NetEqualizer

Last updated
APconnections, Inc.
Type Private
Industry
Founded Lafayette, Colorado, U.S.
(August 1, 2003;19 years ago (2003-08-01))
FoundersArt Reisman
Area served
Worldwide
Products Traffic shaping, Quality of service, Intrusion prevention systems, Networking
Website www.netequalizer.com
www.netequalizernews.com

The NetEqualizer is a bandwidth shaping appliance designed for voice and data networks, created by APconnections in 2003. NetEqualizer traffic shaping appliances use built-in behavior-based algorithms to automatically shape traffic during peak periods on the network. [1] When the network is congested, the fairness algorithms favor business class applications at the expense of large file downloads. The favored applications include those such as VoIP, web browsing, web-based applications, chat and email. [2] Traffic is prioritized based on the nature of the traffic, so the NetEqualizer remains Net Neutral.

The NetEqualizer also provides quality of service (QoS) through rate limiting, shared limits, and quota. New in 2015 is a DDoS Monitor. In addition, the NetEqualizer can be configured to control both encrypted an unencrypted peer-to-peer file sharing (P2P) traffic.

Add-on modules include directory integration (NDI), caching (NCO), and a DDoS Firewall.

The NetEqualizer has been implemented by colleges, universities, libraries, hotels, and businesses around the world. The appliance is currently being used in the rebuilding efforts in both Iraq and Afghanistan. [3]

APconnections is a privately held company founded in 2003 and is based in Lafayette, Colorado.

Related Research Articles

<span class="mw-page-title-main">Peer-to-peer</span> Type of decentralized and distributed network architecture

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes.

<span class="mw-page-title-main">Denial-of-service attack</span> Cyber attack disrupting service by overloading the provider of the service

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

FastTrack is a peer-to-peer (P2P) protocol that was used by the Kazaa, Grokster, iMesh and Morpheus file sharing programs. FastTrack was the most popular file sharing network in 2003, and used mainly for the exchange of music mp3 files. The network had approximately 2.4 million concurrent users in 2003. It is estimated that the total number of users was greater than that of Napster at its peak.

<span class="mw-page-title-main">Load balancing (computing)</span> Set of techniques to improve the distribution of workloads across multiple computing resources

In computing, load balancing is the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.

BitTorrent is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner.

Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. It is often confused with traffic policing, the distinct but related practice of packet dropping and packet marking.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used to baseline application behavior, analyze network usage, troubleshoot network performance, ensure that data is in the correct format, check for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.

<span class="mw-page-title-main">Akamai Technologies</span> American computer networking company

Akamai Technologies, Inc. is an American content delivery network (CDN), cybersecurity, and cloud service company, providing web and Internet security services. Akamai's Intelligent Edge Platform is one of the world's largest distributed computing platforms. The company operates a network of servers worldwide and rents capacity of the servers to customers wanting to increase efficiency of their websites by using Akamai owned servers located near the user. When a user navigates to the URL of an Akamai customer, their browser is directed by Akamai's domain name system to a proximal edge server that can serve the requested content. Akamai's mapping system assigns each user to a proximal edge server using sophisticated algorithms such as stable matching and consistent hashing, enabling more reliable and faster web downloads. Further, Akamai implements DDoS mitigation and other security services in its edge server platform.

<span class="mw-page-title-main">Botnet</span> Collection of compromised internet-connected devices controlled by a third party

A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a portmanteau of the words "robot" and "network". The term is usually used with a negative or malicious connotation.

<span class="mw-page-title-main">Internet security</span> Branch of computer security

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">Content delivery network</span> Layer in the internet ecosystem addressing bottlenecks

A content delivery network, or content distribution network (CDN), is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance by distributing the service spatially relative to end users. CDNs came into existence in the late 1990s as a means for alleviating the performance bottlenecks of the Internet as the Internet was starting to become a mission-critical medium for people and enterprises. Since then, CDNs have grown to serve a large portion of the Internet content today, including web objects, downloadable objects, applications, live streaming media, on-demand streaming media, and social media sites.

<span class="mw-page-title-main">Web conferencing</span> Forms of online many-to-many communication

Web conferencing is used as an umbrella term for various types of online conferencing and collaborative services including webinars, webcasts, and web meetings. Sometimes it may be used also in the more narrow sense of the peer-level web meeting context, in an attempt to disambiguate it from the other types known as collaborative sessions. The terminology related to these technologies is exact and agreed relying on the standards for web conferencing but specific organizations practices in usage exist to provide also term usage reference.

<span class="mw-page-title-main">F5, Inc.</span> U.S. information technology company

F5, Inc. is an American technology company specializing in application security, multi-cloud management, online fraud prevention, application delivery networking (ADN), application availability & performance, network security, and access & authorization.

WAN optimization is a collection of techniques for improving data transfer across wide area networks (WANs). In 2008, the WAN optimization market was estimated to be $1 billion, and was to grow to $4.4 billion by 2014 according to Gartner, a technology research firm. In 2015 Gartner estimated the WAN optimization market to be a $1.1 billion market.

Packeteer, Inc., founded in 1996 by Robert Packer, Brett Galloway and Bob Luxenberg was an I.T. company based in Cupertino, California that was listed on the NASDAQ. Networking appliances focus on Application Traffic Management and optimization for wide area networks. They held at least 40 patents for various network optimization methods. Packeteer was acquired by Blue Coat Systems in 2008.

In computing, Microsoft's Windows Vista and Windows Server 2008 introduced in 2007/2008 a new networking stack named Next Generation TCP/IP stack, to improve on the previous stack in several ways. The stack includes native implementation of IPv6, as well as a complete overhaul of IPv4. The new TCP/IP stack uses a new method to store configuration settings that enables more dynamic control and does not require a computer restart after a change in settings. The new stack, implemented as a dual-stack model, depends on a strong host-model and features an infrastructure to enable more modular components that one can dynamically insert and remove.

<span class="mw-page-title-main">Phex</span>

Phex is a peer-to-peer file sharing client for the gnutella network, released under the terms of the GNU General Public License, so Phex is free software. Phex is based on Java SE 5.0 or later.

Founded in 2004 in New York City, Pando Networks was a managed peer-to-peer (P2P) media distribution company backed by Intel Capital, BRM Capital and Wheatley Partners. The company specialized in cloud distribution of games, video and software for publishers and media distributors and also operated a freemium consumer business for sending large files.

NetScaler is a line of networking products owned by Cloud Software Group. The products consist of NetScaler, an application delivery controller (ADC), NetScaler AppFirewall, an application firewall, NetScaler Unified Gateway, NetScaler Management & Analytics System, and NetScaler SD-WAN, which provides software-defined wide-area networking management. NetScaler was initially developed in 1997 by Michel K Susai and acquired by Citrix in 2005. Citrix consolidated all of its networking products under the NetScaler brand in 2016.

References

  1. Dubie, Denise (9 November 2006). "A look at NetEqualizer". Network World.
  2. "NetEqualizer.com". www.netequalizer.com.
  3. http://www.dailycamera.com/news/2007/oct/01/taming-the-net-in-the-middle-east . Retrieved 2007-12-26.{{cite web}}: Missing or empty |title= (help)