SlideShare uma empresa Scribd logo
1 de 7
Visualizing Network Health
How to Drive Visibility into Complex Infrastructures
Written by Dell Software
Introduction
Deep infrastructure visibility enables network administrators
and IT professionals to proactively manage (or overhaul)
data center resources to boost performance or productivity,
address network performance or availability issues, and provide
an optimal user experience. In fact, the Aberdeen Research
report “The Real Value of Network Visibility” found that network
performance projects “are becoming major components of
enterprise strategies for better customer service, profitability,
and revenue growth.”
Why has network performance become increasingly important?
The most important factor is that more and more business-
critical applications depend on the network. Trends such as
globalization, virtual workplaces and mobility are leading to
the extension of applications, data and unified communication
tools to a broader set of users across distributed locations.
However, as networks become more complex to support these
demands, real-time visibility becomes increasingly difficult.
Network administrators must now support heterogeneous
equipment, converged data, wireless access and mobility,
hybrid cloud environments, real-time applications, virtualized
data centers, next-generation devices, and more—and that
complexity makes deep visibility a bigger challenge.
This whitepaper arms network administrators and managed
service providers (MSPs) with insight into the trends that impact
network complexity, details about the capabilities required to
support visibility, and a quick look at Dell’s Foglight NMS, a
solution that delivers comprehensive network visibility and
actionable monitoring.
2
As organizations
support office
locations around
the world, the ability
for IT professionals
to remotely
manage end user
applications or
machines becomes
increasingly
important.
Trends driving network
complexity today
Before we delve into best practices for
gaining network visibility, it’s important
to understand the characteristics of
networks today and the macro IT trends
that have added to their complexity.
Fluid networks
New technologies are constantly
emerging that promise to improve
speed and reduce costs, and the
needs of both users applications are
constantly evolving as well. Therefore,
today’s networks are increasingly
fluid, changing on demand to meet
application and service needs. A single
network today could have a blend of
physical and virtual servers or desktops
that support wireless and wired network
access for a wide range of devices from
smart phones to tablets, laptops and
desktops, all from different vendors
and all running on different operating
systems. Managing these complex
network device configurations using a
variety of different tools wastes time and
introduces more room for error.
Quick facts:
•	 According to an infographic by Lenovo and
Qualcomm, 147.2 million tablets will ship by
2015, with 45 million of those purchased
by businesses.
•	 IDC forecasts that more than 23 percent of
all servers shipped in 2014 will be actively
supporting virtual machine technology.
•	 Gartner reports that global spending on
public cloud services is expected to grow
to $110.3B through 2016.
•	 Ericsson, a leading mobile solution provider,
predicts that there will be 50 billion
connected devices by 2020 and expects
mobile data traffic to grow 10 times
by 2016.
•	 Diverse operating systems continue to be
used: Net Applications tracked usage data
from 40,000 websites and 160 million
unique visitors and found that access from
Windows 7 machines accounted for 44.48%
of monitored activity, Windows XP for
39.51% and Windows Vista for 5.25%. Mac
OS X 10.8 and Windows 8 rounded out the
top five with 2.44% and 2.26%, respectively.
Distributed workforce and globalization
Despite steps back from some large
companies, more and more employees
work outside the office. In fact, the
independent employment research firm
Telework Research Network reports
that in 2013, 20–30 million Americans
will work from home at least once a
week. Remote or teleworking is made
possible by network extensions and
the fact that applications, data and
unified communication tools are now
largely distributed. Countless business
applications support web access,
enabling employees to access data
anywhere, anytime.
Globalization is also changing how
data center resources are used. As
organizations support office locations
around the world, the ability for IT
professionals to remotely manage end
user applications or machines becomes
increasingly important. Network
administrators and MSPs who support
customers remotely should look for
solutions that enable remote access
(from across an office, city or country)
without distributing end-user activity.
BYOD and the consumerization of IT
Intelligent mobile devices in the
workplace are also placing significant
demands on networks. With the trend
toward “bring your own device” (BYOD),
employees now expect to use personal
devices as well as company-issued
devices for work, and they demand the
same anywhere, anytime network access
for their business applications as they
get on their personal devices. While
mobile devices and BYOD can improve
user satisfaction and productivity, these
trends introduce significant security
concerns and can cause bandwidth
bottlenecks. The network administrator
is forced to balance IT infrastructure
security with user demands while now
managing more devices.
Share:
3
Data alone is not
enough to address
complex challenges;
IT professionals
need a solution
that enables them
to quickly identify
exceptions and
abnormalities
and that offers
trustworthy advice
and automation
workflow to resolve
problems quickly.
Cloud computing and
virtual environments
In many cases, company data is no longer
housed within a company’s four walls.
Instead it’s at data centers or in public,
private or hybrid cloud environments.
As cloud computing and converged
infrastructure reshape corporate
data centers, network complexity
increases and network administrators
must carefully monitor and manage
connectivity and WAN optimization.
VoIP and unified communications
Real-time data, social networks, video,
telepresence, VoIP, intelligent electronic
devices (such as RFID) and unified
communications are all raising the
bar for raw network throughput for
enterprises and service providers alike.
These applications, designed to foster
collaboration and user productivity, are
bandwidth hogs with high potential
to disrupt the performance of other
business-critical applications. As more
streaming applications are incorporated
into a network, IT professionals need
to carefully review network bandwidth
usage and requirements to ensure
uptime of all applications.
Choosing the right network
management solutions
Key capabilities for gaining
network visibility
The reality, then, is that today, networks
are increasing complex, fluid and
distributed, and they are being taxed by
an explosion of data. At the same time,
critical business systems, employee
productivity, communication and
customer-facing sites all rely on efficient
and stable network operation. Managing
today’s networks at a reasonable cost
requires simplifying the complexity
and giving network administrators
infrastructure-wide visibility to ensure
operational performance.
What capabilities are critical to attaining
the visibility required to manage network
infrastructure complexity? Let’s review a
few of the most important:
•	 Discovery and infrastructure topology
mapping—Dynamic discovery of all
equipment in the IT infrastructure enables
mapping of their current locations,
configurations and interdependencies.
The more types of devices the discovery
technology can detect, identify and
support, the better visibility the network
administrator will have.
•	 Real-time access across the infrastructure—
Network visibility is most effective when
it happens in real time; delayed or static
views of network components simply
do not provide network administrators
with the information they need to make
proactive adjustments to ensure network
availability and performance. Without
real-time visibility across the entire network
infrastructure, administrators can, at
best, correct issues after they occur and
implement new equipment. Only real-time
visibility can enable proactive analysis to
help administrators pinpoint the root cause
of intermittent, hard-to-find problems.
•	 Answers, not data—Actionable information
about network health, faults, bandwidth
hogs and performance issues reduces
mean-time-to-resolution (MTTR). There
are a lot of monitoring solutions on the
market, but data alone is not enough
to address complex challenges; IT
professionals need a solution that enables
them to quickly identify exceptions and
abnormalities and that offers trustworthy
advice and automation workflow to resolve
problems quickly.
Many remote management platforms are
available to manage servers, desktops
and laptops. Dell’s performance
monitoring solutions for network
management go much further, enabling
IT professionals to proactively resolve
problems before they impact client and
end-user satisfaction.
Share:
4
In particular, Foglight Network
Management System (NMS) enables
you to easily discover, map and monitor
network components in disparate
locations across the globe. Its actionable
insights help you detect, diagnose and
resolve potential issues anywhere in the
stack, helping ensure your network’s
performance and availability.
Network discovery
Foglight NMS makes network discovery
simple. You begin by scanning a network
using the techniques you choose in
order to populate a database with the
devices you want to monitor, as shown
in Figure 1. The solution automatically
assigns devices based on the policies
you define, yielding the data you want
(and need) to see.
Network mapping
Once discovery is complete, Foglight
NMS creates easy-to-view network
topologies that deliver visibility into
your LAN or WAN (see Figure 2). These
diagrams are automatically updated
when devices are added or removed
from the network, so they provide a
quick view of the current status of your
Foglight Network
Management
System (NMS)
enables you to easily
discover, map and
monitor network
components in
disparate locations
across the globe.
Figure 1. Foglight NMS makes network discovery easy.
Figure 2. Foglight NMS provides easy-to-view network topologies—and automatically
updates them when devices are added or removed from the network.
Share:
5
network, enabling you to check for
broken connections and determine the
location and details of the devices within
the network.
Dashboard setup and customization
The Foglight NMS dashboard provides
high-level overviews of network
performance, fault management and
device availability, as shown in Figure 3.
You can easily customize the dashboard
for visibility into critical device
information such as CPU load, network
interface traffic, latency and other key
performance indicators.
Network traffic monitoring and
real-time alerts
Foglight NMS gives network
administrators and MSPs visibility
into which users or applications are
generating traffic on the network and
how much network bandwidth they are
consuming (see Figure 4). You can drill
down into applications, conversations,
domains and endpoints to determine
how bandwidth usage impacts the
network as a whole. Foglight NMS not
only identifies potentially problematic
traffic spikes or bursts, but it also
provides alerts to notify you about
emerging issues in real time.
Syslog and event log monitoring
You can set Foglight NMS to receive,
log and display Syslog messages from
routers, switches and other Syslog-
enabled devices, so you’ll have the
complete information you need to
detect problems quickly.
The Foglight NMS
dashboard provides
high-level overviews
of network
performance, fault
management and
device availability.
Figure 3. The Foglight NMS dashboard provides high-level overviews of network
performance, fault management and device availability, and you can easily customize
it to meet your specific needs.
Figure 4. Foglight NMS provides visibility into which users or applications are generating
traffic on the network and how much network bandwidth they are consuming.
Share:
6
Foglight NMS not
only identifies
potentially
problematic traffic
spikes or bursts,
but it also provides
alerts to notify you
about emerging
problems in
real time.
Conclusion
Networks today are complex and
constantly changing. Ensuring their
stability and performance is essential
to the delivering an optimal user
experience and ensuring the availability
of business-critical applications. To
effectively manage those networks,
administrators need complete network
visibility, from network discovery and
mapping to monitoring of network
traffic. Dell’s performance monitoring
solutions deliver those capabilities and
more, enabling network administrators
and MSPs to proactively manage their
networks and address emerging issues
to ensure high application performance
and user satisfaction.
To learn more
To learn more, or to download a free,
30-day, fully functional trial of Foglight
NMS, please visit quest.com/foglight-
network-management-system/.
You can also contact us by phone,
toll-free, at 1-800-360-9379,
option 9, ext. 17873, or by email
at nmsquestions@quest.com.
Figure 5. Foglight NMS provides Syslog and event log monitoring.
Share:
7
Whitepaper-FoglightNMS-NetworkHealth-US-KS-2013-05-28
© 2013 Dell, Inc. ALL RIGHTS RESERVED. This document
contains proprietary information protected by copyright. No
part of this document may be reproduced or transmitted in
any form or by any means, electronic or mechanical, including
photocopying and recording for any purpose without the
written permission of Dell, Inc. (“Dell”).
Dell, Dell Software, the Dell Software logo and products—as
identified in this document—are registered trademarks of Dell,
Inc. in the U.S.A. and/or other countries. All other trademarks
and registered trademarks are property of their respective
owners.
The information in this document is provided in connection
with Dell products. No license, express or implied, by estoppel
or otherwise, to any intellectual property right is granted by
this document or in connection with the sale of Dell products.
EXCEPT AS SET FORTH IN DELL’S TERMS AND CONDITIONS AS
SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS
ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING
TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO
EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL
DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES
FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS
OF INFORMATION) ARISING OUT OF THE USE OR INABILITY
TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no
representations or warranties with respect to the accuracy or
completeness of the contents of this document and reserves
the right to make changes to specifications and product
descriptions at any time without notice. Dell does not make
any commitment to update the information contained in this
document.
About Dell
Dell Inc. (NASDAQ: DELL) listens to customers and delivers
worldwide innovative technology, business solutions and
services they trust and value. For more information,
visit www.dell.com.
If you have any questions regarding your potential use of
this material, contact:
Dell Software
5 Polaris Way
Aliso Viejo, CA 92656
www.dell.com
Refer to our Web site for regional and international
office information.
For More Information
Share:

Mais conteúdo relacionado

Mais procurados

Role of Cloud Computing Technology in Agriculture Fields
Role of Cloud Computing Technology in Agriculture FieldsRole of Cloud Computing Technology in Agriculture Fields
Role of Cloud Computing Technology in Agriculture Fieldssushil Choudhary
 
Information Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsInformation Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsVSR *
 
Introduction to integration for local government webinar
Introduction to integration for local government webinar Introduction to integration for local government webinar
Introduction to integration for local government webinar Symphony3
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesInteractiveNEC
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps Joe Maglitta
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18arif muhamad
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
Modern Trends of ICT in Business
Modern Trends of ICT in BusinessModern Trends of ICT in Business
Modern Trends of ICT in Businesshighbartech
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Yobitel Communicaitons Corporate Brochure
Yobitel Communicaitons Corporate BrochureYobitel Communicaitons Corporate Brochure
Yobitel Communicaitons Corporate BrochureAbishek Vimala Raju
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesInteractiveNEC
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 
SDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYSDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYMallory Zemelis
 

Mais procurados (20)

Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Role of Cloud Computing Technology in Agriculture Fields
Role of Cloud Computing Technology in Agriculture FieldsRole of Cloud Computing Technology in Agriculture Fields
Role of Cloud Computing Technology in Agriculture Fields
 
Information Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsInformation Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure Projects
 
Introduction to integration for local government webinar
Introduction to integration for local government webinar Introduction to integration for local government webinar
Introduction to integration for local government webinar
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Modern Trends of ICT in Business
Modern Trends of ICT in BusinessModern Trends of ICT in Business
Modern Trends of ICT in Business
 
Enabling Digital Business (EDB)
Enabling Digital Business (EDB)Enabling Digital Business (EDB)
Enabling Digital Business (EDB)
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
CommunityWide Case Study_V1
CommunityWide Case Study_V1CommunityWide Case Study_V1
CommunityWide Case Study_V1
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Excellent Network Connectivity: A Must for Every Business
Excellent Network Connectivity:  A Must for Every BusinessExcellent Network Connectivity:  A Must for Every Business
Excellent Network Connectivity: A Must for Every Business
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Yobitel Communicaitons Corporate Brochure
Yobitel Communicaitons Corporate BrochureYobitel Communicaitons Corporate Brochure
Yobitel Communicaitons Corporate Brochure
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
SDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYSDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRY
 

Destaque

education content
education contenteducation content
education contentMina Helmy
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network HealthDellNMS
 
Reduced specification by_example2
Reduced specification by_example2Reduced specification by_example2
Reduced specification by_example2afreidah
 
Kata ganti nama diri thn1
Kata ganti nama diri thn1Kata ganti nama diri thn1
Kata ganti nama diri thn1quenyie
 
Mz(burung kakak tua)
Mz(burung kakak tua)Mz(burung kakak tua)
Mz(burung kakak tua)quenyie
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 

Destaque (11)

education content
education contenteducation content
education content
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
 
Reduced specification by_example2
Reduced specification by_example2Reduced specification by_example2
Reduced specification by_example2
 
Flowers
FlowersFlowers
Flowers
 
Dogs
Dogs Dogs
Dogs
 
cv-cairo
cv-cairocv-cairo
cv-cairo
 
簡報
簡報簡報
簡報
 
Kata ganti nama diri thn1
Kata ganti nama diri thn1Kata ganti nama diri thn1
Kata ganti nama diri thn1
 
Mz(burung kakak tua)
Mz(burung kakak tua)Mz(burung kakak tua)
Mz(burung kakak tua)
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 

Semelhante a Visualizing your Network Health

Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Network performance management
Network performance managementNetwork performance management
Network performance managementjuliajone2511
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Kanishka Ramyar
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000Fauzil Rizqi
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...Diego Alberto Tamayo
 
Data Driven Efficiency
Data Driven EfficiencyData Driven Efficiency
Data Driven EfficiencyEricsson
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperhoanv
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technologyMH Shihab
 
Software-Definted Mobility Overview
Software-Definted Mobility OverviewSoftware-Definted Mobility Overview
Software-Definted Mobility OverviewMichael Palmacci
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Philippe Boivineau
 
Digital Businesses Need to Rethink Their Network Strategies
Digital Businesses Need to Rethink Their Network StrategiesDigital Businesses Need to Rethink Their Network Strategies
Digital Businesses Need to Rethink Their Network StrategiesAbhishek Sood
 
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...Infovista
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 

Semelhante a Visualizing your Network Health (20)

Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Network performance management
Network performance managementNetwork performance management
Network performance management
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000
 
Sdn whitepaper
Sdn whitepaperSdn whitepaper
Sdn whitepaper
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...
 
Data Driven Efficiency
Data Driven EfficiencyData Driven Efficiency
Data Driven Efficiency
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaper
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technology
 
Software-Definted Mobility Overview
Software-Definted Mobility OverviewSoftware-Definted Mobility Overview
Software-Definted Mobility Overview
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
 
Digital Businesses Need to Rethink Their Network Strategies
Digital Businesses Need to Rethink Their Network StrategiesDigital Businesses Need to Rethink Their Network Strategies
Digital Businesses Need to Rethink Their Network Strategies
 
Serenus White Paper
Serenus White PaperSerenus White Paper
Serenus White Paper
 
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Visualizing your Network Health

  • 1. Visualizing Network Health How to Drive Visibility into Complex Infrastructures Written by Dell Software Introduction Deep infrastructure visibility enables network administrators and IT professionals to proactively manage (or overhaul) data center resources to boost performance or productivity, address network performance or availability issues, and provide an optimal user experience. In fact, the Aberdeen Research report “The Real Value of Network Visibility” found that network performance projects “are becoming major components of enterprise strategies for better customer service, profitability, and revenue growth.” Why has network performance become increasingly important? The most important factor is that more and more business- critical applications depend on the network. Trends such as globalization, virtual workplaces and mobility are leading to the extension of applications, data and unified communication tools to a broader set of users across distributed locations. However, as networks become more complex to support these demands, real-time visibility becomes increasingly difficult. Network administrators must now support heterogeneous equipment, converged data, wireless access and mobility, hybrid cloud environments, real-time applications, virtualized data centers, next-generation devices, and more—and that complexity makes deep visibility a bigger challenge. This whitepaper arms network administrators and managed service providers (MSPs) with insight into the trends that impact network complexity, details about the capabilities required to support visibility, and a quick look at Dell’s Foglight NMS, a solution that delivers comprehensive network visibility and actionable monitoring.
  • 2. 2 As organizations support office locations around the world, the ability for IT professionals to remotely manage end user applications or machines becomes increasingly important. Trends driving network complexity today Before we delve into best practices for gaining network visibility, it’s important to understand the characteristics of networks today and the macro IT trends that have added to their complexity. Fluid networks New technologies are constantly emerging that promise to improve speed and reduce costs, and the needs of both users applications are constantly evolving as well. Therefore, today’s networks are increasingly fluid, changing on demand to meet application and service needs. A single network today could have a blend of physical and virtual servers or desktops that support wireless and wired network access for a wide range of devices from smart phones to tablets, laptops and desktops, all from different vendors and all running on different operating systems. Managing these complex network device configurations using a variety of different tools wastes time and introduces more room for error. Quick facts: • According to an infographic by Lenovo and Qualcomm, 147.2 million tablets will ship by 2015, with 45 million of those purchased by businesses. • IDC forecasts that more than 23 percent of all servers shipped in 2014 will be actively supporting virtual machine technology. • Gartner reports that global spending on public cloud services is expected to grow to $110.3B through 2016. • Ericsson, a leading mobile solution provider, predicts that there will be 50 billion connected devices by 2020 and expects mobile data traffic to grow 10 times by 2016. • Diverse operating systems continue to be used: Net Applications tracked usage data from 40,000 websites and 160 million unique visitors and found that access from Windows 7 machines accounted for 44.48% of monitored activity, Windows XP for 39.51% and Windows Vista for 5.25%. Mac OS X 10.8 and Windows 8 rounded out the top five with 2.44% and 2.26%, respectively. Distributed workforce and globalization Despite steps back from some large companies, more and more employees work outside the office. In fact, the independent employment research firm Telework Research Network reports that in 2013, 20–30 million Americans will work from home at least once a week. Remote or teleworking is made possible by network extensions and the fact that applications, data and unified communication tools are now largely distributed. Countless business applications support web access, enabling employees to access data anywhere, anytime. Globalization is also changing how data center resources are used. As organizations support office locations around the world, the ability for IT professionals to remotely manage end user applications or machines becomes increasingly important. Network administrators and MSPs who support customers remotely should look for solutions that enable remote access (from across an office, city or country) without distributing end-user activity. BYOD and the consumerization of IT Intelligent mobile devices in the workplace are also placing significant demands on networks. With the trend toward “bring your own device” (BYOD), employees now expect to use personal devices as well as company-issued devices for work, and they demand the same anywhere, anytime network access for their business applications as they get on their personal devices. While mobile devices and BYOD can improve user satisfaction and productivity, these trends introduce significant security concerns and can cause bandwidth bottlenecks. The network administrator is forced to balance IT infrastructure security with user demands while now managing more devices. Share:
  • 3. 3 Data alone is not enough to address complex challenges; IT professionals need a solution that enables them to quickly identify exceptions and abnormalities and that offers trustworthy advice and automation workflow to resolve problems quickly. Cloud computing and virtual environments In many cases, company data is no longer housed within a company’s four walls. Instead it’s at data centers or in public, private or hybrid cloud environments. As cloud computing and converged infrastructure reshape corporate data centers, network complexity increases and network administrators must carefully monitor and manage connectivity and WAN optimization. VoIP and unified communications Real-time data, social networks, video, telepresence, VoIP, intelligent electronic devices (such as RFID) and unified communications are all raising the bar for raw network throughput for enterprises and service providers alike. These applications, designed to foster collaboration and user productivity, are bandwidth hogs with high potential to disrupt the performance of other business-critical applications. As more streaming applications are incorporated into a network, IT professionals need to carefully review network bandwidth usage and requirements to ensure uptime of all applications. Choosing the right network management solutions Key capabilities for gaining network visibility The reality, then, is that today, networks are increasing complex, fluid and distributed, and they are being taxed by an explosion of data. At the same time, critical business systems, employee productivity, communication and customer-facing sites all rely on efficient and stable network operation. Managing today’s networks at a reasonable cost requires simplifying the complexity and giving network administrators infrastructure-wide visibility to ensure operational performance. What capabilities are critical to attaining the visibility required to manage network infrastructure complexity? Let’s review a few of the most important: • Discovery and infrastructure topology mapping—Dynamic discovery of all equipment in the IT infrastructure enables mapping of their current locations, configurations and interdependencies. The more types of devices the discovery technology can detect, identify and support, the better visibility the network administrator will have. • Real-time access across the infrastructure— Network visibility is most effective when it happens in real time; delayed or static views of network components simply do not provide network administrators with the information they need to make proactive adjustments to ensure network availability and performance. Without real-time visibility across the entire network infrastructure, administrators can, at best, correct issues after they occur and implement new equipment. Only real-time visibility can enable proactive analysis to help administrators pinpoint the root cause of intermittent, hard-to-find problems. • Answers, not data—Actionable information about network health, faults, bandwidth hogs and performance issues reduces mean-time-to-resolution (MTTR). There are a lot of monitoring solutions on the market, but data alone is not enough to address complex challenges; IT professionals need a solution that enables them to quickly identify exceptions and abnormalities and that offers trustworthy advice and automation workflow to resolve problems quickly. Many remote management platforms are available to manage servers, desktops and laptops. Dell’s performance monitoring solutions for network management go much further, enabling IT professionals to proactively resolve problems before they impact client and end-user satisfaction. Share:
  • 4. 4 In particular, Foglight Network Management System (NMS) enables you to easily discover, map and monitor network components in disparate locations across the globe. Its actionable insights help you detect, diagnose and resolve potential issues anywhere in the stack, helping ensure your network’s performance and availability. Network discovery Foglight NMS makes network discovery simple. You begin by scanning a network using the techniques you choose in order to populate a database with the devices you want to monitor, as shown in Figure 1. The solution automatically assigns devices based on the policies you define, yielding the data you want (and need) to see. Network mapping Once discovery is complete, Foglight NMS creates easy-to-view network topologies that deliver visibility into your LAN or WAN (see Figure 2). These diagrams are automatically updated when devices are added or removed from the network, so they provide a quick view of the current status of your Foglight Network Management System (NMS) enables you to easily discover, map and monitor network components in disparate locations across the globe. Figure 1. Foglight NMS makes network discovery easy. Figure 2. Foglight NMS provides easy-to-view network topologies—and automatically updates them when devices are added or removed from the network. Share:
  • 5. 5 network, enabling you to check for broken connections and determine the location and details of the devices within the network. Dashboard setup and customization The Foglight NMS dashboard provides high-level overviews of network performance, fault management and device availability, as shown in Figure 3. You can easily customize the dashboard for visibility into critical device information such as CPU load, network interface traffic, latency and other key performance indicators. Network traffic monitoring and real-time alerts Foglight NMS gives network administrators and MSPs visibility into which users or applications are generating traffic on the network and how much network bandwidth they are consuming (see Figure 4). You can drill down into applications, conversations, domains and endpoints to determine how bandwidth usage impacts the network as a whole. Foglight NMS not only identifies potentially problematic traffic spikes or bursts, but it also provides alerts to notify you about emerging issues in real time. Syslog and event log monitoring You can set Foglight NMS to receive, log and display Syslog messages from routers, switches and other Syslog- enabled devices, so you’ll have the complete information you need to detect problems quickly. The Foglight NMS dashboard provides high-level overviews of network performance, fault management and device availability. Figure 3. The Foglight NMS dashboard provides high-level overviews of network performance, fault management and device availability, and you can easily customize it to meet your specific needs. Figure 4. Foglight NMS provides visibility into which users or applications are generating traffic on the network and how much network bandwidth they are consuming. Share:
  • 6. 6 Foglight NMS not only identifies potentially problematic traffic spikes or bursts, but it also provides alerts to notify you about emerging problems in real time. Conclusion Networks today are complex and constantly changing. Ensuring their stability and performance is essential to the delivering an optimal user experience and ensuring the availability of business-critical applications. To effectively manage those networks, administrators need complete network visibility, from network discovery and mapping to monitoring of network traffic. Dell’s performance monitoring solutions deliver those capabilities and more, enabling network administrators and MSPs to proactively manage their networks and address emerging issues to ensure high application performance and user satisfaction. To learn more To learn more, or to download a free, 30-day, fully functional trial of Foglight NMS, please visit quest.com/foglight- network-management-system/. You can also contact us by phone, toll-free, at 1-800-360-9379, option 9, ext. 17873, or by email at nmsquestions@quest.com. Figure 5. Foglight NMS provides Syslog and event log monitoring. Share:
  • 7. 7 Whitepaper-FoglightNMS-NetworkHealth-US-KS-2013-05-28 © 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. (“Dell”). Dell, Dell Software, the Dell Software logo and products—as identified in this document—are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL’S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. About Dell Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit www.dell.com. If you have any questions regarding your potential use of this material, contact: Dell Software 5 Polaris Way Aliso Viejo, CA 92656 www.dell.com Refer to our Web site for regional and international office information. For More Information Share: