Welcome!

SDN Journal Authors: Elizabeth White, Pat Romanski, TJ Randall, Yeshim Deniz, Liz McMillan

Related Topics: SDN Journal, Containers Expo Blog

SDN Journal: Blog Post

Performance Management 101 By @MJannery | @CloudExpo [#SDN #Cloud]

There are two main approaches to performance: elemental and application

I've written other posts on some of the basic disciplines of management, including (so far) inventory and discovery as well as event management, and how these come in many forms and levels of implementation depending on the network management system. Same thing with performance management. Let's take a look.

There are two main approaches to performance: elemental and application.

Elemental Performance: Measurements in this area relate to the performance of the devices themselves: is data (packet) throughput what is expected?

Application Performance: Management of application performance is done by inspecting application flow through an interface. In other words, what is the application and how much data is flowing? There are various protocols for monitoring flow, including Netflow (primarily for Cisco devices and other vendors who support it), IPFIX (industry standard derived from the latest version of Cisco Netflow), Jflow (Juniper), Sflow (various vendors and standards), NBAR (Network Based Application Recognition-also Cisco), and so on.

Key to performance management is the length of history that is retained so that trending can be analyzed and prediction can be performed. Low-end solutions typically provide short history. Higher-end solutions provide much longer history.

Rudimentary network management solutions provide little to no performance data.

Basic solutions provide only elemental performance, and at a light level with very short history and light reporting capability.

Intermediate solutions provide both performance approaches, but typically in separate products (with separate costs).

Enterprise-level solutions provide both an elemental view and an application flow view of performance, in an integrated manner-performance investigations can link from elemental performance to the flow across that interface in a single button click, allowing the most efficient forensic analysis possible.

Another advanced technology used in the enterprise is IP SLA, which measures the latency and other timing metrics between two points on the network using a variety of synthetic transaction techniques. Basic network management tools do not support IPSLA, whereas enterprise class tools allow IP SLA pairs and routes to be created and reported on.

More Stories By Michael Jannery

Michael Jannery is CEO of Entuity. He is responsible for setting the overall corporate strategy, vision, and direction for the company. He brings more than 30 years of experience to Entuity with 25 years in executive management.

Prior to Entuity, he was Vice President of Marketing for Proficiency, where he established the company as the thought, technology, and market leader in a new product lifecycle management (PLM) sub-market. Earlier, Michael held VP of Marketing positions at Gradient Technologies, where he established them as a market leader in the Internet security sector, and Cayenne Software, a leader in the software and database modeling market. He began his career in engineering.

CloudEXPO Stories
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one bottle of the oil for commercial purpose. But from its medical properties to its culinary importance, skin lightening, moisturizing, and protection abilities, down to its extraordinary hair care properties, prickly seed oil has got lots of excellent rewards for anyone who pays the price.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.