Monitoring your WAN When, What and How

Size: px
Start display at page:

Download "Monitoring your WAN When, What and How"

Transcription

1 Monitoring your WAN When, What and How Even though WAN performance monitoring tools have been available for close to a decade, less than a quarter of US WAN links are monitored by enterprises either by using their own equipment or their service providers. The ratio is even lower outside of the US. Are the total benefits of monitoring links enough to outweigh the costs of deploying and monitoring the links? What are the key benefits to monitoring your WAN circuits? What should you monitor with your WAN links? This whitepaper will help you calculate the value of link monitoring, help you calculate the total cost of downtime, understand the causes of slow service or application performance and effectively manage your bandwidth. When does it make sense to monitor WAN links? So why are some WAN links monitored and other links left unmonitored? In some cases, the costs of monitoring the links do not provide sufficient benefits to justify monitoring. Many WAN technologies such as Frame Relay, PPP and ATM are mature technologies that network managers let run unchecked. For these unmonitored links, performance and availability are more or less relegated to the service provider with very little customer visibility of link performance. Many network managers feel that the problems and inefficiencies occurring with most unmonitored WAN links are usually resolved in a sufficient amount of time or are allowed to continue unchecked because deploying costly monitoring solutions do not justify the incremental gains. A second reason is that many network administrators appear to still be at a loss as to where the key benefits of monitoring their WAN circuits lie. Network managers understand that there are plenty of tools in the market that give them data about their WAN performance, but they are still uncertain as to how the data can help them with their jobs. In either case, it s a simple cost-benefit equation. In the former case, the time and expense required to deploy monitoring does not provide enough additional benefit. In the latter case, the benefits of monitoring are not clear enough to justify the costs of deploying a monitoring solution. Mission-critical links Depending on the types of applications and users utilizing a given WAN link, the criticality of the need and the degree of proactive monitoring needed varies. If a WAN link is used to provide general corporate users with access to the Internet for business web surfing, the meticulous monitoring of link performance is probably not worth the expense. Traffic from an order fulfillment user at a branch office that needs access to customer records in order to complete a point-of-sale transaction is missioncritical and warrants constant monitoring to ensure it is performing flawlessly. In essence, WAN links deemed mission critical have a significant impact to the business and should be monitored.

2 Mission-critical WAN links usually fall into the following categories: Links that are absolutely necessary to keep customers satisfied. These links are typically those that carry real-time customer transaction type data. Examples include point-of-sale customer records access, credit card transactions, VoIP calls in customer call centers and other critical customer serving applications. Links supporting real-time applications that are essential for personnel. These links typically support end-user, missioncritical internal operations. Examples include e-commerce applications, web shareware applications, real-time inventory data access, video conferencing, and other real-time operational applications. Links supporting critical business tools. These are links supporting key back-office applications, especially in data centers. Examples include data exchange tools, remote mirror site back-up exchanges, remote server software upgrades and other back-office applications. Calculating the value of link monitoring The value of monitoring a WAN link is dependent on the criticality of the traffic being carried, the current efficiency of the network and the organizational structure of the company. One way to quantify value is to apply a simple mathematical formula to estimate value components employed through link monitoring. With this method, you simply calculate and then add up all the value components derived for the chosen link to be monitored. This value is then compared against the costs to deploy the selected monitoring solution to determine if the cost of monitoring is worth the benefits derived. Value component (per Year) MTTR value Labor time savings value Efficiency improvements Tools savings value Applying the formulas in Figure 1 to generate a numerical value for the benefits is typically done in a fairly subjective way. To illustrate this, let s use an example. Assume a given link is currently being monitored with a WAN probe. Based on past experience, the network manager has observed that the real-time monitoring capability on this link yields a two-hour decrease in mean-time-to-repair (MTTR) every year when compared with a similar unmonitored link. Assuming the mission-critical link has a value of $100/min.*, the value of monitoring for improving MTTR is $12,000 per year ($100/min. x 120 min. MTTR improvement/yr.) for this value component alone. The value for monitoring this link is even greater when other value components such as saved troubleshooting labor time and other network efficiency improvements are included as a result of monitoring the link. Obviously the magnitude of MTTR improvement and per minute value of a downed link will vary substantially from link to link and company to company. But, the fundamental value element and calculation formula remains the same. Calculating total downtime costs Evaluating whether to deploy link monitoring on a link-by-link basis makes sense if a network engineer is only looking to deploy simple stop-gap solutions on selected links. Determining the total value of a distributed Mathematical formula for estimating value Link downtime (min.) x # occurrence /yr. x $ value / min. Time saved (hrs.) x $ value / hr. x occurrence/yr. x # of people ROI increase from leveraging currently installed tools $ / yr. spent buying and maintaining eliminated tool Figure 1: Mathematical formulas for quantifying the value of monitoring WAN links * Examples using US dollars. WAN monitoring system may require a different approach, as adding up all the value components of all links to be monitored becomes unwieldy. In evaluating distributed WAN monitoring systems, you may want to start with the top-level costs associated with downtime. Fluke Networks has estimated that for a typical enterprise with $100M (USD) in annual revenue, the costs of downtime can be quite significant. (See Figure 2) Notice for each source of downtime, WAN links may be a major cost. Sources of downtime will obviously vary substantially from company to company, so an individual analysis of the cost contribution for your specific enterprise should be conducted before determining whether a distributed WAN solution is right for your organization. Based on analysis of the typical enterprise, however, WAN networks may be a significant source of downtime costs. What should you monitor within your WAN links? Let s now assume that at least a few WAN links have been identified as mission-critical and worthy of monitoring. The next logical question is, what are the things that are most important to monitor? With a sea of vendors all eager to sell network visibility to IT organizations, network managers rarely complain about a shortage of tools that can provide them with network performance data. End users using 2

3 these vendor tools receive a lot of data from their devices telling them about what s going on with their network. But, most users admit they are unable to make good use of the sea of data streaming to them when trouble occurs in the network or users complain about poor application performance. Network engineers are quick to point out that most network analysis tools lack the ability to clearly, easily and rapidly generate the exact network information needed to help isolate and resolve the wide variety of challenges they face. Different vendors have different solutions that are usually good at solving different point problems. But, in most instances, network engineers don t have the time nor budget to procure, learn and maintain solutions from all the different vendors needed to provide 100% monitoring of network activities. So what are the most important WAN activities enterprise network professionals are interested in monitoring? Fluke Networks recently conducted a user survey to determine what WAN link concerns and problems are of most interest to network engineers and administrators. This international survey showed that a vast majority of end users not only had very similar basic WAN link concerns, but the priority of the concerns were fairly uniform across all geographies surveyed. Not surprisingly, network engineers seek fundamental circuit visibility to proactively manage the bandwidth performance of their WAN links, as well as troubleshoot link problems that cause slow application response and service interruptions. Hence, monitoring relevant WAN metrics that best facilitate bandwidth management and identify service interruption sources are the things to watch when managing WAN links. Figure 2: Estimated cost of downtime for a typical enterprise with $100M in revenue (Shown in USD) (Derived from The Cost of Enterprise Downtime 2004: Cost Analyzer Infonetics Research) At first glance, concerns such as bandwidth management and basic visibility may mean different things to different people. To clarify and better understand the meaning of these concerns, Fluke Networks conducted interviews with selected survey respondents. Curiously, the interview results yielded a fairly consistent and common understanding of the top six concerns listed in Figure 3. In the subsequent sections, we share our findings on these top six concerns. Bandwidth management Bandwidth management ensures bandwidth is made available to users, servers, applications and other network devices in whatever form the enterprise network manager specifies. For a minority of users, bandwidth management means the relief of traffic congestion through mechanisms such as traffic shaping/policing/enforcement or compression. For a few others, bandwidth management means prioritizing traffic types like VoIP to ensure voice calls traversing the data network meet specific quality metrics. The vast majority of respondents, however, said bandwidth management simply means the ability to monitor user and circuit bandwidth consumption so the network manager has adequate, real-time information in order to take action that ensures proper throughput and error-free operation of the WAN link. For example, the network manager needs the ability to identify the cause of bandwidth bottleneck problems so that corrective action may be taken. Most of the time, these actions do not include things such as setting or changing class of service policies, buying more bandwidth or implementing compression technology. Corrective action typically includes simple network tweaks such as shutting down a port number to an unauthorized application like KAZAA or changing the time of a regularly scheduled download of software updates to remote servers and workstations. The other main need for bandwidth management is the ability to 3

4 continuously see what s going on with the network to deliver maximum efficiency of limited bandwidth in an environment of constant change from new application deployments, new service deployments and moves, adds and changes. Network managers indicated the need to monitor vital link statistics as key functions of a monitoring solution. Metrics such as link utilization, throughput rate and errors for each individual virtual circuit over various time horizons is extremely useful in verifying performance. (See Figure 4) Monitoring link utilization is a quick way to determine if the WAN is a bottleneck. If utilization is too high, then a closer examination of WAN activity is needed to determine the root cause. If utilization is within the design boundary, then there is evidence that the WAN is performing properly. Understanding the applications that utilize the WAN link is also very important for bandwidth management. This enables visibility of true bandwidth needs, bottleneck sources and detection of unauthorized applications. This visibility is essential when making traffic engineering decisions. (See Figure 5) Slow service and application performance Slow service or application performance can be caused by a variety of sources including the application itself, servers hosting the user, servers hosting the application and network elements such as switches and routers. Network managers need basic visibility across all major sources of performance inhibitors so that efficient triage of the problem area can be performed. Key metrics to determine the source of bottlenecks within the network or server include: Connection time Amount of time it takes to establish a TCP session between the client and server before data transfer can begin Figure 3: WAN link concerns based on survey results of network managers Figure 4: Utilization monitoring is essential for bandwidth management 4

5 Server delay Amount of time it takes for the server to begin responding to a request Data transfer delay Amount of time from when the server starts responding until it finishes sending data for a request Retransmission delay Represents the additional delay in the network round trip time due to retransmissions Network round trip time Amount of time it takes for a packet to traverse the network Visibility of these metrics yields a quick understanding of the slowdown source and is essential to effective and efficient implementation of corrective solutions. With no means for monitoring performance, network managers are likely to conclude that insufficient bandwidth is the source of the problem. The enterprise then attempts to remedy this either by buying a link with more bandwidth, or a PVC with a higher CIR. In many cases, this is a waste of money, as the source of the slowdown is elsewhere in the network. (See Figure 6) Figure 5: Monitor top applications to better manage bandwidth Figure 6: Monitor response times to triage slowdown sources 5

6 Basic visibility Basic link visibility allows you to quickly look at a given circuit to verify its performance. Network managers need this at-aglance look at the WAN circuit to eliminate the WAN as a source of the problem or pinpoint an area for further examination. It is also a quick look at the top metrics that characterize the WAN link to get an instant, real-time understanding of what the link is doing. (See Figures 7 and 8) Key metrics for basic WAN circuit monitoring include: Circuit connection Verifying the type of circuit (e.g. FR, PPP, ATM, etc.), the number of virtual circuits and their endpoint routers Utilization Quick glance to determine if a bandwidth bottleneck is present. This should include a view of the total circuit utilization, as well as top bandwidth consuming hosts, applications and virtual circuits Devices A display of all devices that are using the link including routers, servers, hosts and probes Problems A problem log display showing alarms and alerts generated by traffic monitoring probes Figure 7: Quickly view all key WAN performance areas Figure 8: Better manage the link by knowing what devices are on it 6

7 Uptime / service interruptions Problem alerts are an essential part of any monitoring solution. Proactive monitoring sends you alerts based on standard failure events, as well as user configurable threshold breaches. Corrective actions won t be made unless the network manager is aware of the problem. (See Figure 9) Figure 9: Problem logs proactively alert administrators to WAN problems Service provider provisioning Despite the best efforts of installers, technicians and engineers, errors happen during service provider provisioning. Hence, it is prudent to verify the link throughput you expect is actually being delivered. SLAs exist to assure you of the basic quality of service that will be available through your WAN. But monitoring is necessary to verify SLA compliance. Your throughput can be affected when traffic is dropped because of momentary congestion in the WAN. Knowing and verifying the throughput characteristics of your PVCs over time is important for the recognition of problems that are the result of temporary loads, systemic problem or simple miss-configurations. (See Figure 10) Figure 10: Verifying committed capacity from your service provider 7

8 Physical layer problems Just as it is prudent to verify committed capacity from your service provider, it is also important to monitor physical layer problems. The ability to cross-check physical layer performance eliminates finger-pointing between the enterprise and service provider and helps to quickly isolate or rule out physical layer issues associated with the WAN. When physical layer problems occur on a mission-critical link, MTTR is paramount as the impact to users is usually severe. (See Figure 11) Conclusion Monitoring mission-critical WAN links has demonstrated proven cost-benefit value for just about any enterprise, although the exact quantitative cost-benefit value must be estimated on a company-by-company basis. In order to achieve maximum WAN link efficiency and uptime of mission-critical links, real-time, active monitoring of WAN circuits must be performed. Network managers must first monitor key performance metrics on their WAN links so that they may thoroughly understand how their links are being used before taking corrective action. A lack of monitoring capability will result in WAN networks that are not optimally designed, implemented and maintained. Figure 11: Monitor the physical layer to reduce MTTR and finger-pointing NETWORKSUPERVISION Fluke Networks P.O. Box 777, Everett, WA USA Fluke Networks operates in more than 50 countries worldwide. To find your local office contact details, go to Fluke Corporation. All rights reserved. Printed in U.S.A. 4/ A-ENG-N Rev A

SuperAgent and Siebel

SuperAgent and Siebel SuperAgent and Siebel Executive summary Siebel Systems provides a comprehensive family of multichannel ebusiness applications services, all within a single architecture. The Siebel architecture is an n-tier

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

The Financial Benefits of Using LiveAction Software for Network QoS

The Financial Benefits of Using LiveAction Software for Network QoS White Paper The Financial Benefits of Using LiveAction Software for Network QoS How implementing network quality of service management can provide quantifiable cost savings, improved profitability and

More information

Business case for VoIP Readiness Network Assessment

Business case for VoIP Readiness Network Assessment Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The

More information

Managing Network Bandwidth to Maximize Performance

Managing Network Bandwidth to Maximize Performance Managing Network Bandwidth to Maximize Performance With increasing bandwidth demands, network professionals are constantly looking to optimize network resources, ensure adequate bandwidth, and deliver

More information

Application-Centric Analysis Helps Maximize the Value of Wireshark

Application-Centric Analysis Helps Maximize the Value of Wireshark Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and

More information

Benefits of WAN-Level Visibility in Monitoring and Maintaining your Network

Benefits of WAN-Level Visibility in Monitoring and Maintaining your Network Benefits of WAN-Level Visibility in Monitoring and Maintaining your Network A WAN Analyzer offers essential insight into your WAN links, including Service Level Agreement verification, WAN frame visibility,

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

Traffic Analysis with Netflow The Key to Network Visibility

Traffic Analysis with Netflow The Key to Network Visibility Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7

More information

6 Ways to Calculate Returns from Your Network Monitoring Investment

6 Ways to Calculate Returns from Your Network Monitoring Investment WHITE PAPER 6 Ways to Calculate Returns from Your Network Monitoring Investment All network management teams have two things in common: their budgets are tight and their user communities expect reliable

More information

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise

More information

Alcatel-Lucent VitalSuite Performance Management Software for the Enterprise

Alcatel-Lucent VitalSuite Performance Management Software for the Enterprise Alcatel-Lucent VitalSuite Performance Management Software for the Enterprise Monitor, measure and enhance delivery of carrier-class business services across your multi-vendor, multi-service infrastructure

More information

The Mandate to Implement Unified Performance Management

The Mandate to Implement Unified Performance Management The Mandate to Implement Unified Performance Management Ashton, Metzler & Associates Leverage Technology & Talent for Success 1. Executive Summary In most companies there is a gap between the needs of

More information

Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP

Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Introduction As businesses search for new ways to cut costs and increase efficiency, they are moving their phone systems to VoIP (voice

More information

Traffic Analysis With Netflow. The Key to Network Visibility

Traffic Analysis With Netflow. The Key to Network Visibility Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Monitoring, Managing, Remediating

Monitoring, Managing, Remediating MANAGED SERVICES Packages include: Fault management Troubleshooting & escalation Proactive monitoring WAN status 800# Incident & inventory management Quarterly reviews Managed device database Online dashboard

More information

Best Practices from Deployments of Oracle Enterprise Operations Monitor

Best Practices from Deployments of Oracle Enterprise Operations Monitor Best Practices from Deployments of Oracle Enterprise Operations Monitor September 2014 Prepared by: Zeus Kerravala Best Practices from Deployments of Oracle Enterprise Operations Monitor by Zeus Kerravala

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: E-Guide Network Management Fundamentals Network management is a complex topic. In today's diverse networking infrastructure, the network has to handle more instances of unified communications, video, and

More information

Proven techniques and best practices for managing infrastructure changes

Proven techniques and best practices for managing infrastructure changes Proven techniques and best practices for managing infrastructure changes When a business expands an existing facility, adds a new location, incorporates an influx of new users, or upgrades an existing

More information

PERFORMANCE MANAGER. Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business.

PERFORMANCE MANAGER. Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business. PERFORMANCE MANAGER Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business. The ETM Performance Manager provides unified, realtime,

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Advancements in field measurement of Ethernet performance

Advancements in field measurement of Ethernet performance Advancements in field measurement of Ethernet performance An Ethernet service provider needs to demonstrate to his customer that the service he is providing is compliant with the service level agreement.

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

Network Application Performance Alignment to IT Best Practices

Network Application Performance Alignment to IT Best Practices Network Application Performance Alignment to IT Best Practices This white paper briefly describes best practices, highlights IT best practices and discusses in detail; IT business service management, the

More information

PROACTIVE PERFORMANCE MANAGEMENT

PROACTIVE PERFORMANCE MANAGEMENT 51-11-99 DATA COMMUNICATIONS MANAGEMENT PROACTIVE PERFORMANCE MANAGEMENT Tim Clark INSIDE The Current State of Performance Management; Proactive Performance Management; Developing a Baseline; Online Utilization

More information

MITEL. NetSolutions. Flat Rate MPLS VPN

MITEL. NetSolutions. Flat Rate MPLS VPN MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations

More information

Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923)

Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923) Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923) Key Features: The everything software bundle for application aware network monitoring for remote sites

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper > A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide

More information

Application Performance Management

Application Performance Management Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for

More information

Driving Service Delivery with SLA Performance Management

Driving Service Delivery with SLA Performance Management Driving Service Delivery with SLA Performance Management Providers #1 competitive advantage Service providers more and more depend on Ethernet services as the networks are evolving from traditional voice

More information

White Paper: Application and network performance alignment to IT best practices

White Paper: Application and network performance alignment to IT best practices Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business

More information

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Often, the only way to get to the root cause of unwelcome or intermittent events that occur on

More information

Enabling a Converged World. Are Duplicate Packets Interfering with Network Monitoring?

Enabling a Converged World. Are Duplicate Packets Interfering with Network Monitoring? Enabling a Converged World Are Duplicate Packets Interfering with Network Monitoring? 915-6510-01 Rev A December 2011 Contents Overview...3 Duplicate Packets Diminish Monitoring Port Bandwidth...4 Duplicate

More information

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations

More information

Benchmarking VoIP Performance Management

Benchmarking VoIP Performance Management Benchmarking VoIP Performance Management March 2008 Page 2 Executive Summary Aberdeen surveyed 159 organizations to identify best practices for managing Voice over Internet Protocol (VoIP). This report

More information

The Ultimate Guide to Gaining Control of the WAN

The Ultimate Guide to Gaining Control of the WAN LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers

More information

Monitoring Application Response Time Components and analysis of various approaches

Monitoring Application Response Time Components and analysis of various approaches Monitoring Application Response Time Components and analysis of various approaches Explores the components and analysis of application response time; describes new approaches that can simplify the analysis

More information

How To: Diagnose Poor VoIP Calls through diagnostics.

How To: Diagnose Poor VoIP Calls through diagnostics. How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

CIR (down/up) 256k/64k 320k/96k 384k/128k. Throughput allowance 2 GB 4 GB 6 GB. (down/up) in unexpectedly high fees.

CIR (down/up) 256k/64k 320k/96k 384k/128k. Throughput allowance 2 GB 4 GB 6 GB. (down/up) in unexpectedly high fees. Broadband Satellite: Enterprise Class or Cookie Cutter? There are a wide range of broadband satellite services available from a wide variety of network operators. What are the differences between them?

More information

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are

More information

Managing Application Delivery from the User s Perspective

Managing Application Delivery from the User s Perspective Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,

More information

Ten top problems network techs encounter

Ten top problems network techs encounter Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,

More information

Configuring an efficient QoS Map

Configuring an efficient QoS Map Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable

More information

Monitoring Web Applications with Application Response

Monitoring Web Applications with Application Response Monitoring Web Applications with Application Response For time-critical Web-based applications, even a short-term performance problem can cause lost revenue when customers cannot place orders or they become

More information

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction

More information

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more

More information

OneSight Voice Quality Assurance

OneSight Voice Quality Assurance OneSight Voice Quality Assurance Benefits Proactively determine voice quality issues as well as other service impacting issues before users complain Comprehensively monitor communications systems with

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their

More information

NetFlow Tips and Tricks

NetFlow Tips and Tricks NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

2013 WAN Management Spectrum. October 2013

2013 WAN Management Spectrum. October 2013 2013 WAN Management Spectrum October 2013 Market Context... 2 Executive Summary... 3 By the Numbers... 5 Research Background... 6 WAN Management... 8 Business Impact... 9 Submarkets... 10 Deployment...

More information

The Untapped Treasure

The Untapped Treasure WHITE PAPER Application Aware The Untapped Treasure Mining Value Out of Current Network and Application Assets Introduction: Gaining Visibility into the Network It s one of the heaviest holiday shopping

More information

White Paper: Troubleshooting Remote Site Networks Best Practices

White Paper: Troubleshooting Remote Site Networks Best Practices White Paper: Troubleshooting Remote Site Networks Best Practices Management and remote site employees expect the same level of network service as the headquarters site. However, when IT staff are faced

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

Observer Analyzer Provides In-Depth Management

Observer Analyzer Provides In-Depth Management Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,

More information

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

Network Application Integrity and Efficiency - An Example

Network Application Integrity and Efficiency - An Example Building an ROI: Application and Network Performance Management Believing there are benefits to improved network and application performance is not enough for most organizations. The ability to quantify

More information

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview

More information

What IT gains from managing the end-user experience

What IT gains from managing the end-user experience WHITE PAPER What IT gains from managing the end-user experience Adapted from The Defi nitive Guide to Business Service Management, written by Greg Shields, published by Realtime Publishers PROBLEM IDENTIFICATION

More information

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,

More information

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security

More information

--- Who s watching over your network to insure that it is operating efficiently? ---

--- Who s watching over your network to insure that it is operating efficiently? --- Did You Know...? Starnet offers numerous ITrelated services in support of many of today s complex IT operational issues. --- Who s watching over your network to insure that it is operating efficiently?

More information

Are Duplicate Packets Interfering with Network Monitoring? White Paper

Are Duplicate Packets Interfering with Network Monitoring? White Paper Are Duplicate Packets Interfering with Network Monitoring? White Paper A network monitoring switch allows IT teams to simultaneously connect a wide array of monitoring tools. The best-in-class network

More information

Best Practices for NetFlow/IPFIX Analysis and Reporting

Best Practices for NetFlow/IPFIX Analysis and Reporting WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:

Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share: Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed

More information

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application

More information

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface. Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local

More information

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 The modern enterprise relies on its web sites to provide information

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Cisco Prime Network Analysis Module Software 5.1 for WAAS VB

Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of

More information

Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite

Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,

More information

Monitoring Call Center Applications with Application Response

Monitoring Call Center Applications with Application Response Monitoring Call Center Applications with Application Response Use ehealth Application Response to monitor and manage the performance of call center applications, such as desktop applications used by call

More information

Avoid Three Common Pitfalls With VoIP Readiness Assessments

Avoid Three Common Pitfalls With VoIP Readiness Assessments Avoid Three Common Pitfalls With VoIP Readiness Assessments xo.com Table of Contents Abstract..................................................... 1 Overview.....................................................

More information

Enterprise. Application Performance Optimization Services Boosting your application performance by optimizing network resources

Enterprise. Application Performance Optimization Services Boosting your application performance by optimizing network resources Enterprise Application Performance Optimization Services Boosting your application performance by optimizing network resources Optimization Services (APO) Deploying and maintaining applications and communications

More information

White Paper: Validating 10G Network Performance

White Paper: Validating 10G Network Performance White Paper: Validating 10G Network Performance TABLE OF CONTENTS» Introduction» The Challenge of Testing 10G Connections» 10G Network Performance Test with Path Visibility» What Settings to Use» Measuring

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

White Paper. Optimizing Video Performance Across the Distributed Enterprise >

White Paper. Optimizing Video Performance Across the Distributed Enterprise > White Paper Optimizing Video Performance Across the Distributed Enterprise > High-Quality Videoconferencing to Any User, On Any Network, Anywhere Do more with less: that s the message echoing through corporate

More information

Using Application Response to Monitor Microsoft Outlook

Using Application Response to Monitor Microsoft Outlook Focus on Value Using Application Response to Monitor Microsoft Outlook Microsoft Outlook is one of the primary e-mail applications used today. If your business depends on reliable and prompt e-mail service,

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended

More information

Community Anchor Institution Service Level Agreement

Community Anchor Institution Service Level Agreement Community Anchor Institution Service Level Agreement Date: 3/13/2014 Version: 2.0 Prepared by: DC-Net Table of Contents 1 Service Level Agreement... 3 2 Definitions... 3 3 Service Delivery... 5 3.1 Network

More information

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications

More information

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Empirix OneSight for VoIP: Avaya Aura Communication Manager

Empirix OneSight for VoIP: Avaya Aura Communication Manager Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information