network monitoring and management_hb_final
TRANSCRIPT
-
8/11/2019 Network Monitoring and Management_hb_final
1/12
TechGuide
1EDITORS NOTE
2ENTERPRISE
WAN STRATEGY
3APPLICATION
PERFORMANCE
4NETWORK
VIRTUALIZATION
VIRTUALIZ
ATION
CLOUD
APPLICATI
ONDEVELOPMENT
HEALTHIT
NETWORKING
STORAGEARCHITECTURE
DATACENT
ERMANAGEMENT
BI/APPLICATIONS
DISASTER
RECOVERY/COMPLIANCE
SECURITY
Network Monitoringand ManagementThis TechGuide explores the driving trends of advanced WAN management
and monitoring tools growth, the impact of virtualization and understanding
how the new generation of WAN management and monitoring tools can helpyou achieve optimum performance.
-
8/11/2019 Network Monitoring and Management_hb_final
2/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
2 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
1EDITORS NOTE A New Generation of Managementand Monitoring Tools Emerge
Ten years ago, network management and
network monitoring were two sides of the same
coin. Both operations were critically important,
but because each one was based on separate
and often proprietary tools, getting a central-
ized view of both processes wasnt easy.Today, network managers know they must
have a comprehensive converged management
and monitoring toolset to provide the real-time
performance data they need.
That requirement has been driven by several
trends, among them the need to monitor net-
work devices and boundary performance, the
and ensure WAN service-level agreement com-
pliance. Application performance monitoring
(APM), meanwhile, has evolved into a thriving
mission-critical business segment of its own.
A full-featured APM product should not only
register where performance is suffering, but
pinpoint where a problem may lie.
Yet even as identifying network performance
issues becomes more critical, the expansion
of virtualizationfrom servers to network
devicesthreatens to make the task more
challenging
As a result, its critical for network admin-
istrators to deploy monitoring and perfor-mance tools that can track both physical host
resources and virtualized network infrastruc-
ture assets, especially as application-aware and
software-defined networking deployments gain
traction.
There is a lot to like and a lot to know about
the new generation of WAN management and
monitoring tools. This TechGuide helps you
understand how these tools have evolved and
gives network managers insight into how they
can ensure optimum performance at their orga-
nization. n
Chuck Moozakis
Site Editor, Networking Media Group
-
8/11/2019 Network Monitoring and Management_hb_final
3/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
3 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
2ENTERPRISEWAN STRATEGY The Enterprise WAN NetworkMonitoring Strategy Evolution
The discrepancy between network moni-
toring and management has blurred now that
technology, service and labor changes have
taken place in the enterprise. This change re-
quires an update to your WAN network moni-
toring strategy.
HOW A WAN NETWORK MONITORING
STRATEGY HAS CHANGED
Network connections are the fabric that de-
livers IT services and supports collaborative
relationships in the enterprise, and any failure
in the network is likely to cut users off from
critical applications and destroy team produc-
tivity. From the onset of enterprise networking,
a critical requirement for network operations
managers and planners has been to monitor
network behavior to detect trends that could
compromise performance and to respond
to problems proactively. This requirement
remains real today, but the way it is addressed
is evolving under the pressure of technology,
service and even labor changes.
One reflection of the evolution of monitor-
ing is its collision with network management.
A WAN network monitoringstrategy has al-ways required the analysis of traffic in real
time, but most management systems support
at least some form of real-time traffic analy-
sis too; so the distinction between monitoring
and management may become more cloudy. As
network management systems improve, in fact,
monitoring has tended to focus on areas where
general statistical information about network
performance may not be enough.
WHAT SHOULD YOUR WAN NETWORK
MONITORING STRATEGY ACCOMPLISH?
Most enterprises link WAN network monitor-
ing with one or more of three specific missions:
http://searchenterprisewan.techtarget.com/feature/WAN-monitoring-Should-you-outsourcehttp://searchenterprisewan.techtarget.com/feature/WAN-monitoring-Should-you-outsource -
8/11/2019 Network Monitoring and Management_hb_final
4/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
4 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
2ENTERPRISEWAN STRATEGY nApplication monitoring:Monitoring at theapplication level to measure the service qual-
ity actually delivered to the application. Thisis growing out of a need by network and IT
management to provide specific performance
guarantees to line departments they serve.
nNetwork device monitoring:Monitoring at
the device level to determine the health of
network components and the extent to which
their performance matches capacity plansand intra-enterprise service-level agreements
(SLAs). This is the primary focus of network
monitoring for enterprises with large net-
work investments.
nBoundary monitoring:Monitoring at the
trunk/connection level to detect faults, man-
age SLA commitments by WAN service pro-
viders/vendors, and troubleshoot in the case
of failures. This boundary monitoring is
on the rise as enterprises adopt increasingly
complex IP and Ethernet services whose SLA
terms are more complicated to verify.
WHAT FORM SHOULD YOUR WAN
NETWORK MONITORING TOOL TAKE?
For each of these WAN monitoring strategies,
there are two high-level options:
n
A deviceor interfaces management informa-tion base (MIB) can be monitored.
Or
n A probecan be used to gather specific infor-
mation at a lower level, perhaps even inde-
pendent of the devices involved.
Network management tended to be based on
Simple Network Management Protocoland on
Boundary monitoring is on the rise as enterprises adoptincreasingly complex IP and Ethernet services whose SLAterms are more complicated to verify.
http://searchitchannel.techtarget.com/definition/service-level-agreementhttp://searchcio-midmarket.techtarget.com/definition/management-information-basehttp://searchcio-midmarket.techtarget.com/definition/Simple-Network-Management-Protocolhttp://searchcio-midmarket.techtarget.com/definition/Simple-Network-Management-Protocolhttp://searchcio-midmarket.techtarget.com/definition/management-information-basehttp://searchitchannel.techtarget.com/definition/service-level-agreement -
8/11/2019 Network Monitoring and Management_hb_final
5/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
5 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
2ENTERPRISEWAN STRATEGY MIBs ten years ago, while network monitoringtended to be based on proprietary probes and a
separate set of central tools to analyze the data.The desire to centralize all network man-
agement/monitoring tools into a single cohe-
sive application set has converged monitoring
and management at the network operations
level. As enterprises have moved to deploy
management strategies, theyve adopted a
strategy of using a high-level console to display
network health overall, with the ability to drilldown to isolate specific problems. HPs Open-
View platformis an example of a management
console that can integrate both high-level man-
agement and lower-level monitoring tools.
Tom Nolle
https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-10%5e36657_4000_100https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-10%5e36657_4000_100https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-10%5e36657_4000_100https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-10%5e36657_4000_100 -
8/11/2019 Network Monitoring and Management_hb_final
6/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
6 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
3APPLICATIONPERFORMANCE Evaluating Your Application PerformanceMonitoring and Management Options
Ultimately, the work of IT is about pro-
viding services to users, and the primary ser-
vicesfrom a users perspectiveare storage
and applications. Users notice only a few things
about applications, most of which boil down to
two questions:
1. Does the application do what I want well?
2. Does the application do what I want
quickly?
So, delivering applications with good perfor-
manceis a key indicator of ITs performance.
Thus, IT has great interest in application de-
livery optimization and in application perfor-
mance monitoring and management(APM).
WHAT APM DOES
APM approaches application performance
managementfrom several perspectives:
nServer:How does an application perform
with respect to its use of compute, memory
and storage resources? Does it use them
in ways that waste no more than is accept-
able and deliver acceptable response time?
nNetwork:How do traffic flows between
the user and application front tier act
on the network? How do flows between
application tiers and application compo-
nents behave?
nDesktop:How does the application desktop
client perform?
The goal, of course, is to be able to say how
well applications are performing, and if they
are not performing well, where the problem
lies. Your application performance monitor-
ing and management solution should be able
to pinpoint whether the problem lies:
http://searchenterprisewan.techtarget.com/news/2240022564/WAN-management-Look-at-application-performance-management-not-uptimehttp://searchenterprisewan.techtarget.com/news/2240022564/WAN-management-Look-at-application-performance-management-not-uptimehttp://searchenterprisewan.techtarget.com/tip/Networked-application-performance-management-Where-to-starthttp://searchenterprisewan.techtarget.com/tip/Networked-application-performance-management-Where-to-starthttp://searchenterprisewan.techtarget.com/tip/Application-performance-managementhttp://searchenterprisewan.techtarget.com/tip/Application-performance-managementhttp://searchnetworking.techtarget.com/opinion/Dirty-jobs-Application-monitoring-tools-for-network-administratorshttp://searchnetworking.techtarget.com/opinion/Dirty-jobs-Application-monitoring-tools-for-network-administratorshttp://searchenterprisewan.techtarget.com/tip/Application-performance-managementhttp://searchenterprisewan.techtarget.com/tip/Application-performance-managementhttp://searchenterprisewan.techtarget.com/tip/Networked-application-performance-management-Where-to-starthttp://searchenterprisewan.techtarget.com/tip/Networked-application-performance-management-Where-to-starthttp://searchenterprisewan.techtarget.com/news/2240022564/WAN-management-Look-at-application-performance-management-not-uptimehttp://searchenterprisewan.techtarget.com/news/2240022564/WAN-management-Look-at-application-performance-management-not-uptime -
8/11/2019 Network Monitoring and Management_hb_final
7/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
7 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
3APPLICATIONPERFORMANCE n in the architecture and provisioning of theapplication;n
in the network between users and apps; orn on the client side.
Having figured out where a problem lies can
be critical to taking successful corrective action
and to not wasting resources fixing the wrong
things.
CHOOSING AN APM PRODUCT
One of the key decisions to make is whether
to run application performance monitoring
with or without agents. An application per-
formance monitoring product with agents
involves software on servers and clients or
specialized hardware in the network, whereas
agentless APM does not use management
agents on systems or the network. Agentless
monitoring can be passive (examining net-
work packets for information about what
applications are doing) or active (using stan-
dard data access protocols such as SimpleNetwork Management Protocol and Windows
Management Instrumentationto poll servers
and switches and routers for information).
Using an agent can get the most information,
but also entails installation of the agents,
complicating configuration management and
subsequent software lifecycle management for
the agents, which can introduce additionalcost and effort. Going agentless limits you to
the data available via standard management
interfaces.
WHERE TO LOOK IN YOUR APM
However you approach APM, it is increasingly
important to look at the entire range of behav-
ior, from server and network hardware all the
way up to application protocols and specific
Having figured out where a problem lies can be criticalto taking successful corrective action and to not wastingresources fixing the wrong things.
http://searchenterprisewan.techtarget.com/news/2240022665/WAN-application-performance-management-Automate-or-controlhttp://searchenterprisewan.techtarget.com/news/2240022665/WAN-application-performance-management-Automate-or-controlhttp://technet.microsoft.com/en-us/library/ee692772.aspxhttp://technet.microsoft.com/en-us/library/ee692772.aspxhttp://technet.microsoft.com/en-us/library/ee692772.aspxhttp://technet.microsoft.com/en-us/library/ee692772.aspxhttp://searchenterprisewan.techtarget.com/news/2240022665/WAN-application-performance-management-Automate-or-controlhttp://searchenterprisewan.techtarget.com/news/2240022665/WAN-application-performance-management-Automate-or-control -
8/11/2019 Network Monitoring and Management_hb_final
8/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
8 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
3APPLICATIONPERFORMANCE application operations (i.e., how specific com-mands and transactions perform and how cli-
ent and server communicate).Application performance problems can arise
at any layer. A network card or router interface
card may be malfunctioning, or two devices
connected to one another may not be com-
municating properly due to misconfigurations.
Problems not rooted in the network can result
from poor application architecture or coding.
Understand that it can be very difficult todirect corrective action toward those causes
without being able to rule out the network. It
may be necessary in some environments to run
specialized code to track the performance of
individual applications running on the serverand even of modules or routines within the
applicationsto understand application per-
formance problems.
Ultimately, ensuring application delivery re-
quires APM at some level, either to determine
a baseline of good performance when things
are working well, for future comparisonor
to identify the causes of problems, direct theirsolution, and verify their having been resolved.
John Burke
-
8/11/2019 Network Monitoring and Management_hb_final
9/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
9 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
4NETWORKVIRTUALIZATION Maximizing Network VirtualizationEfforts in the Enterprise
Nearly 60% of organizations have noted a
slowdown in their virtualization initiatives,
according to a recent Nemertes Research study.
The complexity of systemsspecifically the
complexity of network configurationsis often
cited as a key barrier to the continued adoption
of virtual networks. The ability for enterprises
to configure virtual networks and to fully de-
fine these configurations in software is the
key to boosting virtualized network adoption
again. As your organizations network virtu-
alization effort goes forward, here are some
tips that should help you maximize those ef-
forts and tie them into server and storage
virtualization.
nTIP 1: EVALUATE YOUR ORGANIZATIONAL
STRUCTURE AND OPTIMIZE YOUR NETWORK
POLICIES AND PROCEDURES
Advancements in storage, server and network
virtualization have allowed enterprises to do
things in the data center that simply werent
possible on a physical network. Yet the sepa-
ration in many organizations between IT
and network teams hasnt enabled them to
reap the full rewards of these new capabi-
lities. Many network teams view virtualiza-
tion as the responsibility of the server team
and are not in a hurry to embrace virtualized
switchesor virtual network appliances. Many
are still happy to have traffic come out of the
virtual infrastructure, route it through physi-
cal network components and then go back into
virtual space. IT organizations should make
sure that the roles, responsibilities, policies
and procedures of these teams are clarified
and revised to embrace virtualizations capa-
bilities. Its only a matter of time before virtu-
alization takes hold in networking the way
it has with servers and storage, so resistance
is futile.
http://searchnetworking.techtarget.com/news/2240174286/Resisting-network-virtualization-technology-is-like-keeping-Token-Ringhttp://searchnetworking.techtarget.com/news/2240174286/Resisting-network-virtualization-technology-is-like-keeping-Token-Ringhttp://searchnetworking.techtarget.com/tip/The-new-virtualization-The-storage-and-network-hypervisorhttp://searchnetworking.techtarget.com/tip/The-new-virtualization-The-storage-and-network-hypervisorhttp://searchnetworking.techtarget.com/news/2240161456/HP-adds-multi-tenant-private-cloud-networking-and-virtual-switchinghttp://searchnetworking.techtarget.com/news/2240161456/HP-adds-multi-tenant-private-cloud-networking-and-virtual-switchinghttp://searchnetworking.techtarget.com/news/2240161456/HP-adds-multi-tenant-private-cloud-networking-and-virtual-switchinghttp://searchnetworking.techtarget.com/news/2240161456/HP-adds-multi-tenant-private-cloud-networking-and-virtual-switchinghttp://searchnetworking.techtarget.com/tip/The-new-virtualization-The-storage-and-network-hypervisorhttp://searchnetworking.techtarget.com/tip/The-new-virtualization-The-storage-and-network-hypervisorhttp://searchnetworking.techtarget.com/news/2240174286/Resisting-network-virtualization-technology-is-like-keeping-Token-Ringhttp://searchnetworking.techtarget.com/news/2240174286/Resisting-network-virtualization-technology-is-like-keeping-Token-Ring -
8/11/2019 Network Monitoring and Management_hb_final
10/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
10 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
4NETWORKVIRTUALIZATION nTIP 2: CONSIDER YOUR MONITORING TOOLSAND YOUR MANAGEMENT FRAMEWORK
Traditional monitoring tools and managementframeworks have struggled to keep up with the
adoption of server virtualization. Network vir-
tualization only adds to these challenges. Now
is an excellent time to reevaluate your moni-
toring tools and management framework. Using
virtualization as a catalyst, consider how you
can create an integrated single-pane-of-glass
view of servers and virtualized network infra-
structure that can and will be sharing physical
host resources with other workloads, moving
from place to place, or spread across internal
data centers and public or private clouds.
nTIP 3: EMBRACE OPEN STANDARDS
WHENEVER POSSIBLE
Cisco and VMware areclearly leading in the
market share battle for data center virtual-
ization, virtual switching and programmable
networks, and they will likely have significant
market positions in software-defined network-
ing(SDN). Both have vowed to support openstandards such as OpenFlowand OpenStack.
Yet their current products and roadmaps dont
necessarily enforce these standards. Enter-
prises should consider whether any purchase
decisions might lead them further down the
path of being locked into a proprietary solu-
tion. Both of these vendors are quick to point
out all the advanced features and capabilities
their proprietary products can deliver. Dont
take the bait. Opt instead for an open standards
approach that wont limit your options. As a
side benefit, embracing open standards should
simplify the transition of applications to or
from cloud environments.
nTIP 4: START EVALUATING AND PLANNING
FOR SOFTWARE-DEFINED NETWORKING
SDN is the next major trend in enterprise IT.
Embracing open standards should simplify the transitionof applications to or from cloud environments.
http://searchsdn.techtarget.com/definition/software-defined-networking-SDNhttp://searchsdn.techtarget.com/definition/software-defined-networking-SDNhttp://whatis.techtarget.com/definition/OpenFlowhttp://whatis.techtarget.com/definition/OpenStackhttp://whatis.techtarget.com/definition/OpenStackhttp://whatis.techtarget.com/definition/OpenFlowhttp://searchsdn.techtarget.com/definition/software-defined-networking-SDNhttp://searchsdn.techtarget.com/definition/software-defined-networking-SDN -
8/11/2019 Network Monitoring and Management_hb_final
11/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
11 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
4NETWORKVIRTUALIZATION The adoption of SDN will balloon over the nextthree years. SDN supports virtual networks, but
organizations are struggling to assess the rolesof SDN and other network virtualization tech-
niques in their current network roadmaps. Your
best approach is to try out both to see which
solution or combination of solutions is best
suited to your environment and would yield the
greatest cost savings and increased agility.
Enterprises that embrace virtual networks
and use them to push their overall adoption of
virtualization techniques will see the greatest
return on their investment. To ensure success,
however, IT may need to rethink both its tradi-tional organizational structure and enterprise
system management tooling capabilities. Orga-
nizations can further protect their virtualiza-
tion investments by embracing open standards
whenever possible. Finally, determine now how
software-defined networks can increase your
agility and reduce deployment challenges and
costs. Henry Svendblad
http://searchsdn.techtarget.com/news/2240179691/SDN-blog-roundup-OpenFlow-standards-flow-tables-and-SDN-skillshttp://searchsdn.techtarget.com/news/2240179691/SDN-blog-roundup-OpenFlow-standards-flow-tables-and-SDN-skills -
8/11/2019 Network Monitoring and Management_hb_final
12/12
Home
Editors Note
Enterprise WAN
Strategy
Application
Performance
Network
Virtualization
12 N ET WORK MON IT ORIN G AN D MAN AG EMEN T
TOM NOLLE is president of CIMI Corporation, a strategic
consulting firm specializing in telecommunications and
data communications since 1982. He is also the publisher
of Netwatcher, a journal addressing advanced telecom-
munications strategy issues.
JOHN BURKE is principal research analyst with Nemertes
Research. With nearly two decades of technology ex-
perience, he has worked at all levels of IT, including
end-user support specialist, programmer, system admin-
istrator, database specialist, network administrator, net-
work architect and systems architect. He has worked atJohns Hopkins University, the College of St. Catherine
and the University of St. Thomas.
HENRY SVENDBLAD is a principal research analyst with
Nemertes Research, where he conducts both primary
benchmark research and custom research, advises vendor
and enterprise clients, writes thought-leadership reports
and delivers strategic seminars. A seasoned senior-level
IT executive, Henry leads research on advanced carrier
services, with an emphasis on emerging trends, vendor
management, business continuity/disaster recovery,
security and cloud strategies.
ABOUT
THE
AUTHORS
This Technical Guide on
Network Monitoring and Management is a
SearchNetworking.come-publication.
Kate Gerwig |Editorial Director
Kara Gattine |Senior Managing Editor
Rivka Gewirtz Little |Executive Editor
Shamus McGillicuddy |News Director
Chuck Moozakis |Site Editor
Rachel Shuster |Associate Managing Editor
Linda Koury |Director of Online Design
Neva Maniscalco |Graphic Designer
Doug Olender |Vice President/Group Publisher
TechTarget
275 Grove Street, Newton, MA 02466www.techtarget.com
2013 TechTarget Inc. No part of this publication may be transmitted or re-produced in any form or by any means without written permission from thepublisher. TechTarget reprints are available throughThe YGS Group.
About TechTarget:TechTarget publishes media for information technologyprofessionals. More than 100 focused websites enable quick access to a deepstore of news, advice and analysis about the technologies, products and pro-cesses crucial to your job. Our live and virtual events give you direct access toindependent expert commentary and advice. At IT Knowledge Exchange, oursocial community, you can get advice and share solutions with peers and experts.
http://searchnetworking.techtarget.com/http://reprints.ygsgroup.com/m/techtargethttp://reprints.ygsgroup.com/m/techtargethttp://reprints.ygsgroup.com/m/techtargethttp://searchnetworking.techtarget.com/