WHITEPAPER Best Practices for Monitoring Business Transactions:
|
|
|
- Lorin Banks
- 10 years ago
- Views:
Transcription
1 WHITEPAPER Best Practices for Monitoring Business Transactions: Business transaction monitoring has never been more critical to operational efficiency, yet there remains much confusion over methodology. The implementation choices consist of different deployment strategies (client-site or server-site, agent, or appliance) and distinct monitoring technologies (active or passive). The different options have their individual strengths and weaknesses. This article discusses industry best practices for effectively monitoring business transactions in a global environment.
2 Best Practices for Monitoring Business Transactions Business transaction monitoring has never been more critical to operational efficiency, yet there remains much marketing confusion over methodology. The implementation choices consist of different deployment strategies (clientsite or server-site, agent or appliance) and distinct monitoring technologies (active or passive). The different options have their individual strengths and weaknesses. This article discusses industry best practices for effectively monitoring business transactions in a global environment. Deployment Strategies One of the most important decisions is the deployment strategy for the business monitoring solution. Should monitors be deployed at the client sites or should they be deployed at the data centers? Should software agents or hardware appliances be used? While this may seem like a minor matter, it has serious ramifications from an immediate headache and recurring cost standpoint. Client-site Approaches Client-site approaches require that software be installed on clients desktops or hardware be installed at the clients sites. For large enterprises, this approach may prove to be a deployment and management headache that requires cooperation among multiple management fiefdoms. The individual who manages the network is often different from the individuals who manage the desktops at the various sites. Indeed, deploying either software or hardware at client sites might not be possible and is rarely easy. It can also be quite painful to maintain large numbers of remote monitors, keeping them continuously running and up-to-date. From a technical standpoint, client-site approaches have some important weaknesses. First, they usually have a very limited view of the client-application-network environment. Because of cost, maintenance, and load issues, they are typically deployed in limited quantities across the network. They therefore only get sample, hopefully representative, measurements of the overall environment. Client-site software agents are particularly ineffective in that a single computer at a site might be selected to represent behavior for the entire site or even multiple sites. Client-site hardware appliances (using passive monitoring technology) might be placed at the access router to measure performance for all clients at that site. Client-site approaches may unduly stress the network or servers. The network might be stressed as remote monitors upload their performance statistics to a centralized data store. It is wise to ask the vendor for bandwidth usage metrics per monitor as a function of number of transactions and then perform the measurements yourself to verify. If active monitoring technology is used, additional traffic is inserted from the synthetic transactions; this may unduly load the network links or the servers themselves. Unacceptable network or server stress is another reason that the number of client-site monitors is often reduced to a representative sample, resulting in a limited view of the environment. Pg. 2 Copyright 2006, NetQoS Inc
3 Because of their location, client-site approaches have difficulty separating the server delay from the network delay. A common technique is to measure the network delay based on the initial TCP connection setup time and then assume that the network delay is constant throughout the session. This approach can be grossly inaccurate, particularly when persistent sessions (now common with web) or long sessions (common with telnet, FTP, and so on) are involved. It also completely ignores the effect of serialization delay because the connection setup involves the smallest sized packets. It also ignores self-induced queuing delay. Some augment their network delays by periodically actively sending ping (ICMP) packets but this approach suffers from similar drawbacks. Server-site Approaches Server-site approaches allow monitors to be placed at the datacenters rather than at the clients sites. This reduces the number of monitors, greatly easing deployment and management issues. Not only are there fewer systems to manage, but datacenters will have people more experienced in their maintenance. Special care must be taken if the approach requires that software be installed on the actual production servers. Systems managers are rightfully nervous of potential software conflicts, and some have had negative experiences with the monitoring software crashing their systems. They do not deem such as a career-enhancing event. Usually the easiest solution, and certainly the one with least risk, is one that allows a hardware appliance to be placed near the servers off of a tap or span port rather than one that requires that software be installed on the servers themselves. Server-site passive approaches provide a wonderful vantage point. Server-site monitors can see all users interacting with all servers at the datacenter, on a 7x24 basis, because that is where they are located. Server-site active approaches have a horrible vantage point if network information is important (and it generally is) they only see the datacenter LAN. Server-site monitors place much less stress on the network and servers. The performance statistics are uploaded over well-provisioned links because the (passive or active) monitors are already located at the datacenters. Likewise, the additional traffic from active monitors synthetic transactions occurs over higher-capacity links, and the stress to servers is generally much lower because fewer monitors are needed (as compared to client-site deployment). Because of their location, server-site approaches have no difficulty separating the server delay from the network delay. However, they will have trouble identifying client processing time from client silence. That is, they will not know whether the client CPU is busy or if the client is simply drinking coffee and chatting. Deployment Summary The preferred deployment strategy uses the server-site approach. It greatly reduces deployment and maintenance headaches, places minimal stress on the network, and can provide a virtually unlimited view of the environment. To reduce risk, deploy a hardware appliance to avoid installing software on the production servers. If you deploy client-site monitors, you can reduce their numbers by also deploying a server-site monitor. Pg. 3 Copyright 2006, NetQoS Inc
4 Monitoring Technologies Another important and frequently contentious decision for selecting a business transaction monitoring solution is whether to use active or passive technology. An active monitor emulates a client by periodically generating synthetic transactions according to some user-defined script. In contrast, a passive monitor measures the transactions of real clients in all their variability. Which is better? Well, it all depends on what you want to measure. Active Monitors Active monitoring approaches generate synthetic transactions. They use a form of robot to periodically perform one or more defined business transactions. The robots follow a script, a sequence of timed commands, in their interactions with the server. They are often installed on dedicated systems to minimize the number of system variables between script runs. By always running the exact same transaction in the same manner on the same platform with no other application competing for resources, active monitors provide a deterministic baseline that reflects variations in server and network performance. The client variability has been effectively removed. The advantages of an active monitor are that you know what it is doing, and you know when it should be doing it. You know that any significant deviations in performance measurements are likely due to changes in network or server behavior. You have controlled 7x24 activity, which is useful for availability monitoring. The disadvantages to active monitoring are that you do not know what the real users are experiencing, and the monitors can significantly degrade the real user performance. Addressing the second point first, active monitors place additional load on the network and the servers. Without careful planning, active monitors have been known to congest network links and bring servers to their knees an avoidable but all too common situation. While active monitors are useful for availability monitoring, load concerns usually limit their effectiveness. They are typically programmed to perform their transactions only every 15 minutes or so to prevent stressing the environment. This means, on average, they detect a failure after 7.5 minutes have passed much better than never, but the helpdesk phone has probably already been ringing if it happens during normal business hours. The primary disadvantage to active monitors is that they do not capture the real user experience. The script they follow might bear little resemblance to how actual clients are using the application; it is simply a model of a possible transaction. This is useful for monitoring changes in performance of the scripted transaction, but it does not necessarily relate to the real user. Pg. 4 Copyright 2006, NetQoS Inc
5 Even if a user were to perform the same transaction with the same programmed timing as the active monitor, the performance of the real user might differ significantly from the active monitor because of differences in underlying software. For example, some commercial active monitors do not use a web browser when sending commands to the Web server; instead, they use an API to send requests serially within a single session. The real user will be using Internet Explorer or Firefox or the like, and will send requests simultaneously in multiple parallel sessions. The time it takes for a typical Web page to download will thus differ significantly for the real user and the active monitor even though the Web page is the same. Differences in hardware, operating systems, drivers, and other software can impact experienced performance. The performance reported by active agents might also differ substantially from real users due to caching or other acceleration techniques. By periodically repeating identical requests, active monitors might experience a significant performance boost from caching technologies on the servers, on network devices, or on the client itself. While caching on the client might be disabled, caching on the servers or other network devices cannot be disabled without harming the real users. One approach that eliminates this caching benefit is to program the active monitor to send random queries, but this also destroys their deterministic advantage you no longer know what is being measured. Passive Monitors Passive monitoring approaches measure real user traffic and behavior. They accommodate variations in user behavior, systems, Web browsers, and networks they do not assume that a single model is representative. They can provide an unlimited view of performance in terms of different transactions, different network segments, different servers and different application tiers. Passive monitors can either report on individual transactions (verb monitors) or on an aggregation (generic monitors). Verb monitors provide individual performance statistics for each configured verb, where a verb can be a URL for web applications, a specific query for database applications, or a document download for FTP applications. This approach provides the most granular performance detail at a cost of scalability and ease-of-use (because each verb must be configured). If many verbs are configured, important patterns might be hidden by the noise the trees might obscure the nature of the forest. Generic application monitors typically summarize the performance results for the different observed verbs. This approach reduces configuration requirements and improves scalability at a cost of reduced granularity. For example the performance of all FTP document downloads from a particular server within a specific size range (such as between 23 and 46 KBs) might be presented as a single average metric using the generic approach, whereas an FTP-specific monitor might require that you configure each document that you wish to monitor to be able to report their individual performance statistics. Pg. 5 Copyright 2006, NetQoS Inc
6 The preferred passive monitoring solution combines the ease-of-use and scalability of generic monitoring with the flexibility and detail of verb (transaction) monitoring. That is, it provides out-of-the-box generic monitoring but also supports user configuration of custom verbs (transactions). Support for custom transaction configuration in passive monitors is less flexible than that in active monitors. There are two main disadvantages to passive monitors. One is that they might not provide the flexibility to define a desired custom business transaction the applications and transactions that they monitor might be limited. Another disadvantage is also their strength: their measurements include the variability inherent in real user behavior. Technology Summary Active monitors eliminate uncertainty about what is measured and provide a check for loss of service. They provide a very limited view of performance, limited by number of transactions, locations, and environments. They can receive an artificial performance boost from caching, and they do not capture the real user experience. Passive monitors capture the real user behavior and provide a potentially unlimited view of application, network, and server performance. They lack the determinism and control intrinsic to active monitors. They might be limited in their support of custom-defined transactions. Best Practices The preferred deployment strategy uses passive server-site monitoring in the form of an appliance. The server-site approach greatly reduces deployment and maintenance headaches, places minimal stress on the network, and can provide a virtually unlimited view of the environment. Use of an appliance reduces risk by avoiding the need to install software on production servers. The optimal technology approach combines both passive and active monitors. The passive server-site monitor effectively captures the real user behavior and provides a potentially unlimited view of application, network, and server performance. There is no need to deploy active monitors across the network the passive server-site monitor will report any network performance problem, including loss of network availability. Therefore only a single active monitor placed at the datacenter is necessary to provide a deterministic baseline of custom configured transactions. Pg. 6 Copyright 2006, NetQoS Inc
7 About the Author Dr. Cathy Fulton Co-Founder, Executive Vice President and Chief Technology Officer of NetQoS Dr. Cathy Fulton is a highly recognized and credentialed network performance expert. Dr. Fulton has earned many outstanding distinctions over the years, such as National Science Foundation Fellow, National Defense Science and Engineering Fellow, Navy Achievement Medal recipient, National Defense Service Medal recipient and Navy Master Training Specialist. In addition to these distinctions, Dr. Fulton is a member of the board of NetQoS, Inc. and is an active member of both IEEE (Institute of Electrical and Electronics Engineers) and ACM (Association for Computing Machinery). Dr. Fulton is widely published in networking journals such as the IEEE/ACM Transactions on Networking and IEEE Journal of Selected Areas in Communications. She is also sought after to present her research and work for international conferences and events such as Interop, IEEE Infocom, the ATM Forum Traffic Management Group, and the Computer Measurement Group. Prior to co-founding NetQoS, Dr. Fulton was employed as a Vice President for Smaqcom, a network consulting firm and as a Research Scientist and Project Leader for Schlumberger. Dr. Fulton has provided consulting to major firms such as Cisco, Schlumberger, and Samsung, and has taught nuclear physics at the U.S. Navy s Nuclear Power School. Since January 1999, she has been developing the NetQoS proprietary system for network performance management. Dr. Fulton received her Ph.D. in Electrical and Computer Engineering from the University of Texas, specializing in performance analysis of multimedia networks. She also holds a B.S. in Physics from Texas A&M University. Pg. 7 Copyright 2006, NetQoS Inc
8 About NetQoS NetQoS is the fastest growing network performance management products and services provider. NetQoS has enabled hundreds of the world s largest organizations to take a Performance First approach to network management the new vanguard in ensuring optimal application delivery across the WAN. By focusing on the performance of key applications running over the network and identifying where there is opportunity for improvement, IT organizations can make more informed infrastructure investments and resolve problems that impact the business. Today, NetQoS is the only vendor that can provide global visibility for the world s largest enterprises into all key metrics necessary to take a Performance First management approach. More information is available at NetQoS, Inc. e. [email protected] p t f NetQoS, Inc. All rights reserved. NetQoS, the NetQoS logo, SuperAgent, and NetVoyant are registered trademarks of NetQoS, Inc. ReporterAnalyzer and Allocate are trademarks of NetQoS, Inc. Other brands, product names and trademarks are property of their respective owners. WP rev Pg. 8 Copyright 2006, NetQoS Inc
Best Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
Network Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
Network Management. 8.1 Centralized Monitoring, Reporting, and Troubleshooting. 8.1.1 Monitoring Challenges and Solutions CHAPTER
CHAPTER 8 The Cisco WAN and application optimization solution provides a powerful set of WAN optimization features. To translate these features into verifiable user benefits, effective network management
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
How Network Transparency Affects Application Acceleration Deployment
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Traffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services
White Paper Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services What You Will Learn IT departments are increasingly relying on best-in-class
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
NetQoS Delivers Distributed Network
Behind the Scenes with MySQL NetQoS Delivers Distributed Network Management Solution with Embedded MySQL NetQoS delivers products and services that enable some of the world s most demanding enterprises
Web Load Stress Testing
Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
MIMIC Simulator helps testing of Business Service Management Products
Technical white paper from FireScope and Gambit Communications MIMIC Simulator helps testing of Business Service Management Products By Ryan Counts, FireScope, Inc. & Pankaj Shah, Gambit Communications
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Traffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management
Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Executive Summary Organizations
PRODUCTS & TECHNOLOGY
PRODUCTS & TECHNOLOGY DATA CENTER CLASS WAN OPTIMIZATION Today s major IT initiatives all have one thing in common: they require a well performing Wide Area Network (WAN). However, many enterprise WANs
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
Business case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Application Performance Management
Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Managing Dynamic Configuration
White Paper Immediate Network Synchronization with Low Overhead: Cisco Prime Network Reduced Polling VNE Cisco Prime Network's near real-time model relies on accurate information about the managed network
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals
NetQoS Offers An Experience Monitoring Solution For Global Performance Management The Forrester Wave Vendor Summary, Q2 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D., and Reedwan Iqbal EXECUTIVE
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Real vs. Synthetic Web Performance Measurements, a Comparative Study
Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com [email protected]
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Simac ICT Netherlands ::
Industry: Managed service provider CASE STUDY Simac ICT Netherlands :: Providing a Differentiated Service Offering with the NetQoS Performance Center Within two weeks of deployment, SuperAgent helped us
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
A FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Linking 2 Sites Together Using VPN How To
ewon Application User Guide AUG 015 / Rev 1.0 You Select, We Connect Linking 2 Sites Together Using VPN How To Content The purpose of this document is to explain you how to connect 2 remote equipments
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider.
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Is Your School Network Ready? Network readiness is an important factor in any new
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Lab Testing Summary Report
Key findings and conclusions: Cisco WAAS exhibited no signs of system instability or blocking of traffic under heavy traffic load Lab Testing Summary Report September 2009 Report 090815B Product Category:
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Lab Testing Summary Report
Lab Testing Summary Report May 2007 Report 070529 Product Category: Network Acceleration Vendor Tested: Cisco Systems Product Tested: Cisco Wide Area Application Services (WAAS) v4.0.7 Key findings and
LotWan Appliance User Guide USER GUIDE
LotWan Appliance User Guide USER GUIDE Copyright Information Copyright 2014, Beijing AppEx Networks Corporation The description, illustrations, pictures, methods and other information contain in this document
WEB SERVER MONITORING SORIN POPA
WEB SERVER MONITORING SORIN POPA Keywords: monitoring systems, web server, monitoring process Sorin POPA, Associate Professor, PhD. University of Craiova Abstract. This paper introduces web-server monitoring,
Cisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
WhatsUp Event Alarm v10x Quick Setup Guide
WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]
[ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.
technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
How To Test A Web Server
Performance and Load Testing Part 1 Performance & Load Testing Basics Performance & Load Testing Basics Introduction to Performance Testing Difference between Performance, Load and Stress Testing Why Performance
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations
Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
SolarWinds. Packet Analysis Sensor Deployment Guide
SolarWinds Packet Analysis Sensor Deployment Guide Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
Monitoring Application Response Time Components and analysis of various approaches
Monitoring Application Response Time Components and analysis of various approaches Explores the components and analysis of application response time; describes new approaches that can simplify the analysis
Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP
Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Introduction As businesses search for new ways to cut costs and increase efficiency, they are moving their phone systems to VoIP (voice
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
Understanding the Impact of Running WAN Emulation with Load Testing
Understanding the Impact of Running WAN Emulation with Load Testing A Shunra Software White Paper July 2, 2008 Introduction Investment in pre-deployment performance testing has become a widely adopted
Troubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and
By the Citrix Publications Department. Citrix Systems, Inc.
Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
White Paper. Intrusion Detection Deploying the Shomiti Century Tap
White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Monitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER
CHAPTER 5 Monitoring WAAS Using Cisco Network Analysis Module This chapter describes Cisco Network Analysis Module (NAM), which you can use to monitor your WAAS devices. This chapter contains the following
Virtual Contact Center
Virtual Contact Center Zendesk Integration Configuration Guide Version 7.1 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents
2. Are explicit proxy connections also affected by the ARM config?
Achieving rapid success with WCCP and Web Security Gateway October 2011 Webinar Q/A 1. What if you are already using WCCP for Cisco waas on the same routers that you need to use WCCP for websense? Using
