TCP/IP is simple. It has a simple packet structure, and has a definition for an application (or service) that can be easily detected by looking as a certain offset in the packet header (the TCP or UDP “port”). A registration process was created to ensure that every application (such as email or file transfer) will use a unique port (a “well-known port” – see PORT NUMBERS) . Indeed simple. As a result, the network elements (routers) used to build the Internet can process enormous amounts of data (or PPS - packets per second). They are not required to show any exceptional intelligence, and may concentrate on their main job - moving packets.
However, there is no way to ensure that everybody is fully conforming to the architecture as designed. There is no enforcement authority or embedded technology making sure that everybody uses the designated ports – and this loophole created the need to look deeper into the packet in order to identify the real application or the content communicated between the two sides.
Of course, when someone is hiding something, he probably has a good reason to do so. It may be illegal, abusing or taking advantage of someone else’s assets and investments. DPI was created to help owners of network and service providers to better control their network and resources.
The first vendors to use the term (just 3-4 years ago) created a solution that helps service providers and carriers understand and control traffic on their network. While DPI technology itself was only one of the components of the solution (used to identify applications by looking beyond the TCP port information) it gave the solution its name. It is very common now to see ISPs, fixed, mobile and cable operators publishing tenders for DPI. The other components of this kind of DPI solution include traffic policies enforcement, traffic shaping and throttling, reporting and more.
Why “this kind of DPI”?
Because there are many other solutions and technologies, all looking deeper into the packet. Many use the term DPI to describe their technology, creating some confusing in the market.
Some other examples for DPI are:
- Stopping illegal traffic, such as child abuse content or transfer of copyrighted material (for example using P2P – Peer to Peer – applications)
- Security solutions, stopping malware such as viruses, worms and Trojan horses
- User behavior monitoring, analyzing what subscribers are doing for marketing or targeted advertising
No comments:
Post a Comment