GREAT BANDWIDTH NOT DELIVERING GREAT PERFORMANCE?

Similar documents
SolarWinds Engineer s Toolset Fast Fixes to Network Issues

PATCH MANAGER AUTOMATED PATCHING OF MICROSOFT SERVERS AND 3RD-PARTY APPS

NetFlow Traffic Analyzer

NetFlow Traffic Analyzer

SolarWinds Orion Platform Scalability

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan

[Document Title] Network IP Multicast Monitoring & Troubleshooting. [Document Subtitle] Angi Gahler. Share: Author: Brad Hale

WHITE PAPER. The Top 5 Threats in File Server Management

IT TRENDS REPORT 2016:

IT TRENDS REPORT 2016:

VoIP and Network Quality Manager

SolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Traffic and Performance Visibility for Cisco Live 2010, Barcelona

GETTING STARTED GUIDE. Mobile Admin. Version 8.2

Real-Time Network Utilization And Bandwidth Monitoring

How can we gain the insights and control we need to optimize the performance of applications running on our network?

Configuring Devices for Flow Collection

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic;

Virtual Office. Technical Requirements. Version 3.0. Revision 1.0

NetFlow Basics and Deployment Strategies

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

Network Configuration Manager

Virtualization Manager

Optimizing your network for the cloud-first world

Access Rights Manager

Network Configuration Manager

This PDF is no longer being maintained. Search the SolarWinds Success Center for more information.

Virtual Office. Technical Requirements. Version 4.0. Revision 1.0

Innovate Summit 2017 Prometheus AlertManager and Long-term Storage

Bring Your Own Device. Peter Silva Technical Marketing Manager

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

Scalability Engine Guidelines for SolarWinds Orion Products

SolarWinds Technical Reference

SOLARWINDS ORION 5 DAY COURSE

Computer Management* (IEA) Training Foils

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

BYOD: BRING YOUR OWN DEVICE.

Wireless Integration Overview

2013 InterWorks, Page 1

Network Performance Monitor

BUILT FOR BUSINESS. 10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business. Whitepaper

FireMon Security manager

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Orion Network Performance Monitor

Using SolarWinds Orion for Cisco Assessments

SolarWinds. Migrating SolarWinds NPM Technical Reference

Prepare Your Network for BYOD. Meraki Webinar Series

NetFlow Traffic Analyzer

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Connectivity to Cloud-First Applications

SERVICE DESCRIPTION SD-WAN. from NTT Communications

White paper. Optimizing ios and macos Devices on Cisco Wireless Networks

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017

Intel Unite Solution. Plugin Guide for Protected Guest Access

Quick Install & Troubleshooting Guide. WAP223NC Cloud Managed Wireless N Access Point

BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes

WHITE PAPER. The Shortfalls of Traceroute in Modern Multi-Path Networks

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

MONITORING STORAGE PERFORMANCE OF IBM SVC SYSTEMS WITH SENTRY SOFTWARE

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management

Avoid a DCIM Procurement Disaster

Product Solution Guide Education

Tait GridLink THE INTELLIGENT CHOICE FOR DISTRIBUTION AUTOMATION. harris.com #harriscorp

Mitel Cloud VOIP. Integration Guide

Intel Unite Solution Version 4.0

Gaining End-to-end Visibility of Service Delivery: Making critical decisions and avoiding shortfalls

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

Monitoring and Reporting System (MARS)

Making Remote Network Visibility Affordable for the Distributed Enterprise

Observer Probe Family

Managing Network Bandwidth to Maximize Performance

Optimize and Accelerate Your Mission- Critical Applications across the WAN

SolarWinds Technical Reference

ClientVantage Agentless What s New in Release 11.1

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

SEVEN Networks Open Channel Traffic Optimization

Deploying Cisco SD-WAN on AWS

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7

Meraki 2014 Solution Brochure

FAQs. Frequently Asked Questions

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

FAQs. Frequently Asked Questions

Cisco Start. IT solutions designed to propel your business

CONFIGURING SQL SERVER FOR PERFORMANCE LIKE A MICROSOFT CERTIFIED MASTER

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need

Meraki Solution Brochure

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

IPsec VPN. Quick Guide 3/19/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

SEVONE END USER EXPERIENCE

LEVEL 3 SM WEB MEETING SECURITY GUIDE

Dell Management Portal. Apple Device Enrollment Program

ShareFile Account Admin Guide

SolarWinds Management Pack Version 2.1

NEED FOR SPEED: BEST PRACTICES FOR MYSQL PERFORMANCE TUNING JANIS GRIFFIN PERFORMANCE EVANGELIST / SENIOR DBA

Database Performance Analyzer Integration Module

Troubleshooting WLAN with NSight HOW TO GUIDE

WAN Application Infrastructure Fueling Storage Networks

Transcription:

GREAT BANDWIDTH NOT DELIVERING GREAT PERFORMANCE? MAY 20, 2015 SMPTE BBTB 2015 ED BENDER HEAD FEDERAL SYSTEMS ENGINEER, SOLARWINDS ED.BENDER@SOLARWINDS.COM 410-286-3060

AGENDA Challenges in delivering great performance Automated tools for pinpointing network weaknesses and improving overall performance Keys to ensuring network availability and visibility in a world of Mobile users BYOD Internet of Things Social media and video The importance of careful NetFlow planning and monitoring with priorities for specific types of traffic Other suggestions Q&A 2

CHALLENGES DELIVERING GREAT PERFORMANCE SHOULD NOT BE SO HARD Rise of Content Sharing and Consumption Volume of content being shared and consumed is constantly on the rise Content is the face of an organization it celebrates their brand, connects their audience, and informs on their latest news People now expect instantaneous access to this content Bandwidth Availability Within an Organization Number of users can constrain bandwidth availability Budgets can constrain the ability to provide adequate bandwidth Network Traffic Mix Certain types of network traffic are large consumers of bandwidth Human Resource Availability Administrators traveling site-to-site or building-to-building Personally-Owned/Unmanaged Devices Significantly increase in bandwidth consumption during March Madness for example Represent a potential risk to organization resources and other users 3

SOLUTION: NETWORK PERFORMANCE MONITORING Network performance monitoring provides visibility into where the network is busy Identifies hot spots and under-utilized links Identify high bandwidth usage times Adjust backup schedules and other tasks to load balance over time Identify when and where additional bandwidth is needed Alert when links become saturated Allows for pro-active fixes before critical outages occur

SOLUTION: NETWORK PERFORMANCE MONITORING

SOLUTION: NETWORK PERFORMANCE MONITORING

SOLUTION: NETWORK TRAFFIC MONITORING LEVERAGING FLOW DATA FROM NETWORK ROUTERS Network performance monitoring identifies where performance hot spots are Network traffic monitoring, using NetFlow technology, provides visibility into who and what are consuming the bandwidth on hot spots NetFlow jflow, rflow, sflow, Reduce the Mean Time to Innocence Organizational end-users can be educated about how their usage impacts the network as a whole Anything that can be monitored, can also be ALERTED on, which provides additional opportunities to be pro-active about fixes before they become critical outages.

SOLUTION: NETWORK TRAFFIC MONITORING NetFlow can show you when one type of traffic is hogging the pipe......or when it's a user bingewatching their favorite show

SOLUTION: IS IT THE APPLICATION OR THE NETWORK? Packet Analysis is the, often cumbersome, process of looking at network traffic between two devices (or a specific type of network traffic such as SQL or HTTP) and measuring the request <-> response timing Two of the most helpful metrics that compare timing: TCP Handshake - indicates the network speed Time to first byte - gives the application server response time to data requests Packet analysis can now be performed automatically, in real-time This provides the data in graphs that show the breakdown of protocols, participants, and timing Software based probes are now available rather than hardware only probes

SOLUTION: IS IT THE APPLICATION OR THE NETWORK?

SOLUTION: QUALITY OF SERVICE Quality of Service (QoS) is the process of prioritizing some types of network traffic based on port or protocol Enabling QoS management on the Internet connection ensures that important traffic is not constrained by superficial traffic Low priority or undesirable traffic can be constrained with QoS capabilities BUT... QoS does allow superficial traffic to continue to exist, without negatively impacting the important traffic.

SOLUTION: QUALITY OF SERVICE SOLUTION: QUALITY OF SERVICE

SOLUTION: MANAGED DEVICES Mobile Device Management (MDM) provides: Security lost/stolen devices can be wiped/locked preventing the possible disclosure of sensitive student data Monitoring location services to find lost devices or to alert when devices (read: their owners) are in places they ought not be Management Deploy, block, remove applications Reporting including call logs, message traffic, installed/removed apps Alerts end users can be alerted about events, issues, warnings

SOLUTION: GUEST WIRELESS NETWORK Guest wireless will move much of the high volume traffic off of the organization s network, allowing employees to work more efficiently Guest wireless will eliminate much of the security risk to organizational resources introduced by unmanaged devices Guest wireless does not have to be building wide; in many cases, outfitting common areas will be sufficient: lobby, cafeteria, meeting rooms, etc.. You might even deliberately not implement it in certain areas in which you want to restrict access for non-employees. May not even require additional equipment, merely reassigning the existing devices to a separate SSID and partitioning their connectivity on a separate VLAN.

SOLUTION: COMMUNICATION/EDUCATION Communicate with users publicly/privately regarding their utilization of network resources Discuss bandwidth consumption of various traffic types Discuss security implications of always-on wireless Communicate with organization management Regarding the nature of these challenges The solutions that are immediately available Additional solutions that may require budgetary consideration

DETAILED PERFORMANCE MONITORING

HOLISTIC PERFORMANCE MONITORING

QUESTIONS?

STAY CONNECTED & LEARN MORE Stay Connected: Join the SolarWinds online user community, thwack Follow us on LinkedIn Call: 866.530.8100 Email: sales@solarwinds.com Learn More: Visit our website Download a free trial

The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC and its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.