Monitoring your WAN When, What and How
|
|
- Rodney Ward
- 8 years ago
- Views:
Transcription
1 Monitoring your WAN When, What and How Even though WAN performance monitoring tools have been available for close to a decade, less than a quarter of US WAN links are monitored by enterprises either by using their own equipment or their service providers. The ratio is even lower outside of the US. Are the total benefits of monitoring links enough to outweigh the costs of deploying and monitoring the links? What are the key benefits to monitoring your WAN circuits? What should you monitor with your WAN links? This whitepaper will help you calculate the value of link monitoring, help you calculate the total cost of downtime, understand the causes of slow service or application performance and effectively manage your bandwidth. When does it make sense to monitor WAN links? So why are some WAN links monitored and other links left unmonitored? In some cases, the costs of monitoring the links do not provide sufficient benefits to justify monitoring. Many WAN technologies such as Frame Relay, PPP and ATM are mature technologies that network managers let run unchecked. For these unmonitored links, performance and availability are more or less relegated to the service provider with very little customer visibility of link performance. Many network managers feel that the problems and inefficiencies occurring with most unmonitored WAN links are usually resolved in a sufficient amount of time or are allowed to continue unchecked because deploying costly monitoring solutions do not justify the incremental gains. A second reason is that many network administrators appear to still be at a loss as to where the key benefits of monitoring their WAN circuits lie. Network managers understand that there are plenty of tools in the market that give them data about their WAN performance, but they are still uncertain as to how the data can help them with their jobs. In either case, it s a simple cost-benefit equation. In the former case, the time and expense required to deploy monitoring does not provide enough additional benefit. In the latter case, the benefits of monitoring are not clear enough to justify the costs of deploying a monitoring solution. Mission-critical links Depending on the types of applications and users utilizing a given WAN link, the criticality of the need and the degree of proactive monitoring needed varies. If a WAN link is used to provide general corporate users with access to the Internet for business web surfing, the meticulous monitoring of link performance is probably not worth the expense. Traffic from an order fulfillment user at a branch office that needs access to customer records in order to complete a point-of-sale transaction is missioncritical and warrants constant monitoring to ensure it is performing flawlessly. In essence, WAN links deemed mission critical have a significant impact to the business and should be monitored.
2 Mission-critical WAN links usually fall into the following categories: Links that are absolutely necessary to keep customers satisfied. These links are typically those that carry real-time customer transaction type data. Examples include point-of-sale customer records access, credit card transactions, VoIP calls in customer call centers and other critical customer serving applications. Links supporting real-time applications that are essential for personnel. These links typically support end-user, missioncritical internal operations. Examples include e-commerce applications, web shareware applications, real-time inventory data access, video conferencing, and other real-time operational applications. Links supporting critical business tools. These are links supporting key back-office applications, especially in data centers. Examples include data exchange tools, remote mirror site back-up exchanges, remote server software upgrades and other back-office applications. Calculating the value of link monitoring The value of monitoring a WAN link is dependent on the criticality of the traffic being carried, the current efficiency of the network and the organizational structure of the company. One way to quantify value is to apply a simple mathematical formula to estimate value components employed through link monitoring. With this method, you simply calculate and then add up all the value components derived for the chosen link to be monitored. This value is then compared against the costs to deploy the selected monitoring solution to determine if the cost of monitoring is worth the benefits derived. Value component (per Year) MTTR value Labor time savings value Efficiency improvements Tools savings value Applying the formulas in Figure 1 to generate a numerical value for the benefits is typically done in a fairly subjective way. To illustrate this, let s use an example. Assume a given link is currently being monitored with a WAN probe. Based on past experience, the network manager has observed that the real-time monitoring capability on this link yields a two-hour decrease in mean-time-to-repair (MTTR) every year when compared with a similar unmonitored link. Assuming the mission-critical link has a value of $100/min.*, the value of monitoring for improving MTTR is $12,000 per year ($100/min. x 120 min. MTTR improvement/yr.) for this value component alone. The value for monitoring this link is even greater when other value components such as saved troubleshooting labor time and other network efficiency improvements are included as a result of monitoring the link. Obviously the magnitude of MTTR improvement and per minute value of a downed link will vary substantially from link to link and company to company. But, the fundamental value element and calculation formula remains the same. Calculating total downtime costs Evaluating whether to deploy link monitoring on a link-by-link basis makes sense if a network engineer is only looking to deploy simple stop-gap solutions on selected links. Determining the total value of a distributed Mathematical formula for estimating value Link downtime (min.) x # occurrence /yr. x $ value / min. Time saved (hrs.) x $ value / hr. x occurrence/yr. x # of people ROI increase from leveraging currently installed tools $ / yr. spent buying and maintaining eliminated tool Figure 1: Mathematical formulas for quantifying the value of monitoring WAN links * Examples using US dollars. WAN monitoring system may require a different approach, as adding up all the value components of all links to be monitored becomes unwieldy. In evaluating distributed WAN monitoring systems, you may want to start with the top-level costs associated with downtime. Fluke Networks has estimated that for a typical enterprise with $100M (USD) in annual revenue, the costs of downtime can be quite significant. (See Figure 2) Notice for each source of downtime, WAN links may be a major cost. Sources of downtime will obviously vary substantially from company to company, so an individual analysis of the cost contribution for your specific enterprise should be conducted before determining whether a distributed WAN solution is right for your organization. Based on analysis of the typical enterprise, however, WAN networks may be a significant source of downtime costs. What should you monitor within your WAN links? Let s now assume that at least a few WAN links have been identified as mission-critical and worthy of monitoring. The next logical question is, what are the things that are most important to monitor? With a sea of vendors all eager to sell network visibility to IT organizations, network managers rarely complain about a shortage of tools that can provide them with network performance data. End users using 2
3 these vendor tools receive a lot of data from their devices telling them about what s going on with their network. But, most users admit they are unable to make good use of the sea of data streaming to them when trouble occurs in the network or users complain about poor application performance. Network engineers are quick to point out that most network analysis tools lack the ability to clearly, easily and rapidly generate the exact network information needed to help isolate and resolve the wide variety of challenges they face. Different vendors have different solutions that are usually good at solving different point problems. But, in most instances, network engineers don t have the time nor budget to procure, learn and maintain solutions from all the different vendors needed to provide 100% monitoring of network activities. So what are the most important WAN activities enterprise network professionals are interested in monitoring? Fluke Networks recently conducted a user survey to determine what WAN link concerns and problems are of most interest to network engineers and administrators. This international survey showed that a vast majority of end users not only had very similar basic WAN link concerns, but the priority of the concerns were fairly uniform across all geographies surveyed. Not surprisingly, network engineers seek fundamental circuit visibility to proactively manage the bandwidth performance of their WAN links, as well as troubleshoot link problems that cause slow application response and service interruptions. Hence, monitoring relevant WAN metrics that best facilitate bandwidth management and identify service interruption sources are the things to watch when managing WAN links. Figure 2: Estimated cost of downtime for a typical enterprise with $100M in revenue (Shown in USD) (Derived from The Cost of Enterprise Downtime 2004: Cost Analyzer Infonetics Research) At first glance, concerns such as bandwidth management and basic visibility may mean different things to different people. To clarify and better understand the meaning of these concerns, Fluke Networks conducted interviews with selected survey respondents. Curiously, the interview results yielded a fairly consistent and common understanding of the top six concerns listed in Figure 3. In the subsequent sections, we share our findings on these top six concerns. Bandwidth management Bandwidth management ensures bandwidth is made available to users, servers, applications and other network devices in whatever form the enterprise network manager specifies. For a minority of users, bandwidth management means the relief of traffic congestion through mechanisms such as traffic shaping/policing/enforcement or compression. For a few others, bandwidth management means prioritizing traffic types like VoIP to ensure voice calls traversing the data network meet specific quality metrics. The vast majority of respondents, however, said bandwidth management simply means the ability to monitor user and circuit bandwidth consumption so the network manager has adequate, real-time information in order to take action that ensures proper throughput and error-free operation of the WAN link. For example, the network manager needs the ability to identify the cause of bandwidth bottleneck problems so that corrective action may be taken. Most of the time, these actions do not include things such as setting or changing class of service policies, buying more bandwidth or implementing compression technology. Corrective action typically includes simple network tweaks such as shutting down a port number to an unauthorized application like KAZAA or changing the time of a regularly scheduled download of software updates to remote servers and workstations. The other main need for bandwidth management is the ability to 3
4 continuously see what s going on with the network to deliver maximum efficiency of limited bandwidth in an environment of constant change from new application deployments, new service deployments and moves, adds and changes. Network managers indicated the need to monitor vital link statistics as key functions of a monitoring solution. Metrics such as link utilization, throughput rate and errors for each individual virtual circuit over various time horizons is extremely useful in verifying performance. (See Figure 4) Monitoring link utilization is a quick way to determine if the WAN is a bottleneck. If utilization is too high, then a closer examination of WAN activity is needed to determine the root cause. If utilization is within the design boundary, then there is evidence that the WAN is performing properly. Understanding the applications that utilize the WAN link is also very important for bandwidth management. This enables visibility of true bandwidth needs, bottleneck sources and detection of unauthorized applications. This visibility is essential when making traffic engineering decisions. (See Figure 5) Slow service and application performance Slow service or application performance can be caused by a variety of sources including the application itself, servers hosting the user, servers hosting the application and network elements such as switches and routers. Network managers need basic visibility across all major sources of performance inhibitors so that efficient triage of the problem area can be performed. Key metrics to determine the source of bottlenecks within the network or server include: Connection time Amount of time it takes to establish a TCP session between the client and server before data transfer can begin Figure 3: WAN link concerns based on survey results of network managers Figure 4: Utilization monitoring is essential for bandwidth management 4
5 Server delay Amount of time it takes for the server to begin responding to a request Data transfer delay Amount of time from when the server starts responding until it finishes sending data for a request Retransmission delay Represents the additional delay in the network round trip time due to retransmissions Network round trip time Amount of time it takes for a packet to traverse the network Visibility of these metrics yields a quick understanding of the slowdown source and is essential to effective and efficient implementation of corrective solutions. With no means for monitoring performance, network managers are likely to conclude that insufficient bandwidth is the source of the problem. The enterprise then attempts to remedy this either by buying a link with more bandwidth, or a PVC with a higher CIR. In many cases, this is a waste of money, as the source of the slowdown is elsewhere in the network. (See Figure 6) Figure 5: Monitor top applications to better manage bandwidth Figure 6: Monitor response times to triage slowdown sources 5
6 Basic visibility Basic link visibility allows you to quickly look at a given circuit to verify its performance. Network managers need this at-aglance look at the WAN circuit to eliminate the WAN as a source of the problem or pinpoint an area for further examination. It is also a quick look at the top metrics that characterize the WAN link to get an instant, real-time understanding of what the link is doing. (See Figures 7 and 8) Key metrics for basic WAN circuit monitoring include: Circuit connection Verifying the type of circuit (e.g. FR, PPP, ATM, etc.), the number of virtual circuits and their endpoint routers Utilization Quick glance to determine if a bandwidth bottleneck is present. This should include a view of the total circuit utilization, as well as top bandwidth consuming hosts, applications and virtual circuits Devices A display of all devices that are using the link including routers, servers, hosts and probes Problems A problem log display showing alarms and alerts generated by traffic monitoring probes Figure 7: Quickly view all key WAN performance areas Figure 8: Better manage the link by knowing what devices are on it 6
7 Uptime / service interruptions Problem alerts are an essential part of any monitoring solution. Proactive monitoring sends you alerts based on standard failure events, as well as user configurable threshold breaches. Corrective actions won t be made unless the network manager is aware of the problem. (See Figure 9) Figure 9: Problem logs proactively alert administrators to WAN problems Service provider provisioning Despite the best efforts of installers, technicians and engineers, errors happen during service provider provisioning. Hence, it is prudent to verify the link throughput you expect is actually being delivered. SLAs exist to assure you of the basic quality of service that will be available through your WAN. But monitoring is necessary to verify SLA compliance. Your throughput can be affected when traffic is dropped because of momentary congestion in the WAN. Knowing and verifying the throughput characteristics of your PVCs over time is important for the recognition of problems that are the result of temporary loads, systemic problem or simple miss-configurations. (See Figure 10) Figure 10: Verifying committed capacity from your service provider 7
8 Physical layer problems Just as it is prudent to verify committed capacity from your service provider, it is also important to monitor physical layer problems. The ability to cross-check physical layer performance eliminates finger-pointing between the enterprise and service provider and helps to quickly isolate or rule out physical layer issues associated with the WAN. When physical layer problems occur on a mission-critical link, MTTR is paramount as the impact to users is usually severe. (See Figure 11) Conclusion Monitoring mission-critical WAN links has demonstrated proven cost-benefit value for just about any enterprise, although the exact quantitative cost-benefit value must be estimated on a company-by-company basis. In order to achieve maximum WAN link efficiency and uptime of mission-critical links, real-time, active monitoring of WAN circuits must be performed. Network managers must first monitor key performance metrics on their WAN links so that they may thoroughly understand how their links are being used before taking corrective action. A lack of monitoring capability will result in WAN networks that are not optimally designed, implemented and maintained. Figure 11: Monitor the physical layer to reduce MTTR and finger-pointing NETWORKSUPERVISION Fluke Networks P.O. Box 777, Everett, WA USA Fluke Networks operates in more than 50 countries worldwide. To find your local office contact details, go to Fluke Corporation. All rights reserved. Printed in U.S.A. 4/ A-ENG-N Rev A
SuperAgent and Siebel
SuperAgent and Siebel Executive summary Siebel Systems provides a comprehensive family of multichannel ebusiness applications services, all within a single architecture. The Siebel architecture is an n-tier
More informationImproving. Summary. gathered from. research, and. Burnout of. Whitepaper
Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level
More informationThe Financial Benefits of Using LiveAction Software for Network QoS
White Paper The Financial Benefits of Using LiveAction Software for Network QoS How implementing network quality of service management can provide quantifiable cost savings, improved profitability and
More informationBusiness case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
More informationManaging Network Bandwidth to Maximize Performance
Managing Network Bandwidth to Maximize Performance With increasing bandwidth demands, network professionals are constantly looking to optimize network resources, ensure adequate bandwidth, and deliver
More informationApplication-Centric Analysis Helps Maximize the Value of Wireshark
Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and
More informationBenefits of WAN-Level Visibility in Monitoring and Maintaining your Network
Benefits of WAN-Level Visibility in Monitoring and Maintaining your Network A WAN Analyzer offers essential insight into your WAN links, including Service Level Agreement verification, WAN frame visibility,
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationTraffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
More information6 Ways to Calculate Returns from Your Network Monitoring Investment
WHITE PAPER 6 Ways to Calculate Returns from Your Network Monitoring Investment All network management teams have two things in common: their budgets are tight and their user communities expect reliable
More informationwhitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
More informationAlcatel-Lucent VitalSuite Performance Management Software for the Enterprise
Alcatel-Lucent VitalSuite Performance Management Software for the Enterprise Monitor, measure and enhance delivery of carrier-class business services across your multi-vendor, multi-service infrastructure
More informationThe Mandate to Implement Unified Performance Management
The Mandate to Implement Unified Performance Management Ashton, Metzler & Associates Leverage Technology & Talent for Success 1. Executive Summary In most companies there is a gap between the needs of
More informationSimplify VoIP Network Setup and Troubleshooting with NetTool VoIP
Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Introduction As businesses search for new ways to cut costs and increase efficiency, they are moving their phone systems to VoIP (voice
More informationTraffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationMonitoring, Managing, Remediating
MANAGED SERVICES Packages include: Fault management Troubleshooting & escalation Proactive monitoring WAN status 800# Incident & inventory management Quarterly reviews Managed device database Online dashboard
More informationBest Practices from Deployments of Oracle Enterprise Operations Monitor
Best Practices from Deployments of Oracle Enterprise Operations Monitor September 2014 Prepared by: Zeus Kerravala Best Practices from Deployments of Oracle Enterprise Operations Monitor by Zeus Kerravala
More informationE-Guide. Sponsored By:
E-Guide Network Management Fundamentals Network management is a complex topic. In today's diverse networking infrastructure, the network has to handle more instances of unified communications, video, and
More informationProven techniques and best practices for managing infrastructure changes
Proven techniques and best practices for managing infrastructure changes When a business expands an existing facility, adds a new location, incorporates an influx of new users, or upgrades an existing
More informationPERFORMANCE MANAGER. Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business.
PERFORMANCE MANAGER Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business. The ETM Performance Manager provides unified, realtime,
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationAdvancements in field measurement of Ethernet performance
Advancements in field measurement of Ethernet performance An Ethernet service provider needs to demonstrate to his customer that the service he is providing is compliant with the service level agreement.
More informationEmpowering the Enterprise Through Unified Communications & Managed Services Solutions
Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can
More informationNetwork Application Performance Alignment to IT Best Practices
Network Application Performance Alignment to IT Best Practices This white paper briefly describes best practices, highlights IT best practices and discusses in detail; IT business service management, the
More informationPROACTIVE PERFORMANCE MANAGEMENT
51-11-99 DATA COMMUNICATIONS MANAGEMENT PROACTIVE PERFORMANCE MANAGEMENT Tim Clark INSIDE The Current State of Performance Management; Proactive Performance Management; Developing a Baseline; Online Utilization
More informationMITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
More informationDatasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923)
Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923) Key Features: The everything software bundle for application aware network monitoring for remote sites
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationVoice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationCisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
More informationApplication Performance Management
Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for
More informationDriving Service Delivery with SLA Performance Management
Driving Service Delivery with SLA Performance Management Providers #1 competitive advantage Service providers more and more depend on Ethernet services as the networks are evolving from traditional voice
More informationWhite Paper: Application and network performance alignment to IT best practices
Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business
More informationSelecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events
Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Often, the only way to get to the root cause of unwelcome or intermittent events that occur on
More informationEnabling a Converged World. Are Duplicate Packets Interfering with Network Monitoring?
Enabling a Converged World Are Duplicate Packets Interfering with Network Monitoring? 915-6510-01 Rev A December 2011 Contents Overview...3 Duplicate Packets Diminish Monitoring Port Bandwidth...4 Duplicate
More informationGetting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
More informationBenchmarking VoIP Performance Management
Benchmarking VoIP Performance Management March 2008 Page 2 Executive Summary Aberdeen surveyed 159 organizations to identify best practices for managing Voice over Internet Protocol (VoIP). This report
More informationThe Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
More informationMonitoring Application Response Time Components and analysis of various approaches
Monitoring Application Response Time Components and analysis of various approaches Explores the components and analysis of application response time; describes new approaches that can simplify the analysis
More informationHow To: Diagnose Poor VoIP Calls through diagnostics.
How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing
More informationITSM Process Description
ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management
More informationCisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
More informationCIR (down/up) 256k/64k 320k/96k 384k/128k. Throughput allowance 2 GB 4 GB 6 GB. (down/up) in unexpectedly high fees.
Broadband Satellite: Enterprise Class or Cookie Cutter? There are a wide range of broadband satellite services available from a wide variety of network operators. What are the differences between them?
More informationWhite Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.
White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally
More informationE-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
More informationManaging Application Delivery from the User s Perspective
Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,
More informationTen top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
More informationConfiguring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
More informationMonitoring Web Applications with Application Response
Monitoring Web Applications with Application Response For time-critical Web-based applications, even a short-term performance problem can cause lost revenue when customers cannot place orders or they become
More informationNetwork Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
More informationTHE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating
More informationUNDERSTANDING BUSINESS ETHERNET SERVICES
UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more
More informationOneSight Voice Quality Assurance
OneSight Voice Quality Assurance Benefits Proactively determine voice quality issues as well as other service impacting issues before users complain Comprehensively monitor communications systems with
More informationTroubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
More informationService Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
More informationGMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
More informationUNDERSTANDING BUSINESS ETHERNET SERVICES
EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their
More informationNetFlow Tips and Tricks
NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More information2013 WAN Management Spectrum. October 2013
2013 WAN Management Spectrum October 2013 Market Context... 2 Executive Summary... 3 By the Numbers... 5 Research Background... 6 WAN Management... 8 Business Impact... 9 Submarkets... 10 Deployment...
More informationThe Untapped Treasure
WHITE PAPER Application Aware The Untapped Treasure Mining Value Out of Current Network and Application Assets Introduction: Gaining Visibility into the Network It s one of the heaviest holiday shopping
More informationWhite Paper: Troubleshooting Remote Site Networks Best Practices
White Paper: Troubleshooting Remote Site Networks Best Practices Management and remote site employees expect the same level of network service as the headquarters site. However, when IT staff are faced
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More informationObserver Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
More informationWHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
More informationCloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
More informationNetwork Application Integrity and Efficiency - An Example
Building an ROI: Application and Network Performance Management Believing there are benefits to improved network and application performance is not enough for most organizations. The ability to quantify
More informationCISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS
CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview
More informationWhat IT gains from managing the end-user experience
WHITE PAPER What IT gains from managing the end-user experience Adapted from The Defi nitive Guide to Business Service Management, written by Greg Shields, published by Realtime Publishers PROBLEM IDENTIFICATION
More informationBrocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency
WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,
More informationApplication Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
More information--- Who s watching over your network to insure that it is operating efficiently? ---
Did You Know...? Starnet offers numerous ITrelated services in support of many of today s complex IT operational issues. --- Who s watching over your network to insure that it is operating efficiently?
More informationAre Duplicate Packets Interfering with Network Monitoring? White Paper
Are Duplicate Packets Interfering with Network Monitoring? White Paper A network monitoring switch allows IT teams to simultaneously connect a wide array of monitoring tools. The best-in-class network
More informationBest Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More informationQuality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:
Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed
More informationQuality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application
More informationJuly, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
More informationManaging User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006
Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 The modern enterprise relies on its web sites to provide information
More informationObserver Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
More informationCisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
More informationAchieving Service Quality and Availability Using Cisco Unified Communications Management Suite
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,
More informationMonitoring Call Center Applications with Application Response
Monitoring Call Center Applications with Application Response Use ehealth Application Response to monitor and manage the performance of call center applications, such as desktop applications used by call
More informationAvoid Three Common Pitfalls With VoIP Readiness Assessments
Avoid Three Common Pitfalls With VoIP Readiness Assessments xo.com Table of Contents Abstract..................................................... 1 Overview.....................................................
More informationEnterprise. Application Performance Optimization Services Boosting your application performance by optimizing network resources
Enterprise Application Performance Optimization Services Boosting your application performance by optimizing network resources Optimization Services (APO) Deploying and maintaining applications and communications
More informationWhite Paper: Validating 10G Network Performance
White Paper: Validating 10G Network Performance TABLE OF CONTENTS» Introduction» The Challenge of Testing 10G Connections» 10G Network Performance Test with Path Visibility» What Settings to Use» Measuring
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationWhite Paper. Optimizing Video Performance Across the Distributed Enterprise >
White Paper Optimizing Video Performance Across the Distributed Enterprise > High-Quality Videoconferencing to Any User, On Any Network, Anywhere Do more with less: that s the message echoing through corporate
More informationUsing Application Response to Monitor Microsoft Outlook
Focus on Value Using Application Response to Monitor Microsoft Outlook Microsoft Outlook is one of the primary e-mail applications used today. If your business depends on reliable and prompt e-mail service,
More informationNetwork Instruments white paper
Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended
More informationCommunity Anchor Institution Service Level Agreement
Community Anchor Institution Service Level Agreement Date: 3/13/2014 Version: 2.0 Prepared by: DC-Net Table of Contents 1 Service Level Agreement... 3 2 Definitions... 3 3 Service Delivery... 5 3.1 Network
More informationRouting & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
More informationWireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationEmpirix OneSight for VoIP: Avaya Aura Communication Manager
Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment
More informationAutomated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
More information