation and replication enabled centralized monitoring, optimizing the use of existing monitoring tools and reducing overall costs.

Conclusion

The Aster A-640 is a solution for enterprises and data centers facing the complexities of high-speed network environments. Its advanced capabilities in visibility, traffic management, and security offer a holistic approach to optimizing performance, securing data flows, and maximizing the effectiveness of existing monitoring tools. By deploying the A-640, organizations can significantly enhance their network management strategies, reduce security risks, and achieve a more efficient and secure network environment.

Related products:

Enhance Telecom Network Security with Microtel Innovation’s Advanced TAPs

Microtel Network Security

In the dynamic and data-intensive telecommunications industry, network visibility is a critical requirement for ensuring the reliability, security, and efficiency of services. Among the essential components that enable this visibility are Network TAPs (Traffic Access Points). Microtel Innovation’s TAPs are engineered to deliver precise, non-intrusive access to network traffic, allowing operators to perform real-time monitoring and analysis without compromising network integrity.

A TAP is a vital component for any Telco operator aiming to maintain high standards of network visibility and security.

Technical Implementation: Strengthening Network Security and Optimization

Imagine a major telecommunications provider responsible for managing an extensive multi-tiered network that supports millions of users, each generating vast amounts of data daily. The provider is tasked with not only maintaining seamless service but also protecting sensitive data from increasingly sophisticated cyber threats. As the network grows more complex, conventional monitoring tools fall short in providing the necessary visibility to detect and mitigate potential issues in real-time.

Microtel Innovation TAP Solution

 

To address these challenges, the provider integrates Microtel Innovation’s Optical TAPs into critical segments of their network. This TAP is strategically deployed to monitor high-bandwidth links, ensuring that every packet of data is captured and forwarded to security appliances and network analyzers without causing any disruption to live traffic. Unlike SPAN (Switch Port Analyzer) port, which can introduce latency and packet loss under heavy load, Microtel’s TAP operates at full line rates, ensuring complete traffic capture even in the most demanding environments.

During a security audit, the provider’s monitoring system, fed by data from Microtel’s TAPs, detects anomalous traffic patterns indicative of an advanced persistent threat (APT) targeting the network’s core. Leveraging the detailed data streams provided by the TAPs, the security team can perform deep packet inspection, tracing the malicious activity back to its source and neutralizing the threat before any data exfiltration occurs. 

Technical Specifications and Performance Metrics of Microtel Innovation’s TAPs

Microtel Innovation’s TAPs are engineered to meet the demanding requirements of modern telecommunications networks. They are available in various configurations, including optical and copper, to accommodate different network types and speeds. Key technical features include:

High Availability: Designed for continuous operation with minimal maintenance, ensuring that network monitoring remains uninterrupted.

Full Line Rate Monitoring: Capable of capturing traffic at speeds up to 100 Gbps without introducing latency or packet loss.

Versatile Deployment: Compatible with various network environments, including 1G, 10G, 25G, 40G, and 100G networks, and available in both single-mode and multi-mode fiber options.

Fail-Safe Operation: In the event of power loss, the TAP maintains the integrity of the network by defaulting to a pass-through mode, ensuring that traffic flow is not interrupted.

Compact Design: Optimized for space efficiency, allowing for deployment in high-density data center environments.

Microtel Innovation’s TAPs are a vital component for any Telco operator aiming to maintain high standards of network visibility and security. Their advanced features and reliable performance make them an indispensable tool for managing the complex demands of modern telecommunications networks.

Deduplication: Improve Monitoring Efficiency and Reporting Accuracy

 

WHY PACKET DEDUPLICATION?

It is common that a single packet capturing device (such as a passive probe, or any other passive tool analyzing the network performances) to receive multiple copies of the same data within a network.

This often occurs when customers use SPAN (also known as Port Mirroring) technology to collect traffic from multiple VLANs or ports on a switch/router and direct it to a single packet capturing device. In such cases, the packet capturing tool might see identical IP packets multiple times, even when network performance is not compromised.

Consider the following example: PC-A in VLAN 1 sends IP packets to PC-C in VLAN 2, routed through a multi-layer switch. At the switch’s mirror port, both ingress and egress copies of each packet from this stream are captured, creating duplicate packets. Monitoring only the ingress traffic would prevent this duplication, but then packets from PC-B to PC-A or PC-C would not be captured.

Fig.1: Simple port mirroring scheme

When all this traffic is directed to the same packet capturing tool, the device may interpret the duplicates as retransmissions, leading to an overestimation of data volume. This misinterpretation impairs effective network monitoring by skewing statistical accuracy and inflating perceived traffic levels or network errors.

MICROTEL INNOVATION SOLUTION

Removing duplicate packets at the monitoring tool level is not the solution. These tools are already burdened with handling and processing network traffic and typically lack the processing power to efficiently manage an additional, resource-intensive task like deduplication.

Microtel Innovation offers an effective solution with its product: A-XFE-DEDUP, a high-performance Network Packet Broker with 20 x 40/100 Gb/s input/output ports.

Its key features include:

  • Advanced Network Packet Broker with high-performance packet deduplication capabilities
  • Configurable packet fields for duplicate detection, with intervals ranging from 66 ms to 1 second
  • GTP Balancer with session-based GTP filtering

This device ensures efficient network monitoring by eliminating duplicate packets before they reach the monitoring tool, thereby maintaining data accuracy and reducing the load on monitoring systems.

Enhancing Digital Security: Microtel’s Contribution

Digital interactions, whether on public networks or within private networks, have taken on a predominant role in both interpersonal and business relationships. Therefore, it is essential to intervene to ensure that everything occurs in a secure online environment. For public networks, recent legal provisions in Italy have mandated operators (ISPs, Internet Service Providers) to strengthen their services to protect rights in two specific areas:

○ Parental Control
○ Copyright Control (Anti-piracy)

The responsibility to comply with these regulations falls on ISPs, and the implementation of these systems requires robust and reliable technical solutions.

Anti-piracy: combating the distribution of illicit streaming

The increasing spread of pirated content has prompted legislative action to curb illegal streaming activities. Microtel implemented a comprehensive anti-piracy solution, curtailing unauthorized streaming activities that allowed illegal access to paid TV content without a regular subscription.

By utilizing a combination of Microtel’s Aster technology for IP address blocking and a 3rd-party system for FQDN blocking, the client has a robust defense mechanism against the spread of illegal content. The platform, powered by AGCOM’s “Piracy Shield” infrastructure, allows the blocking of reported addresses within the strict deadlines defined by regulations (30 minutes from the report). 

Incorporating the A-640 packet broker, which boasts the ability to instantaneous adjustments to the distribution of network packets without significant downtime, ensures seamless management of vast amounts of data with minimal delays, maintaining an active link effortlessly.

Designed with a 1U box, Microtel’s Aster A-640 efficiently manages vast amounts of data, up to 6.4 Tb/s, leveraging high bandwidth enabled by its total number of input/output ports of 32×40/100 Gb/s, and ensuring minimal delays.

Microtel Innovation's A-640 packet broker ensures seamless management of vast amounts of data with minimal delays, maintaining an active link effortlessly.

The adoption of Microtel Innovation’s R&D department-developed monitoring software, Dardo, optimizes the management of all hardware devices engaged in continuous requests for domain and IP address blocking.

Possible developments

Thanks to its solid foundation, the implemented solution lends itself to a wide range of functional extensions within the scope of cybersecurity, including enhanced security for the growing number of IoT devices in use today.

In this ever-evolving digital landscape, a focus on innovation is crucial. To ensure a safer digital future and protect their online ecosystems, collaboration with technological partners like Microtel Innovation, who provide end-to-end solutions for traffic monitoring and control, as well as safeguarding corporate data, is strategic.

Dardo: The Network Device Management System by Microtel

Dardo is a Management System, developed by us at Microtel Innovation, designed to simplify and enhance the control of Microtel Innovation’ network devices. In this article, we will introduce you to the main features of Dardo, highlighting its distinctive characteristics and its added value in the network management landscape.

Introduction

In addition to optimizing the management of Microtel’ network devices, Dardo offers a comprehensive solution for traffic capture and analysis. The system provides operators with an intuitive interface for controlling individual devices, ensuring efficient network management.

System Description

Dardo provides a web interface accessible via a browser, with recommended support for Mozilla Firefox or Google Chrome. The application allows access to network devices through an Exercise & Maintenance (E&M) interface, enabling operators to control the selected device once logged in.

Key Features

1 | Overview

The overview page offers a geographical view of configured devices, allowing users to quickly identify the location and status of devices. Users can zoom in on the map to view detailed information about each device.

The geographical representation enables operators to identify device locations quickly and monitor their status in real-time. Furthermore, the zoom functionality allows specific areas to be enlarged for a more detailed view, making navigation intuitive and effective.

2 | Authentication

Dardo supports user and profile management, ensuring secure and personalized access to system functionalities. Users can be created and managed easily, with the ability to define roles and privileges for each profile.

3 | Devices

The section dedicated to devices offers a complete list of network devices managed by Dardo. Users can view detailed information about each device, manage alarms, and access usage statistics easily.

The device page allows users to monitor the operational status of devices and intervene promptly in case of anomalies. Through an intuitive interface, users can view detailed information about each device, including data such as IP address, operating status, and creation date.

4 | Centralized Management System

One of the standout features of Dardo is its capability to serve as a Centralized Management System, consolidating monitoring and control functions across various interfaces. Dardo seamlessly integrates with different network interfaces, offering comprehensive L1-L2 alarm collection and processing capabilities. This means that, regardless of the network infrastructure in place, whether it’s traditional copper-based networks or modern fiber-optic systems, Dardo can effectively monitor and manage the network’s health and performance.

5 | Statistics

Dardo’s intuitive GUI simplifies monitoring device performance and managing alarms, providing real-time statistics on bandwidth, packet loss, and latency to help operators quickly respond to network conditions. Alarms are categorized by severity, ensuring prompt attention to critical issues.

Conclusions

In conclusion, Dardo emerges as a comprehensive and reliable solution for managing network devices, offering advanced features and an intuitive interface. Thanks to its distinctive characteristics and user-friendly approach, Dardo stands as an essential ally for network administrators looking for effective tools for device control and management.

For more information on Dardo and its functionalities, feel free to reach out to us directly via email at marketing@microtelinnovation.com or through the contact form on our website. We’re here to assist you every step of the way.

Benefits of the “On-the-fly” feature

In today’s rapidly evolving digital landscape, network security and performance are paramount. Enterprises require efficient tools that can effectively manage and optimize network traffic. This is where packet brokers come into play, specifically, the A-640 packet broker, which offers a unique and powerful feature known as “on-the-fly” action. This article will explore the concept of on-the-fly action in packet brokers and discuss its benefits and implications in network operations.

Understanding "On-the-Fly" Action

The A-640 packet broker boasts the ability to perform actions and processes dynamically and in real-time, hence the term “on the fly.” This means that the device can make instantaneous decisions and adjustments to the routing and distribution of network packets with no downtime or manual intervention, keeping the link up and active

Instantaneous adjustments to the distribution of network packets without significant downtime

 Now let’s delve into some aspects related to the packet broker “on-the-fly” feature:

1 | Dynamic Traffic Redirection

One of the key advantages of on-the-fly action is the packet broker’s capability to dynamically redirect network traffic based on predefined criteria or conditions, either by user intervention or through an API system.                    For instance, it can swiftly reroute traffic in response to changes in network conditions, load balancing requirements, or security events. This flexibility ensures that network resources are efficiently utilized, enhancing performance and resilience.

2 | Packet Filtering

          Another compelling function of the packet broker’s on-the-fly action is its ability to perform real-time packet filtering.  With this feature, the device can dynamically identify and handle specific types of traffic according to defined filtering rules. This enables the packet broker to filter out malicious content or suspicious users on the fly, increasing network security and mitigating potential threats.

3 | "On-the-Fly" Load Balancing

        Efficient network resource utilization is a critical aspect of network management. Here, the on-the-fly load balancing feature shines. The A-640 packet broker can dynamically redistribute network traffic in real-time, optimally utilizing network resources. By adjusting the distribution of packets among different network links or servers based on the current load conditions, the packet broker ensures optimal performance and avoids bottlenecks.

Conclusions

The A-640 packet broker’s on-the-fly action feature revolutionizes network management by providing dynamic and real-time decision-making capabilities. With the ability to redirect traffic, perform packet filtering, and enable on-the-fly load balancing without significant downtime, this packet broker empowers enterprises to optimize network performance, enhance security, and adapt swiftly to changing network requirements. Embracing this innovative technology opens doors to efficient and scalable network management in an ever-evolving digital landscape.

Mobile Traffic Growth: How to manage it?

Due to the dramatic growth of mobile networks traffic, Telecom operators must upgrade monitoring and security tools because one single probe is not capable anymore to manage all User Plane traffic. Coherent balancing to several Probes is necessary and Microtel Innovation Aster A-640, thanks to its 32 x 100 GB ports, is the right investment for the future.

How to implement User Plane coherent balancing? Using GTP correlation may not be the right solution, because it requires lot of costly computational power. Moreover, it is difficult to implement in modern networks, where Control Plane Traffic and User Plane Traffic are often not in the same location.

Instead, Microtel Innovation Aster A-640 implement coherent balancing without using GTP correlation, and is able to balance User Plane Traffic in a way that all user plane sessions belonging to the same Subscriber are sent to the same Probe. 3G, 4G and 5G Core Network interfaces are supported; Aster A-640 can cope with up to 3,2 TB traffic.

Example: A-640 implementing GTP User Plane coherent balancing

 

USER PLANE BALANCING WITH ASTER A-640 – CASE HISTORY 

THE CHALLENGE

The customer, a Far East Tier1 Mobile operator, asked our support to manage the GTP traffic in a much more efficient way, given the growth it was having in the last period, achieving peak traffic values of 200G/250G in the Core Network sites.

Since the traffic was too much to be managed by one single probe, the Operator’s had to add additional probes, and to find the proper way to feed them: A-640 was the right solution that he was looking for.

Customer request was to feed all probes with the User Plane data, with the need that all traffic related to the same Mobile User has to be sent to the same probe, to grant a proper data analysis.

MICROTEL INNOVATION SOLUTION

To solve the customer issue the technical team proposed Microtel Aster A-640, a powerful L2-L4 advanced packet broker capable of balancing GTP User Plane traffic in a coherent way; both IPv6 and IPv4 are supported. The product is based on the powerful Intel® Tofino chipset. It grants high flexibility and, using its special algorithm (no need for GTP correlation), A-640 can balance and forward specific subscriber sessions to one single tool.

A-640 has been installed, and it allows our customer to split the traffic toward 5 probes.

It receives 200G/250G data traffic during peak hours: input ports 1-2-3-4-7-8 are fed with GTP v2 (4G network) traffic, while input ports 5-6 receive GTP v1 (3G network) data.

Control plane traffic is replicated to all probes. User plane traffic is balanced in a coherent way to the 5 Probes the customer just installed: all sessions belonging to a single subscriber are sent to the same probe.

Solution: A-640 implementing GTP User Plane coherent balancing towards 5 customer Probes