Q&A: Ixia Talks About Network Visibility
November 29, 2013
Share this

In APMdigest's exclusive interview, Scott Register, Senior Director of Product Management at Ixia, talks about network visibility and its relation to APM.

APM: How do you define network visibility?

SR: Complete network visibility is a state of operation in which all application and network monitoring tools can access exactly the data they need from multiple network segments and have a complete view of the network traffic.

Although it sounds simple, it's becoming more challenging to gain this visibility just as it's becoming more crucial to do so. Networks are expanding in size, speed and complexity to deliver applications and services that are becoming increasingly business-critical. Just getting the right data to the right tool can be a monumental task, and tools can easily be overwhelmed by traffic. Often, there aren't even enough data access points for all the monitoring tools and IT teams that need them.

Network visibility is enabled by a class of technology called network monitoring switches, also known as network packet brokers. These products sit in between the network and the monitoring tool suite to deliver all required traffic from anywhere in the network to the tool, allowing 100 percent of the data to be monitored and analyzed. They also perform other functions, such as aggregating, filtering, mirroring and otherwise optimizing traffic before it is sent to analysis tools.

APM: What role does network visibility play in APM?

SR: APM in particular requires a complete end-to-end perspective. Identifying and understanding where and how problems are occurring – and catching them before users do – are key to APM. Problems can occur anywhere along the application delivery path, often in isolation. As networks grow in complexity and applications are increasingly remotely or virtually hosted, a fragmented view of the environment makes it exponentially more difficult to guarantee application delivery to meet service level agreements.

APM: What are the biggest network visibility challenges?

SR: Visibility traditionally was considered an issue for large data center networks, such as those operated by a service provider. However, today enterprises of all sizes are operating mission-critical networks that are faster, more complex and more dynamic, with more traffic. In the world of data center network and application management, the only sure things are more data, more network traffic, and more challenges in protecting the business.

Cisco's latest Global Cloud Index shows that 76 percent of network traffic today never even leaves the data center. According to Cisco, this high degree of intra-data center traffic can be attributed to functional separation of application servers, storage and databases, which generates replication, backup and read/write traffic traversing the data center. Contrast this with an older, simpler model where monitoring was focused on “the Internet connection” or at least a few identifiable choke points that all traffic went through, and you can see how the issue of visibility is growing in every network.

On a macro level, this loss of visibility is being driven by a convergence of factors: exploding mobile growth, virtualization, the adoption of 10/40/100GE networks, cloud, Big Data, and an increase in sophisticated security threats.

Consider this one statistic: IDC reports that the amount of data in the world will grow 50-fold from the beginning of 2010 to the end of 2020 - to more than 40,000 exabytes. It's highly unlikely that our network infrastructures will grow at the same rate, creating the need to develop new strategies for managing, analyzing and optimizing all this data traffic.

APM: Is visibility in virtualized environments also a big challenge?

SR: Yes. Last year, the number of applications running in virtual environments passed the 50 percent mark, according to a report from market research firm Aberdeen Group Inc. Virtualization allows significant increases in efficiency, so it's no surprise that adoption is growing at a rapid clip.

However, these advances are not without a powerful downside. The premise on which virtualization is based – multiple virtual machines (VMs) handling traffic on a single server – means a loss of traffic visibility. This becomes problematic when trying to trace a packet or to analyze packet flow at any given time. We call this inability to see what's happening in the virtual data center the “Virtual Blind Spot.”

APM: What is the solution?

SR: Certain virtualized analysis tools have hit the market, but these have problems. Virtualized environments are self-contained, and by nature, any tools developed for virtualized environments focus exclusively on the virtual. This creates a conundrum when attempting to troubleshoot or monitor the “whole story” which includes the virtual plus the physical network. How can you troubleshoot a problem when you only see part of the situation? When an application's network operations are spread across both physical and virtual links, it is impossible to diagnose or understand that application's performance without seamless integration of physical and virtual network monitoring.

To solve this challenge, solutions utilizing more capable network monitoring switches can obtain traffic from both the physical and virtual infrastructure, and optimize and broadcast it to the full suite of monitoring tools for a complete picture.

APM: How does Ixia help customers gain network visibility?

SR: At Ixia, we say our mission is to create amazing products so our customers can connect the world. Many people know our name in the context of network testing and validation, and this is still a major focus for our company. Leveraging that expertise, we also offer a leading class of solutions to enable customers to gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. These range from 100 Gb Ethernet-capable, carrier-class network monitoring switches to our newest family of products, the Ixia Net Tool Optimizer 2112/2113. These network monitoring switches are designed for smaller network deployments, enabling enterprise class network monitoring in a cost-effective and easily deployed appliance.

ABOUT Scott Register

Scott Register has more than 15 years of experience leading product management operations for global technology companies. Register is currently the Sr. Director of Product Management for Network Visibility Solutions at Ixia, after leading product management at BreakingPoint Systems prior to its acquisition by Ixia. Scott has previously led product lines for Blue Coat, Permeo, and Check Point Software. Register has also served as a member of the research faculty at a major university. He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology.

Related Links:

www.ixiacom.com

Ixia Introduces New Family of Net Tool Optimizer Products

Net Optics to be Acquired by Ixia

Cisco's Global Cloud Index

Share this

The Latest

July 29, 2016

System Administrators (SysAdmins) are every organization’s unsung heroes. Whether it’s diagnosing performance bottlenecks or preventing data loss, application downtime, service outages and more, SysAdmins keep data centers running and work tirelessly behind the scenes to keep all the technology modern businesses have come to rely so heavily upon running smoothly. SolarWinds has developed these e-cards as a fun way to say “thank you” ...

July 28, 2016

IT has access to an amazing amount of data. Often we collect hundreds of data points on one server such as individual processor load, thread state, disk throughput both in and out etc. We then store this in a bin and use this to create a metric called something similar to server performance ...

July 27, 2016

Today's IT managers and engineers have an incredible arsenal of powerful tactical tools; APM, NPM, BSM, EUEM and the list goes on. The strength of these tools, their narrow, bottom-up focus, is also the cause of a real problem for businesses. These narrow tools miss issues that stem from the hand-off from one node or application to the next. The monitoring tools can't see the data falling into the gaps ...

July 25, 2016

After many science fiction plots and decades of research, Artificial Intelligence (AI) is being applied across industries for a wide variety of purposes. AI, Big Data and human domain knowledge are converging to create possibilities formerly only dreamed of. The time is ripe for IT operations to incorporate AI into its processes ...

July 22, 2016

More than $1 trillion in IT spending will be directly or indirectly affected by the shift to cloud during the next five years, according to Gartner, Inc. This will make cloud computing one of the most disruptive forces of IT spending since the early days of the digital age ...

July 21, 2016

One of the most common problems network monitoring tools are employed to solve are problems with bandwidth. Availability is critical for IT departments of all sizes, and slow bandwidth creates productivity problems and even outages that have a real effect on businesses. Identifying the problems behind bandwidth drains can be difficult, so to help, I’ve put together a list of the five most common causes of sudden traffic spikes ...

July 20, 2016

In 2014 Gartner predicted that "75 percent of IT organizations will be bi-modal in some way by 2017." We are in the midst of this two-speed IT approach that organizations are adopting at an increasing rate to stay relevant for their customers. Speed 1 is the traditional IT that is being managed by the IT Operations persona and Speed 2 is the agile IT where within the organization especially the Developer persona and the Line of Business Persona are involved to get the most out of the digital innovations that flood our daily lives. One thing that these personas have in common is that they have a need for monitoring. In this blog I will focus on the needs of the various personas ...

July 19, 2016

While shoppers enjoy the bargains on Prime Day – a 24-hour sale on Amazon – few may realize that the success of such massive events hinges on network and application performance ...

July 18, 2016

I am constantly hearing the common theme that organizations want to make their IT-dependent employees and customers top priority in order to better support business growth. However, what I then find contradictory is while the desire is there, it's a significant challenge for organizations to actually achieve this. Here are four common barriers to business transformation initiatives – and suggested steps enterprises can take to overcome them ...

July 15, 2016

You already see the potential of adopting an Internet of Things model into your enterprise, but are you doing it in the best way? The following are four questions you and your team should be answering to determine how to find the right opportunity in the IoT space for your business ...