Smart Application Control (SAC)
What Is Smart Application Control (SAC)?
Utilizing Service Awareness (SA) technology, Smart Application Control (SAC) detects and identifies Layer 4 to Layer 7 information in packets and dynamic protocols such as HTTP and RTP via a sophisticated application protocol identification and classification engine. This enables fine-grained QoS management based on identification results, thereby implementing application-based traffic control.
Why is SAC Necessary?
Traditional traffic classification methods only analyze content at Layer 4 and below, such as source and destination IP addresses, port numbers, and service types, which limits their ability to understand application-specific data. SAC, leveraging service awareness (SA) technology, addresses this by detecting and identifying Layer 4 to Layer 7 information within packets and dynamic protocols like HTTP and RTP through an advanced application protocol identification and classification engine. This enables SAC to perform detailed QoS management and application-based traffic control, significantly enhancing network efficiency and security.
Application Scenarios for SAC
As illustrated in the diagram below, SAC (Service Access Control) can be configured to monitor and manage various applications on a network to maintain network quality and regulate employee online behavior. Here are some examples of how SAC can be effectively utilized:
-
Allow Specific Network Activities: SAC can be set up to permit certain types of network browsing, ensuring that essential office services are transmitted smoothly within the internal network.
-
Control Instant Messaging: SAC can be configured to block instant messaging applications or restrict their traffic rate to enforce acceptable online behavior among employees.
-
Manage P2P Bandwidth: By limiting the bandwidth for peer-to-peer applications like BT and eDonkey/eMule, SAC helps maintain overall network performance and prevent congestion.
How Does SAC work?
An application signature database is developed by analyzing the signatures of common applications. Once this database is loaded onto a switch, the switch can classify traffic from all identifiable applications. For example, P2P file sharing applications such as BT and eDonkey/eMule are categorized under FileShare_P2P.
The system analyzes the traffic passing through the device and compares the results with the signature database loaded on the device. It identifies applications by detecting signatures within data packets and implements fine-grained QoS management based on these identification results. The figure below illustrates the working mechanism of SAC.
-
400G RoCE Lossless Network for HPC with RDMA
This solution offers a perfect 400G interconnect solution for QSFP-DD switches and OSFP network cards, addressing the compatibility issues between different port encapsulations. And it is tailored according to the network topology of HPC architecture, inc
-
PicOS® for Automated Driving Solution
FS provides a range of tailored hardware, easy-to-deploy application and management software, and end-to-end services for HPC network solutions. With this, businesses can respond to customers instantly, run networks with maximum efficiency and safety, and
-
PicOS® for H100 InfiniBand Solution
Based on the NVIDIA® H100 GPU, along with PicOS® software and AmpCon™ management platform, the FS H100 Infiniband solution is tailored according to the network topology of HPC architecture, including infiniband network, management network, and storage net