SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
Your Applications Are Distributed
How About Your Network Analysis Solution?


Jay Botelho
                                    Show us your tweets!
                                       Use today’s webinar hashtag:
Director of Product Management
WildPackets                             #wp_distributed
jbotelho@wildpackets.com         with any questions, comments, or feedback.
Follow me @jaybotelho                      Follow us @wildpackets

                                                   © WildPackets, Inc.   www.wildpackets.com
Agenda
•   Current Trends in Application Distribution
•   Monitoring Application Performance
•   Network Analysis Architecture in a Distributed World
•   Network Analysis – Proactive vs. Reactive
•   Using Network Analysis for Application Performance
    Monitoring
• Company Overview
• Product Line Overview



                 Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   2
Current Trends in Application
         Distribution




                      © WildPackets, Inc.   www.wildpackets.com
First, Back to Basics
• Cloud – it’s all the rage
   ‒ Public
   ‒ Private
   ‒ Hybrid
• ―… as a Service‖
   ‒ Software aaS
   ‒ Infrastructure aaS
   ‒ Platform aaS
• Application Service Providers
• Virtualization
• Grid computing

                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   4
Let’s Focus
• Cloud – it’s all the rage
   ‒ Public
   ‒ Private
   ‒ Hybrid
• “… as a Service”
   ‒ Software aaS
   ‒ Infrastructure aaS
   ‒ Platform aaS
• Application Service Providers
• Virtualization
• Grid computing

                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   5
Cloud Computing Characteristics1
• Providing applications to end users vs. just
    computer cycles
•   Scalability
•   Elasticity – compute power grows and shrinks
•   Simple, web-based provisioning
•   Integration and ease-of-use
•   Simple cost structure
•   Worldwide data recovery
•   Device independence
•   Example – Hosted corporate email ala Google
                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   6
ASPs vs. Cloud Computing
• Most ASP vendors were start-ups
  ‒   Limited resources
  ‒   Unknown pedigree
  ‒   Short life spans
  ‒   Flexible application choices
• Cloud computing vendors are big companies
  ‒   Resources for enormous data centers
  ‒   Vast amounts of storage
  ‒   Computing capacity to service millions of users
  ‒   Experience with large-scale web-based applications
  ‒   Google, Dell, Amazon, IBM, etc.
  ‒   Less application choice but more economy of scale


                   Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   7
―aaS‖ vs. Cloud Computing
• ―aaS‖
  ‒ Flexibility
  ‒ Little to no integration between services (stovepipes)
• Cloud Computing
  ‒ All applications 100% integrated on the Web
  ‒ No install, no IT, no human intervention by the vendor




                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   8
Current Trends2
• 69% of US Internet users are using some form of
 Internet-based computing (Pew Research Center)
• 40% of IT infrastructure purchases by early
 technology adopters are ―as a service‖
• By 2013, 12% of world software market will be
 Internet-based computing (Merrill Lynch)
• 78% of IT managers believe economic uncertainty
 makes Cloud Computing more appealing (ScanSafe)




               Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   9
Does It Really Matter?




Forget what you call it – focus
  on the changing network
   management equation




       Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   10
Monitoring Application
    Performance




                   © WildPackets, Inc.   www.wildpackets.com
It’s All About The User
Application Response Time – The time it takes an
 application to respond to a specific user request,
 measured from the user’s perspective
     3 Performance Levels of User Satisfaction




                Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   12
A Bit More Precisely …
          Application Response Time =
Network Response Time + Transaction Response Time




              Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   13
Network Response Time
                          Network Response Time (R) ~
                      (payload/bandwidth) + [AppTurns*RTT]

          • Network Response Time (R): Time between a user’s action and
             the network’s response to that action
          • Payload: Information content in bytes
          • Bandwidth: Minimal link speed between client and server
          • AppTurns: Number of interactions needed between the client
             and server to provide a response to the user
          • Round Trip Response Time (RTT): Propagation time for data
             between the client and server


Adapted from Peter Sevcik and
Rebecca Wetzel of NetForecast
                                Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   14
Other Network Response Time
           Considerations
• NRT is dynamic, never a constant
• DNS response time is a common source of
 performance issues
• Proxy servers – TCP connection is not end-to-end to
 the server
• Multi-tier designs – network latency between each
 tier




               Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   15
Transaction Response Time
           Transaction Response Time (TRT) ~
 Server Response Time (SRT) + Client Response Time (CRT)

          • Server Response Time (SRT): Processing time required by the
             server
          • Client Response Time (CRT): Processing time required by the
             client




Adapted from Peter Sevcik and
Rebecca Wetzel of NetForecast
                                Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   16
Transaction Response Time Factors
• Server Latency: Time for the server to process a
 request - memory, disk system, CPU, and usage
 dependent
• Application Latency: Time for the application itself to
 process the request – mostly software design
 dependent
• Database Latency: Database design factors that
 contribute to overall processing time – eg.
 fragmentation, indexing, etc.
• Browser/Workstation Latency: The client side of the
 equation
• Protocol Usage: Some protocols outperform others
                Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   17
It’s All About The User
   3 Performance Levels of User Satisfaction




Application Response Time ~ (payload/bandwidth) +
            [AppTurns*RTT] + SRT + CRT
             Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   18
Network Analysis Architecture in a
       Distributed World




                         © WildPackets, Inc.   www.wildpackets.com
Where To Look?




Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   20
Different Approaches, Different Results
 • Server-side or Client-side?
    ‒ Client side
        • Closest to what the user sees
        • Difficult to troubleshoot delays
        • Monitoring equipment at all remote sites – expensive
    ‒ Server-side
        • RTT harder to determine
        • Consolidation of monitoring equipment
        • Better able to assess server response time
 • Active or Passive?
    ‒ Active
        • Challenging to accurately simulate user traffic patterns
        • Predictable
        • Better for ongoing monitoring
    ‒ Passive
        • Closer representation of the user experience
        • Somewhat unpredictable
        • Best for pre-deployment application profiling
                       Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   21
Network Analysis Example
  2. Data Recorder records                                                                       IDS/IPS System
  and aggregates data
  throughout attack

                                                                                                3. Event logged, attack
                                                                                                partially tracked by IDS




                                                                                                               Servers
1. Attack
bypasses firewall




                                4. Post event analysis reveals
                                attacker, method, damage!
                         Your Applications Are Distributed – How About Your Network Analysis?            © WildPackets, Inc.   22
The Cloud Changes Very Little




                                                                              Cloud Provider
       Your Applications Are Distributed – How About Your Network Analysis?                    © WildPackets, Inc.   23
Network Analysis – Proactive vs.
          Reactive




                        © WildPackets, Inc.   www.wildpackets.com
Network Analysis: Not Just Reactive!
• Network analysis and troubleshooting has
 traditionally been implemented only when there’s a
 problem
• But proactive troubleshooting identifies troubles
 when they are small and are having minimal impact!
• The concept is simple…

      Proactive                                                       Reactive
      Troubleshooting                      =                          Troubleshooting




                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   25
Know Your Network
• Traffic levels per                                      • Baselines
  segment                                                           ‒ Establish and re-establish
    ‒ Mbps?                                                         ‒ Use Expert events for further
    ‒ Packets per                                                     classification
      second?
    ‒ Packet size
      distribution?
• Traffic level per
  application
    ‒ Average rates
    ‒ Peak rates
    ‒ Weekly patterns




                      Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   26
Using Network Analysis for
 Application Performance
       Monitoring



                     © WildPackets, Inc.   www.wildpackets.com
User’s Perspective




 Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   28
Analyst’s Perspective




   Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   29
Application Performance Monitoring
   Doesn’t Change in the Cloud

• All the same goals apply
   ‒   Monitoring/alarms
   ‒   Real-time analysis
   ‒   Post-capture analysis
   ‒   Network performance
   ‒   Application performance
   ‒   Service level assessments
• Only the implementation is different



                   Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   30
A Case Study
• April, 2011 – Amazon’s EC2 Web Service outage
 lasts nearly 24 hours and takes brand-name websites
 down with it
• Highlights the need to ―design for failure‖
• Lessons:
   ‒ Monitoring remains highly valuable in the Cloud
   ‒ Cloud providers must do a better job of making service
     uninterrupted to attract customers
   ‒ Determining when the interruption is in your network or from
     your service provider




                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   31
Getting It All In One Place




                                   ~ RTT
Payload
                         Turns


                                           ~ SRT, CRT




          Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   32
SRT, CRT Highly Variable




    Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   33
The Network Or The Application?

       Possible Issues on the Network




      Possible Issues with the Application




         Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   34
Expert Analysis Leads The Way

                               System or Application is at fault




                                                               Network may be at fault

       Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   35
What To Look For
• Primary events are anything related to ―slow‖
   ‒ Depending on what events we see, we will know who is at fault
• Typical application events:
   ‒ HTTP slow response time
   ‒ Oracle slow response time
   ‒ Inefficient client
• Typical network events:
   ‒   TCP SLOW segment recovery
   ‒   Slow retransmissions
   ‒   Slow acknowledgements
   ‒   Low throughput



                  Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   36
Visual Expert Provides Proof
   Two requests for data, two quick TCP Acks, but then a long delay
              before the server sends the requested data




                                                                                  ACK fast = Network fast
Requests and                            Then the Data
Acks                                    gets returned
                                        much later
                                                                                 Data slow = System slow




                 Your Applications Are Distributed – How About Your Network Analysis?      © WildPackets, Inc.   37
Company Overview




               © WildPackets, Inc.   www.wildpackets.com
Corporate Background
• Experts in network monitoring, analysis, and troubleshooting
   ‒ Founded: 1990 / Headquarters: Walnut Creek, CA
   ‒ Offices throughout the US, EMEA, and APAC


• Our customers are leading edge organizations
   ‒ Mid-market, and enterprise lines of business
   ‒ Financial, manufacturing, ISPs, major federal agencies,
     state and local governments, and universities
   ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000


• Award-winning solutions that improve network performance
   ‒ Internet Telephony, Network Magazine, Network Computing Awards
   ‒ United States Patent 5,787,253 issued July 28, 1998
        • Different approach to maintaining availability of network services

                     Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   39
Real-World Deployments
    Education                                Financial                                        Government




Health Care / Retail                         Telecom                                          Technology




                       Your Applications Are Distributed – How About Your Network Analysis?    © WildPackets, Inc.   40
Product Line Overview




                  © WildPackets, Inc.   www.wildpackets.com
Product Line Overview
              OmniPeek/Compass
Enterprise Packet Capture, Decode and Analysis
    • 10/100/1000 Ethernet, Wireless, WAN, 10G
    • Portable capture and OmniEngine console
    • VoIP analysis and call playback


                Omnipliance / TimeLine
     Distributed Enterprise Network Forensics
            • Packet capture and real-time analysis
            • Stream-to-disk for forensics analysis
            • Integrated OmniAdapter network analysis cards


                                  WatchPoint
  Centralized Enterprise Network Monitoring Appliance
          • Aggregation and graphical display of network data
          • WildPackets OmniEngines
          • NetFlow and sFlow

                     Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   43
OmniPeek Network Analyzer
• OmniEngine Manager
   – Connect and configure distributed OmniEngines/Omnipliances
• Comprehensive dashboards present network traffic in real-time
   – Vital statistics and graphs display trends on network and application
     performance
   – Visual peer-map shows conversations and protocols
   – Intuitive drill-down for root-cause analysis of performance bottlenecks
• Visual Expert diagnosis speeds problem resolution
   – Packet and Payload visualizers provide business-centric views
• Automated analytics and problem detection 24/7
   – Easily create filters, triggers, scripting, advanced alarms and alerts




                     Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   44
Omnipliance Network Recorders
•   Captures and analyzes all network traffic 24x7
     – Runs our OmniEngine software probe
     – Generates vital statistics on network and application performance
     – Intuitive root-cause analysis of performance bottlenecks
•   Expert analysis speeds problem resolution
     – Fault analysis, statistical analysis, and independent notification
•   Multiple Issue Digital Forensics
     – Real-time and post capture data mining for compliance and troubleshooting
•   Intelligent data transport
     –   Network data analyzed locally
     –   Detailed analysis passed to OmniPeek on demand
     –   Summary statistics sent to WatchPoint for long term trending and reporting
     –   Efficient use of network bandwidth
•   User-Extensible Platform
     – Plug-in architecture and SDK

                         Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   45
Omnipliance Network Recorders
Price/performance solutions for every application




        Portable                                   Edge                                         Core
        Ruggedized                          Small Networks                         Datacenter Workhorse
      Troubleshooting                       Remote Offices                          Easily Expandable
 Aluminum chassis / 17” LCD          1U rack mountable chassis                    3U rack mountable chassis
 Quad-Core Xeon 2.5GHz               Quad-Core Intel Xeon                         Two Quad-Core Intel Xeon
                                     X3460 2.80Ghz                                E5530 2.4Ghz
 4GB RAM                             4GB RAM                                      6GB RAM
 2 PCI-E Slots                       2 PCI-E Slots                                4 PCI-E Slots
 2 Built-in Ethernet Ports           2 Built-in Ethernet Ports                    2 Built-in Ethernet Ports
 500GB and 2.5TB SATA                1TB SATA storage capacity                    2TB SATA storage capacity
 storage capacity
                         Your Applications Are Distributed – How About Your Network Analysis?          © WildPackets, Inc.   46
TimeLine
• Fastest network recording and real-time statistical
 display — simultaneously
   ‒ 11.7Gbps sustained capture with zero packet loss
   ‒ Network statistics display in TimeLine visualization format
• Rapid, intuitive forensics search and retrieval
   ‒ Historical network traffic analysis and quick data rewinding
   ‒ Several pre-defined forensics search templates making
     searches easy and fast
• A natural extension to the WildPackets product line
• Turnkey bundled solution
   ‒ Appliance + OmniEngine, OmniAdapter, OmniPeek Connect


                   Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   47
TimeLine
For the most demanding network analysis tasks




                                   TimeLine

                           10g Network Forensics

        3U rack mountable chassis
        Two Quad-Core Intel Xeon 5560 2.8Ghz
        18GB RAM
        4 PCI-E Slots
        2 Built-in Ethernet Ports
        8/16/32TB SATA storage capacity



              Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   48
WatchPoint
Centralized Monitoring for Distributed Enterprise Networks

                                                                      •      High-level, aggregated
                                                                             view of all network
                                                                             segments
                                                                                – Monitor per campus, per
                                                                                  region, per country
                                                                      •      Wide range of network
                                                                             data
                                                                                – NetFlow, sFlow, OmniFlow
                                                                      •      Web-based, customizable
                                                                             network dashboards
                                                                      •      Flexible detailed reports
                                                                      •      Omnipliances must be
                                                                             configured for continuous
                                                                             capture
                  Your Applications Are Distributed – How About Your Network Analysis?     © WildPackets, Inc.   49
WildPackets Key Differentiators
• Visual Expert Intelligence with Intuitive Drill-down
    – Let computer do the hard work, and return results, real-time
    – Packet / Payload Visualizers are faster than packet-per-packet diagnostics
    – Experts and analytics can be memorized and automated
• Automated Capture Analytics
    – Filters, triggers, scripting and advanced alarming system combine to provide
      automated network problem detection 24x7
• Multiple Issue Network Forensics
    – Can be tracked by one or more people simultaneously
    – Real-time or post capture
• User-Extensible Platform
    – Plug-in architecture and SDK
• Aggregated Network Views and Reporting
    – NetFlow, sFlow, and OmniFlow


                       Your Applications Are Distributed – How About Your Network Analysis?   © WildPackets, Inc.   50
Q&A

   Show us your tweets!
      Use today’s webinar hashtag:           Follow us on SlideShare!
                                              Check out today’s slides on SlideShare
       #wp_distributed                           www.slideshare.net/wildpackets
with any questions, comments, or feedback.
          Follow us @wildpackets



                                                           © WildPackets, Inc.   www.wildpackets.com
Thank You!


WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200

                                    © WildPackets, Inc.   www.wildpackets.com

Contenu connexe

Tendances

Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
 
Ca partner day - qualità servizi - roma 2 di 2
Ca partner day - qualità servizi - roma 2 di 2Ca partner day - qualità servizi - roma 2 di 2
Ca partner day - qualità servizi - roma 2 di 2CA Technologies Italia
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Orion NTA Customer Training
Orion NTA Customer TrainingOrion NTA Customer Training
Orion NTA Customer TrainingSolarWinds
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network MayhemPacketTrap Msp
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best PracticesSolarWinds
 
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Splunk
 
Best reviews for Nevales Networks
Best reviews for Nevales NetworksBest reviews for Nevales Networks
Best reviews for Nevales NetworksNevales Networks
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesSolarWinds
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsSolarWinds
 

Tendances (20)

Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and Support
 
Ca partner day - qualità servizi - roma 2 di 2
Ca partner day - qualità servizi - roma 2 di 2Ca partner day - qualità servizi - roma 2 di 2
Ca partner day - qualità servizi - roma 2 di 2
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Orion NTA Customer Training
Orion NTA Customer TrainingOrion NTA Customer Training
Orion NTA Customer Training
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best Practices
 
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
 
Best reviews for Nevales Networks
Best reviews for Nevales NetworksBest reviews for Nevales Networks
Best reviews for Nevales Networks
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing Rules
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) Solutions
 

En vedette

AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIPMakkawy khair
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?STelligence Company
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPSevana Oü
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Kaela Loffler
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 

En vedette (20)

AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
 
How to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy StepsHow to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy Steps
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
CWNA
CWNACWNA
CWNA
 
Iuwne10 S05 L04
Iuwne10 S05 L04Iuwne10 S05 L04
Iuwne10 S05 L04
 
Iuwne10 S03 L05
Iuwne10 S03 L05Iuwne10 S03 L05
Iuwne10 S03 L05
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIP
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
La acción marzo 2015 (1)
La acción marzo 2015 (1)La acción marzo 2015 (1)
La acción marzo 2015 (1)
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 

Similaire à Your Applications Are Distributed, How About Your Network Analysis Solution?

Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011IndicThreads
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centersNarendran Vaideeswaran
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera, Inc.
 
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPROIDEA
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summitMatt Carroll
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Cloud-Native Data: What data questions to ask when building cloud-native apps
Cloud-Native Data: What data questions to ask when building cloud-native appsCloud-Native Data: What data questions to ask when building cloud-native apps
Cloud-Native Data: What data questions to ask when building cloud-native appsVMware Tanzu
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
 

Similaire à Your Applications Are Distributed, How About Your Network Analysis Solution? (20)

Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Design of network
Design of networkDesign of network
Design of network
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
 
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summit
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Cloud-Native Data: What data questions to ask when building cloud-native apps
Cloud-Native Data: What data questions to ask when building cloud-native appsCloud-Native Data: What data questions to ask when building cloud-native apps
Cloud-Native Data: What data questions to ask when building cloud-native apps
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Grid computing
Grid computingGrid computing
Grid computing
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 

Plus de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 

Plus de Savvius, Inc (20)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 

Dernier

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Your Applications Are Distributed, How About Your Network Analysis Solution?

  • 1. Your Applications Are Distributed How About Your Network Analysis Solution? Jay Botelho Show us your tweets! Use today’s webinar hashtag: Director of Product Management WildPackets #wp_distributed jbotelho@wildpackets.com with any questions, comments, or feedback. Follow me @jaybotelho Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 2. Agenda • Current Trends in Application Distribution • Monitoring Application Performance • Network Analysis Architecture in a Distributed World • Network Analysis – Proactive vs. Reactive • Using Network Analysis for Application Performance Monitoring • Company Overview • Product Line Overview Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 2
  • 3. Current Trends in Application Distribution © WildPackets, Inc. www.wildpackets.com
  • 4. First, Back to Basics • Cloud – it’s all the rage ‒ Public ‒ Private ‒ Hybrid • ―… as a Service‖ ‒ Software aaS ‒ Infrastructure aaS ‒ Platform aaS • Application Service Providers • Virtualization • Grid computing Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 4
  • 5. Let’s Focus • Cloud – it’s all the rage ‒ Public ‒ Private ‒ Hybrid • “… as a Service” ‒ Software aaS ‒ Infrastructure aaS ‒ Platform aaS • Application Service Providers • Virtualization • Grid computing Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 5
  • 6. Cloud Computing Characteristics1 • Providing applications to end users vs. just computer cycles • Scalability • Elasticity – compute power grows and shrinks • Simple, web-based provisioning • Integration and ease-of-use • Simple cost structure • Worldwide data recovery • Device independence • Example – Hosted corporate email ala Google Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 6
  • 7. ASPs vs. Cloud Computing • Most ASP vendors were start-ups ‒ Limited resources ‒ Unknown pedigree ‒ Short life spans ‒ Flexible application choices • Cloud computing vendors are big companies ‒ Resources for enormous data centers ‒ Vast amounts of storage ‒ Computing capacity to service millions of users ‒ Experience with large-scale web-based applications ‒ Google, Dell, Amazon, IBM, etc. ‒ Less application choice but more economy of scale Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 7
  • 8. ―aaS‖ vs. Cloud Computing • ―aaS‖ ‒ Flexibility ‒ Little to no integration between services (stovepipes) • Cloud Computing ‒ All applications 100% integrated on the Web ‒ No install, no IT, no human intervention by the vendor Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 8
  • 9. Current Trends2 • 69% of US Internet users are using some form of Internet-based computing (Pew Research Center) • 40% of IT infrastructure purchases by early technology adopters are ―as a service‖ • By 2013, 12% of world software market will be Internet-based computing (Merrill Lynch) • 78% of IT managers believe economic uncertainty makes Cloud Computing more appealing (ScanSafe) Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 9
  • 10. Does It Really Matter? Forget what you call it – focus on the changing network management equation Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 10
  • 11. Monitoring Application Performance © WildPackets, Inc. www.wildpackets.com
  • 12. It’s All About The User Application Response Time – The time it takes an application to respond to a specific user request, measured from the user’s perspective 3 Performance Levels of User Satisfaction Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 12
  • 13. A Bit More Precisely … Application Response Time = Network Response Time + Transaction Response Time Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 13
  • 14. Network Response Time Network Response Time (R) ~ (payload/bandwidth) + [AppTurns*RTT] • Network Response Time (R): Time between a user’s action and the network’s response to that action • Payload: Information content in bytes • Bandwidth: Minimal link speed between client and server • AppTurns: Number of interactions needed between the client and server to provide a response to the user • Round Trip Response Time (RTT): Propagation time for data between the client and server Adapted from Peter Sevcik and Rebecca Wetzel of NetForecast Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 14
  • 15. Other Network Response Time Considerations • NRT is dynamic, never a constant • DNS response time is a common source of performance issues • Proxy servers – TCP connection is not end-to-end to the server • Multi-tier designs – network latency between each tier Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 15
  • 16. Transaction Response Time Transaction Response Time (TRT) ~ Server Response Time (SRT) + Client Response Time (CRT) • Server Response Time (SRT): Processing time required by the server • Client Response Time (CRT): Processing time required by the client Adapted from Peter Sevcik and Rebecca Wetzel of NetForecast Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 16
  • 17. Transaction Response Time Factors • Server Latency: Time for the server to process a request - memory, disk system, CPU, and usage dependent • Application Latency: Time for the application itself to process the request – mostly software design dependent • Database Latency: Database design factors that contribute to overall processing time – eg. fragmentation, indexing, etc. • Browser/Workstation Latency: The client side of the equation • Protocol Usage: Some protocols outperform others Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 17
  • 18. It’s All About The User 3 Performance Levels of User Satisfaction Application Response Time ~ (payload/bandwidth) + [AppTurns*RTT] + SRT + CRT Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 18
  • 19. Network Analysis Architecture in a Distributed World © WildPackets, Inc. www.wildpackets.com
  • 20. Where To Look? Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 20
  • 21. Different Approaches, Different Results • Server-side or Client-side? ‒ Client side • Closest to what the user sees • Difficult to troubleshoot delays • Monitoring equipment at all remote sites – expensive ‒ Server-side • RTT harder to determine • Consolidation of monitoring equipment • Better able to assess server response time • Active or Passive? ‒ Active • Challenging to accurately simulate user traffic patterns • Predictable • Better for ongoing monitoring ‒ Passive • Closer representation of the user experience • Somewhat unpredictable • Best for pre-deployment application profiling Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 21
  • 22. Network Analysis Example 2. Data Recorder records IDS/IPS System and aggregates data throughout attack 3. Event logged, attack partially tracked by IDS Servers 1. Attack bypasses firewall 4. Post event analysis reveals attacker, method, damage! Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 22
  • 23. The Cloud Changes Very Little Cloud Provider Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 23
  • 24. Network Analysis – Proactive vs. Reactive © WildPackets, Inc. www.wildpackets.com
  • 25. Network Analysis: Not Just Reactive! • Network analysis and troubleshooting has traditionally been implemented only when there’s a problem • But proactive troubleshooting identifies troubles when they are small and are having minimal impact! • The concept is simple… Proactive Reactive Troubleshooting = Troubleshooting Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 25
  • 26. Know Your Network • Traffic levels per • Baselines segment ‒ Establish and re-establish ‒ Mbps? ‒ Use Expert events for further ‒ Packets per classification second? ‒ Packet size distribution? • Traffic level per application ‒ Average rates ‒ Peak rates ‒ Weekly patterns Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 26
  • 27. Using Network Analysis for Application Performance Monitoring © WildPackets, Inc. www.wildpackets.com
  • 28. User’s Perspective Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 28
  • 29. Analyst’s Perspective Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 29
  • 30. Application Performance Monitoring Doesn’t Change in the Cloud • All the same goals apply ‒ Monitoring/alarms ‒ Real-time analysis ‒ Post-capture analysis ‒ Network performance ‒ Application performance ‒ Service level assessments • Only the implementation is different Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 30
  • 31. A Case Study • April, 2011 – Amazon’s EC2 Web Service outage lasts nearly 24 hours and takes brand-name websites down with it • Highlights the need to ―design for failure‖ • Lessons: ‒ Monitoring remains highly valuable in the Cloud ‒ Cloud providers must do a better job of making service uninterrupted to attract customers ‒ Determining when the interruption is in your network or from your service provider Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 31
  • 32. Getting It All In One Place ~ RTT Payload Turns ~ SRT, CRT Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 32
  • 33. SRT, CRT Highly Variable Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 33
  • 34. The Network Or The Application? Possible Issues on the Network Possible Issues with the Application Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 34
  • 35. Expert Analysis Leads The Way System or Application is at fault Network may be at fault Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 35
  • 36. What To Look For • Primary events are anything related to ―slow‖ ‒ Depending on what events we see, we will know who is at fault • Typical application events: ‒ HTTP slow response time ‒ Oracle slow response time ‒ Inefficient client • Typical network events: ‒ TCP SLOW segment recovery ‒ Slow retransmissions ‒ Slow acknowledgements ‒ Low throughput Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 36
  • 37. Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Requests and Then the Data Acks gets returned much later Data slow = System slow Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 37
  • 38. Company Overview © WildPackets, Inc. www.wildpackets.com
  • 39. Corporate Background • Experts in network monitoring, analysis, and troubleshooting ‒ Founded: 1990 / Headquarters: Walnut Creek, CA ‒ Offices throughout the US, EMEA, and APAC • Our customers are leading edge organizations ‒ Mid-market, and enterprise lines of business ‒ Financial, manufacturing, ISPs, major federal agencies, state and local governments, and universities ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 • Award-winning solutions that improve network performance ‒ Internet Telephony, Network Magazine, Network Computing Awards ‒ United States Patent 5,787,253 issued July 28, 1998 • Different approach to maintaining availability of network services Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 39
  • 40. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 40
  • 41. Product Line Overview © WildPackets, Inc. www.wildpackets.com
  • 42. Product Line Overview OmniPeek/Compass Enterprise Packet Capture, Decode and Analysis • 10/100/1000 Ethernet, Wireless, WAN, 10G • Portable capture and OmniEngine console • VoIP analysis and call playback Omnipliance / TimeLine Distributed Enterprise Network Forensics • Packet capture and real-time analysis • Stream-to-disk for forensics analysis • Integrated OmniAdapter network analysis cards WatchPoint Centralized Enterprise Network Monitoring Appliance • Aggregation and graphical display of network data • WildPackets OmniEngines • NetFlow and sFlow Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 43
  • 43. OmniPeek Network Analyzer • OmniEngine Manager – Connect and configure distributed OmniEngines/Omnipliances • Comprehensive dashboards present network traffic in real-time – Vital statistics and graphs display trends on network and application performance – Visual peer-map shows conversations and protocols – Intuitive drill-down for root-cause analysis of performance bottlenecks • Visual Expert diagnosis speeds problem resolution – Packet and Payload visualizers provide business-centric views • Automated analytics and problem detection 24/7 – Easily create filters, triggers, scripting, advanced alarms and alerts Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 44
  • 44. Omnipliance Network Recorders • Captures and analyzes all network traffic 24x7 – Runs our OmniEngine software probe – Generates vital statistics on network and application performance – Intuitive root-cause analysis of performance bottlenecks • Expert analysis speeds problem resolution – Fault analysis, statistical analysis, and independent notification • Multiple Issue Digital Forensics – Real-time and post capture data mining for compliance and troubleshooting • Intelligent data transport – Network data analyzed locally – Detailed analysis passed to OmniPeek on demand – Summary statistics sent to WatchPoint for long term trending and reporting – Efficient use of network bandwidth • User-Extensible Platform – Plug-in architecture and SDK Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 45
  • 45. Omnipliance Network Recorders Price/performance solutions for every application Portable Edge Core Ruggedized Small Networks Datacenter Workhorse Troubleshooting Remote Offices Easily Expandable Aluminum chassis / 17” LCD 1U rack mountable chassis 3U rack mountable chassis Quad-Core Xeon 2.5GHz Quad-Core Intel Xeon Two Quad-Core Intel Xeon X3460 2.80Ghz E5530 2.4Ghz 4GB RAM 4GB RAM 6GB RAM 2 PCI-E Slots 2 PCI-E Slots 4 PCI-E Slots 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 500GB and 2.5TB SATA 1TB SATA storage capacity 2TB SATA storage capacity storage capacity Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 46
  • 46. TimeLine • Fastest network recording and real-time statistical display — simultaneously ‒ 11.7Gbps sustained capture with zero packet loss ‒ Network statistics display in TimeLine visualization format • Rapid, intuitive forensics search and retrieval ‒ Historical network traffic analysis and quick data rewinding ‒ Several pre-defined forensics search templates making searches easy and fast • A natural extension to the WildPackets product line • Turnkey bundled solution ‒ Appliance + OmniEngine, OmniAdapter, OmniPeek Connect Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 47
  • 47. TimeLine For the most demanding network analysis tasks TimeLine 10g Network Forensics 3U rack mountable chassis Two Quad-Core Intel Xeon 5560 2.8Ghz 18GB RAM 4 PCI-E Slots 2 Built-in Ethernet Ports 8/16/32TB SATA storage capacity Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 48
  • 48. WatchPoint Centralized Monitoring for Distributed Enterprise Networks • High-level, aggregated view of all network segments – Monitor per campus, per region, per country • Wide range of network data – NetFlow, sFlow, OmniFlow • Web-based, customizable network dashboards • Flexible detailed reports • Omnipliances must be configured for continuous capture Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 49
  • 49. WildPackets Key Differentiators • Visual Expert Intelligence with Intuitive Drill-down – Let computer do the hard work, and return results, real-time – Packet / Payload Visualizers are faster than packet-per-packet diagnostics – Experts and analytics can be memorized and automated • Automated Capture Analytics – Filters, triggers, scripting and advanced alarming system combine to provide automated network problem detection 24x7 • Multiple Issue Network Forensics – Can be tracked by one or more people simultaneously – Real-time or post capture • User-Extensible Platform – Plug-in architecture and SDK • Aggregated Network Views and Reporting – NetFlow, sFlow, and OmniFlow Your Applications Are Distributed – How About Your Network Analysis? © WildPackets, Inc. 50
  • 50. Q&A Show us your tweets! Use today’s webinar hashtag: Follow us on SlideShare! Check out today’s slides on SlideShare #wp_distributed www.slideshare.net/wildpackets with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 51. Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200 © WildPackets, Inc. www.wildpackets.com