SlideShare una empresa de Scribd logo
1 de 48
Tune Up Your Network  For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
What To Consider
Know Your Network Traffic levels per segment Mbps?  Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
Statistics vs. Packets
Not All Flows Are Created Equal
It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 9
Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
Resolve to Develop Baselines
Network Dashboard
VoIP Dashboard
Application Dashboard
A Bit More Precisely … Application Response Time
Archiving Your Results Packets files Formatted reports
Common Pitfalls
5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
The Network Battlefield
Data Impacts on VoIP
Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
Key VoIP/Video Issues Packet  Loss Latency Jitter CAMP IT Pinpointing the Problem 22
Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example:   The WAN can support 2 simultaneous calls.   	              What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
Monitoring For Life
Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments?  (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
Troubleshooting As A Last Resort
Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
Analyst’s Perspective
Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and  Acks Data slow = System slow
Company Overview
Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
Product Line Overview
Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country  Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
Omnipliance Network RecordersPrice/performance solutions for every application
OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization

Más contenido relacionado

La actualidad más candente

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalEmily Pechal
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinarpmohapat
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdRonald Bartels
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
The Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANThe Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANEric Lee
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Canada
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016ADVA
 

La actualidad más candente (20)

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily Pechal
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
The Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WANThe Power of UCaaS + SD-WAN
The Power of UCaaS + SD-WAN
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN
SD WANSD WAN
SD WAN
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016
 

Destacado

Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Kaela Loffler
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIPMakkawy khair
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPSevana Oü
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?STelligence Company
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 

Destacado (20)

CWNA
CWNACWNA
CWNA
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
Assuring Quality of Experience in Dynamic Networks: Gaining Full End User Vis...
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Passive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIPPassive Call Quality Monitoring in VoIP
Passive Call Quality Monitoring in VoIP
 
Iuwne10 S05 L04
Iuwne10 S05 L04Iuwne10 S05 L04
Iuwne10 S05 L04
 
La acción marzo 2015 (1)
La acción marzo 2015 (1)La acción marzo 2015 (1)
La acción marzo 2015 (1)
 
Iuwne10 S03 L05
Iuwne10 S03 L05Iuwne10 S03 L05
Iuwne10 S03 L05
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
How to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy StepsHow to Get a Forensic Job: 10 Easy Steps
How to Get a Forensic Job: 10 Easy Steps
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 

Similar a Tune Up Your Network For The New Year With WildPackets

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point SolutionSavvius, Inc
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 
NetQoS Performance Center Overview
NetQoS Performance Center OverviewNetQoS Performance Center Overview
NetQoS Performance Center OverviewDenny K
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingSavvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewManageEngine
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4danieljimmie
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Presofaiiqb
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSailaja Tennati
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 

Similar a Tune Up Your Network For The New Year With WildPackets (20)

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
NetQoS Performance Center Overview
NetQoS Performance Center OverviewNetQoS Performance Center Overview
NetQoS Performance Center Overview
 
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and TroubleshootingPlanning For Success - Wireless Network Design, Analysis, and Troubleshooting
Planning For Success - Wireless Network Design, Analysis, and Troubleshooting
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
Cascade
CascadeCascade
Cascade
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics System
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 

Más de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 

Más de Savvius, Inc (20)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Tune Up Your Network For The New Year With WildPackets

  • 1. Tune Up Your Network For The New Year Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com
  • 2. Agenda What to consider Resolve to develop baselines Common pitfalls The network battlefield Monitoring for life Troubleshooting as a last resort Company overview Product line overview
  • 4. Know Your Network Traffic levels per segment Mbps? Packets per second? Packet size distribution? Traffic types per segment Data? VoIP? Video? Baselines Establish and re-establish Use automated analysis to identify anomalies
  • 6. Not All Flows Are Created Equal
  • 7. It’s All In The Packets Packets contain vitalinformation not detected by flow-based systems
  • 8. Choices and Comprises Greater visibility Monitoringand troubleshooting Single solution Integrated, cost-effective Packet-based Overhead? Cost?
  • 9. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 9
  • 10. Be Specific Where to collect data? Real-time or post-capture analysis? Everywhere? What data to collect? Am I getting all the data I expect?
  • 11. Resolve to Develop Baselines
  • 15. A Bit More Precisely … Application Response Time
  • 16. Archiving Your Results Packets files Formatted reports
  • 18. 5 Most Common Networking Problems Cabling issues Connectivity problems Configuration Hardware malfunctions Excessive network collisions Collisions are normal and expected Early collisions – first 512 bits – recovery automatic (2 – 3 ms) Late collisions – recovery 100x longer – eg. NIC stuck in TX mode Software problem DNS configuration WINS configuration Duplicate IP addresses
  • 21. Network Traffic: Quantitative Analysis Most network engineers are concerned about the amount of traffic on their networks Utilization (percentage of bandwidth) Throughput (bits or bytes per second) You also need to be concerned about individual utilization components How much bandwidth and throughput can be attributed to each application or process? Clarifies which application traffic may need to be tuned or controlled How well or poorly will the baseline (trended) behavior of each application interact with VoIP Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
  • 22. Key VoIP/Video Issues Packet Loss Latency Jitter CAMP IT Pinpointing the Problem 22
  • 23. Network Traffic: Qualitative Analysis The quality of your network traffic is potentially more important than its quantity when it comes to VoIP Many traffic streams are “bursty” in nature Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes Prolonged rises in utilization may decrease the number of calls that can occur simultaneously Sharp spikes may cause very noticeable quality issues with ongoing calls Your baseline monitoring should consider not only averages and long-term trends, but also the short-term peaks and dips that characterize your traffic flow
  • 24. Assessing the Monster's Impact While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP is very sensitive to these troubles Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP network Pre- and post-deployment network assessments are critical You must understand your network’s ability to accommodate VoIP Current latency, jitter, and packet loss QoS capabilities Current bandwidth utilization (is there any room for VoIP) You must maintain a constant vigil after deployment to watch for imminent troubles
  • 25. The Impact of "Just One More Call" Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… 1st Call 2nd Call x2111 x1111 x2112 x1112 3rd Call x2113 x1113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
  • 27. Changing Methods - Data Recorders Servers IDS/IPS System Post-incident Real-time
  • 28. Strategy for Monitoring 10G Ethernet Which of the following apply to your strategy for monitoring 10G segments? (Select all that apply) SOURCE:Benchmarking Network and Security Operations: Tools, Processes, and Enabling Technologies Study, 2009, Enterprise Management Associates. n=124
  • 29. 10Gig Network Analysis Workflow Identify Key Analysis Pts Deploy 24x7 Monitoring Alarms/Alerts At 10Gig – 24x7 Is Essential Problem? NO YES Rewind Data Analyze Tune if Necessary
  • 30. Troubleshooting As A Last Resort
  • 31. Network Recording,Real-Time Statistics, Forensics Search Display TimeLine Graph during capture-to-disk Utilization (Mbits/s) Packets/s unicast/multicast/broadcast Packet sizes VLAN/MPLS Protocols Company and Product Line Overview
  • 32. A Picture is Worth a 1000 Words A graph of latency, jitter, or packet loss can speak volumes about network health, either for proactive or reactive troubleshooting Overlaying this graph with a graph of utilization or total throughput can reveal even more about the causes of VoIP troubles
  • 34. Visual Expert Provides Proof Two requests for data, two quick TCP Acks, but then a long delay before the server sends the requested data ACK fast = Network fast Then the Data gets returned much later Requests and Acks Data slow = System slow
  • 36. Corporate Background Experts in network monitoring, analysis, and troubleshooting Founded: 1990 / Headquarters: Walnut Creek, CA Offices throughout the US, EMEA, and APAC Our customers are leading edge organizations Mid-market, and enterprise lines of business Financial, manufacturing, ISPs, major federal agencies,state and local governments, and universities Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 Award-winning solutions that improve network performance Internet Telephony, Network Magazine, Network Computing Awards United States Patent 5,787,253 issued July 28, 1998 Different approach to maintaining availability of network services
  • 37. What We Do Provide network visibility and intelligence … WatchPoint, OmniPeek, OmniEngines Expert systems – we find the problems for you Superior drill-down capability – trouble-shoot from anywhere Flexible, customizable, extensible – leverage your investment Professional services, training, best practices For all network segments … Data center to desktop to remote office LAN, WAN, Wireless … HTTP, Email, Database, VoIP, Video … To … Network engineers; IT Management; Developers
  • 38. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology
  • 39. With accurate visibilityinto the network…IT staff can improve: End-user Productivity Network Performance Application Performance Security Compliance
  • 41. Product OfferingsSoftware and Turnkey Appliances Enterprise Monitoring and Reporting WatchPoint Server OmniFlow, NetFlow, and sFlow Collectors Network Probes & Recorders Omnipliance Network Recorders – Edge, Core TimeLine Network Recorder OmniAdapter Analysis Cards Distributed Analysis Software OmniPeek – Enterprise, Professional, Basic, Connect OmniEngine – Enterprise, Desktop, OmniVirtual Portable Solutions OmniPeek software Omnipliance Portable
  • 42. WatchPointCentralized Monitoring for Distributed Enterprise Networks High-level, aggregated view of all network segments Monitor per campus, per region, per country Wide range of network data NetFlow, sFlow, OmniFlow, SNMP Web-based, customizable network dashboards Flexible and detailed reports
  • 43.
  • 44. Omnipliance Network Recorders Captures and analyzes all network traffic at the source 24x7 Runs our OmniEngine intelligent probe software Generates vital statistics on network and application performance Intuitive root-cause analysis of performance bottlenecks Intelligent data transport Network data analyzed locally Detailed analysis passed to OmniPeek on demand Summary statistics sent to WatchPoint for long term trending and reporting Efficient use of network bandwidth Expert analysis speeds problem resolution Fault analysis, statistical analysis, and independent notification Multiple Issue Digital Forensics Real-time and post capture data mining for compliance and troubleshooting
  • 45. TimeLine Network Recorder11.7Gbps Sustained Capture Fastest network recording and real-time statistical display — simultaneously Network statistics display in TimeLine visualization format Rapid, intuitive forensics search and retrieval Historical network traffic analysis and quick data rewinding Several pre-defined forensics search templates making searches easy and fast A natural extension to the WildPackets product line Turnkey bundled solution
  • 46. Omnipliance Network RecordersPrice/performance solutions for every application
  • 47. OmniPeek Network Analyzer OmniEngine Manager Connect and configure distributed OmniEngines/Omnipliances Comprehensive dashboards present network traffic in real-time Vital statistics and graphs display trends on network and application performance Visual peer-map shows conversations and protocols Intuitive drill-down for root-cause analysis of performance bottlenecks Visual Expert diagnosis speeds problem resolution Packet and Payload visualizers provide business-centric views Automated analytics and problem detection 24/7 Easily create filters, triggers, scripting, advanced alarms and alerts
  • 48. Key Differentiators High-level network monitoring to root-cause analysis Single solution for today’s converged networks Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV Reduce and even eliminate network downtime Automated monitoring 24x7 Speedy resolution of network bottlenecks Improve network and application performance Uniquely Extensible Platform – tailored to your needs Plug-ins and APIs for integration and customization
  • 49. Thank You! WildPackets, Inc.1340 Treat Boulevard, Suite 500Walnut Creek, CA 94597(925) 937-3200

Notas del editor

  1. NetFlowNetFlow is a network protocol developed by CiscoProprietary protocol that runs on Cisco IOSNetFlow accounts for all traffic going in and out of the routerTransit trafficTraffic destined for the routerEach NetFlow record contains a wide variety of information about the flowNetFlow never includes the payloads Sampled NetFlow can be configured for use on busy networks – not 100% accurateIPFIXInternet Protocol Flow Information eXchangeAn emerging, IETF (standard) version of NetFlowBased on NetFlow v9Predicted to rapidly become the industry standardsFlowA standard (RFC 3176), sampling-based mechanism to capture network traffic dataApplicable to higher speed networks (gigabit speeds or greater)An sFlow agent compiles flow recordsFlow records are based on Statistical packet-based samplingTime-based sampling of interface countersStatistically based – not 100% accurateJflowSimilar functionality to NetFlow but provided by JuniperData sampled at a globally configured rateStatistically based – not 100% accurateOmniFlowWildPackets proprietary flow analysis and recording mechanismAnalysis of each and every packetNot statistical – 100% accurateSignificantly exceeds the flow records from other mechanismsProvides detailed flow analysis above Layer 3VoIP/VideoApdexCorrelated event analysisCorrelated to packets for instant troubleshooting using deep packet inspection – a complete solution