Welcome!

@CloudExpo Authors: Kevin Benedict, Zakia Bouachraoui, Elizabeth White, Maria C. Horton, Liz McMillan

Related Topics: @CloudExpo, Linux Containers, Containers Expo Blog, @DXWorldExpo, SDN Journal, FinTech Journal, @DevOpsSummit

@CloudExpo: Article

Network Performance Monitoring | @CloudExpo #DataCenter #SDN #DevOps

Converged applications and network monitoring tools greatly enhance cross-team communication and collaboration.

Four Ways to Boost IT Performance with Application-Aware Network Performance Monitoring
By Amrutha Aprameya, Evangelist, ManageEngine

In an era of unified IT, you can no longer afford to take a silo-based approach to monitoring and troubleshooting IT problems. It's time for network engineers, server admins and application engineers to expand beyond their particular domains and department-specific tools. It's time to embrace a new, integrated approach to network and application monitoring that lets you view your entire IT infrastructure from a single console and resolve issues before they affect end users. It's time for applications-aware network performance monitoring (AANPM).

AANPM tools are network- and application-level data collectors, monitoring network devices as well as monitoring business-critical applications to establish cross-platform visibility. With AANPM tools, engineers can make better decisions while monitoring the applications and networks that, in turn, help maintain high performance of critical business applications. AANPM, though, must be used judiciously. Otherwise, you can easily drown in meaningless data and miss key factors.

So what's the best way to use AANPM to drive down your mean time to repair (MTTR), the metric most organizations use to measure the performance of IT service providers? By measuring the following four IT performance metrics:

  • Bandwidth utilization rate
  • End-user page response time
  • Network latency or round trip time (RTT)
  • Volume of transactions processed

Bandwidth utilization rate
This metric measures the total amount of traffic for a given period of time. Typically, bandwidth utilization is measured by analyzing packet flows, and it can be tracked for an entire organization, business unit or data center. In the most basic sense, this metric expresses link utilization as a percentage of network traffic. It's measured by using SNMP polling and flow packets (NetFlow, JFlow, SFlow, etc.).

The problems related to bandwidth utilization rates often occur when the personal, user-related activities consume excessive bandwidth, leaving very little bandwidth for business-critical applications. This can significantly lower the performance of business-critical applications and may even lead to network outages.

Benefits: AANPM tools provide engineers with capabilities such as real-time network visibility, bandwidth monitoring and traffic shaping. By using AANPM tools that collect data on both the network and the application, organizations can gain real-time visibility into where and when the network is busy. The real-time visibility helps network engineers monitor the network and prioritize which applications need additional bandwidth. These tools also help in shaping the network traffic at the network interface level with complete granularity. Therefore, by using AANPM tools, network engineers can enhance the bandwidth utilization rates for business-critical applications.

Data based on bandwidth and application usage patterns also helps managers plan and control their IT budgets.

End-user page response time
This metric identifies the time taken for the client system to process information related to the original page request. This is done by placing probes near the client system. These probes monitor turnaround time and validate if the page request has been processed in a timely manner.

Benefits: AANPM tools help you to evaluate the likely experience of users from multiple locations by identifying potential bottlenecks in resources. This way, the end-user experience of business-critical network services such as DNS, LDAP, DHCP and Mail servers can be monitored easily. Using the tools' data, engineers can reconstruct events, analyze flow forensics for identifying the traffic on key links, and replay VoIP calls. These statistics can be particularly useful for analyzing and solving historic problems related to application performance.

Using the end-user page response time statistics collected by these AANPM tools, system engineers can also monitor and track the SLAs of service providers. These same patterns of response times can further help system engineers plan and counter any overall application outages that may occur in the future.

Network latency or round trip time (RTT)
Network latency refers to the time elapsed between transferring a packet of data from the host system to the destination system, or vice-versa. Typically, it's measured using the metric round trip time (RTT), which refers to the amount of time taken for a packet to reach from source to destination and back again. ICMP ping and Cisco's IPSLA would come in handy for RTT calculations.

Ideally, the RTT should be as close to zero as possible. Excessive network latency creates bottlenecks, therefore reducing the bandwidth needed for critical applications. This network latency metric can majorly impact end-user experiences. The impact of network latency on bandwidth can be classified as intermittent (lasting a few seconds) or constant, depending on the source of the delays.

Benefits: AANPM provides performance data from both network and application perspectives that includes application response time analysis and SNMP, ICMP or CLI polling data. Network engineers can assess this data to identify and resolve problem areas, which will drastically reduce the RTT.

AANPM tools help network engineers establish a baseline for network flows under three categories: stable, degrading or unacceptable flow rate. These details can also support capacity planning, as they help network engineers determine where the bottlenecks occur and which applications require more bandwidth.

Volume of transactions processed
This metric refers to the total amount of Web transactions processed during a specific period of time. If the volume of transactions is too high, they can sit in the queue for too long. This causes client systems to reprocess the transaction requests, which may result in application outages.

Benefits: AANPM helps system engineers gain an application-centric view of events happening across the network by outlining the inter-dependencies between an application and the network. It also enables engineers to identify Web transaction data by providing insights into average end-user response times, throughput, and APDEX (application performance index) scores so that the most critical paths can be prioritized over less critical ones. System engineers can then monitor and optimize the end-user experience by assessing applications in terms of how they are deployed and how they perform. This technique can directly improve network uptime and the availability of critical business applications.

In Closing
Converged applications and network monitoring tools greatly enhance cross-team communication and collaboration. AANPM tools provide a single performance management interface that offers a holistic view of both network and application performance. Using this interface, network engineers gain deeper knowledge they need to tune their organizations' networks, servers and applications. Ultimately, that knowledge can help IT departments effectively plan and monitor network traffic, server loads, and transaction volumes as well as dramatically reduce MTTR.


Amrutha Aprameya is an IT management/marketing evangelist at ManageEngine by profession and a passionate blogger by choice. She writes extensively about technology, management consulting trends, and social causes.

More Stories By ManageEngine IT Matters

ManageEngine believes IT management can be simple and affordable. Our authors share insights and how-to tips for SMBs and large enterprises. Over 120,000 companies around the world – including three of every five Fortune 500 companies – trust our products to manage their networks, data centers, business applications, and IT services, and security. We take a straightforward, customer-centric approach to IT management software. Our customers' needs drive our product philosophy. And we've built a strong, in-house R&D team to support our product team and turn customer requests into product realities. We look forward to hearing from you.

CloudEXPO Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in multiple vertical markets. Our delegate profiles can be located in our show prospectus.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secures more than 4,000 modern applications for its Enterprise customers around the world.
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform eliminates the need to build an in-house platform or developing any specialized compute distribution capabilities. The platform significantly simplifies the deployment of containerized apps anywhere. Organizations can now achieve their desired levels of reliability, availability and performance with any combination of public cloud environments through a developer-friendly SaaS offering. From deploying ...