English

Smart Application Control (SAC)

Updated on Aug 8, 2024 by
177

What Is Smart Application Control (SAC)?

Utilizing Service Awareness (SA) technology, Smart Application Control (SAC) detects and identifies Layer 4 to Layer 7 information in packets and dynamic protocols such as HTTP and RTP via a sophisticated application protocol identification and classification engine. This enables fine-grained QoS management based on identification results, thereby implementing application-based traffic control.

Why is SAC Necessary?

Traditional traffic classification methods only analyze content at Layer 4 and below, such as source and destination IP addresses, port numbers, and service types, which limits their ability to understand application-specific data. SAC, leveraging service awareness (SA) technology, addresses this by detecting and identifying Layer 4 to Layer 7 information within packets and dynamic protocols like HTTP and RTP through an advanced application protocol identification and classification engine. This enables SAC to perform detailed QoS management and application-based traffic control, significantly enhancing network efficiency and security.

Application Scenarios for SAC

As illustrated in the diagram below, SAC (Service Access Control) can be configured to monitor and manage various applications on a network to maintain network quality and regulate employee online behavior. Here are some examples of how SAC can be effectively utilized:

  • Allow Specific Network Activities: SAC can be set up to permit certain types of network browsing, ensuring that essential office services are transmitted smoothly within the internal network.

  • Control Instant Messaging: SAC can be configured to block instant messaging applications or restrict their traffic rate to enforce acceptable online behavior among employees.

  • Manage P2P Bandwidth: By limiting the bandwidth for peer-to-peer applications like BT and eDonkey/eMule, SAC helps maintain overall network performance and prevent congestion.

Networking of SAC

How Does SAC work?

An application signature database is developed by analyzing the signatures of common applications. Once this database is loaded onto a switch, the switch can classify traffic from all identifiable applications. For example, P2P file sharing applications such as BT and eDonkey/eMule are categorized under FileShare_P2P.

The system analyzes the traffic passing through the device and compares the results with the signature database loaded on the device. It identifies applications by detecting signatures within data packets and implements fine-grained QoS management based on these identification results. The figure below illustrates the working mechanism of SAC.

SAC working mechanism

You might be interested in

See profile for undefined.
FS Official
iWAPR
See profile for undefined.
FS Official
PCIe 5.0