* The Reveiwmeister continues the compression session Continuing our compression session, here’s our analysis of the Peribit’s SR-50, a LAN-based network compression product that includes two 10/100M bit/sec ports.The local port is connected to the LAN switch, and the remote port is connected to the WAN router. The SR-50 is capable of handling up to 45M bit/sec of traffic. Installation can be completed in less than 10 minutes, and performance in all areas is very strong. Peribit says it has applied DNA pattern matching technology to its algorithm, which is known as molecular sequence reduction.Ongoing configuration and management are accomplished using a Web-based GUI, although a command-line interface is also available. Both methods require secure connections. Access lists might be employed to prevent unauthorized connections to the device. You also can create a read-only user account so that reports might be viewed.For skeptical users, a profile mode is available. You can profile the traffic on your network and see what kind of performance gains you might achieve after placing the box inline. Logging is accomplished via SNMP and syslog support. Other benefits include a central management system, the ability to preserve and set type of service/Differentiated Services values, and interoperability with Routing Information Protocol, Open Shortest Path First and Border Gateway Protocol, which means you don’t have to manually specify each subnet you want to turn compression on for, as the list is provided via your routing table. The SR-50 performed equally well on TCP and UDP traffic without incurring significant latency. In our FTP testing, while a significant reduction of data occurred on the first transmission, the pattern matched to what is in memory and recalled from the cache in subsequent transfers to further lower latency.A voice-over-IP (VoIP) call placed over the network showed a moderate level of compression. A denial-of-service attack was launched to disrupt the VoIP call, but the attack was easily defended against by placing the VoIP traffic in a prioritized queue. For the full report, go to https://www.nwfusion.com/reviews/2003/0804rev.html Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe