The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
|
|
|
- Barnaby Porter
- 10 years ago
- Views:
Transcription
1 The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com September
2 Agenda Today s IT challenges Introduction to Network Flow Analysis Nature of Network Congestion Case Studies Q&A NetworkPhysics.com 2
3 IT Challenge: The 3 C s Extranet Business Partners IP Sec VPN DSL/T1 Remote Office Network(s) Customers Public Internet T3 or OC3 WAN Internet Road Warriors SSL VPN DSL/Dial-Up T3 or OC3 Multi-homed? Web Services Sales Office(s) MPLS VPN DSL/T1 Enterprise LAN Corporate Servers And VPN Branch Office(s) IT Goals Reduce complexity Enable change Manage costs Corporate Users WAN Frame Relay / T1 Complexity Sheer number of devices Outsourced networks & services Management silos Network of networks Change Economic & business change Drives need for business agility Business ecosystem Cost Reducing capex & opex while meeting business goals Spend less, manage more NetworkPhysics.com 3
4 Device-Based Management Can t Manage 3 C s Traditional Device-based Management Problems Complexity Management silos: too much finger pointing across teams, too little answers Blind spots: can t see or manage Internet, 3 rd party networks, outsourced services Change Fear of network transitions: network performance anxiety Hard-wired device mgmt: breaks down w/ networks changes, migrations, moves Cost Escalating capex: add/change services > add/change management Point tools proliferate: single purpose probes, fragmented management NetworkPhysics.com 4
5 Flow-Based Management, Business Relevance Manage actual network traffic flows, instead of devices Deliver object-relevant management of the most dynamic & complex networks Network Flow Complexity: Monitor end-to-end regardless of underlying complexity Change: Dynamically adapt to network changes Cost: Consolidate management to reduce cost NetworkPhysics.com 5
6 What are Network Flows? Network Network Traffic Traffic Flows Flows Flows Flows = = TCP, TCP, UDP UDP connections connections End-to-end, Layer 4 End-to-end, Layer 4 Source, destination Source, destination Application or service port Application or service port Flows Flows capture: capture: All traffic, all the time All traffic, all the time Non-invasive: Non-invasive: no no agents, agents, no no SNMP, SNMP, no no polling, polling, no no synthetic synthetic transactions transactions You are here Inspect Inspect TCP, TCP, UDP UDP flows flows in in realtime realtime to to monitor monitor performance, performance, response response time, time, utilization utilization Locate problems in the network using only what you can observe at! NetworkPhysics.com 6
7 What is Flow-Based Management? NetworkPhysics.com 7
8 Typical enterprise network profile Average Mb/s traffic 90K flows/sec, 40K unique connected users/sec Experience 10% congestion episodes/sec, of which 30% are critical Sessions lasting 10 sec- 2min Financial value of each session may vary widely How much a session in a financial environment is worth? How much a connection to Yahoo! is worth? Where do you act first? CIO call, John Doe call? Reduced IT human support Reduced IT infrastructure for troubleshooting Persistency of Network problems Congestions come and go in bursting mode. When congestion occurs, it tends to occur repeatedly at specific points (I.e., specific bandwidth exchange points). Apply the 8 seconds rule! NetworkPhysics.com 8
9 Today s challenges of intelligent data management Real Time Data Acquisition Data is heterogeneous by nature. Patterns are fractal in nature and happen at all dimensions(packets, connections, flows) Loss-less data compression. How can the system retain the information while reducing the size? Effective pre-processing is the key to statistical accuracy and resolution. Optimized clustering Average customer network will generate 90K convers/sec. In addition route, configuration, lookup information have to be correlated to the conversations in real-time Pattern identification How do you close the gap between data generation and data comprehension? What is the most appropriate data model? Accuracy relies on statistics: more traffic is better NetworkPhysics.com 9
10 What can we see? What can t we see? IP packet headers TCP segment headers Data source IP address destination IP address TTL (time-to-live) TOS (type-of-service): TCP, UDP, ICMP, etc. Source, port number Destination, port number Flags: SYN FIN ACK RST e.g., HTTP stuff (we note the total size, in bytes) Where packets have been Where packets were delayed Where packets got dropped WHERE, WHERE, WHERE? NetworkPhysics.com 10
11 Extensive Suite of Metrics Response Metrics Time to First Byte (ms) Network Transfer Time (ms) Server Response Time (ms) Connection Duration (sec) Round Trip Time (ms) Client Metrics Time to Live (Hops) Client Reset Rate (#/s) Timeout Rate (#/s) Client Request Rate (#/s) Information (Hostname) Throughput Metrics Inbound TCP Throughput (Mbps) Inbound TCP Traffic (MB) Inbound Packet Throughput (pps) Inbound Packet Traffic (packets) Inbound Throughput (Mbps) Inbound Traffic (MB) Outbound TCP Throughput (Mbps) Outbound TCP Traffic (MB) Outbound Packet Throughput (pps) Outbound Packet Traffic (MB) Outbound Throughput (Mbps) Outbound Traffic (MB) Connection Rate (#/s) Connection Payload (KB) Congestion Metrics Outbound Retrans (MB) Outbound Packet Retrans (packets) Outbound Retrans Rate (Mbps) Outbound Packet Retrans Rate (pps) Outbound Packet Loss (%) Total Congestion Time (min) Lossless Network Transfer Time AS Metrics Trans-ISP RTT (ms) ISP Peering Point RTT (ms) Associated AS Associate AS Description Associated AS Information For each IP address, subnet, business group, Autonomous System, Server, Client, etc. NetworkPhysics.com 11
12 Architecture Passive monitoring Does not require any network modification Does not rely on MIBs or other parameter polling mechanism Only one device is needed - does not require agents Collects data all the time - real-time and historical Database is included for long term analysis Data is persistently stored. Includes a BGP Speaker, AS lookup, TCP/ICMP traceroutes Web server + Java app for data browsing NetworkPhysics.com 12
13 Business-Relevant Visibility Virtualized: to maintain business service visibility regardless of network complexity Feature: Business groups Business level visibility through data aggregation Business critical apps SAP, Exchange Important business units London, Burbank Building 170, 154 Business networks Internet, Internal Specific server farms Mainframe, SF L/R/C NetworkPhysics.com 13
14 Baselining Application Usage Ports required for Firewall Determine which applications may need to be prioritized through the VPN Size of Internet Connection Standard Services http ftp Streaming services Real Windows Media Player Peer-to-peer (P2P) apps Fasttrack-based apps (KazaA, Grokster, Morpheus) Gnutella Gaming apps Operation Flashpoint Quake III Medal of Honor Internal Application Usage NetworkPhysics.com 14
15 Baselining All Users Security Detailed list of the subnets that need to allowed through the firewall. Internet Connection Understand who is using the network and how much May want to migrate remote offices with less traffic first! Network Responsiveness Understand response times for remote offices as a baseline to measure VPN performance NetworkPhysics.com 15
16 Application Response Time Analysis Unifying: across management silos, across disparate management systems Feature: Response time composition analysis Troubleshoot SAP performance problems Isolate largest contributor to SAP response time delays Monitor SAP usage trends month-tomonth Identify major SAP application response time delays NetworkPhysics.com 16
17 AS Information: Insight Into The Cloud ISP G Last AS ISP C 2 nd AS Extranet Business Partners IP Sec VPN ISP A 1 st AS ISP D 2 nd AS Web Services Customers Public Internet ISP H Last AS T3 or OC3 Multi-homed ISP E 2 nd AS ISP B 1 st AS Enterprise LAN ISP I Last AS ISP F 2 nd AS Sales Office(s) MPLS VPN DSL/T1 For each 1 st, 2 nd, and Last AS, we provide a unique set of statistics Utilization End-to-End performance Transit and peering latency Only available by correlating Flows, BGP, and Traceroute Information Corporate Servers And VPN Corporate Users NetworkPhysics.com 17
18 Measuring Service Provider Performance Measure effectiveness of remote office and directly connected ISP s Thresholding can be used to alert users to any SLA violations. Validate efficiencies of ISP peers Grade performance of multiple ISP s NetworkPhysics.com 18
19 Troubleshooting Inside the Cloud Graphical network route analysis pinpoints hidden bottlenecks Local Local London London London Identifies destinations with critical performance issues Local Local Virginia Virginia Measures hop-by-hop delay metrics to localize network latency problems External NetworkPhysics.com 19
20 Detect the infection MS Blaster Worm Where did it start? Who is affected? NetworkPhysics.com 20
21 Conclusions This is an interesting, but challenging problem (hardware and software) Capturing meaningful data is hard Make sense of them is even harder! CREDITS SLAC (Stanford Linear Accelerator Center) Yahoo! Cisco Stanford and U. of Utah, DOE, DOD, National Labs. Staff of Network Physics We are looking for data/test sites and collaborators NetworkPhysics.com 21
22 Questions? Silvia Veronese NETWORK PHYSICS NetworkPhysics.com 22
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Cisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites
Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable
Brocade Flow Optimizer Making SDN Consumable Business And IT Are Changing Like Never Before Changes in Application Type, Delivery and Consumption Public/Hybrid Cloud SaaS/PaaS Storage Users/ Machines Device
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Компјутерски Мрежи NAT & ICMP
Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers
CiscoWorks Internetwork Performance Monitor
CiscoWorks Internetwork Performance Monitor (IPM) v2.6 Tutorial Introduction 1-1 About This Tutorial Identify the need for network service monitoring tools Describe how to use IPM to configure and monitor
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
Bandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
How To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap
Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such
Network Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
OpManager MSP Edition
OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
UNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
24x7 Monitoring and Troubleshooting Distributed Application Performance
24x7 Monitoring and Troubleshooting Distributed Application Performance WHITE PAPER Gone is the luxury of sending network engineers to physically visit a site to troubleshoot performance issues. Today
MITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
Application Note. Cell Janus Load Balancing Algorithms Technical Overview
Cell Janus Load Balancing Algorithms Technical Overview Introduction This application note describes the technical aspects of all load balancing algorithms in Cell Janus. Load balancing occurs in both
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT
WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper
Nimsoft for Network Monitoring A Nimsoft Service Level Management Solution White Paper Nimsoft for Network Monitoring Table of Contents Nimsoft for Network Monitoring Solution Summary... 3 Solution Overview...
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
WAN Optimization in MPLS Networks- the Transparency Challenge!
DATE OF ISSUE May 2005 AUTHOR Efi Gat mor 103 Eisenhower Parkway Roseland, NJ 07068 USA TEL +1.888.892.1250 +1.973.618.9000 FAX +1.973.618.9254 www.expand.com WAN Optimization in MPLS Networks- the Transparency
VLAN und MPLS, Firewall und NAT,
Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was
Test Methodology White Paper. Author: SamKnows Limited
Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Improving Network Efficiency for SMB Through Intelligent Load Balancing
Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. [email protected] www.netforecast.com VoIP Deployment Realities VoIP is not just another application
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
