In APMdigest's exclusive interview, Scott Register, Senior Director of Product Management at Ixia, talks about network visibility and its relation to APM.
APM: How do you define network visibility?
SR: Complete network visibility is a state of operation in which all application and network monitoring tools can access exactly the data they need from multiple network segments and have a complete view of the network traffic.
Although it sounds simple, it's becoming more challenging to gain this visibility just as it's becoming more crucial to do so. Networks are expanding in size, speed and complexity to deliver applications and services that are becoming increasingly business-critical. Just getting the right data to the right tool can be a monumental task, and tools can easily be overwhelmed by traffic. Often, there aren't even enough data access points for all the monitoring tools and IT teams that need them.
Network visibility is enabled by a class of technology called network monitoring switches, also known as network packet brokers. These products sit in between the network and the monitoring tool suite to deliver all required traffic from anywhere in the network to the tool, allowing 100 percent of the data to be monitored and analyzed. They also perform other functions, such as aggregating, filtering, mirroring and otherwise optimizing traffic before it is sent to analysis tools.
APM: What role does network visibility play in APM?
SR: APM in particular requires a complete end-to-end perspective. Identifying and understanding where and how problems are occurring – and catching them before users do – are key to APM. Problems can occur anywhere along the application delivery path, often in isolation. As networks grow in complexity and applications are increasingly remotely or virtually hosted, a fragmented view of the environment makes it exponentially more difficult to guarantee application delivery to meet service level agreements.
APM: What are the biggest network visibility challenges?
SR: Visibility traditionally was considered an issue for large data center networks, such as those operated by a service provider. However, today enterprises of all sizes are operating mission-critical networks that are faster, more complex and more dynamic, with more traffic. In the world of data center network and application management, the only sure things are more data, more network traffic, and more challenges in protecting the business.
Cisco's latest Global Cloud Index shows that 76 percent of network traffic today never even leaves the data center. According to Cisco, this high degree of intra-data center traffic can be attributed to functional separation of application servers, storage and databases, which generates replication, backup and read/write traffic traversing the data center. Contrast this with an older, simpler model where monitoring was focused on “the Internet connection” or at least a few identifiable choke points that all traffic went through, and you can see how the issue of visibility is growing in every network.
On a macro level, this loss of visibility is being driven by a convergence of factors: exploding mobile growth, virtualization, the adoption of 10/40/100GE networks, cloud, Big Data, and an increase in sophisticated security threats.
Consider this one statistic: IDC reports that the amount of data in the world will grow 50-fold from the beginning of 2010 to the end of 2020 - to more than 40,000 exabytes. It's highly unlikely that our network infrastructures will grow at the same rate, creating the need to develop new strategies for managing, analyzing and optimizing all this data traffic.
APM: Is visibility in virtualized environments also a big challenge?
SR: Yes. Last year, the number of applications running in virtual environments passed the 50 percent mark, according to a report from market research firm Aberdeen Group Inc. Virtualization allows significant increases in efficiency, so it's no surprise that adoption is growing at a rapid clip.
However, these advances are not without a powerful downside. The premise on which virtualization is based – multiple virtual machines (VMs) handling traffic on a single server – means a loss of traffic visibility. This becomes problematic when trying to trace a packet or to analyze packet flow at any given time. We call this inability to see what's happening in the virtual data center the “Virtual Blind Spot.”
APM: What is the solution?
SR: Certain virtualized analysis tools have hit the market, but these have problems. Virtualized environments are self-contained, and by nature, any tools developed for virtualized environments focus exclusively on the virtual. This creates a conundrum when attempting to troubleshoot or monitor the “whole story” which includes the virtual plus the physical network. How can you troubleshoot a problem when you only see part of the situation? When an application's network operations are spread across both physical and virtual links, it is impossible to diagnose or understand that application's performance without seamless integration of physical and virtual network monitoring.
To solve this challenge, solutions utilizing more capable network monitoring switches can obtain traffic from both the physical and virtual infrastructure, and optimize and broadcast it to the full suite of monitoring tools for a complete picture.
APM: How does Ixia help customers gain network visibility?
SR: At Ixia, we say our mission is to create amazing products so our customers can connect the world. Many people know our name in the context of network testing and validation, and this is still a major focus for our company. Leveraging that expertise, we also offer a leading class of solutions to enable customers to gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. These range from 100 Gb Ethernet-capable, carrier-class network monitoring switches to our newest family of products, the Ixia Net Tool Optimizer 2112/2113. These network monitoring switches are designed for smaller network deployments, enabling enterprise class network monitoring in a cost-effective and easily deployed appliance.
ABOUT Scott Register
Scott Register has more than 15 years of experience leading product management operations for global technology companies. Register is currently the Sr. Director of Product Management for Network Visibility Solutions at Ixia, after leading product management at BreakingPoint Systems prior to its acquisition by Ixia. Scott has previously led product lines for Blue Coat, Permeo, and Check Point Software. Register has also served as a member of the research faculty at a major university. He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology.
Related Links:
Ixia Introduces New Family of Net Tool Optimizer Products
The Latest
Broad proliferation of cloud infrastructure combined with continued support for remote workers is driving increased complexity and visibility challenges for network operations teams, according to new research conducted by Dimensional Research and sponsored by Broadcom ...
New research from ServiceNow and ThoughtLab reveals that less than 30% of banks feel their transformation efforts are meeting evolving customer digital needs. Additionally, 52% say they must revamp their strategy to counter competition from outside the sector. Adapting to these challenges isn't just about staying competitive — it's about staying in business ...
Leaders in the financial services sector are bullish on AI, with 95% of business and IT decision makers saying that AI is a top C-Suite priority, and 96% of respondents believing it provides their business a competitive advantage, according to Riverbed's Global AI and Digital Experience Survey ...
SLOs have long been a staple for DevOps teams to monitor the health of their applications and infrastructure ... Now, as digital trends have shifted, more and more teams are looking to adapt this model for the mobile environment. This, however, is not without its challenges ...
Modernizing IT infrastructure has become essential for organizations striving to remain competitive. This modernization extends beyond merely upgrading hardware or software; it involves strategically leveraging new technologies like AI and cloud computing to enhance operational efficiency, increase data accessibility, and improve the end-user experience ...
AI sure grew fast in popularity, but are AI apps any good? ... If companies are going to keep integrating AI applications into their tech stack at the rate they are, then they need to be aware of AI's limitations. More importantly, they need to evolve their testing regiment ...
If you were lucky, you found out about the massive CrowdStrike/Microsoft outage last July by reading about it over coffee. Those less fortunate were awoken hours earlier by frantic calls from work ... Whether you were directly affected or not, there's an important lesson: all organizations should be conducting in-depth reviews of testing and change management ...
In MEAN TIME TO INSIGHT Episode 11, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Secure Access Service Edge (SASE) ...
On average, only 48% of digital initiatives enterprise-wide meet or exceed their business outcome targets according to Gartner's annual global survey of CIOs and technology executives ...
Artificial intelligence (AI) is rapidly reshaping industries around the world. From optimizing business processes to unlocking new levels of innovation, AI is a critical driver of success for modern enterprises. As a result, business leaders — from DevOps engineers to CTOs — are under pressure to incorporate AI into their workflows to stay competitive. But the question isn't whether AI should be adopted — it's how ...