SlideShare uma empresa Scribd logo
1 de 48
Tune Up Your Network  For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
What To Consider
Know Your Network Traffic levels per segment Mbps?  Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
Statistics vs. Packets
Not All Flows Are Created Equal
It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 9
Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
Resolve to Develop Baselines
Network Dashboard
VoIP Dashboard
Application Dashboard
A Bit More Precisely … Application Response Time
Archiving Your Results Packets files Formatted reports
Common Pitfalls
5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
The Network Battlefield
Data Impacts on VoIP
Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 22
Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example:   The WAN can support 2 simultaneous calls.   	              What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
Monitoring For Life
Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments?  (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
Troubleshooting As A Last Resort
Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
Analyst’s Perspective
Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and  Acks Data slow = System slow
Company Overview
Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
Product Line Overview
Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country  Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
Omnipliance Network RecordersPrice/performance solutions for every application
OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization

Mais conteúdo relacionado

Mais procurados

Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
 

Mais procurados (20)

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily Pechal
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
The Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANThe Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WAN
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016
 

Destaque

Identity fraud
Identity fraudIdentity fraud
Identity fraud
scamtools
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
Savvius, Inc
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
Makkawy khair
 

Destaque (20)

CWNA
CWNACWNA
CWNA
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIP
 
Iuwne10 S05 L04
Iuwne10 S05 L04Iuwne10 S05 L04
Iuwne10 S05 L04
 
La acción marzo 2015 (1)
La acción marzo 2015 (1)La acción marzo 2015 (1)
La acción marzo 2015 (1)
 
Iuwne10 S03 L05
Iuwne10 S03 L05Iuwne10 S03 L05
Iuwne10 S03 L05
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
How to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy StepsHow to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy Steps
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 

Semelhante a Tune Up Your Network for the New Year

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
Savvius, Inc
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Savvius, Inc
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
ManageEngine
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
danieljimmie
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
F5 Networks
 

Semelhante a Tune Up Your Network for the New Year (20)

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
NetQoS Performance Center Overview
NetQoS Performance Center OverviewNetQoS Performance Center Overview
NetQoS Performance Center Overview
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
Cascade
CascadeCascade
Cascade
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics System
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 

Mais de Savvius, Inc

WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
Savvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
Savvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
Savvius, Inc
 

Mais de Savvius, Inc (20)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Tune Up Your Network for the New Year

  • 1. Tune Up Your Network For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
  • 2. Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
  • 4. Know Your Network Traffic levels per segment Mbps? Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
  • 6. Not All Flows Are Created Equal
  • 7. It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
  • 8. Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
  • 9. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 9
  • 10. Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
  • 11. Resolve to Develop Baselines
  • 15. A Bit More Precisely … Application Response Time
  • 16. Archiving Your Results Packets files Formatted reports
  • 18. 5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
  • 21. Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
  • 22. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 22
  • 23. Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
  • 24. Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
  • 25. The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
  • 27. Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
  • 28. Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments? (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
  • 29. 10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
  • 30. Troubleshooting As A Last Resort
  • 31. Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
  • 32. A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
  • 34. Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and Acks Data slow = System slow
  • 36. Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
  • 37. What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
  • 38. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
  • 39. With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
  • 41. Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
  • 42. WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
  • 43.
  • 44. Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
  • 45. TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
  • 46. Omnipliance Network RecordersPrice/performance solutions for every application
  • 47. OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
  • 48. Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization
  • 49. Thank You! WildPackets, Inc.1340 Treat Boulevard, Suite 500Walnut Creek, CA 94597(925) 937-3200

Notas do Editor

  1. NetFlowNetFlow is a network protocol developed by CiscoProprietary protocol that runs on Cisco IOSNetFlow accounts for all traffic going in and out of the routerTransit trafficTraffic destined for the routerEach NetFlow record contains a wide variety of information about the flowNetFlow never includes the payloads Sampled NetFlow can be configured for use on busy networks – not 100% accurateIPFIXInternet Protocol Flow Information eXchangeAn emerging, IETF (standard) version of NetFlowBased on NetFlow v9Predicted to rapidly become the industry standardsFlowA standard (RFC 3176), sampling-based mechanism to capture network traffic dataApplicable to higher speed networks (gigabit speeds or greater)An sFlow agent compiles flow recordsFlow records are based on Statistical packet-based samplingTime-based sampling of interface countersStatistically based – not 100% accurateJflowSimilar functionality to NetFlow but provided by JuniperData sampled at a globally configured rateStatistically based – not 100% accurateOmniFlowWildPackets proprietary flow analysis and recording mechanismAnalysis of each and every packetNot statistical – 100% accurateSignificantly exceeds the flow records from other mechanismsProvides detailed flow analysis above Layer 3VoIP/VideoApdexCorrelated event analysisCorrelated to packets for instant troubleshooting using deep packet inspection – a complete solution