White Papers 2020.07.22

O-RAN Next-Generation Fronthaul Conformance Testing

O-RAN Next-Generation Fronthaul Conformance Testing

Building a more cost-effective, agile RAN requires openness. This paper discusses the advantages of an open RAN for 5G and discusses strategies for testing.

2020.07.22

White Papers 2020.07.15

The Essential Signal Generator Guide – Solid RF Foundations

The Essential Signal Generator Guide – Solid RF Foundations

Part 1 of a two-part series on RF signal generators. Gain a sound understanding on the fundamental specifications of signal generators.

2020.07.15

White Papers 2020.07.15

Address Your Future Wireless Test Needs with the Right Oscilloscope

Address Your Future Wireless Test Needs with the Right Oscilloscope

Engineers of the past typically chose oscilloscopes based on technical factors such as bandwidth, rise time, signal-to-noise ratio, sampling modes, probing, and positioning. With the proliferation of new and complex technologies, engineers are getting a lot more future-ready. Decision-making now takes into consideration the rapidly evolving needs of test instruments. When it comes to oscilloscopes, bandwidth and channel density are the two major comparison points that engineers are making, with good reason. Learn more on why is this the case by reading this white paper.

2020.07.15

White Papers 2020.07.14

Metrology and Traceability Matters to Ensure Accurate Measurements

Metrology and Traceability Matters to Ensure Accurate Measurements

Accuracy matters. This white paper explains how traceability is the proof that measurement results were obtained with a direct link to an agreed upon reference.

2020.07.14

White Papers 2020.07.13

5 Things the E5080B Can Do (That the E5071C Can’t)

5 Things the E5080B Can Do (That the E5071C Can’t)

The Keysight E5080B vector network analyzer provides a more comprehensive solution for R&D and manufacturing test with useful features to simplify your device test.

2020.07.13

White Papers 2020.07.01

TDECQ Part II Manufacturing Test Recommendations

TDECQ Part II Manufacturing Test Recommendations

This document gives an overview of the adoption of TDECQ in manufacturing tests, and how to efficiently automate FlexDCA for making TDECQ measurements.

2020.07.01

White Papers 2020.07.01

Stronger Security with Network Packet Brokers

Stronger Security with Network Packet Brokers

Securing a network requires more than just a menagerie of security tools. You have to ensure that your tools have effective visibility into your network and the traffic on it. Unfortunately, many factors including departmental silos, virtualization, rogue IT, SPAN ports and complexity can get in the way and create blind spots. This white paper discusses ways that you can use network packet brokers to better secure your network, touching on topics including data filtering, uptime, high availability and redundancy, tool chaining, honeypots, and SIEM integration.

2020.07.01

White Papers 2020.06.23

Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots

Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots

Unnoticed network vulnerabilities are blind spots, especially as they pertain to application reliability, performance, and security. Blind spots directly correlate to network problems and outages, increased network security risk, and potential regulatory compliance issues. Identifying blind spots by establishing greater network visibility is critical for identifying hidden threats. This paper outlines how to use network visibility to remove blind spots that reduce network issues, security risk, and compliance issues. Specific topics include: Visibility architectures expose missing and hidden data. Tap deployments improve data collection. Virtual taps reveal hidden east-west traffic in virtual data centers. Regenerating monitoring data for distribution to multiple destinations. Visibility into cloud networks. Eliminate switched port analyzer (SPAN) port overload. Reducing network complexity with visibility architectures. Cisco ACI monitoring. Visibility loss — mergers and acquisitions (M&As) network integrations. Better validation of network designs. Download this whitepaper to read about how to implement these use cases.

2020.06.23

White Papers 2020.06.23

How to Select Your Next Oscilloscope: 12 Tips on What to Consider Before You Buy

How to Select Your Next Oscilloscope: 12 Tips on What to Consider Before You Buy

How to select an oscilloscope to meet your specific measurement needs and budget is an important task. Read this oscilloscope selection guide first.

2020.06.23

White Papers 2020.06.22

How to Test and Troubleshoot USB4

How to Test and Troubleshoot USB4

USB4 is a hardware interface that supports several protocols through the USB Type-C connector. Based on the Thunderbolt protocol specification, the USB4 architecture doubles the bandwidth of USB and enables multiple simultaneous data and display protocols.

2020.06.22

White Papers 2020.06.22

Satellites Bolster 5G Through Non-Terrestrial Networks

Satellites Bolster 5G Through Non-Terrestrial Networks

Unlike previous cellular network technologies, the 3rd Generation Partnership Project is planning to make 5G into a network that incorporates satellites to augment terrestrial 5G networks. These non-terrestrial networks will extend the reach of 5G to regions lacking terrestrial infrastructure.

2020.06.22

White Papers 2020.06.19

Threat Hunting 101

Threat Hunting 101

While security threats in general are a consistent concern for IT departments, the specific types of security threats change over time. For instance, according to the WatchGuard Internet Security Report - Q1 2019, cyber attackers are altering their forms of security attacks that includes: an increase in malware, changes in network attacks, new Mac adware variants, and a surge in web application attacks (like XSS and SQLi). This is important because what you do not know about the security of your network really will hurt you. Since security threats are changing, this could mean that you also need to change, or at least augment, your security tactics. One tactic that has been increasing for a couple years now is to actively hunt for threats on your network. Passive security practices just aren’t good enough anymore. You need to be proactive to stop a breach, as the threats themselves have become much more sophisticated and harder to detect. Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

2020.06.19

Case Studies 2020.07.29

Federal Agency Fortifies Its Network Against Cyberattacks

Federal Agency Fortifies Its Network Against Cyberattacks

US federal agency fortifies its network with Vision ONE NPBs, Flex Taps and AppStack.

2020.07.29

Case Studies 2020.07.21

Global Biotech IT Group Ensures Telecommuter Productivity

Global Biotech IT Group Ensures Telecommuter Productivity

This company relied on VPN-gateway vendor data sheets to size their new capacity provisioning, however their confidence on their plan was shaken as some of the remote users experienced inconsistent VPN quality of experience. Keysight's SSL VPN Assessment Service testing revealed trouble spots and actionable steps to improve capacity and save costs.

2020.07.21

Case Studies 2020.05.31

Cook Children’s Healthcare System Improves Application Experience Using Network Intelligence

Cook Children’s Healthcare System Improves Application Experience Using Network Intelligence

Cook Children's Health Care System is a not-for-profit, nationally recognized pediatric health care organization that operates a medical center, physician network, hospital, pediatric surgery center and health plan. Founded in 1918 and based in Fort Worth, Texas, the integrated system has more than 60 primary and specialty care offices throughout North Texas. They needed to improve their network visibility and monitoring practices to solve application performance and SPAN port contention issues. Read this case study to learn how they reduced their mean time to repair for network issues from days to hours and increased monitoring tool efficiency.

2020.05.31

Case Studies 2020.05.31

Cloud Visibility Overcomes Security Limitation of Turnkey Private Cloud

Cloud Visibility Overcomes Security Limitation of Turnkey Private Cloud

For government entities, network security is mission-critical and subject to strict regulations. That is why this customer, who was deploying a turnkey private cloud platform, was concerned when they realized their provider could not supply the data needed by their threat detection and security analytics solutions. Without the ability to examine packets for potential threats, their new private cloud would present a considerable risk to their network. In search of a solution to provide access to packet data, this government customer turned to Ixia, who worked alongside their security solutions provider to deploy a total cloud visibility solution and eliminate this serious security issue.

2020.05.31

Case Studies 2020.05.30

BYD Plans For Growth With Faster Automotive Ethernet Testing

BYD Plans For Growth With Faster Automotive Ethernet Testing

BYD, one of the largest automobile manufacturers in China, needed to upgrade to Ethernet for the communication technology in their car network. This modernization shift would connect essential components like the digital instruments, driving data recorder, the panoramic ECU, and the AVB switch allowing faster testing when new capabilities are added. The customer was using an older, but well known, controller area network (CAN) for their system bus. The move to Automotive Ethernet provided higher-quality, lower latency, time synchronization of audio and video in Ethernet standard format to transmit realtime audio and video streams. The upgrade resulted in a reduction of test time by 50% with a Layer 1-7 end-to-end solution.

2020.05.30

Case Studies 2020.05.29

Ensure Wireless Deployment Quality

Ensure Wireless Deployment Quality

Conduct wireless network assessments with Hawkeye by deploying wireless-enabled endpoints in different locations on campuses; or between different sites with software endpoints deployed on Android, iOS, MS Windows, or Linux devices.

2020.05.29

Case Studies 2020.05.29

High Traffic and Need for Security and Visibility Spur 100GE Redesign

High Traffic and Need for Security and Visibility Spur 100GE Redesign

The University of Texas at Austin must monitor and manage traffic to guard against increasing cyber threats. Ixia provided a solution that will save the university 20–30% on IDS capacity and improve end-to-end network visibility and security.

2020.05.29

Case Studies 2020.05.29

De-Risk your Migration to Data Center or Cloud Hosting

De-Risk your Migration to Data Center or Cloud Hosting

Using the Ixia Hawkeye solution, you can ensure the new hosting location’s reachability and quality of access from all your remote sites and validate that the network transport will offer the same or better quality for your end-users.

2020.05.29

Case Studies 2020.05.28

Ixia and Alcatel-Lucent Validate IEEE1588v2 Performance for Mobile Backhaul

Ixia and Alcatel-Lucent Validate IEEE1588v2 Performance for Mobile Backhaul

Ixia and Alcatel-Lucent have engaged in rigorous test exercises to validate the performance and robustness of 1588v2 boundary and transparent clock implementations under traffic load, network failover, and scaled mobile backhaul network conditions.

2020.05.28

Case Studies 2020.05.28

Validating Automotive Ethernet Conformance and Performance

Validating Automotive Ethernet Conformance and Performance

Using Ixia’s IxNetwork and IxANVL products, customers like the BMW Group are successful in validating their automotive Ethernet toolchain, getting visibility into the performance and robustness of the switches integrated into ECUs. Read about how Ixia’s L2-3 test solutions helped the BMW Group ensure delivery of the premium-quality vehicle communications that their car owners expect from the BMW brand.

2020.05.28

Case Studies 2020.05.28

Keysight Streamlines SD-WAN Adoption with Hawkeye Monitoring from Ixia

Keysight Streamlines SD-WAN Adoption with Hawkeye Monitoring from Ixia

Software-defined wide area networks, or “SD-WANs,” can reduce telecom costs, lessen the burden on operations teams, and improve application performance — if deployments go according to plan. Several challenges came into play when test and measurement market leader Keysight Technologies embarked on a global initiative to replace leased lines with broadband service from three global Internet Service Providers (ISPs). Read the case study to learn how Keysight used the Hawkeye monitoring solution from Ixia to overcome initial and ongoing SD-WAN challenges including: - Qualifying ISP circuits on a global basis - Ensuring application quality before and after migration - Managing new vendor relationships and SLAs - Proactively monitoring voice and video quality Learn more about SD-WAN adoption and why Keysight’s Senior IT Systems Architect Joe Giegel says, “Other monitoring solutions that are deployed centrally can monitor what’s happening at other locations, but they don’t give us the same insight into the actual user experience with applications.”

2020.05.28

Case Studies 2020.05.28

Bank Improves Response Time with Performance Monitoring

Bank Improves Response Time with Performance Monitoring

This large regional financial institution had the foresight to strengthen the bank's online presence. The result was a significant increase in downloads and application updates. IT began struggling to maintain service quality as customers did more of their banking from smart phones, tablets, and other remote points of service. Learn how the network visibility platform they implemented helped them reduce response time and application-related support cases.

2020.05.28

eBooks 2020.07.31

A Practical Guide to Locate and Mitigate Interference

A Practical Guide to Locate and Mitigate Interference

Signal hunting grows increasingly complex in today’s crowded RF spectrum environment. Here are the most common problems encountered as well as information on detecting, identifying, locating, and mitigating these problem signals.

2020.07.31

eBooks 2020.07.24

Making Dynamic Data Acquisition Measurements Using a DAQ

Making Dynamic Data Acquisition Measurements Using a DAQ

This eBook walks through the architecture of a dynamic DAQ system. It helps you to confidently choose the sensors, types of cables to use, hardware requirements, and the PC DAQ software for controlling your DAQ hardware, and how to perform data analysis.

2020.07.24

eBooks 2020.07.23

Breach & Attack Simulation For Dummies®

Breach & Attack Simulation For Dummies®

You know you spend a lot of time and effort on security, but do you really know how effective your efforts have been? What if there was an easy way to find vulnerabilities and address gaps and misconfigurations in your existing infrastructure? There is - learn more about Breach and Attack Simulation.

2020.07.23

eBooks 2020.06.29

The ABCs of Inline Security

The ABCs of Inline Security

Network security is one of today's most important IT functions. Inline security, specifically, refers to solutions deployed in the flow of live network traffic and used to identify and prevent cyberattacks and other security incidents. The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, we provide a simple definition, common use cases, and important considerations for deployment. With a better understanding of the concepts of inline security, we hope you will find it easier to strengthen your defenses and protect your organization's assets.

2020.06.29

eBooks 2020.06.25

The 5 C's of IoT

The 5 C's of IoT

Many individuals and organizations use IoT devices to increase productivity and profit. While IoT devices offer great convenience, having large numbers of them in a small space increases complexity in device design, test, performance, and security. Testing these devices is one of the biggest challenges today’s design engineers and device manufacturers face. Learn about testing the 5 C's of IoT through this eBook.

2020.06.25

eBooks 2020.06.24

5 Ways to Improve ROI with Network Packet Brokers

5 Ways to Improve ROI with Network Packet Brokers

A compelling ROI analysis is the difference between a successfully-funded IT project, and one that gets canceled. This is especially true for relatively new technologies that are not well understood by IT management. By reading this eBook, you will learn five different ways you can use network packet brokers (NPBs) to improve your network architecture ROI: expedite troubleshooting, detect breaches faster, reduce the processing burden on your existing tools, extend tool life after a network upgrade, and streamline regulatory compliance.

2020.06.24

eBooks 2020.06.01

5 Tips for Getting the Most Out of Your Function Generator

5 Tips for Getting the Most Out of Your Function Generator

Today’s function generators can do much more than their predecessors, but many engineers are not aware of these advanced capabilities. This eBook will introduce you to five advanced waveform capabilities that can help improve testing and save you time in the lab.

2020.06.01

eBooks 2020.05.28

The ABCs of Network Visibility

The ABCs of Network Visibility

The concepts of network visibility, network monitoring, and network blind spots help you understand what is happening on your network. While some of the terms can be intimidating at first, straightforward definitions eliminate the confusion. Read this book, which is a compilation of blog posts from Ixia network visibility experts, to get a quick and clear understanding of the terminology associated with network monitoring. Over 20 terms are explained. In addition, examples throughout the text provide ideas on how the concepts can be useful to IT networks. See for yourself how easy it is to become a network monitoring expert.

2020.05.28

eBooks 2020.05.21

The ABCs of Performance Monitoring

The ABCs of Performance Monitoring

Maintaining network and application performance is both essential and complex. Monitoring capabilities have expanded considerably in the last several years to account for virtualization, cloud computing, smart devices, and increased processing at the network edge. Fill the gaps in your knowledge with this useful resource. The ABCs of Performance Monitoring describes 15 key practices used by network operations teams. Each entry covers the purpose of the practice, a description of common use cases, and recommendations for implementing the practice effectively in your environment. Support digital transformation and a customer-first strategy in your organization using these techniques for ensuring excellent network performance.

2020.05.21

eBooks 2020.04.16

Five Key Practices for Developing Network Insight - A Guide to Dynamic Network Intelligence

Five Key Practices for Developing Network Insight - A Guide to Dynamic Network Intelligence

Dynamic network intelligence is crucial to successfully manage today’s networks. See how you can access the right network data, extract the meaning it contains, and take fast action on what you learn.

2020.04.16

eBooks 2020.04.06

How to Secure Your Network

How to Secure Your Network

To create a resilient system, network security needs to be an ongoing process. Security professionals need effective security during each life-cycle stage of their network: pre-deployment testing, installation, production, and software and hardware upgrades.

2020.04.06

eBooks 2020.04.02

10 Brainteaser to Test Your "Smarts"

10 Brainteaser to Test Your "Smarts"

At Keysight, our engineers challenge themselves as they work to innovate new technologies and new solutions to help you master design and test. Now it’s your turn to be challenged by our engineers. Take a break from all your hard work and flex a little creative brainpower by trying your hand at some seemingly simple, or not so simple, math puzzles.

2020.04.02

Solution Briefs 2020.08.05

TradeVision Decoder Trading Subscription Package

TradeVision Decoder Trading Subscription Package

TradeVision DTSP - Decoder Trading Subscription Package, offers users in the financial and trading space a subscription service that provides constantly updated market feed configurations for dozens of exchanges worldwide.

2020.08.05

Solution Briefs 2020.07.23

Palo Alto Networks and Keysight Technologies Intelligence to Secure the Enterprise

Palo Alto Networks and Keysight Technologies Intelligence to Secure the Enterprise

Make sure the foundation your security tools connect to is as secure and scalable as the tools themselves. Ixia's Vision ONE and iBypass combine with Palo Alto Networks next-gen firewalls to create a solution that scales as you need to – quickly, securely, and reliably. Download the solution brief to learn more.

2020.07.23

Solution Briefs 2020.07.22

Multichannel Current Measurement Solution Using a DAQ

Multichannel Current Measurement Solution Using a DAQ

See our solution brief to learn how the Keysight Technologies DAQ970A and DAQ973A data acquisition (DAQ) systems can provide you the versatility, robust functionality, and cost-effectiveness you need to design multi-channel current test systems.

2020.07.22

Solution Briefs 2020.07.09

Validate the Quality of RF Signals Used for Aircraft Navigation Testing

Validate the Quality of RF Signals Used for Aircraft Navigation Testing

Gain confidence in your avionics navigation system by verifying signals from a signal generator or transmitter.

2020.07.09

Solution Briefs 2020.07.06

Hawkeye: Helping Carriers Monetize and Manage SD-WAN

Hawkeye: Helping Carriers Monetize and Manage SD-WAN

Keysight Hawkeye provides service providers with a cost-effective way to manage, monitor, and monetize their SD-WAN deployments. Learn more in this solution brief.

2020.07.06

Solution Briefs 2020.07.03

Hawkeye: Streamline Enterprise SD-WAN Deployments

Hawkeye: Streamline Enterprise SD-WAN Deployments

Discover how Keysight Hawkeye streamlines enterprise SD-WAN deployments, turn up, and maintenance. Download the solution brief today!

2020.07.03

Solution Briefs 2020.06.25

Testing Audio Video Bridging (AVB) and Time Sensitive Networking (TSN)

Testing Audio Video Bridging (AVB) and Time Sensitive Networking (TSN)

The time-synchronization quality of an AVB system must be verified before devices are released to market. What's more, both AVB and non-AVB traffic can coexist on existing Ethernet networks today, so both kinds of traffic must be properly forwarded through the network to provide the desired QoS. This feature brief explains how Ixia’s AVB/TSN solution is used by leading network equipment manufacturers and car and ECU makers to develop and integrate standards-compliant AVB equipment.

2020.06.25

Solution Briefs 2020.06.24

Testing Automotive Ethernet Ecu Conformance And Interoperability

Testing Automotive Ethernet Ecu Conformance And Interoperability

Ethernet is now used to integrate diverse connected-car technologies on the same platform. Apart from being cheaper and standardized, Ethernet is also light-weight compared to the specialized cables—reducing automobile weight and contributing to fuel economy.

2020.06.24

Solution Briefs 2020.06.23

SSL VPN Gateway Assessment Service

SSL VPN Gateway Assessment Service

VPN infrastructure is mission-critical for daily enterprise operations. It is even more vital when a crisis hits and business continuity depends on most employees working from home. Open this document to understand how Keysight's turnkey assessment service can quickly determine how many users your VPN gateway can support and at what throughput level.

2020.06.23

Solution Briefs 2020.06.21

UHD100T32 — Purpose-Built to Meet the Density and Cost Challenges of Validating 100GE Devices

UHD100T32 — Purpose-Built to Meet the Density and Cost Challenges of Validating 100GE Devices

Keysight’s Ixia UHD100T32 32x100GE QSFP28 fixed chassis test system comes ready, out of the box, to test your 100GE devices with simplified deployment, web user interface, and a staggering 3.2Tbps of Layer 2/3 traffic generation. Open the document referenced here to understand how the UHD can solve your network device test challenges.

2020.06.21

Solution Briefs 2020.06.19

Network Visibility Network Packet Broker Comparison Table

Network Visibility Network Packet Broker Comparison Table

This table compares all the network packet brokers and their attributes, specifications, and more. Download the comparison table to read additional details on the key features and contact us for a demo or price quote.

2020.06.19

Solution Briefs 2020.06.18

Why are Taps Critical to Network Visibility and Security?

Why are Taps Critical to Network Visibility and Security?

The first building-block to your visibility architecture is access to the data. That comes in one of two forms: a network tap or a switch port analyzer (SPAN) port (also known as port mirroring). But which is the right one? This document should help answer that question. These days, your network is as important to your business as any other item—including your products.

2020.06.18

Brochures 2020.07.30

Electronic Warfare Test and Evaluation Solutions

Electronic Warfare Test and Evaluation Solutions

Keysight Technologies provides complete end-to-end solutions for designing, testing and verifying EW System Under Test. We’re stepping forward as a commercial collaborator, creating and delivering the rapidly adaptable EW solutions you need to succeed far into the future. We will work with your team to ensure enhanced realism and greater confidence in test and evaluation.

2020.07.30

Brochures 2020.07.29

Keysight Supports the UN SDGs

Keysight Supports the UN SDGs

Keysight’s corporate social responsibility efforts are well-aligned with the charter of the United Nations’ Sustainable Development Goals (UN SDGs).

2020.07.29

Brochures 2020.07.17

Keysight's Response to Climate Change

Keysight's Response to Climate Change

Keysight is committed to help minimize the impact of climate change by conducting business in an ethical, environmentally sustainable and socially responsible manner.

2020.07.17

Brochures 2020.07.09

X-Series Measurement Applications

X-Series Measurement Applications

Address changing measurement needs with over 25 signal analysis applications for cellular communications, wireless connectivity, digital video, and general purpose measurements.

2020.07.09

Brochures 2020.07.09

Pathwave Signal Creation

Pathwave Signal Creation

Signal Studio reduces the time you spend on signal generation with Keysight's performance optimized signals and signal creation software. Learn more in this brochure.

2020.07.09

Brochures 2020.07.09

PathWave Vector Signal Analysis (89600 VSA)

PathWave Vector Signal Analysis (89600 VSA)

This brochure provides an overview of the powerful signal analysis capabilities of the 89600 VSA software.

2020.07.09

Brochures 2020.06.30

Nemo Cloud Brochure

Nemo Cloud Brochure

This 2-page brochure introduces key features and benefits of Nemo Cloud.

2020.06.30

Brochures 2020.06.19

Nemo Handy

Nemo Handy

Nemo Handy is a solution for thorough and advanced measurement and optimization of wireless air interface and mobile application Quality-of-Service and Quality-of-Experience.

2020.06.19

Brochures 2020.06.19

Nemo Walker Air

Nemo Walker Air

Nemo Walker Air is solution for performing indoor measurements and benchmarking.

2020.06.19

Brochures 2020.06.14

Nemo Outdoor

Nemo Outdoor

This brochure introduces the key features and benefits of Nemo Outdoor

2020.06.14

Brochures 2020.06.08

Keysight’s PathWave Data Analytics Software

Keysight’s PathWave Data Analytics Software

Learn how to gain efficiency from Keysight's data analytics software. Software that integrates data analytics, machine learning, and artificial intelligence unleashes a new era of engineering insights.

2020.06.08

Brochures 2020.06.04

KeysightCare Accelerate the Win

KeysightCare Accelerate the Win

KeysightCare transforms service and support to help your team deliver better results, consistently.

2020.06.04

Application Notes 2020.08.04

Enable 1/f Noise Measurement Over 1A

Enable 1/f Noise Measurement Over 1A

The E4727B Advanced Low-Frequency Noise Analyzer enables fast, accurate and repeatable low-frequency noise (LFN) measurements on numerous device types. Now, thanks to tight integration with Keysight’s WaferPro Express software, device modeling and characterization engineers can now add noise measurements to a larger suite that includes high-speed DC, capacitance and RF S-parameter measurements, all the while automating wafer prober control.

2020.08.04

Application Notes 2020.07.29

Validating Network Suitability for Voice and Video Services in a Live Network

Validating Network Suitability for Voice and Video Services in a Live Network

Participants in global financial markets face interesting challenges in delivering voice and video services. Their teams are often geographically diverse, spanning multiple countries and an even greater number of different service providers. Technological sea changes such as the widespread migration from MPLS to SD-WAN contribute to the challenge. Synthetic or active performance monitoring solutions such as Hawkeye can help ensure that the network is ready to power demanding applications such as voice and video in such an environment.

2020.07.29

Application Notes 2020.07.23

Understanding FMCW Automotive Radar

Understanding FMCW Automotive Radar

In this application note, we will look at frequency modulated continuous waveform (FMCW) radar technology in detail, particularly the wideband 76-81 GHz range. We will describe how you can use Keysight’s solutions to test your designs to ensure maximum efficiency, reliability, repeatability, and most importantly, ensure that your devices work to the highest safety standards possible.

2020.07.23

Application Notes 2020.07.22

S-Parameter Design

S-Parameter Design

Learn practical S-parameter design techniques for RF and microwave applications to assist continued development of new high frequency circuit designs.

2020.07.22

Application Notes 2020.07.17

De-Embedding and Embedding S-Parameter Networks Using a Vector Network Analyzer

De-Embedding and Embedding S-Parameter Networks Using a Vector Network Analyzer

Explore the techniques of de-embedding and embedding S-parameter networks with a DUT. The error coefficients can be modified using the error-correcting algorithms of the VNA.

2020.07.17

Application Notes 2020.07.13

New i3070 Series 6 is 1.5x faster!

New i3070 Series 6 is 1.5x faster!

This application note summarizes some of the results of Vectorless Test Enhanced Probe (VTEP) early tests conducted at customer sites.

2020.07.13

Application Notes 2020.07.10

Impedance Measurement Handbook

Impedance Measurement Handbook

This handbook introduces the basics of impedance measurements using Keysight's LCR meters and impedance analyzers. Learn some great impedance measurement techniques!

2020.07.10

Application Notes 2020.07.06

Understanding the Fundamental Principles of Vector Network Analysis

Understanding the Fundamental Principles of Vector Network Analysis

Review the fundamental principles of vector network analysis and its use, including scattering parameters (S-parameters) and RF transmission line measurements.

2020.07.06

Application Notes 2020.07.05

Making Time Domain Measurement with Pulsed Source Using SMU

Making Time Domain Measurement with Pulsed Source Using SMU

This SMU demo guide shows how easily you can make a time domain measurement with sourcing pulsed current or voltage using the B2900A Series SMU step by step.

2020.07.05

Application Notes 2020.07.01

Using the Keysight Vector Modulation Analysis Measurement Application to Analyze Complex Signals

Using the Keysight Vector Modulation Analysis Measurement Application to Analyze Complex Signals

N9054EM0E Vector Modulation Analysis (VMA) is a general-purpose measurement application which allow customers configure the signal with two segments for analyzing complex signals like DVB-S2 or DVB-S2X signals. It includes measurement traces for raw main time, spectrum, EVM time spectrum, and insightful modulation quality metrics such as EVM or MER.

2020.07.01

Application Notes 2020.06.29

Direct Radar Signal Generation and Acquisition – Part 1

Direct Radar Signal Generation and Acquisition – Part 1

Generation and detection of radar signals have changed dramatically in the past 30 years. Today’s digital signal processing capabilities offer a wide range of possibilities to simulate radar signals and include simulated objects to verify the performance of a radar system.

2020.06.29

Application Notes 2020.06.25

IVI-COM Driver and VISA-COM I/O Programming Examples in Microsoft Visual C#

IVI-COM Driver and VISA-COM I/O Programming Examples in Microsoft Visual C#

This paper details the installation instructions and Visual C# (C-sharp) programming examples for Keysight Technologies IVI-COM instrument drivers and VISA-COM I/O. This application note will demonstrate examples from the N4965A multi-channel BERT controller and the N4962A serial BERT 12.5 Gb/s.

2020.06.25

Want more?
Explore, filter, and search our extensive libraries of pre-sales and post-sales literature, videos, webinars, and more.