SlideShare une entreprise Scribd logo
1  sur  48
Tune Up Your Network  For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
What To Consider
Know Your Network Traffic levels per segment Mbps?  Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
Statistics vs. Packets
Not All Flows Are Created Equal
It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 9
Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
Resolve to Develop Baselines
Network Dashboard
VoIP Dashboard
Application Dashboard
A Bit More Precisely … Application Response Time
Archiving Your Results Packets files Formatted reports
Common Pitfalls
5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
The Network Battlefield
Data Impacts on VoIP
Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 22
Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example:   The WAN can support 2 simultaneous calls.   	              What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
Monitoring For Life
Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments?  (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
Troubleshooting As A Last Resort
Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
Analyst’s Perspective
Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and  Acks Data slow = System slow
Company Overview
Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
Product Line Overview
Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country  Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
Omnipliance Network RecordersPrice/performance solutions for every application
OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization

Contenu connexe

Tendances

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalEmily Pechal
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinarpmohapat
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdRonald Bartels
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
The Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANThe Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANEric Lee
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Canada
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016ADVA
 

Tendances (20)

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily Pechal
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
The Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANThe Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WAN
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016
 

En vedette

Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Kaela Loffler
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIPMakkawy khair
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPSevana Oü
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?STelligence Company
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 

En vedette (20)

CWNA
CWNACWNA
CWNA
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIP
 
Iuwne10 S05 L04
Iuwne10 S05 L04Iuwne10 S05 L04
Iuwne10 S05 L04
 
La acción marzo 2015 (1)
La acción marzo 2015 (1)La acción marzo 2015 (1)
La acción marzo 2015 (1)
 
Iuwne10 S03 L05
Iuwne10 S03 L05Iuwne10 S03 L05
Iuwne10 S03 L05
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
How to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy StepsHow to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy Steps
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 

Similaire à Tune Up Your Network For The New Year With WildPackets

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point SolutionSavvius, Inc
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 
NetQoS Performance Center Overview
NetQoS Performance Center OverviewNetQoS Performance Center Overview
NetQoS Performance Center OverviewDenny K
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingSavvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewManageEngine
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4danieljimmie
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Presofaiiqb
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSailaja Tennati
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 

Similaire à Tune Up Your Network For The New Year With WildPackets (20)

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
NetQoS Performance Center Overview
NetQoS Performance Center OverviewNetQoS Performance Center Overview
NetQoS Performance Center Overview
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
Cascade
CascadeCascade
Cascade
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics System
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 

Plus de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 

Plus de Savvius, Inc (20)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Tune Up Your Network For The New Year With WildPackets

  • 1. Tune Up Your Network For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
  • 2. Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
  • 4. Know Your Network Traffic levels per segment Mbps? Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
  • 6. Not All Flows Are Created Equal
  • 7. It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
  • 8. Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
  • 9. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 9
  • 10. Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
  • 11. Resolve to Develop Baselines
  • 15. A Bit More Precisely … Application Response Time
  • 16. Archiving Your Results Packets files Formatted reports
  • 18. 5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
  • 21. Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
  • 22. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 22
  • 23. Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
  • 24. Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
  • 25. The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
  • 27. Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
  • 28. Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments? (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
  • 29. 10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
  • 30. Troubleshooting As A Last Resort
  • 31. Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
  • 32. A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
  • 34. Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and Acks Data slow = System slow
  • 36. Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
  • 37. What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
  • 38. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
  • 39. With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
  • 41. Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
  • 42. WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
  • 43.
  • 44. Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
  • 45. TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
  • 46. Omnipliance Network RecordersPrice/performance solutions for every application
  • 47. OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
  • 48. Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization
  • 49. Thank You! WildPackets, Inc.1340 Treat Boulevard, Suite 500Walnut Creek, CA 94597(925) 937-3200

Notes de l'éditeur

  1. NetFlowNetFlow is a network protocol developed by CiscoProprietary protocol that runs on Cisco IOSNetFlow accounts for all traffic going in and out of the routerTransit trafficTraffic destined for the routerEach NetFlow record contains a wide variety of information about the flowNetFlow never includes the payloads Sampled NetFlow can be configured for use on busy networks – not 100% accurateIPFIXInternet Protocol Flow Information eXchangeAn emerging, IETF (standard) version of NetFlowBased on NetFlow v9Predicted to rapidly become the industry standardsFlowA standard (RFC 3176), sampling-based mechanism to capture network traffic dataApplicable to higher speed networks (gigabit speeds or greater)An sFlow agent compiles flow recordsFlow records are based on Statistical packet-based samplingTime-based sampling of interface countersStatistically based – not 100% accurateJflowSimilar functionality to NetFlow but provided by JuniperData sampled at a globally configured rateStatistically based – not 100% accurateOmniFlowWildPackets proprietary flow analysis and recording mechanismAnalysis of each and every packetNot statistical – 100% accurateSignificantly exceeds the flow records from other mechanismsProvides detailed flow analysis above Layer 3VoIP/VideoApdexCorrelated event analysisCorrelated to packets for instant troubleshooting using deep packet inspection – a complete solution